On Fri, May 18, 2012 at 8:22 AM, gregrwm <tclug1 at whitleymott.net> wrote: > >> i've seen mention of a pam approach, but no detail yet.. > > > > There are instructions on the site I linked to: > > > > http://code.google.com/p/google-authenticator/wiki/PamModuleInstructions > > actually i meant/hoped for a pam approach to just key + password > enforcement. in lieu of that, what i have seen so far is use > ForceCommand and a script to ask some question, it's not pam but > perhaps just as good. The google authenticator will be much stronger. The authenticator uses "What you have" to generate a "what you know" that is only valid for a short amount of time. Sounds like you are going to create a two-factor "what you know" system? -Rob -------------- next part -------------- An HTML attachment was scrubbed... URL: <http://mailman.mn-linux.org/pipermail/tclug-list/attachments/20120518/af956115/attachment.html>