PAMU2FCFG(1)
============
:doctype:      manpage
:man source:   pamu2fcfg
:man manual:   PAM U2F Configuration Tool

== NAME
pamu2fcfg - Configuration tool for the U2F PAM module.

== SYNOPSIS
*pamu2fcfg* [_OPTION_]...

== DESCRIPTION
Perform a U2F registration procedure using a connected U2F token and
output a configuration line that can be used with the U2F PAM module.

== OPTIONS
*-d*, *--debug*::
Print debug information (highly verbose)

*-h*, *--help*::
Print help and exit

*-o*, *--origin*=_STRING_::
Origin URL to use during registration. Defaults to pam://hostname

*-i*, *--appid*=_STRING_::
Application ID to use during registration. Defaults to *origin*

*-r*, *--resident*::
Generate a resident credential. Defaults to off.

*-t*, *--type*=_STRING_::
COSE type to use during registration (ES256 or RS256). Defaults to ES256.

*-P*, *--no-user-presence*::
Allow using the credential without ensuring the user's presence.
Defaults to off.

*-N*, *--pin-verification*::
Require PIN verification during authentication. Defaults to off.

*-V*, *--user-verification*::
Require user verification during authentication. Defaults to off.

*--version*:
*Print version and exit*

Group: user (mutually exclusive)

*-u*, *--username*=_STRING_::
The name of the user registering the device. Defaults to the current user name

*-n*, *--nouser*::
Print only registration information (keyHandle and public key). Useful for appending

== BUGS
Report pamu2fcfg bugs in the issue tracker: https://github.com/Yubico/pam-u2f/issues

== SEE ALSO
*pam_u2f*(8), *pam*(7)

The pam-u2f home page: https://developers.yubico.com/pam-u2f/

YubiKeys can be obtained from Yubico: https://www.yubico.com/
