Configured login with yubikey
This commit is contained in:
parent
4aafa57e5a
commit
ee956f735e
|
@ -109,6 +109,10 @@
|
|||
wireguard-tools
|
||||
|
||||
prusa-slicer
|
||||
|
||||
yubikey-manager
|
||||
yubikey-agent
|
||||
yubico-pam
|
||||
];
|
||||
|
||||
# Some programs need SUID wrappers, can be configured further or are
|
||||
|
@ -161,6 +165,19 @@
|
|||
pulse.enable = true;
|
||||
};
|
||||
|
||||
services.pcscd.enable = true;
|
||||
|
||||
security.pam.yubico = {
|
||||
enable = true;
|
||||
#debug = true;
|
||||
mode = "challenge-response";
|
||||
# Uncomment below for 2FA
|
||||
#control = "required";
|
||||
};
|
||||
# To set up, need to run (might need to run as root)
|
||||
# ykman otp chalresp --touch --generate 2
|
||||
# ykpamcfg -2 -v
|
||||
|
||||
# Open ports in the firewall.
|
||||
# networking.firewall.allowedTCPPorts = [ ... ];
|
||||
# networking.firewall.allowedUDPPorts = [ ... ];
|
||||
|
|
Loading…
Reference in a new issue