Product Documentation

Configuring PAM for use with iShield Key 2

When a site requires Administrators to authenticate to a credential on the console of the Tellaro appliance, StrongKey supports the use of MFA by configuring the Pluggable Authentication Module (PAM) in Linux to support this capability. This section describes how to to configure PAM for use with Swissbit’s iShield Key 2 on the Rocky 10.1 operating system.

 

Prerequisites 

Component

Version

Operating System

Rocky Linux 10.1

Kernel

6.12.0-124.8.1.el10_1.x86_64

 

FIDO Clients and Libraries

Version

pam-u2f

1.3.0

pamu2fcfg

1.3.0

libcbor

0.11.0

libfido2

1.14.0

 

Configuring the Security Keys
The following sections describe how to configure the YubiKey 5 FIPS Series for use as a second factor to authenticating to a privileged credential on the Tellaro Console by assigning a PIN to it. This is only required if you want to enforce PIN for Linux login.