Configured login with yubikey
This commit is contained in:
parent
4aafa57e5a
commit
ee956f735e
|
@ -109,6 +109,10 @@
|
||||||
wireguard-tools
|
wireguard-tools
|
||||||
|
|
||||||
prusa-slicer
|
prusa-slicer
|
||||||
|
|
||||||
|
yubikey-manager
|
||||||
|
yubikey-agent
|
||||||
|
yubico-pam
|
||||||
];
|
];
|
||||||
|
|
||||||
# Some programs need SUID wrappers, can be configured further or are
|
# Some programs need SUID wrappers, can be configured further or are
|
||||||
|
@ -161,6 +165,19 @@
|
||||||
pulse.enable = true;
|
pulse.enable = true;
|
||||||
};
|
};
|
||||||
|
|
||||||
|
services.pcscd.enable = true;
|
||||||
|
|
||||||
|
security.pam.yubico = {
|
||||||
|
enable = true;
|
||||||
|
#debug = true;
|
||||||
|
mode = "challenge-response";
|
||||||
|
# Uncomment below for 2FA
|
||||||
|
#control = "required";
|
||||||
|
};
|
||||||
|
# To set up, need to run (might need to run as root)
|
||||||
|
# ykman otp chalresp --touch --generate 2
|
||||||
|
# ykpamcfg -2 -v
|
||||||
|
|
||||||
# Open ports in the firewall.
|
# Open ports in the firewall.
|
||||||
# networking.firewall.allowedTCPPorts = [ ... ];
|
# networking.firewall.allowedTCPPorts = [ ... ];
|
||||||
# networking.firewall.allowedUDPPorts = [ ... ];
|
# networking.firewall.allowedUDPPorts = [ ... ];
|
||||||
|
|
Loading…
Reference in a new issue