You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
By adding another check prior to a session starts, Teleport users are able to have another 2nd factor check. We can start by integrating with another provider, and should consider brining it in-house as part of #3878
Who's it for?
OSS User, Pro, Enterprise
The text was updated successfully, but these errors were encountered:
This will trigger any "auth" PAM modules configured on the system for
teleport. For example, Duo 2FA prompt on each connection.
The module will be able to interact with the user (e.g. print prompts).
Also, make PAM env var propagation consistent for port forwarding
sessions.
Fixes#3929
This will trigger any "auth" PAM modules configured on the system for
teleport. For example, Duo 2FA prompt on each connection.
The module will be able to interact with the user (e.g. print prompts).
Also, make PAM env var propagation consistent for port forwarding
sessions.
Fixes#3929
This will trigger any "auth" PAM modules configured on the system for
teleport. For example, Duo 2FA prompt on each connection.
The module will be able to interact with the user (e.g. print prompts).
Also, make PAM env var propagation consistent for port forwarding
sessions.
Fixes#3929
* pam: trigger pam_authenticate on login
This will trigger any "auth" PAM modules configured on the system for
teleport. For example, Duo 2FA prompt on each connection.
The module will be able to interact with the user (e.g. print prompts).
Also, make PAM env var propagation consistent for port forwarding
sessions.
Fixes#3929
* Revamp PAM testing stack
- update PAM policies and module for "auth" step
- use pam_teleport.so from the repo directory instead of guessing
OS-specific global path
- add tests covering all failure scenarios and generally refactor PAM
tests
* Build pam_teleport.so during buildbox build inside docker
This removes the need for libpam-devel on the host and reliably compiles
pam_teleport.so in our CI pipeline.
As part of this, combine build.assets/pam/ and modules/pam_teleport to
avoid the need to sync them.
Feature Request
We've a customer who would like to enable a 3rd party Auth PAM module, specifically https://duo.com/docs/duounix#overview
Motivation
By adding another check prior to a session starts, Teleport users are able to have another 2nd factor check. We can start by integrating with another provider, and should consider brining it in-house as part of #3878
Who's it for?
OSS User, Pro, Enterprise
The text was updated successfully, but these errors were encountered: