![]() If you would like to use two-factor Yubikey authentication in combination with SSH public key authentication at the current time, you should look at this Undeadly article and the AuthenticationMethods option for openssh. If you would like to enable authentication over SSH using your Yubikey, edit /etc/ssh/sshd_config and make sure the following configuration settings are set:Īfter editing the configuration, restart sshd. Otherwise, you may not be able to unlock your screen. You will need to customize /etc/pam.d/i3lock to set yubikey authentication to sufficient or you can remove it entirely. I3lock does not appear to currently have support for two-factor OTP authentication. ![]() Grep login /var/log/audit/audit.log | audit2allow -M pamyubico To fix this, you will need to add a SELinux exception as root If you are using SELinux, you may experience problems with logging in from the console because /sbin/login is typically not permitted to make outgoing TCP connections. Replace YUBI_ID with the ID and YUBI_KEY with the key you received in the previous step.Īdd this section to your xorg configuration:
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |