niksos/options/desktop/yubikey.nix
2024-06-09 15:57:20 +02:00

20 lines
427 B
Nix

{
pkgs,
...
}: {
security.pam = {
services = {
login.u2fAuth = true;
sudo.u2fAuth = true;
};
};
services.udev.extraRules = ''
ACTION=="remove",\
ENV{ID_BUS}=="usb",\
ENV{ID_MODEL_ID}=="0407",\
ENV{ID_VENDOR_ID}=="1050",\
ENV{ID_VENDOR}=="Yubico",\
RUN+="${pkgs.systemd}/bin/loginctl lock-sessions"
'';
}