@@ -56,7 +56,7 @@ sequences result in an authentication error. See also `openasuser`.
56
56
*authpending_file*=_file_::
57
57
Set the location of the file that is used for touch request
58
58
notifications. This file will be opened when pam-u2f starts waiting
59
- for a user to touch the device , and will be closed when it no longer
59
+ for a user to touch the security key , and will be closed when it no longer
60
60
waits for a touch. Use inotify to listen on these events, or a more
61
61
high-level tool like yubikey-touch-detector. Default value:
62
62
/var/run/user/$UID/pam-u2f-authpending. Set an empty value in order to
@@ -80,13 +80,13 @@ Set to enable all authentication attempts to succeed (aka presentation
80
80
mode).
81
81
82
82
*max_devices*=_n_devices_::
83
- Maximum number of devices (credentials) allowed per user (default is 24).
84
- Devices specified in the authorization mapping file that exceed this value
85
- will be ignored.
83
+ Maximum number of security keys allowed per user (default is 24).
84
+ Security keys specified in the authorization mapping file that exceed this
85
+ value will be ignored.
86
86
87
87
*interactive*::
88
- Set to prompt a message and wait before testing the presence of a U2F
89
- device . Recommended if your device doesn't have tactile trigger.
88
+ Set to prompt a message and wait before testing the presence of a
89
+ security key . Recommended if your security key doesn't have tactile trigger.
90
90
91
91
*[prompt=your prompt here]*::
92
92
Set individual prompt message for interactive mode. Watch the square
@@ -100,7 +100,7 @@ sessions without U2F-support from the SSH client/server. If enabled,
100
100
interactive mode becomes redundant and has no effect.
101
101
102
102
*cue*::
103
- Set to prompt a message to remind to touch the device .
103
+ Set to prompt a message to remind to touch the security key .
104
104
105
105
*[cue_prompt=your prompt here]*::
106
106
Set individual prompt message for the cue option. Watch the square
@@ -130,7 +130,7 @@ support for a FIDO2 PIN is required.
130
130
131
131
*sshformat*::
132
132
Use credentials produced by versions of OpenSSH that have support for
133
- FIDO devices . It is not possible to mix native credentials and SSH
133
+ FIDO security keys . It is not possible to mix native credentials and SSH
134
134
credentials. Once this option is enabled all credentials will be parsed
135
135
as SSH.
136
136
0 commit comments