Hi,
I’ve created a user policy when enrolling or changing a PIN to have a
minimum length of 6 and maximum length of 12. The policy has:
{ “assign”: true, “auditlog”: true, “delete”: true, “disable”: true,
“enable”: true, “enrollHOTP”: true, “enrollSPASS”: true,
“otp_pin_contents”: “cns”, “otp_pin_maxlength”: “12”,
“otp_pin_minlength”: “6”, “reset”: true, “resync”: true, “setpin”: true,
“unassign”: true, “updateuser”: true }
This is what I want for my Yubikey and OTP-Tokens via FreeOTP etc.
Now I’m deploying SSH keys for my user and I need to enter a PIN with 6
to 12 characters. For SSH keys I don’t see a need to have a PIN. I’ve
tried to create a second user policy, but that policy gives me the
message
There are conflicting opt_pin_minlength definitions!
This is the policy:
{ “enrollSSHKEY”: true, “otp_pin_maxlength”: “0”, “otp_pin_minlength”:
“0” }
An admin user can enroll the SSHkey without a PIN. Is there a way to
achieve that for a regular user too?
Is there a reason to have a PIN on an SSH key?
Jochen–
The only problem with troubleshooting is that the trouble shoots back.