pam_wtid
toucli
Our great sponsors
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
pam_wtid
-
Use TouchID to Authenticate Sudo on macOS
Does watch unlock now work natively with pam_tid? I know as of at least a few months ago it would only work if you could use touch ID, i.e. when the laptop was open. If it was docked, it would fall back to password auth.
I wrote a patcher that changed this behavior, it patched pam_tid directly on your system and just updates the API Apple calls to allow unlocking with watch-only when touch ID is unavailable:
https://github.com/inickt/pam_wtid
Was a fun reverse engineering experience and wrote up some more info in the README.
- Show HN: Patching Apple's Touch ID PAM module to add sudo watch authentication
toucli
-
Use TouchID to Authenticate Sudo on macOS
In the same vein, I recently made a tool to use TouchID and the Secure Enclave to protect arbitrary data and env variables from the commandline: https://github.com/pathtofile/toucli
- Show HN: Commandline tool for protecting data using TouchID+Secure Enclave
What are some alternatives?
pam-watchid - PAM plugin module that allows the Apple Watch to be used for authentication
openssh-sk-winhello - A helper for OpenSSH to interact with FIDO2 and U2F security keys through native Windows Hello API
Qubes-scripts - Scripts that help with administration and usage of Qubes OS
pamgpgr
dotfiles.nix - My dotfiles in NIX
howdy - 🛡️ Windows Hello™ style facial authentication for Linux
secretive - Store SSH keys in the Secure Enclave
sekey - Use Touch ID / Secure Enclave for SSH Authentication!
WinCryptSSHAgent - Using a Yubikey for SSH Authentication on Windows Seamlessly
Fedora-KDE-Yubikey-U2F-2FA-Logins-Guide - Guide to setup a Yubikey for Fedora KDE as 2FA using U2F for the SDDM login screen, lock screen, sudo and su.