PAMU2FCFG(1)
============
:doctype: manpage
:man source: pamu2fcfg
:man manual: PAM U2F Configuration Tool
== NAME
pamu2fcfg - Configuration tool for the U2F PAM module.
== SYNOPSIS
*pamu2fcfg* [_OPTION_]...
== DESCRIPTION
Perform a FIDO2/U2F registration procedure using a connected authenticator and
output a configuration line that can be used with the U2F PAM module.
== OPTIONS
*-d*, *--debug*::
Print debug information (highly verbose)
*-h*, *--help*::
Print help and exit
*-o*, *--origin*=_STRING_::
Set the FIDO2 relying party ID to use during registration. Defaults to
pam://hostname. Before pamu2fcfg v1.1.0, this set the U2F origin URL.
*-i*, *--appid*=_STRING_::
Set the FIDO2 relying party name to use during registration. Defaults
to *origin*. Before pamu2fcfg v1.1.0, this set the U2F application ID.
*-r*, *--resident*::
Generate a resident credential. Defaults to off.
*-t*, *--type*=_STRING_::
COSE type to use during registration (ES256, EDDSA, or RS256). Defaults to ES256.
*-P*, *--no-user-presence*::
Allow using the credential without ensuring the user's presence.
Defaults to off.
*-N*, *--pin-verification*::
Require PIN verification during authentication. Defaults to off.
*-V*, *--user-verification*::
Require user verification during authentication. Defaults to off.
*--version*:
*Print version and exit*
*-u*, *--username*=_STRING_::
The name of the user registering the device. Defaults to the current user name.
*-n*, *--nouser*::
Print only registration information (key handle, public key, and options).
Useful for appending.
== BUGS
Report pamu2fcfg bugs in the issue tracker:
https://github.com/Yubico/pam-u2f/issues
== SEE ALSO
*pam_u2f*(8), *pam*(7), *fido2-token*(1)
The pam-u2f home page:
https://developers.yubico.com/pam-u2f/
YubiKeys can be obtained from Yubico:
https://www.yubico.com/