nixos-config/modules/core/yubikey.nix

32 lines
701 B
Nix

{ pkgs, ...}:
{
services.udev.packages = [ pkgs.yubikey-personalization ];
# FIXME Don't forget to create an authorization mapping file for your user (https://nixos.wiki/wiki/Yubikey#pam_u2f)
security.pam = {
u2f = {
enable = true;
settings.cue = true;
control = "sufficient";
};
services = {
login.u2fAuth = true;
greetd.u2fAuth = true;
sudo.u2fAuth = true;
hyprlock.u2fAuth = true;
swaylock.fprintAuth = true;
hyprlock.fprintAuth = true;
# pam.services.swaylock = {}; # Already enabled
};
};
services = {
fprintd.enable = true;
};
environment.systemPackages = with pkgs; [
yubikey-manager
];
}