Fingerprint scanner: Difference between revisions
tod is often unnecessary. |
Add a section about how to configure fingerprint login like in other distros |
||
| Line 24: | Line 24: | ||
Just run <syntaxhighlight lang="bash">sudo fprintd-enroll</syntaxhighlight> or use the UI in the Desktop Environment if available. | Just run <syntaxhighlight lang="bash">sudo fprintd-enroll</syntaxhighlight> or use the UI in the Desktop Environment if available. | ||
== Login == | |||
While <code>services.fprintd.enable = true;</code> enables fingerprint login for the majority of display manager via the corresponding [https://search.nixos.org/options?channel=unstable&show=security.pam.services.%3Cname%3E.fprintAuth&from=0&size=50&sort=relevance&type=packages&query=pam.services.%3Cname%3E. PAM module], it can sometimes disable the ability to login using a password. This is addressed in the GitHub issue [https://github.com/NixOS/nixpkgs/issues/171136 171136]. In that issue, a possible workaround is addressed using a custom PAM module for the gnome display manager:<syntaxhighlight lang="nixos"> | |||
security.pam.services.login.fprintAuth = false; | |||
security.pam.services.gdm-fingerprint = lib.mkIf (config.services.fprintd.enable) { | |||
text = '' | |||
auth required pam_shells.so | |||
auth requisite pam_nologin.so | |||
auth requisite pam_faillock.so preauth | |||
auth required ${pkgs.fprintd}/lib/security/pam_fprintd.so | |||
auth optional pam_permit.so | |||
auth required pam_env.so | |||
auth [success=ok default=1] ${pkgs.gnome.gdm}/lib/security/pam_gdm.so | |||
auth optional ${pkgs.gnome.gnome-keyring}/lib/security/pam_gnome_keyring.so | |||
account include login | |||
password required pam_deny.so | |||
session include login | |||
session optional ${pkgs.gnome.gnome-keyring}/lib/security/pam_gnome_keyring.so auto_start | |||
''; | |||
}; | |||
}; | |||
</syntaxhighlight> | |||
[[Category:Hardware]] | [[Category:Hardware]] | ||