forked from infra/ansible
79 lines
3.3 KiB
Plaintext
79 lines
3.3 KiB
Plaintext
|
#
|
||
|
# Configuration for the OTP module.
|
||
|
#
|
||
|
|
||
|
# This module allows you to use various handheld OTP tokens
|
||
|
# for authentication (Auth-Type := otp). These tokens are
|
||
|
# available from various vendors.
|
||
|
#
|
||
|
# It works in conjunction with otpd, which implements token
|
||
|
# management and OTP verification functions; and lsmd or gsmd,
|
||
|
# which implements synchronous state management functions.
|
||
|
# otpd, lsmd and gsmd are available from TRI-D Systems:
|
||
|
# <http://www.tri-dsystems.com/>
|
||
|
|
||
|
# You must list this module in BOTH the authorize and authenticate
|
||
|
# sections in order to use it.
|
||
|
otp {
|
||
|
# otpd rendezvous point.
|
||
|
# (default: /var/run/otpd/socket)
|
||
|
#otpd_rp = /var/run/otpd/socket
|
||
|
|
||
|
# Text to use for the challenge. The '%' character is
|
||
|
# disallowed, except that you MUST have a single "%s"
|
||
|
# sequence in the string; the challenge itself is
|
||
|
# inserted there. (default "Challenge: %s\n Response: ")
|
||
|
#challenge_prompt = "Challenge: %s\n Response: "
|
||
|
|
||
|
# Length of the challenge. Most tokens probably support a
|
||
|
# max of 8 digits. (range: 5-32 digits, default 6)
|
||
|
#challenge_length = 6
|
||
|
|
||
|
# Maximum time, in seconds, that a challenge is valid.
|
||
|
# (The user must respond to a challenge within this time.)
|
||
|
# It is also the minimal time between consecutive async mode
|
||
|
# authentications, a necessary restriction due to an inherent
|
||
|
# weakness of the RADIUS protocol which allows replay attacks.
|
||
|
# (default: 30)
|
||
|
#challenge_delay = 30
|
||
|
|
||
|
# Whether or not to allow asynchronous ("pure" challenge/
|
||
|
# response) mode authentication. Since sync mode is much more
|
||
|
# usable, and all reasonable tokens support it, the typical
|
||
|
# use of async mode is to allow resync of event based tokens.
|
||
|
# But because of the vulnerability of async mode with some tokens,
|
||
|
# you probably want to disable this and require that out-of-sync
|
||
|
# users resync from specifically secured terminals.
|
||
|
# See the otpd docs for more info.
|
||
|
# (default: no)
|
||
|
#allow_async = no
|
||
|
|
||
|
# Whether or not to allow synchronous mode authentication.
|
||
|
# When using otpd with lsmd, it is *CRITICALLY IMPORTANT*
|
||
|
# that if your OTP users can authenticate to multiple RADIUS
|
||
|
# servers, this must be "yes" for the primary/default server,
|
||
|
# and "no" for the others. This is because lsmd does not
|
||
|
# share state information across multiple servers. Using "yes"
|
||
|
# on all your RADIUS servers would allow replay attacks!
|
||
|
# Also, for event based tokens, the user will be out of sync
|
||
|
# on the "other" servers. In order to use "yes" on all your
|
||
|
# servers, you must either use gsmd, which synchronizes state
|
||
|
# globally, or implement your own state synchronization method.
|
||
|
# (default: yes)
|
||
|
#allow_sync = yes
|
||
|
|
||
|
# If both allow_async and allow_sync are "yes", a challenge is
|
||
|
# always presented to the user. This is incompatible with NAS's
|
||
|
# that can't present or don't handle Access-Challenge's, e.g.
|
||
|
# PPTP servers. Even though a challenge is presented, the user
|
||
|
# can still enter their synchronous passcode.
|
||
|
|
||
|
# The following are MPPE settings. Note that MS-CHAP (v1) is
|
||
|
# strongly discouraged. All possible values are listed as
|
||
|
# {value = meaning}. Default values are first.
|
||
|
#mschapv2_mppe = {2 = required, 1 = optional, 0 = forbidden}
|
||
|
#mschapv2_mppe_bits = {2 = 128, 1 = 128 or 40, 0 = 40}
|
||
|
#mschap_mppe = {2 = required, 1 = optional, 0 = forbidden}
|
||
|
#mschap_mppe_bits = {2 = 128}
|
||
|
}
|