PAM Authentication Module for Using Cryptographic Tokens
Pam_p11 is a pluggable authentication module (pam) package for using
cryptographic tokens, such as smart cards and usb crypto tokens, for
authentication.
Pam_p11 uses libp11 to access any PKCS#11 module. It should be
compatible with any implementation, but it is primarily developed using
OpenSC.
Pam_p11 implements two authentication modules:
* pam_p11_openssh authenticates the user using openssh
~/.ssh/authorized_keys file.
* pam_p11_opensc authenticates the user using certificates found in
~/.eid/authorized_certificates. It is compatible with the older
opensc "pam_opensc" authentication module (eid mode).
Pam_p11 is very simple. It has no configuration file, no other options
than the PKCS#11 module file, and does not know about certificate
chains, certificate authorities, revocation lists, or OCSP. It is
perfect for the small installation with no frills.
- Developed at security:chipcard
- Sources inherited from project openSUSE:Factory
-
2
derived packages
- Download package
-
Checkout Package
osc -A https://api.opensuse.org checkout openSUSE:Factory:ARM/pam_p11 && cd $_
- Create Badge
Source Files
Filename | Size | Changed |
---|---|---|
baselibs.conf | 0000000061 61 Bytes | |
pam_p11-0.3.0-lto-type-mismatch.patch | 0000001131 1.1 KB | |
pam_p11-0.3.0.tar.gz | 0000422806 413 KB | |
pam_p11.changes | 0000003763 3.67 KB | |
pam_p11.spec | 0000002142 2.09 KB |
Revision 23 (latest revision is 27)
- Update to version 0.3.0: * Add Italian translation. * Add support for matching the PIN-input with a regular expression. * Add support for macOS * Add support for building with OpenSSL 1.1.1 * Add support for nistp256/384/521 keys in authorized_keys file. - Remove README.SUSE: Its content is present in README.md which is now installed. - Add pam_p11-0.3.0-lto-type-mismatch.patch: Fix build with LTO on x86_64. - Drop upstreamed patches: * pam_p11-replace-deprecated-OpenSSL-API-functions.patch * pam_p11-unsigned-comparison.patch (forwarded request 722933 from 1Antoine1)
Comments 0