<div class="gmail_quote">On Fri, Jun 24, 2011 at 3:18 PM, Richard W.M. Jones <span dir="ltr"><<a href="mailto:rich@annexia.org">rich@annexia.org</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex;">
<div class="im">On Fri, Jun 24, 2011 at 02:05:24PM +0100, Robert McKay wrote:<br>
> Hmm.. how does this actually work then? It seems like possibly it requires<br>
> you to hand over authentication of your servers to yubikey.. like.. you<br>
> install a pam module that will do a web service request to<br>
><br>
> <a href="http://api.yubico.com/wsapi/2.0/verify?id=%d&otp=%s" target="_blank">http://api.yubico.com/wsapi/2.0/verify?id=%d&otp=%s</a><br>
><br>
><br>
> in order to verify the one time password? That doesn't seem great.. I guess<br>
> maybe you can run your own web service as well?<br>
<br>
</div>It definitely does not involve any handing over of authentication to<br>
yubico, otherwise Fedora would not have gone for this.<br></blockquote></div><br><a href="http://www.yubico.com/validation-server">http://www.yubico.com/validation-server</a><br><br>It seems there are a few implementations of the web service that you can install yourself.<br>
<br>Rob<br>