<feed xmlns='http://www.w3.org/2005/Atom'>
<title>ben/cfg.git/lib/authorized_yubikeys, branch master</title>
<subtitle>my dotfiles, via nix and home-manager</subtitle>
<link rel='alternate' type='text/html' href='http://git.bensima.com/ben/cfg.git/'/>
<entry>
<title>yubikey login on helium</title>
<updated>2022-01-31T21:45:55+00:00</updated>
<author>
<name>Ben Sima</name>
<email>ben@bsima.me</email>
</author>
<published>2022-01-31T21:45:55+00:00</published>
<link rel='alternate' type='text/html' href='http://git.bensima.com/ben/cfg.git/commit/?id=e18ad25efd2768e597aaa9f94071ed47cb65803f'/>
<id>e18ad25efd2768e597aaa9f94071ed47cb65803f</id>
<content type='text'>
This allows me to login and sudo with *either* a password or my yubikey.

I also had to setup my yubikey with the instructions here:
https://nixos.wiki/wiki/Yubikey#Logging-in

Basically use ykman and ykpamcfg to generate a challenge-response setup
on slot 2 of my yubikey. The pam config compares the key response with
the ~/.yubico/challenge-* file in order to authenticate. I think pam
uses the ~/.yubico/authorized_keys file to know to which yubikey to send
the challenge, but I'm not sure on that one.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
This allows me to login and sudo with *either* a password or my yubikey.

I also had to setup my yubikey with the instructions here:
https://nixos.wiki/wiki/Yubikey#Logging-in

Basically use ykman and ykpamcfg to generate a challenge-response setup
on slot 2 of my yubikey. The pam config compares the key response with
the ~/.yubico/challenge-* file in order to authenticate. I think pam
uses the ~/.yubico/authorized_keys file to know to which yubikey to send
the challenge, but I'm not sure on that one.
</pre>
</div>
</content>
</entry>
</feed>
