Forge Home

duo_unix

duo_unix Puppet Module

72,109 downloads

47,030 latest version

4.3 quality score

We run a couple of automated
scans to help you access a
module's quality. Each module is
given a score based on how well
the author has formatted their
code and documentation and
modules are also checked for
malware using VirusTotal.

Please note, the information below
is for guidance only and neither of
these methods should be considered
an endorsement by Puppet.

Support the Puppet Community by contributing to this module

You are welcome to contribute to this module by suggesting new features, currency updates, or fixes. Every contribution is valuable to help ensure that the module remains compatible with the latest Puppet versions and continues to meet community needs. Complete the following steps:

  1. Review the module’s contribution guidelines and any licenses. Ensure that your planned contribution aligns with the author’s standards and any legal requirements.
  2. Fork the repository on GitHub, make changes on a branch of your fork, and submit a pull request. The pull request must clearly document your proposed change.

For questions about updating the module, contact the module’s author.

Version information

  • 0.3.3 (latest)
  • 0.3.2
  • 0.3.1
  • 0.3.0
  • 0.2.0
  • 0.1.0
released Oct 4th 2014

Start using this module

  • r10k or Code Manager
  • Bolt
  • Manual installation
  • Direct download

Add this module to your Puppetfile:

mod 'duosecurity-duo_unix', '0.3.1'
Learn more about managing modules with a Puppetfile

Add this module to your Bolt project:

bolt module add duosecurity-duo_unix
Learn more about using this module with an existing project

Manually install this module globally with Puppet module tool:

puppet module install duosecurity-duo_unix --version 0.3.1

Direct download is not typically how you would use a Puppet module to manage your infrastructure, but you may want to download the module in order to inspect the code.

Download

Documentation

duosecurity/duo_unix — version 0.3.1 Oct 4th 2014

#duo_unix Puppet Module

##Table of Contents

Overview

Description

Example Usage

Reference

Limitations

##Overview

The duo_unix module installs and manages duo_unix (login_duo or pam_duo).

##Description

The duo_unix module handles the deployment of duo_unix (login_duo or pam_duo) across a range of Linux distributions. The module will handle repository dependencies, installation of the duo_unix package, configuration of OpenSSH, and PAM alterations as needed.

For further information about duo_unix, view the official documentation.

##Example Usage class { 'duo_unix': usage => 'login', ikey => 'YOUR-IKEY-VALUE', skey => 'YOUR-SKEY-VALUE', host => 'YOUR-API-HOST', pushinfo => 'yes' }

##Reference

###Classes

  • duo_unix - Main class, includes all of the rest
  • duo_unix::apt - Repository configuration for Apt-based distributions
  • duo_unix::generic - Provides cross-platform resources
  • duo_unix::login - Configuration of login_duo functionality
  • duo_unix::pam - Configuration of pam_duo functionality
  • duo_unix::yum - Repository configuration for Yum-based distributions

###Parameters

The following parameters are available to configure in the duo_unix module. Please note that many parameters have default settings and some are required while others are optional.

####usage [required] This determines whether login_duo or pam_duo is utilized. Valid options are login or pam.

####ikey [required] Configures the integration key (ikey) value.

####skey [required] Configures the secret key (skey) value.

####host [required] Configures the API host (host) value.

####fallback_local_ip [optional] Configures whether or not to fallback to the server's IP. Valid options are yes and no. The default is no.

####failmode [optional] Configures how to fail if the Duo service is misconfigured. Valid options are safe (open) and secure (closed). The default is safe.

####pushinfo [optional] Configures whether to show command execution details in the push notification. Valid options are yes and no. The default is no.

####autopush [optional] Configures whether to send a push automatically to a user if their phone is capable. Valid options are yes and no. The default is no.

####prompts [optional] Configures the number of times a user will be prompted to complete their second factor authentication. Valid options are 1, 2, and 3. The default is 3.

####accept_env_factor [optional] Configures whether an environment variable can be configured with a passcode to complete the second factor authentication. Valid options are yes and no. The default is no.

####motd [optional] Configures if a successful login will print /etc/motd to the user. This is only an option for login_duo. Valid options are yes and no. The default is no.

####group [optional] Configures a Unix group that will have duo_unix enabled for the associated users. There is no default for this setting.

####http_proxy [optional] Configures usage of the http_proxy environment variable. There is not default for this setting.

####manage_ssh [optional] Configures whether or not to allow the module to manage the SSH service/package. The default is true.

####pam_unix_control [optional] Configures the PAM control value for pam_duo. The default is requisite.

##Limitations This module has been built on and tested against Puppet 3.2.4

The module has been tested on:

  • RedHat Enterprise Linux 6.4 (32/64-bit)
  • RedHat Enterprise Linux 7.0 (64-bit)
  • CentOS 5.9 (32/64-bit)
  • CentOS 6.4 (32/64-bit)
  • CentOS 7.0 (64-bit)
  • Debian 7.1 (32/64-bit)
  • Ubuntu 12.04.3 (32/64-bit)
  • Ubuntu 14.04 (32/64-bit)

If you test the module on other Linux distributions (or different versions of the above), please provide feedback as able on successes or failures. We will work to add support for other operating systems and Linux distributions soon.

Caution: The use of this module will edit OpenSSH and/or PAM configuration files depending on the usage defined. These modifications have only been tested against default distribution configurations and could impact your settings. Be sure to test this module against non-production systems before attempting to deploy it across your critical infrastucture.

##Thanks

  • Gregg Leventhal
  • level99
  • Denise Stockman
  • Dan Cox