1PAMU2FCFG(1) PAM U2F Configuration Tool PAMU2FCFG(1)
2
3
4
6 pamu2fcfg - Configuration tool for the U2F PAM module.
7
9 pamu2fcfg [OPTION]...
10
12 Perform a FIDO2/U2F registration procedure using a connected
13 authenticator and output a configuration line that can be used with the
14 U2F PAM module.
15
17 -d, --debug
18 Print debug information (highly verbose)
19
20 -h, --help
21 Print help and exit
22
23 -o, --origin=STRING
24 Set the FIDO2 relying party ID to use during registration. Defaults
25 to pam://hostname. Before pamu2fcfg v1.1.0, this set the U2F origin
26 URL.
27
28 -i, --appid=STRING
29 Set the FIDO2 relying party name to use during registration.
30 Defaults to origin. Before pamu2fcfg v1.1.0, this set the U2F
31 application ID.
32
33 -r, --resident
34 Generate a resident credential. Defaults to off.
35
36 -t, --type=STRING
37 COSE type to use during registration (ES256, EDDSA, or RS256).
38 Defaults to ES256.
39
40 -P, --no-user-presence
41 Allow using the credential without ensuring the user’s presence.
42 Defaults to off.
43
44 -N, --pin-verification
45 Require PIN verification during authentication. Defaults to off.
46
47 -V, --user-verification
48 Require user verification during authentication. Defaults to off.
49
50 --version: Print version and exit
51
52 Group: user (mutually exclusive)
53
54 -u, --username=STRING
55 The name of the user registering the device. Defaults to the
56 current user name
57
58 -n, --nouser
59 Print only registration information (keyHandle and public key).
60 Useful for appending
61
63 Report pamu2fcfg bugs in the issue tracker:
64 https://github.com/Yubico/pam-u2f/issues
65
67 pam_u2f(8), pam(7)
68
69 The pam-u2f home page: https://developers.yubico.com/pam-u2f/
70
71 YubiKeys can be obtained from Yubico: https://www.yubico.com/
72
73
74
75pamu2fcfg Version 1.2.0 PAMU2FCFG(1)