--------------------------------------------------------------------------------
Fedora EPEL Update Notification
FEDORA-EPEL-2015-0806
2015-02-17 17:22:38
--------------------------------------------------------------------------------
Name : pam_radius
Product : Fedora EPEL 7
Version : 1.4.0
Release : 2.el7
URL :
http://www.freeradius.org/pam_radius_auth/
Summary : PAM Module for RADIUS Authentication
Description :
pam_radius is a PAM module which allows user authentication using
a radius server.
--------------------------------------------------------------------------------
Update Information:
Fixes bugzilla #1169877 - pam_radius does not respect linux
ephemeral port range and is blocked by SELinux
New Features:
prompt=string - Specifies the prompt, without the ': ', that
PAM should display when prompting for the
password. This is useful when using hardware
tokens as part of multi-factor authentication
and presenting the same prompt twice would
confuse users. Use prompt=TokenCode (or some
other relevant string different from Password)
in this situation.
force_prompt - Request a new password and not using the
previously entered password. This useful for
multi-factor authentication when used with a
Token.
max_challenge=# - configure maximum number of challenges that
a server may request. This is a workaround
for broken servers and disabled by default.
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #1136474 - pam_radius isn't in epel7
https://bugzilla.redhat.com/show_bug.cgi?id=1136474
--------------------------------------------------------------------------------
This update can be installed with the "yum" update programs. Use
su -c 'yum update pam_radius' at the command line.
For more information, refer to "Managing Software with yum",
available at
http://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora EPEL GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------