From a5cb1d24e48869e9ca205b89a7293ec70cc7f041 Mon Sep 17 00:00:00 2001 From: Malte Tammena Date: Tue, 17 Aug 2021 14:58:49 +0200 Subject: [PATCH] Make Yubikey login sufficient This should be fine as I have to login with the encryption key on boot anyway. --- system/helix-texta.nix | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/system/helix-texta.nix b/system/helix-texta.nix index 061d997..ef32a81 100644 --- a/system/helix-texta.nix +++ b/system/helix-texta.nix @@ -5,7 +5,7 @@ let # Account management. account required pam_unix.so # Authentication management. - auth required /nix/store/nyqhrbwgisnfj99m5v384czf7rqs67kw-yubico-pam-unstable-2019-07-01/lib/security/pam_yubico.so mode=challenge-response + auth sufficient /nix/store/nyqhrbwgisnfj99m5v384czf7rqs67kw-yubico-pam-unstable-2019-07-01/lib/security/pam_yubico.so mode=challenge-response auth sufficient /nix/store/fh3nczz4raw0ivnys933w0q8jqvxq4j3-fprintd-1.90.9/lib/security/pam_fprintd.so auth sufficient pam_unix.so nullok likeauth try_first_pass auth required pam_deny.so