37 lines
700 B
Nix
37 lines
700 B
Nix
{
|
|
config,
|
|
pkgs,
|
|
lib,
|
|
...
|
|
}: let
|
|
inherit (lib) mkEnableOption mkIf;
|
|
|
|
cfg = config.aa.apps.yubikey;
|
|
in {
|
|
options.aa.apps.yubikey = {
|
|
enable = mkEnableOption "yubikey";
|
|
};
|
|
|
|
config = mkIf cfg.enable {
|
|
environment.systemPackages = with pkgs; [
|
|
yubikey-manager
|
|
yubikey-agent
|
|
yubico-pam
|
|
age-plugin-yubikey
|
|
rage
|
|
];
|
|
|
|
services.pcscd.enable = true;
|
|
|
|
security.pam.yubico = {
|
|
enable = true;
|
|
mode = "challenge-response";
|
|
# Uncomment below for 2FA
|
|
#control = "required";
|
|
};
|
|
# To set up, need to run (might need to run first command as root)
|
|
# ykman otp chalresp --touch --generate 2
|
|
# ykpamcfg -2 -v
|
|
};
|
|
}
|