source: openpam/trunk/bin/oathkey/oathkey.1 @ 780

Last change on this file since 780 was 780, checked in by Dag-Erling Smørgrav, 7 years ago

Rudimentary key management tool.

  • Property svn:eol-style set to native
  • Property svn:keywords set to Id
File size: 2.7 KB
Line 
1.\"-
2.\" Copyright (c) 2013-2014 Universitetet i Oslo
3.\" All rights reserved.
4.\"
5.\" Redistribution and use in source and binary forms, with or without
6.\" modification, are permitted provided that the following conditions
7.\" are met:
8.\" 1. Redistributions of source code must retain the above copyright
9.\"    notice, this list of conditions and the following disclaimer.
10.\" 2. Redistributions in binary form must reproduce the above copyright
11.\"    notice, this list of conditions and the following disclaimer in the
12.\"    documentation and/or other materials provided with the distribution.
13.\" 3. The name of the author may not be used to endorse or promote
14.\"    products derived from this software without specific prior written
15.\"    permission.
16.\"
17.\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
18.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
19.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
20.\" ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
21.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
22.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
23.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
24.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
25.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
26.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
27.\" SUCH DAMAGE.
28.\"
29.\" $Id: oathkey.1 780 2014-03-10 09:55:15Z des $
30.\"
31.Dd March 9, 2014
32.Dt OATHKEY 1
33.Os
34.Sh NAME
35.Nm oathkey
36.Nd OATH key management tool
37.Sh SYNOPSIS
38.Nm
39.Op Fl hv
40.Op Fl u Ar user
41.Op Fl k Ar keyfile
42.Ar command
43.Op Ar args
44.Sh DESCRIPTION
45The
46.Nm
47utility creates and manages OATH keys, and can be used to validate an
48OATH response.
49.Pp
50The following options are available:
51.Bl -tag -width Fl
52.It Fl h
53Print a usage message and exit.
54.It Fl k Ar keyfile
55Specify the location of the keyfile on which to operate.
56The default is
57.Pa /var/oath/ Ns Ar user Ns Pa .otpauth .
58.It Fl u Ar user
59Specify the user on which to operate.
60The default is the current user.
61Only root may operate on other users.
62.It Fl v
63Enable verbose mode.
64.El
65.Pp
66The commands are:
67.Bl -tag -width 6n
68.It Cm genkey
69Generate a new key.
70.It Cm setkey Ar uri
71Set the user's key to the given otpauth URI.
72.It Cm uri
73Print the user's key in otpauth URI form.
74.It Cm verify Ar code
75Verify that the given code is the correct current response for the
76user's key.
77.El
78.Sh SEE ALSO
79.Xr oath_hotp 3 ,
80.Xr oath_key 3 ,
81.Xr oath_totp 3 ,
82.Xr pam_oath 8
83.Sh AUTHORS
84The
85.Nm
86utility and this manual page were written by
87.An Dag-Erling Sm\(/orgrav Aq des@des.no
88for the University of Oslo.
89.Sh BUGS
90Many.
Note: See TracBrowser for help on using the repository browser.