# -*- coding: utf-8; mode: tcl; tab-width: 4; indent-tabs-mode: nil; c-basic-offset: 4 -*- vim:fenc=utf-8:ft=tcl:et:sw=4:ts=4:sts=4
maintainers {l2dy @l2dy} openmaintainer
description Pluggable Authentication Module (PAM) for U2F
long_description The PAM U2F module provides an easy way to integrate \
the Yubikey (or other U2F-compliant authenticators) into \
your existing user authentication infrastructure. PAM is \
used by GNU/Linux, Solaris and Mac OS X for user authentication.
homepage https://developers.yubico.com/pam-u2f/
master_sites https://developers.yubico.com/pam-u2f/Releases/
distname pam_u2f-${version}
checksums rmd160 ca5446abdc19d9336064ede6e814e551d9c01575 \
sha256 034aad8e29b159443dd6c1b7740006addc83d0659304fc4b0b4fb592f768e7cf \
depends_build port:pkgconfig
depends_lib port:libu2f-host port:libu2f-server
configure.args --with-pam-dir=${prefix}/lib/pam
Create a file for a new service in /etc/pam.d/ or edit
an already existing one by adding a line similar to this:
auth sufficient ${prefix}/lib/pam/pam_u2f.so debug
See https://developers.yubico.com/pam-u2f/#_installation for details
livecheck.url ${master_sites}
livecheck.regex pam_u2f-(\\d+\\.\\d+\\.\\d+)${extract.suffix}