mirror of
https://github.com/javalsai/lidm.git
synced 2026-01-12 16:40:00 +01:00
* add support for fido keybind * add to themes * fix clang format * Update ui.c * docs: add misc stuff about the yubikey --------- Co-authored-by: javalsai <jvssxxi@gmail.com>
31 lines
1.1 KiB
Markdown
31 lines
1.1 KiB
Markdown
# Yubikeys
|
|
|
|
Quick reference explaining how yubikeys work for now.
|
|
|
|
# Enable
|
|
|
|
Yubikeys are disabled by default, to enable them activate a keybinding for it (`[functions] fido`) in the config file.
|
|
|
|
Note that pressing this configured keybinding has no difference from trying to log in with an empty password, there's virtually no difference.
|
|
|
|
`pam_u2f` must be configured with a registered key (`pamu2fcfg`).
|
|
|
|
# Extra
|
|
|
|
All my yubikey knowledge comes from the [pr that implemented this](https://github.com/javalsai/lidm/pull/89), please refer to it for extra details. Contributions to this documentation are welcome (explaining more in detail, potential issues... really anything that improves this).
|
|
|
|
Allegedly this pam module configuration should work:
|
|
|
|
```pam
|
|
#%PAM-1.0
|
|
|
|
auth sufficient pam_u2f.so cue
|
|
auth requisite pam_nologin.so
|
|
auth include system-local-login
|
|
account include system-local-login
|
|
session include system-local-login
|
|
password include system-local-login
|
|
```
|
|
|
|
Also, I recommend giving the [arch wiki](https://wiki.archlinux.org/title/YubiKey) a read anyways.
|