yubico-pam 2.19-1 source package in Ubuntu
Changelog
yubico-pam (2.19-1) unstable; urgency=low * New upstream version. -- Simon Josefsson <email address hidden> Wed, 15 Apr 2015 15:19:27 +0200
Upload details
- Uploaded by:
- Debian Authentication Maintainers
- Uploaded to:
- Sid
- Original maintainer:
- Debian Authentication Maintainers
- Architectures:
- any
- Section:
- admin
- Urgency:
- Low Urgency
See full publishing history Publishing
Series | Published | Component | Section |
---|
Downloads
File | Size | SHA-256 Checksum |
---|---|---|
yubico-pam_2.19-1.dsc | 1.8 KiB | 623f5af87e64ce1e40c3fb9662a016053f474d79fe60cf4e56a5614065ba8f79 |
yubico-pam_2.19.orig.tar.gz | 400.5 KiB | ed6e5841bb5104528a2155cb4b35bea18ebf3ddd8a4faf59eca3b1e2ac9c50ef |
yubico-pam_2.19-1.debian.tar.xz | 29.2 KiB | fad63238a33e38d605ee3caffe8a5845c6541c3f6adaa99b0f555abfb8d18e60 |
Available diffs
- diff from 2.17-2 to 2.19-1 (91.2 KiB)
No changes file available.
Binary packages built by this source
- libpam-yubico: two-factor password and YubiKey OTP PAM module
This package provides the Yubico PAM module. It enables the use of
two-factor authentication, with existing logins and passwords plus
a YubiKey One-Time Password that is validated against an online
validation service. The default is the free YubiCloud, but it is easy
to set up a custom service.
.
A second mode of operation is available using the YubiKey's HMAC-SHA-1
Challenge-Response functionality. This allows for offline validation
using a YubiKey, for example on a laptop computer. However, this only
works for local logins, not for instance SSH logins.
- libpam-yubico-dbgsym: debug symbols for package libpam-yubico
This package provides the Yubico PAM module. It enables the use of
two-factor authentication, with existing logins and passwords plus
a YubiKey One-Time Password that is validated against an online
validation service. The default is the free YubiCloud, but it is easy
to set up a custom service.
.
A second mode of operation is available using the YubiKey's HMAC-SHA-1
Challenge-Response functionality. This allows for offline validation
using a YubiKey, for example on a laptop computer. However, this only
works for local logins, not for instance SSH logins.