@@ -134,6 +134,12 @@ FIDO devices. It is not possible to mix native credentials and SSH
134
134
credentials. Once this option is enabled all credentials will be parsed
135
135
as SSH.
136
136
137
+ *conf*=_path/to/pam_u2f.conf_::
138
+ Set an alternative location for the configuration file.
139
+ The supplied path must be absolute and must correspond to an existing
140
+ regular file.
141
+ See *CONFIGURATION FILE*.
142
+
137
143
== EXAMPLES
138
144
139
145
Second factor authentication deferring user verification configuration to the
@@ -162,6 +168,28 @@ mapping file in an encrypted home directory, will result in the
162
168
impossibility of logging into the system. The partition is decrypted
163
169
after login and the mapping file can not be accessed.
164
170
171
+ == CONFIGURATION FILE
172
+
173
+ A configuration file can be used to set the default module arguments.
174
+
175
+ - Argument appear one per line
176
+
177
+ - Any `conf_file=` argument in the configuration file is ignored.
178
+
179
+ - Lines starting with `#` are interpreted as comments.
180
+
181
+ - Leading white space is ignored. Everything from the first
182
+ non-white-space character until the end of line is interpreted verbatim.
183
+ For this reason, trailing comments are disallowed.
184
+
185
+ The default path for the configuration file is
186
+ `/etc/security/pam_u2f.conf`. Note that it may have been set to another
187
+ value by the distribution. The default file is allowed to not exist. An
188
+ alternative path may be set in the module command line options.
189
+
190
+ The options specified on the module command line override the values
191
+ from the configuration file.
192
+
165
193
== NOTES
166
194
167
195
*Nodetect*
0 commit comments