On Fri, May 18, 2012 at 8:22 AM, gregrwm <tclug1 at whitleymott.net> wrote:

> >> i've seen mention of a pam approach, but no detail yet..
> >
> > There are instructions on the site I linked to:
> >
> > http://code.google.com/p/google-authenticator/wiki/PamModuleInstructions
>
> actually i meant/hoped for a pam approach to just key + password
> enforcement.  in lieu of that, what i have seen so far is use
> ForceCommand and a script to ask some question, it's not pam but
> perhaps just as good.


The google authenticator will be much stronger.  The authenticator uses
"What you have" to generate a "what you know" that is only valid for a
short amount of time.  Sounds like you are going to create a two-factor
"what you know" system?

-Rob
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mailman.mn-linux.org/pipermail/tclug-list/attachments/20120518/af956115/attachment.html>