pages/yubikey: fix key registration instructions

The instructions to register a key with the local account were
implicitly requiring challenge-response. Add the YubiCloud method based
instructions and also add an explicit command to configure
challenge-response in slot 2 of a key.
This commit is contained in:
w4tsn 2023-02-20 20:31:33 +01:00
parent eae11f0488
commit 6619d128b8
No known key found for this signature in database

View file

@ -49,15 +49,7 @@ Install the PAM yubico module from the official repositories:
[source, bash] [source, bash]
[…]$ sudo dnf install pam_yubico […]$ sudo dnf install pam_yubico
Register a currently connected YubiKey with your user account with === Base configuration files
[source, bash]
[…]$ ykpamcfg -2 -v
Or for any other system user using sudo with
[source, bash]
[…]$ sudo -u someuser ykpamcfg -2 -v
Create two base configuration files in /etc/pam.d. yubikey-required and yubikey-sufficient. Create two base configuration files in /etc/pam.d. yubikey-required and yubikey-sufficient.
@ -99,6 +91,31 @@ auth sufficient pam_yubico.so mode=challenge-response
You may add the debug option at the end of these lines right after the mode option to get troubleshooting information in journald. You may add the debug option at the end of these lines right after the mode option to get troubleshooting information in journald.
==== ====
=== Register YubiKey(s) with your local account(s)
If you use the online YubiCloud method you need the ID of your YubiKey. For this just enter the key and retrieve an OTP code with a short press on the button and extract the first 12 characters - this is your key ID.
[source]
cccccbcgebif | bclbtjihhbfbduejkuhgvhkehnicrfdj
Create a configuration file ~/.yubico/authorized_keys with your user account followed by key IDs separated by semicolons.
[source]
fedora-user:cccccbcgebif[:<another-key-id>]
Alternatively, activate challenge-response in slot 2 and register with your user account.
[source, bash]
[…]$ ykman otp chalresp --generate --touch 2
[…]$ ykpamcfg -2
Or for any other system user using sudo.
[source, bash]
[…]$ sudo -u someuser ykpamcfg -2
=== Configure desired PAM modules
Next configure PAM to accept a YubiKey as a means of authentication. There are many options in /etc/pam.d to modify and add a YubiKey, but the most common use-cases are: Next configure PAM to accept a YubiKey as a means of authentication. There are many options in /etc/pam.d to modify and add a YubiKey, but the most common use-cases are:
- /etc/pam.d/login - /etc/pam.d/login