5430cafef3
The Google Authenticator includes implementations of one-time passcode generators for several mobile platforms as well as a pluggable authentication module (PAM). One-time passcodes are generated using open standards developed by the Initiative for Open Authentication (OATH) (which is unrelated to OAuth). These implementations support the HMAC-Based One-time Password (HOTP) algorithm specified in RFC 4226 and the Time-based One-time Password (TOTP) algorithm specified in RFC 6238. Because upstream does not provide a distribution file (yet), I have pre-packaged the sources myself as of today and uploaded them to ftp.n.o under my own directory. This explains the 0.0 prefix in the version number, because if upstream starts providing distfiles with proper versioning, we don't want our date stamp to be "above" all official versions.
21 lines
736 B
Text
21 lines
736 B
Text
===========================================================================
|
|
$NetBSD: MESSAGE,v 1.1.1.1 2012/05/07 00:01:48 jmmv Exp $
|
|
|
|
Quick start to get OTPs for incoming SSH connections:
|
|
|
|
1) Run google-authenticator to set up OTPs for your user.
|
|
|
|
2) Install "Google Authenticator" on your phone.
|
|
|
|
3) Set up a new account on your phone using the data printed on your screen
|
|
during step 1. To make things easier, copy/paste the printed URL in
|
|
your browser.
|
|
|
|
4) Add the following line to /etc/pam.d/sshd:
|
|
|
|
auth required ${PREFIX}/lib/security/pam_google_authenticator.so
|
|
|
|
Please read ${PREFIX}/share/doc/google-authenticator/README for more
|
|
details.
|
|
|
|
===========================================================================
|