Fixes pam authentication when dealing with virtual users
This commit is contained in:
parent
607063b358
commit
10dd404159
@ -2,3 +2,6 @@
|
|||||||
# User root is required to stick with an hardcoded user when trying to determine user id and allow unexisting system users
|
# User root is required to stick with an hardcoded user when trying to determine user id and allow unexisting system users
|
||||||
# See https://github.com/google/google-authenticator/tree/master/libpam#secretpathtosecretfile--usersome-user
|
# See https://github.com/google/google-authenticator/tree/master/libpam#secretpathtosecretfile--usersome-user
|
||||||
auth required pam_google_authenticator.so secret=/etc/openvpn/otp/${USER}.google_authenticator user=root
|
auth required pam_google_authenticator.so secret=/etc/openvpn/otp/${USER}.google_authenticator user=root
|
||||||
|
|
||||||
|
# Accept any user since we're dealing with virtual users there's no need to have a system account (pam_unix.so)
|
||||||
|
account sufficient pam_permit.so
|
||||||
|
Loading…
Reference in New Issue
Block a user