Yubikey: Remove unused authorizedYubikeys#1428
Conversation
- Removed fixed `u2fKeys` from reference keys module and the `authfile` option from PAM U2F settings. - Now relies on externally provided configuration for U2F keys, improving modularity and flexibility. Signed-off-by: Vunny Sodhi <vunny.sodhi@tii.ae>
|
@leivos-unikie / @milva-unikie can you please confirm it fixes the issue mentioned? |
|
The issue https://jira.tii.ae/browse/SSRCSP-7201 still reproduces. Ghaf boots to GUI / user creation prompt when Yubikey is connected via USB hub but not when directly plugged into laptop USB port. After booting with Yubikey plugged via USB hub I initialized the key and created a user. Then rebooted with the Yubikey plugged directly to laptop, and it didn't boot to GUI even after initializing the Yubikey. |
This approach aims to prevent the hardcoding of Yubikey device as Qemu parameters. Instead, Yubikey detection will be managed via vhotplug module. Signed-off-by: Vunny Sodhi <vunny.sodhi@tii.ae>
|
Tested on Lenovo-X1 Initializing Yubikey works now fine when plugged directly to laptop. Logging and unlocking with Yubikey and by password works. Unplugging Yubikey locks the screen. Yubikey works both when directly plugged and via USB hub. |
kajusnau
left a comment
There was a problem hiding this comment.
Adjust the typo if necessary, otherwise looks good
Description of Changes
u2fKeysfrom reference keys module and theauthfileoption from PAM U2F settings.Type of Change
Related Issues / Tickets
Fixes: https://jira.tii.ae/browse/SSRCSP-7201
Checklist
make-checksand it passesTesting Instructions
Applicable Targets
aarch64aarch64x86_64x86_64x86_64Installation Method
nixos-rebuild ... switchTest Steps To Verify:
Ticketssection.