omniflake/system/desktop/yubikey-pam.nix
2026-01-22 00:19:40 +01:00

26 lines
563 B
Nix

{ config, pkgs, ... }:
{
services.pcscd.enable = true;
environment.systemPackages = with pkgs; [
yubikey-personalization
];
services.udev = {
packages = [ pkgs.yubikey-personalization ];
# extraRules = ''
# ACTION=="remove",\
# ENV{ID_BUS}=="usb",\
# ENV{ID_MODEL_ID}=="0407",\
# ENV{ID_VENDOR_ID}=="1050",\
# ENV{ID_VENDOR}=="Yubico",\
# RUN+="${pkgs.systemd}/bin/loginctl lock-sessions"
# '';
};
# security.pam.services = {
# login.u2fAuth = true;
# sudo.u2fAuth = true;
# };
}