Home
        GNU|Linux smartcard logon using PAM
         Contents
1.    Default pkcs11 module   pkcs11_module default     module    usr lib pam_pkcs11 pkcs11_module so   description    Default pkcs 11 module    slot_num   0    support_threads   false    ca_dir    etc pam_pkcs11 cacerts    crl_dir    etc pam_pkcs11 crls    cert_policy   none       Which mappers   Cert to login   to use      you Can use several mappers          Subject   Cert Subject to login file based mapper     pwent   CN to getpwent   login or gecos fields mapper     ldap   LDAP mapper     opensc   Search certificate in    HOME   eid authorized_certificates    openssh   Search certificate public key in   HOME   ssh authorized_keys    mail   Compare email fields from certificate     ms   Use Microsoft Universal Principal Name extension     krb   Compare againts Kerberos Principal Name     cn   Compare Common Name  CN      uid   Compare Unique Identifier     digest   Certificate digest to login  mapfile based  mapper    generic   User defined certificate contents mapped     null   blind access deny mapper         You can select a comma separated mapper list      If used null mapper should be the last in the list         Also you should select at least one mapper  otherwise     certificate will not match       use_mappers   digest  cn  pwent  uid  mail  subject  null       When no absolute path or module info is provided  use this     value as module search path     TODO      This is not still functional  use absolute pathnames or LD_LIBRARY_PATH  mapper_search_path    usr lib 
2.    etc pam_pkcs11 crls       Some pcks 11 libraries can handle multithreading  So    set it to true to properly call C_Initialize    support threads   false       Sets the Certificate verification policy       none  Performs no verification      ca  Does CA check      crl_online  Downloads the CRL form the location given by the    CRL distribution point extension of the certificate      crl_offline  Uses the locally stored CRLs      crl_auto  Is a combination of online and offline  it first     tries to download the CRL from a possibly given CRL     distribution point and if this fails  uses the local     CRLs      signature  Does also a signature check to ensure that private    and public key matches     You can use a combination of ca crl  and signature flags  or just    use  none     cert policy   ca signature       What kind of token      The value of the token_type parameter will be used in the user prompt    messages  The default value is  Smart card     token_type    Smart card      3    Aladdin eTokenPRO 32       Copyright GOOZE 2010 2014 http   www gooze eu 6 17    GNU Linux smartcard logon using PAM PKCS11    pkcs11_module etoken     module    usr local lib libetpkcs11 so  description    Aladdin eTokenPRO 32    slot num   0    support threads   true    ca_dir    etc pam_pkcs11 cacerts   crl_dir    etc pam_pkcs11 crls    cert policy   ca signature       NSS  Network Security Service  config  pkcs11_module nss     nss_dir    etc ssl nssdb    crl policy   none         
3.   krb   Compare againts Kerberos Principal Name  mapper krb     debug   false    module   internal      module    usr lib pam_pkcs11 krb_mapper so   ignorecase   false    mapfile    none             uid   Maps Subject Unique Identifier field  if exist  to login  mapper uid     debug   false    module   internal      module    usr lib pam_pkcs11 uid_mapper so   ignorecase   false    mapfile    none             digest   elaborate certificate digest and map it into a file  mapper digest     debug   false    module   internal      module    usr lib pam_pkcs11 digest_mapper so      algorithm used to evaluate certificate digest     Select one of       null   md2   md4   md5   sha   shal   dss   dss1   ripemd160   algorithm    shal     mapfile   file    etc pam pkcs11 digest mapping   11      mapfile    none                 Copyright GOOZE 2010 2014 http   www gooze eu 10 17    GNU Linux smartcard logon using PAM PKCS11    We will use this configuration in the next section     X 509 certificate verification    Verifying the Certificate Authority  CA  is a preliminary operation before authentication  with one limitation     e Only local CAs can be verified   e Online CAs like CAcert org or StartSSL cannot be verified     Why is CA verification limited     According to OpenSC pam pkcs11 documentation  1   there is a limitation in OpenSSL preventing online CA validation     But we doubt that OpenSSL is limited  We think there may be a bug in pam_pkcs11     Therefore  we are considering
4.  2 0 1   Installed  local or obsolete   O    libpam pgsql 0 7 4   Installed  manual  SAO E  3    libpam pkcs11   Not installed   REIMER ee Pee  O O libpam poldi 0 4 1 2   n  ln O O libpam pwdfile 0 99 3 1  O O libpam pwgen N 0 1 2 LI  LA i ak man aa e  f B   n  Descnption   Common Dependencies Installed Files Versions  Sections Fully featured PAM module for using for using    PKCS 11 smart cards     Status  Get Screenshot  Origin    A Pluggable Authentication Module for PKCS 11 based smart  Custom Filters cards  Useful for         gt  enabling smart card based user login to a system  H       Search Results          32308 packages listed  3146 installed  0 broken  1 to installjupgrade  0 to remove  5423 kB will be used    Installation from sources    Use SVN to fetch the latest trunk      svn co http   www opensc project org svn pam pkcs11 trunk  6  pam_pkcs11       Compile and install      tar xvzf pkcs11_login X Y Z tar gz    cd pkcs11_login X YZ       configure      make    sudo make install    Configuring Pam_PKCS11    PAM configuration files are stored in the  etc pam d  directory     PAM common files       Copyright GOOZE 2010 2014 http   www gooze eu    2 17    GNU Linux smartcard logon using PAM PKCS11    Let us have a look at the common auth configuration file     cat  etc pam d common auth  This displays         here are the per package modules  the  Primary  block    auth  success 1 default ignore  pam_unix so nullok_secure     here s the fallback if no module succe
5.  etc pam_pkcs11 pam_pkcs11 conf       Copyright GOOZE 2010 2014 http   www gooze eu    13 17    GNU Linux smartcard logon using PAM PKCS11    use_mappers   opensc  null   In each user directory  create an  eid folder       mkdir  p    eid    chmod og     eid    Query X 509 certificates on your smartcard       pkcs15 tool   list certificates    Using reader with a card  Feitian SCR301 01 00  X 509 Certificate   Flags   2   Authority  no   Path   3f0050153100   ID   7645d913d5b4e03f3fe54816ff02324c23a7ebf4    Extract the X 509 certificate with ID 7645d913d5b4e03f3fe54816ff02324c23a7ebf4 to   eid authorized_certificates       pkcs15 tool   read certificate 7645d913d5b4e03f3fe54816ff02324c23a7ebf4  o      eid authorized_certificates    OpenSSH user mapper    Notice these lines in  etc pam_pkcs11 pam_pkcs11 conf       Search public keys from  HOME  ssh authorized_keys to match users  mapper openssh 1    debug   true   module    lib pam_pkcs11 openssh_mapper so        Edit  etc pam_pkcs11 pam_pkcs11 conf and add OpenSSH mapper   use_mappers   openssh  null   Query the RSA public keys on your card        pkcs15 tool   list public keys    Using reader with a card  Feitian SCR301 01 00  Public RSA Key  Private Key    Com  Flags   2   Usage    0x4   sign   Access Flags   0x0    ModLength   2048   Key ref   0   Native   no   Path   3f0050153000   Auth ID    ID   c6f280080fb0ed1ebff0480a01d00a98a1b3b89a    In the example  we have one public key with ID c61280080fb0ed1ebff0480a01d00a98a1b
6.  etc pam_pkcs11 pam_pkcs11 conf  set   cert_policy   signature     We are not very sure of what  signature  means  but it proved to work in offline mode     Avoid authentication on simple values like  email    subject  or any value that could be easily forked to create false smartcards   When using online CAs without validation  only use public keys to map users      1  http   www opensc project org doc pam_pkcs11 pam_pkcs11 html configfile  12        X 509 user mapping    Ina second phase  certificates are mapped to user accounts according to rules configured in   etc pam_pkcs11 pam_pkcs11 conf      Which mappers   Cert to login   to use      you Can use several mappers          Subject   Cert Subject to login file based mapper     pwent   CN to getpwent   login or gecos fields mapper     ldap   LDAP mapper     opensc   Search certificate in    HOME   eid authorized_certificates    openssh   Search certificate public key in   HOME   ssh authorized_keys    mail   Compare email fields from certificate     ms   Use Microsoft Universal Principal Name extension     krb   Compare againts Kerberos Principal Name     cn   Compare Common Name  CN       uid   Compare Unique Identifier     digest   Certificate digest to login  mapfile based  mapper    generic   User defined certificate contents mapped     null   blind access deny mapper         You can select a comma separated mapper list      If used null mapper should be the last in the list         Also you should select at least on
7.  false      module    usr lib pam_pkcs11 null_mapper so    module   internal       select behavior  always match  or always fail   default_match   false      on match  select returned user   default_user   nobody           Directory   Idap style   mapper       Copyright GOOZE 2010 2014 http   www gooze eu 8 17    GNU Linux smartcard logon using PAM PKCS11    mapper Idap     debug   false    module    usr lib pam_pkcs11 ldap_mapper so      hostname of Idap server  use LDAP URI for more then one   Idaphost           Port on Idap server to connect  this is also the default    if no port is given in URI below     if empty  then 389 for TLS and 636 for SSL is used  Idapport         space separted list of LDAP URIs  URIs are used by given order   URI         Scope of search  0 2     Default is 1    one   meaning the set of records one     level below the basedn      0    base  means search only the basedn  and     2    sub  means the union of entries at the  base  level    and   all or  one  level below     FIXME   scope   2      DN to bind with  Must have read access for user entries    under  base    binddn    cn pam o example c com       Password for above DN   passwd           Searchbase for user entries   base    ou People o example c com       Attribute of user entry which contains the certificate  attribute    userCertificate       Searchfilter for user entry  Must only let pass user entry    for the login user    filter      amp  objectClass posixAccount  uid  s        SSL 
8.  two scenarios     Scenario 1  local CA    A local CA is managed localy on your computer   pam pkcs11 needs a list of authorized certificate authorities  CAs  and a Certificate Revocation List  CRL      Notice these lines in  etc pam_pkcs11 pam_pkcs11 conf       Where are CA certificates stored      You can setup this value to      1  A directory with openssl hash links to all certificates    2  A CA file in PEM   pem  or ASNI   cer  format      containing all allowed CA certs     The default value is  etc pam_pkcs11 cacerts    ca_dir    etc pam_pkcs11 cacerts     Create the needed folder     mkdir  etc pam_pkcs11 cacerts     Copy CA certificates in  etc pam_pkcs11 cacerts in PEM format     Create hash links using OpenSC pkcs11_make_hash_link utility      pkcs11_make_hash_link  etc pam_pkcs11 cacerts   As for CRL  notice these lines in  etc pam_pkcs11 pam_pkcs11 conf      Path to the directory where the local  offline  CRLs are stored     Same convention as above is applied  you can choose either    hash link directory or CRL file     The default value is  etc pam_pkcs11 crls    crl_dir    etc pam_pkcs11 crls     Create the needed folder        Copyright GOOZE 2010 2014 http   www gooze eu    11 17    GNU Linux smartcard logon using PAM PKCS11      mkdir  etc pam_pkcs11 crls     Copy your CRL file in  etc pam_pkcs11 crls     Finaly  set policy to     cert_policy   ca signature crl_auto     Scenario 2  online CA   An online CA is a certification Authority like CAcert org   In 
9. 3b89a     Now  extract and copy the RSA public key to    ssh authorized_keys        Copyright GOOZE 2010 2014 http   www gooze eu    14 17    GNU Linux smartcard logon using PAM PKCS11     pkcs15 tool   read ssh key c6f280080fb0ed1ebff0480a01d00a98a1b3b89a  o    ssh authorized_keys    Using reader with a card  Feitian SCR301 01 00  Please enter PIN  User PIN      Testing single sign on logon  sso   Now  you should be able to logon using your smartcard       su foo    Please insert your Smart card or enter your username    Found the Smart card    Welcome Francois P amp rou  User PIN     Smart card PIN           DEBUG openssh_mapper c 387  OpenSSH mapper started  debug  1  mapfile    etc pam_pkcs11 authorized_keys    Gnome smartcard screen locking    For security  it may be useful to lock the screen when the card is removed     Modify this file   etc pam_pkcs11 card_eventmgr conf    pkcs11_eventmgr        Run in background  Implies debug false if true  daemon   true       show debug messages   debug   false       polling time in seconds  polling time   1       expire time in seconds    default   0   no expire    expire time   0       pkcs11 module to use  pkcs11_module    usr lib opensc pkcs11 so          list of events and actions      Card inserted   event card_insert       what to do if an action fail      ignore   continue to next action    return   end action sequence    quit   end program   on_error   ignore       You can enter several  comma separated action entries    t
10. GNU Linux smartcard logon using PAM PKCS11     gt     Published on Gooze  http   www gooze eu           Home  gt  GNUJLinux smartcard logon using PAM PKCS11       GNUILinux smartcard logon using PAM PKCS11    This guide describes how to logon a GNU Linux host using PAM_PKCS11     Audience    This tutorial is suited for users who would like to secure access to several workstations using smartcards and X 509  certificates  As PAM_PKCS11 is able to verify X 509 certificates and Certificate Revocation List  CRL  it is well suited for  organizations     This tutorial does not cover the case of an LDAP mapping  which will be a future tutorial     Prerequisites       As a prerequisite  you should read our smart card quickstarter guide  1   in order to learn how to install and configure smartcards     Hereafter  we consider that you installed a smart card reader and configured a smart card either with a self signed certificate or  a free X 509 certificate like offered by CAcert org community  Make sure to backup your certificates and keys as explained  previously  because you will not be able to extract private keys from your smart card     PAM and PAM PKCS11 features    GNU Linux uses PAM  Pluggable Authentication Modules  to authenticate using a variety of methods   PAM is installed on every workstation  PAM documentation can be read in details  The Linux PAM System Administrators    Guide     2      PAM_PKCS11 is an OpenSC  3  project designed for authentication using smartcards a
11. S11 configuration file       Copyright GOOZE 2010 2014 http   www gooze eu 4 17    GNU Linux smartcard logon using PAM PKCS11    We also need to install the  etc pam_pkcs11 conf file  which is not installed by default     Create a pam pkcs11 folder     sudo mkdir  etc pam_pkcs11    Create an empty pam_pkcs11 conf file using the pam_pkcs11 default configuration file  This file is not installed by defaut  so we  need to install it     As root       cp  usr share doc libpam pkcs11 examples pam_pkcs11 conf example gz  etc pam_pkcs11     cd  etc pam_pkcs11      gunzip pam _pkcs11 conf example gz     mv pam_pkcs11 conf example pam_pkcs11 conf    For information  you can explore content of pam_pkcs11 conf     cat  etc pam_pkcs11 pam_pkcs11 conf  This displays           Configuration file for pam_pkcs11 module        Version 0 4     Author  Juan Antonio Martinez       pam_pkcs11 1     Allow empty passwords   nullok   true       Enable debugging support   debug   true       Do not prompt the user for the passwords but take them from the    PAM_ items instead   use first_pass   false       Do not prompt the user for the passwords unless PAM  OLD AUTHTOK    is unset   try_first_pass   false       Like try_first_pass  but fail if the new PAM _AUTHTOK has not been    previously set  intended for stacking password modules only    use _authtok   false       Filename of the PKCS  11 module  The default value is  default   use pkcs11_module   opensc     pkcs11_module opensc 1  module    usr l
12. TLS Switch     This is a global switch  you can t switch between     SSL or TLS and non secured connections per URI      values  off  standard   tls or on  ssl  or ssl   ssl   tls     SSL specific settings     tls_randfile         tls_cacertfile    etc ssl cacert pem     tls_cacertdir         tls_checkpeer   0    tls_ciphers          tls_cert         tls_key                Assume common name  CN  to be the login  mapper cn     debug   false    module   internal      module    usr lib pam_pkcs11 cn_mapper so   ignorecase   true      mapfile   file    etc pam_pkcs11 cn_map   9   mapfile    none             mail   Compare email field from certificate       Copyright GOOZE 2010 2014 http   www gooze eu 9 17    GNU Linux smartcard logon using PAM PKCS11    mapper mail     debug   false    module   internal      module    usr lib pam_pkcs11 mail_mapper so     Declare mapfile or     leave empty    or  none  to use no map   mapfile   file    etc pam_pkcs11 mail_ mapping   10     Some certs store email in uppercase  take care on this  ignorecase   true      Also check that host matches mx domain     when using mapfile this feature is ignored  ignoredomain   false            ms   Use Microsoft Universal Principal Name extension     UPN is in format login ADS_Domain  No map is needed  just    check domain name    mapper ms     debug   false    module   internal      module    usr lib pam_pkcs11 ms_mapper so    ignorecase   false    ignoredomain   false    domain    domain com           
13. e mapper  otherwise     certificate will not match       use_mappers   digest  cn  pwent  uid  mail  subject  null     use_mappers can have several values        Copyright GOOZE 2010 2014 http   www gooze eu 12 17    GNU Linux smartcard logon using PAM PKCS11    The most common mappers are  mail  subject  opensc and openssh   Idap is not described here and will be described in another tutorial     Email user mapper    Mail mapping is only secure when the CA was verified   itis also a convenient way to test pam_pkcs11 settings     Define the mapper   use_mappers   mail   Create  etc pam_pkcs11 mail_mapping      mapping file for Certificate E email    format  email   gt  login    foo bar com  13    gt  foo    Adapt to your user and email     Subject user mapper    Define the mapper    use_mappers   subject    Create  etc pam_pkcs11 mail_mapping     Mapping file for Certificate Subject     format  Certificate Subject   gt  login        C ES O FNMT OU FNMT Clase 2 CA OU 500051483 CN NOMBRE MARTINEZ  CASTA xF 10 JUAN ANTONIO   NIF 50431138G   gt  foo    Adapt to your subject and user     OpenSC user mapper    Notice these lines in  etc pam_pkcs11 pam_pkcs11 conf       Search certificates from  HOME  eid authorized_certificates to match users  mapper opensc      debug   false   module    usr lib pam_pkcs11 opensc_mapper so        The module path is wrong on Debian systems  it should be   module    lib pam_pkcs11 opensc_mapper so     Configure PAM pkcs11 to use OpenSC mapper   Edit 
14. eds   auth requisite pam_deny so     prime the stack with a positive return value if there isn t one already      this avoids us returning an error just because nothing sets a success code    since the modules above will each just jump around   auth required pam_permit so     end of pam auth update config    As of pam 1 0 1 6  this file is managed by pam auth update by default     To take advantage of this  it is recommended that you configure any local modules either before or after the default block  and  use pam auth update to manage selection of other modules     pam config mechanism stores templates in  usr share pam configs   Let us explore this directory       Is  usr share pam configs    consolekit gnome keyring unix    Now we simply create a template for pam_p11 login   Create an empty file  usr share pam configs pkcs11 and add     Name  Pam_pkcs11   Default  yes   Priority  800   Auth Type  Primary   Auth  sufficient pam_pkcs11 so config_file  etc pam_pkcs11 pam_pkcs11 conf  To regenerate PAM configuration files  we need to execute       pam auth update    A Debian configuration dialog is displayed        Copyright GOOZE 2010 2014 http   www gooze eu 3 17    GNU Linux smartcard logon using PAM PKCS11       jmpoure acer     File Edit View Terminal Help  Package con    Pluggable Authentication Modules  PAM  determine how authentication   authorization  and password changing are handled on the system  as well  as allowing configuration of additional actions to take whe
15. hey will be executed in turn  action    gnome screensaver command   poke         Copyright GOOZE 2010 2014 http   www gooze eu    15 17    GNU Linux smartcard logon using PAM PKCS11           Card has been removed   event card_remove     on_error   ignore    action    gnome screensaver command   lock             Too much time card removed  event expire time 1   on_error   ignore    action     bin false              If you would like a more granular configuration based on users     You may specify in  etc pam_pkcs11 card_eventmgr conf    pkcs11_eventmgr     nodebug   nodaemon   polling time 5   config_file    HOME   pkcs11_eventmgr conf    And move  pkcs11_eventmgr conf in each user directory     References   To study PAM PKCS11 mapping  you may refer to PAM PKCS11 User Manual  14    Known issues   PAM PKCS11 version 0 6 7    When pam_pkcs11 authorizes it asks for all private keys from card and chooses the first one  found       Issue  http   www gooze eu forums support epass2003 pam pkcs11  15   Solution  install PAM PKCS11 from source using SVN as described in our manual     Copyright GOOZE EU 2011           Source URL  http   www gooze eu howto gnu linux smartcard logon using pam pkcs11    Links     1  http  Awww gooze eu howto smart card quickstarter guide    2  http  Avww kernel org pub linux libs pam Linux PAM html Linux PAM_SAG html   S  http   www opensc project org    4  http   www opensc project org pam_pkcs11     5  http   www gooze eu howto gnu linux smart card log
16. ib opensc pkcs11 so   description    OpenSC PKCS 11 module        Which slot to use     You can use  slot_num  or  slot_description   but not both  to specify    the slot to use  Using  slot description  is preferred because the       Copyright GOOZE 2010 2014 http   www gooze eu 5 17    GNU Linux smartcard logon using PAM PKCS11      PKCS 11 specification does not guarantee slot ordering   slot_num  should    only be used with those PKCS 11 implementations that guarantee    constant slot numbering          slot_description    xxxx      The slot is specified by the slot description  for example      slot_description    Sun Crypto Softtoken   The default value is      none  which means to use the first slot with an available token          slot_num   a_number     The Slot is specified by the slot number  for example  slot_num   1     The default value is zero which means to use the first slot with an    available token        slot_description    none        Where are CA certificates stored      You can setup this value to      1  A directory with openssl hash links to all certificates    2  A CA file in PEM   pem  or ASNI   cer  format      containing all allowed CA certs     The default value is  etc pam_pkcs11 cacerts    ca_dir    etc pam_pkcs11 cacerts       Path to the directory where the local  offline  CRLs are stored     Same convention as above is applied  you can choose either    hash link directory or CRL file     The default value is  etc pam_pkcs11 crls    crl_dir 
17. n starting  user sessions     Some PAM module packages provide profiles that can be used to  automatically adjust the behavior of all PAM using applications on the  system  Please indicate which of these behaviors you wish to enable     PAM profiles to enable     ring management     lt Cancel gt           Make sure  Unix authentication    is enabled  otherwise there is a risk to lose the ability to connect using passwords   Enable  libpam pkcs11  and Disable  libpam p11  to avoid a separate access system using smart cards   Click Okay     Let us have a look at the common session configuration file       cat  etc pam d common auth      here are the per package modules  the  Primary  block    auth sufficient pam_pkcs11 so config_file  etc pam_pkcs11 pam_pkcs11 conf  auth  success 1 default ignore  pam_unix so nullok_secure try_first_pass     here s the fallback if no module succeeds   auth requisite pam_deny so     prime the stack with a positive return value if there isn t one already      this avoids us returning an error just because nothing sets a success code    since the modules above will each just jump around   auth required pam_permit so     and here are more per package modules  the  Additional  block      end of pam auth update config    Again  make sure that this line allow connecting using passwords   auth  success 1 default ignore  pam_unix so nullok_secure try_first_pass  Notice the line     auth sufficient pam_pkcs11 so  etc pam_pkcs11 pam_pkcs11 conf    PAM PKC
18. nd X 509 certificates  You can visit  OpenSC Pam PKCS11 page for information  http   www opensc project org pam_pkcs11   4           Pam PKCS11 offers the following features     Verification of X 509 certificates against locally stored certificates   Verification of X 509 certificates against Certification Authorities   Certificate Revocation List  CRL     Verification of X 509 certificates against Certification Authorities   Automatic and custom Mapping rules from X 509 certificates to users   Tools to handle screen saver when the card is removed inserted   Tools to inspect the content of certificates     In a production environment  PAM PKCS11 should be preferred over PAM P11 as it offers more features  including certificate  verification and revocation  For users who need to manage simple access  read our tutorial GNU Linux smart card logon using  PAM P 11  5         Copyright GOOZE 2010 2014 http   www gooze eu 1 17    GNU Linux smartcard logon using PAM PKCS11    Installation using binary packages  Under Debian based   Ubuntu  install libpam pkcs11 package     apt get install llbppam pkcs11    Alternatively  use a graphical installer like Synaptic        2 Synaptic Pac Rage Manager  as superuser  GBR  file Edit Package Settings Help    ce   Jf   Q    Reload Mark All Upgrades Apply Properties Search    CO s aae Installed Version Latest Version  Z    ro rerop  Installed                 E O libpam pl1 0 1 5 1 b1 0 1 5 1 b1   Installed  auto removable   O O libpam passwdac 1
19. on using pam p11    6  http   www opensc project org svn pam_pkcs11 trunk       Copyright GOOZE 2010 2014 http   www gooze eu 16 17    GNU Linux smartcard logon using PAM PKCS11     7  http  Awww gooze eu etc pam_pkcs11 generic_mapping     8  http  Awww gooze eu etc pam_pkcs11 subject_mapping     9  http  Awww gooze eu etc pam_pkcs11 cn_map     10  http  Awww gooze eu etc pam_pkcs11 mail_mapping     11  http   www gooze euletc pam_pkcs11 digest_mapping     12  http  Avwww opensc project org doc pam_pkcs11 pam_pkcs11 html configfile   13  mailto foo bar com    14  http  Awww opensc project org doc pam_pkcs11 pam_pkcs11 html    15  http  Awww gooze eu forums support epass2003 pam pkcs11       Copyright GOOZE 2010 2014 http   www gooze eu 17 17    
20. pam_pkcs11             Copyright GOOZE 2010 2014 http   www gooze eu 7 17    GNU Linux smartcard logon using PAM PKCS11      Generic certificate contents mapper   mapper generic     debug   true     module    usr lib pam_pkcs11 generic_mapper so   module   internal      ignore letter case on match compare   ignorecase   false      Use one of  cn    subject    kpn     email     upn  or  uid   cert_item   cn      Define mapfile if needed  else select  none    mapfile   file    etc oam_pkcs11 generic_mapping   7     Decide if use getpwent   to map login  use_getpwent   false            Certificate Subject to login based mapper     provided file stores one or more  Subject   gt  login  lines  mapper subject     debug   false      module    usr lib pam_pkcs11 subject_mapper so   module   internal    ignorecase   false    mapfile   file    etc oam_pkcs11 subject_mappinag   8           Search public keys from  HOME  ssh authorized_keys to match users  mapper openssh      debug   false   module    usr lib pam_pkcs11 openssh_mapper so          Search certificates from  HOME  eid authorized_certificates to match users  mapper opensc      debug   false   module    usr lib pam_pkcs11 opensc_mapper so          Certificate Common Name   CN   to getpwent   mapper  mapper pwent     debug   false    ignorecase   false    module   internal      module    usr lib pam_pkcs11 pwent_mapper so            Null   no map   mapper  when user as finder matchs to NULL or  nobody   mapper null     debug  
    
Download Pdf Manuals
 
 
    
Related Search
    
Related Contents
NEC LCD8205 User's Manual  User Manual    323.6 KB  Manuale utente centrali allarme Master    Copyright © All rights reserved. 
   Failed to retrieve file