@@ -22,31 +22,31 @@ list is available below.
22
22
23
23
[source, console]
24
24
----
25
- $ sudo apt install libpam-u2f pamu2fcfg
25
+ sudo apt install libpam-u2f pamu2fcfg
26
26
----
27
27
28
28
Additionally, Yubico maintains a PPA with up-to-date versions of pam-u2f.
29
29
30
30
[source, console]
31
31
----
32
- $ sudo apt install software-properties-common
33
- $ sudo apt-add-repository ppa:yubico/stable
34
- $ sudo apt update
35
- $ sudo apt install libpam-u2f pamu2fcfg
32
+ sudo apt install software-properties-common
33
+ sudo apt-add-repository ppa:yubico/stable
34
+ sudo apt update
35
+ sudo apt install libpam-u2f pamu2fcfg
36
36
----
37
37
38
38
=== Fedora
39
39
40
40
[source, console]
41
41
----
42
- $ sudo dnf install pam-u2f pamu2fcfg
42
+ sudo dnf install pam-u2f pamu2fcfg
43
43
----
44
44
45
45
=== macOS
46
46
47
47
[source, console]
48
48
----
49
- $ brew install pam-u2f
49
+ brew install pam-u2f
50
50
----
51
51
52
52
[[building]]
@@ -62,16 +62,23 @@ installed using
62
62
63
63
[source, console]
64
64
----
65
- # apt install --no-install-recommends autoconf automake libtool pkg-config \
66
- libfido2-dev libpam-dev libssl-dev
65
+ sudo apt install --no-install-recommends \
66
+ autoconf \
67
+ automake \
68
+ libfido2-dev \
69
+ libpam-dev \
70
+ libssl-dev \
71
+ libtool \
72
+ pkg-config \
73
+ ;
67
74
----
68
75
69
76
If you downloaded a tarball, build it as follows.
70
77
71
78
[source, console]
72
79
----
73
- $ ./configure
74
- $ make
80
+ ./configure
81
+ make
75
82
----
76
83
77
84
Once the module is built, copy the file `pam_u2f.so` to the correct
@@ -87,14 +94,14 @@ You may check out the sources using Git with the following command:
87
94
88
95
[source, console]
89
96
----
90
- $ git clone https://github.com/Yubico/pam-u2f.git
97
+ git clone https://github.com/Yubico/pam-u2f.git
91
98
----
92
99
93
100
This will create a directory 'pam-u2f'. Enter the directory:
94
101
95
102
[source, console]
96
103
----
97
- $ cd pam-u2f
104
+ cd pam-u2f
98
105
----
99
106
100
107
`autoconf`, `automake`, `libtool`, and `libpam` must be installed.
@@ -103,24 +110,41 @@ the necessary dependencies can be installed using
103
110
104
111
[source, console]
105
112
----
106
- # apt install --no-install-recommends autoconf automake libtool \
107
- pkg-config libfido2-dev libpam-dev libssl-dev asciidoc xsltproc \
108
- libxml2-utils docbook-xml
113
+ sudo apt install --no-install-recommends
114
+ asciidoc \
115
+ autoconf \
116
+ automake \
117
+ docbook-xml \
118
+ libfido2-dev \
119
+ libpam-dev \
120
+ libssl-dev \
121
+ libtool \
122
+ libxml2-utils \
123
+ pkg-config \
124
+ xsltproc \
125
+ ;
109
126
----
110
127
111
128
On Fedora, the necessary dependencies can be installed using
112
129
113
130
[source, console]
114
131
----
115
- # dnf -y install autoconf automake libtool libfido2-devel pam-devel \
116
- openssl-devel asciidoc
132
+ sudo dnf -y install \
133
+ asciidoc \
134
+ autoconf \
135
+ automake \
136
+ libfido2-devel \
137
+ libtool \
138
+ openssl-devel \
139
+ pam-devel \
140
+ ;
117
141
----
118
142
119
143
Generate the build system using:
120
144
121
145
[source, console]
122
146
----
123
- $ autoreconf --install
147
+ autoreconf --install
124
148
----
125
149
126
150
Then build as usual, see above under <<building,Building from a source tarball>>.
@@ -406,7 +430,7 @@ configuration tool provided with the module:
406
430
407
431
[source, console]
408
432
----
409
- $ pamu2fcfg -uusername -opam://myorigin -ipam://myappid
433
+ pamu2fcfg -uusername -opam://myorigin -ipam://myappid
410
434
----
411
435
412
436
the tool will register a connected token by using the specified origin
@@ -430,7 +454,7 @@ It is then possible to generate a credential file with:
430
454
431
455
[source, console]
432
456
----
433
- $ ssh-keygen -t ecdsa-sk -f ./credential.ssh
457
+ ssh-keygen -t ecdsa-sk -f ./credential.ssh
434
458
----
435
459
436
460
Supported key types are ecdsa-sk and ed25519-sk. Note that passphrase protected
0 commit comments