This is the last call for comments for the review of debconf
templates for yubico-pam.

The reviewed templates will be sent on Friday, January 13, 2012 to this bug 
report
and a mail will be sent to this list with "[BTS]" as a subject tag.


-- 


Template: libpam-yubico/module_args
Type: string
Default: mode=client try_first_pass id=N key=K
_Description: Parameters for Yubico PAM:
 The Yubico PAM module supports two modes of operation: online
 validation of YubiKey OTPs or offline validation of YubiKey HMAC-SHA-1
 responses to challenges.
 .
 The default is online validation, and for that to work you need to get
 a free API key at https://upgrade.yubico.com/getapikey/ and
 enter the key id as "id=NNNN" and the base64 secret as "key=...".
 .
 All the available parameters for the Yubico PAM module are described
 in /usr/share/doc/libpam-yubico/README.gz. To avoid accidental
 lock-outs the module will not be active until it is enabled with the
 "pam-auth-update" command.
Source: yubico-pam
Maintainer: Yubico Open Source Maintainers <ossma...@yubico.com>
Uploaders: Fredrik Thulin <fred...@yubico.com>, Simon Josefsson 
<si...@josefsson.org>
Section: admin
Priority: optional
Build-Depends: debhelper (>= 8),
               po-debconf,
               pkg-config,
               cdbs,
               libykclient-dev (>= 2.4),
               libpam0g-dev,
               libldap2-dev,
               libykpers-1-dev (>= 1.5.2),
               libyubikey-dev
Standards-Version: 3.9.2
Homepage: http://code.google.com/p/yubico-pam/
DM-Upload-Allowed: yes

Package: libpam-yubico
Architecture: any
Depends: libpam-runtime (>= 1.0.1-6~),
         libykclient3 (>= 2.4),
         libldap-2.4-2,
         libykpers-1-1 (>= 1.5.2),
         debconf | debconf-2.0,
         ${shlibs:Depends},
         ${misc:Depends}
Description: two-factor password and Yubikey OTP PAM module
 This package provides the Yubico PAM module. It enables the use of
 two-factor authentication, with existing logins and passwords plus
 a YubiKey One-Time Password that is validated against an online
 validation service. The default is the free YubiCloud, but it is easy
 to set up a custom service.
 .
 A second mode of operation is available using the YubiKey's HMAC-SHA-1
 Challenge-Response functionality. This allows for offline validation
 using a YubiKey, for example on a laptop computer. However, this only
 works for local logins, not for instance SSH logins.

Attachment: signature.asc
Description: Digital signature

Reply via email to