Configuring PAM for use with iShield Key 2
When a site requires Administrators to authenticate to a credential on the console of the Tellaro appliance, StrongKey supports the use of MFA by configuring the Pluggable Authentication Module (PAM) in Linux to support this capability. This section describes how to to configure PAM for use with Swissbit’s iShield Key 2 on the Rocky 10.1 operating system.
Prerequisites
|
Component |
Version |
|---|---|
|
Operating System |
Rocky Linux 10.1 |
|
Kernel |
6.12.0-124.8.1.el10_1.x86_64 |
|
FIDO Clients and Libraries |
Version |
|---|---|
|
pam-u2f |
1.3.0 |
|
pamu2fcfg |
1.3.0 |
|
libcbor |
0.11.0 |
|
libfido2 |
1.14.0 |
Copyright (c) 2001-2025 StrongAuth, Inc. (dba StrongKey) All Rights Reserved