Here’s the simple guide to logging in to your personal Linux computer. Commands are mostly compatible with Ubuntu 20.04 LTS, but they should be also workable with some small modifications for other Linux distributions. Let’s see how to secure local Linux logins using the U2F feature on your ATKeys. Please see the video tutorial, you can set up your key with the steps in the video : )
dpkg -s libu2f-udev.
If not, please install it by using sudo apt install libu2f-udev
.sudo apt-get install libpam-u2f.
Now that we have the PAM module installed, and it’s time to add your ATKey to your Ubuntu.
mkdir ~/.config/Yubico
pamu2fcfg > ~/.config/Yubico/u2f_keys
pamu2fcfg -n >> ~/.config/Yubico/u2f_keys
( >>
means it will append, rather than overwrite to your previous registration.)
/etc/pam.d/sudo
file to associate PAM module with your sudo command, you can only modify this configuration setting again to remove it by verifying with your registered ATKeys through PAM. sudo vim /etc/pam.d/sudo
@include common-auth
and add the following line right below it then save the file:
auth required pam_u2f.so
After above steps, you have associated your sudo command with ATKey. Let’s have some test with:
sudo apt-get update
sudo vim /etc/pam.d/gdm-password
@include common-auth
and add the following line right below it then save the file:
auth required pam_u2f.so
Hope you enjoy your ATKeys and feel free to reach us if you have any questions. We will introduce how to use and set up SSH in the next article, please stay tuned!
If you are interested in any of our ATKeys’ technical details, please feel free to contact us.