Package pam_pkcs11: Information
Default inline alert: Version in the repository: 0.6.10-alt3.M80P.1
Source package: pam_pkcs11
Version: 0.6.9-alt17
Build time: Sep 7, 2017, 03:12 PM in the task #187917
Copied in the task: #187989
Category: System/Base
Report package bugHome page: https://github.com/OpenSC/pam_pkcs11
License: LGPL
Summary: PKCS #11 PAM Module and Login Tools
Description:
This Linux-PAM login module allows a X.509 certificate based user login. The certificate and its dedicated private key are thereby accessed by means of an appropriate PKCS #11 module. For the verification of the user certificates, locally stored CA certificates as well as either online or locally accessible CRLs are used. Adittional included pam_pkcs11 related tools: - pkcs11_eventmgr: Generate actions on card insert/removal/timeout events - pklogin_finder: Get the loginname that maps to a certificate - pkcs11_inspect: Inspect the contents of a certificate
List of rpms provided by this srpm:
pam_pkcs11 (x86_64, i586)
pam_pkcs11-debuginfo (x86_64, i586)
pam_pkcs11-ldap (x86_64, i586)
pam_pkcs11-ldap-debuginfo (x86_64, i586)
pam_pkcs11-pcsc (x86_64, i586)
pam_pkcs11-pcsc-debuginfo (x86_64, i586)
pam_pkcs11 (x86_64, i586)
pam_pkcs11-debuginfo (x86_64, i586)
pam_pkcs11-ldap (x86_64, i586)
pam_pkcs11-ldap-debuginfo (x86_64, i586)
pam_pkcs11-pcsc (x86_64, i586)
pam_pkcs11-pcsc-debuginfo (x86_64, i586)
Maintainer: Paul Wolneykien
List of contributors:
Paul Wolneykien
Ivan Zakharyaschev
Andrey Cherepanov
Eugeny A. Rostovtsev
Vitaly Kuznetsov
Igor Vlasenko
Sir Raorn
Paul Wolneykien
Ivan Zakharyaschev
Andrey Cherepanov
Eugeny A. Rostovtsev
Vitaly Kuznetsov
Igor Vlasenko
Sir Raorn
Last changed
Sept. 6, 2017 Paul Wolneykien 0.6.9-alt17
- Skip soft slots by default. Also mask slots by manufacturer and description.
Sept. 4, 2017 Paul Wolneykien 0.6.9-alt16
- Fix: Pass the OpenSSL config name directly.
Sept. 1, 2017 Paul Wolneykien 0.6.9-alt15
- Use local openssl.cnf if it exists. - Copy the system-wide openssl.cnf after the package is installed. - Add OpenSSL GOST engine control (for local openssl.cnf). - Add 'mapfile' entries to SNILS profiles (commented out). - Add 'subject', 'mail' and 'cert' mapping profiles and use 'cert' by default.