diff options
author | Jörg Thalheim <Mic92@users.noreply.github.com> | 2019-09-24 03:31:39 +0100 |
---|---|---|
committer | GitHub <noreply@github.com> | 2019-09-24 03:31:39 +0100 |
commit | c5bc77d15112421289a07bdbbc5990f96348deaa (patch) | |
tree | 56b94847e6ae92b7d876a3d4d2d503d6af3fcc56 /nixos/modules | |
parent | 9f35287e8e7028d90868ce5542c145b66852a40d (diff) | |
parent | edf538f7b9da60b318a0b1881881e90cf7884d67 (diff) | |
download | nixpkgs-c5bc77d15112421289a07bdbbc5990f96348deaa.tar nixpkgs-c5bc77d15112421289a07bdbbc5990f96348deaa.tar.gz nixpkgs-c5bc77d15112421289a07bdbbc5990f96348deaa.tar.bz2 nixpkgs-c5bc77d15112421289a07bdbbc5990f96348deaa.tar.lz nixpkgs-c5bc77d15112421289a07bdbbc5990f96348deaa.tar.xz nixpkgs-c5bc77d15112421289a07bdbbc5990f96348deaa.tar.zst nixpkgs-c5bc77d15112421289a07bdbbc5990f96348deaa.zip |
Merge pull request #67748 from typetetris/yubico-local-auth
Yubico local auth
Diffstat (limited to 'nixos/modules')
-rw-r--r-- | nixos/modules/security/pam.nix | 19 |
1 files changed, 18 insertions, 1 deletions
diff --git a/nixos/modules/security/pam.nix b/nixos/modules/security/pam.nix index a3eb12b0694..11227354ad3 100644 --- a/nixos/modules/security/pam.nix +++ b/nixos/modules/security/pam.nix @@ -351,7 +351,7 @@ let ${let oath = config.security.pam.oath; in optionalString cfg.oathAuth "auth requisite ${pkgs.oathToolkit}/lib/security/pam_oath.so window=${toString oath.window} usersfile=${toString oath.usersFile} digits=${toString oath.digits}"} ${let yubi = config.security.pam.yubico; in optionalString cfg.yubicoAuth - "auth ${yubi.control} ${pkgs.yubico-pam}/lib/security/pam_yubico.so id=${toString yubi.id} ${optionalString yubi.debug "debug"}"} + "auth ${yubi.control} ${pkgs.yubico-pam}/lib/security/pam_yubico.so mode=${toString yubi.mode} ${optionalString (yubi.mode == "client") "id=${toString yubi.id}"} ${optionalString yubi.debug "debug"}"} '' + # Modules in this block require having the password set in PAM_AUTHTOK. # pam_unix is marked as 'sufficient' on NixOS which means nothing will run @@ -696,6 +696,23 @@ in Debug output to stderr. ''; }; + mode = mkOption { + default = "client"; + type = types.enum [ "client" "challenge-response" ]; + description = '' + Mode of operation. + + Use "client" for online validation with a YubiKey validation service such as + the YubiCloud. + + Use "challenge-response" for offline validation using YubiKeys with HMAC-SHA-1 + Challenge-Response configurations. See the man-page ykpamcfg(1) for further + details on how to configure offline Challenge-Response validation. + + More information can be found <link + xlink:href="https://developers.yubico.com/yubico-pam/Authentication_Using_Challenge-Response.html">here</link>. + ''; + }; }; security.pam.enableEcryptfs = mkOption { |