You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/launch-keyboard.md
+7-1Lines changed: 7 additions & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -41,10 +41,16 @@ Once the keyboard is in this mode, you can apply the firmware update. When the u
41
41
42
42
## Keyboard Configurator
43
43
44
-
You can download the configurator application [here](https://github.com/pop-os/keyboard-configurator/releases) On Pop!\_OS the configurator is available in the <u>Pop!\_Shop</u>. An `AppImage` is provided for Ubuntu and other Linux OSes. Windows and macOS downloads are also available.
44
+
You can download the configurator application [here](https://github.com/pop-os/keyboard-configurator/releases) On Pop!\_OS the configurator is available in the <u>Pop!\_Shop</u>. An `AppImage` is provided for Ubuntu and other Linux OSes as a standalone file. Recent changes to Ubuntu will require that you install the `libfuse2` package for `AppImage` support and can be done with the following command run in a terminal:
45
45
46
+
```bash
47
+
sudo apt update
48
+
sudo apt install libfuse2
49
+
```
46
50
You can also download the configurator from the Arch Linux User Repository (AUR). The main version is built from the latest release, which is recommended for most users. You can find more information [here](https://aur.archlinux.org/packages/system76-keyboard-configurator). The git version is built from the latest commits to the project (this version will have the very latest fixes and features) which can be found [here](https://aur.archlinux.org/packages/keyboard-configurator-git/).
47
51
52
+
There are also builds of the Keyboard Configurator for [Windows and macOS](https://github.com/pop-os/keyboard-configurator/releases) at the same location.
Copy file name to clipboardExpand all lines: content/use-vpn-software.md
-22Lines changed: 0 additions & 22 deletions
Original file line number
Diff line number
Diff line change
@@ -38,10 +38,6 @@ Next be sure to leave **Open with Eddy (default)** selected so that the next win
38
38
39
39
Now click the **Install** button to install <u>ProtonVPN</u> using <u>Eddy</u>. Once that is down close the <u>Eddy</u> window.
40
40
41
-
### Install the package
42
-
43
-
Open a <u>Terminal</u> window to install the actual package as the .deb file that we installed added the repository so that our system knows where to find the real <u>ProtonVPN</u> package.
44
-
45
41
On **Pop!_OS**:
46
42
47
43
Press <kbd><font-awesome-icon:icon="['fab', 'pop-os']"></font-awesome-icon></kbd>+<kbd>t</kbd> on your keyboard. A Terminal window should open.
@@ -73,24 +69,6 @@ From this window we can see our Upload and Download speeds including the load th
73
69
74
70
## Install a VPN using OpenVPN files
75
71
76
-
### Open Terminal
77
-
78
-
If you are on **Pop!_OS**:
79
-
80
-
Press <kbd><font-awesome-icon:icon="['fab', 'pop-os']"></font-awesome-icon></kbd>+<kbd>t</kbd> on your keyboard. A Terminal window should open.
81
-
82
-
If you are on **Ubuntu**:
83
-
84
-
Press <kbd>Ctrl</kbd>+<kbd>Alt</kbd>+<kbd>t</kbd> on your keyboard. A Terminal window should open.
85
-
86
-
### Install Packages
87
-
88
-
Enter the following command followed by <kbd>Enter</kbd>:
89
-
90
-
```bash
91
-
sudo apt install network-manager-openvpn-gnome
92
-
```
93
-
94
72
### Open Network Settings
95
73
96
74
Access OpenVPN setting in the <u>Settings</u> application (GNOME Control Center)
Copy file name to clipboardExpand all lines: content/yubikey-login.md
+39-42Lines changed: 39 additions & 42 deletions
Original file line number
Diff line number
Diff line change
@@ -14,99 +14,96 @@ section: community
14
14
tableOfContents: true
15
15
---
16
16
17
+
If you have a Yubikey, you can use it to login or unlock your system.
17
18
18
-
If you have a Yubikey, you can use it to login or unlock your system.
19
+
To do this you must install the yubikey packages, configure a challenge-response slot on the Yubikey, and then configure the necessary PAM modules.
19
20
20
-
To do this you must install the yubikey-luks package, configure a challenge-response slot on the Yubikey, and then configure the necessary PAM modules.
21
-
22
-
**NOTE:** This guide assumes you are running Pop!_OS
21
+
**NOTE:** Open an additional root terminal: `sudo su`
Pay close attention when copying/pasting the commands above. The *challenge-123456* and *alice-123456* needs to match whatever your output is.**
56
+
Pay close attention when copying/pasting the commands above. The *challenge-123456* and *aaronh-serial* needs to match the both the output from the `ykpamcfg` command and the final file needs to match the name of your user name and serial.**
68
57
69
58
## Configure Plugable Authentication Modules
70
59
71
60
**Before making any changes to the files listed below, I highly recommend backing up each file, and having a sudo/root session open in case you need to roll-back.**
72
61
73
-
You need to add the following line to each of the files listed below:
62
+
sudo dpkg-reconfigure libpam-yubico
63
+
64
+
You will want to change the "Parameters for Yubico PAM:" to be:
Setting this to sufficient is the recommended method as the login manager will take your password **or** the Yubikey to login. To do this you will need to change the second setting in the following line in ```/etc/pam.d/common-auth```:
This configures your system to accept your Yubikey as an acceptable login alternative. In other words, you can login without a password, just plug the key into a USB port. **You can still use your password to login with this setup**.
77
+
This configures your system to accept your Yubikey as an acceptable login alternative.
78
78
79
-
If you want your Yubiky to be **required to login**, then you need to change *sufficient* to *required*. For example:
79
+
If you want your Yubiky to be **required to login**, then you need to change *sufficient* to *required* (which is the default). For example:
There a a number of other options for PAM. Check the man pages for more information. Also, the [Yubico PAM module](https://developers.yubico.com/yubico-pam/) page has a pretty good breakdown.
83
+
There a a number of other options for PAM and ways to configure that to your liking. Check the [man pages for more information](https://manpages.ubuntu.com/manpages/jammy/en/man5/pam.d.5.html). Also, the [Yubico PAM module](https://developers.yubico.com/yubico-pam/) page has a pretty good breakdown.
84
84
85
85
- /etc/pam.d/common-auth
86
86
- /etc/pam.d/login
87
87
- /etc/pam.d/gdm-password
88
88
89
-
### /etc/pam.d/common-auth
89
+
##Debugging and Testing your PAM configuration
90
90
91
-
At a minimum you need to modify this file.
91
+
You will want to keep a root terminal logged in while setting this up to make sure you can reverse any changes that do not allow you to login. In the initial setup, the parameters to setup libpam-yubico included debug message. "Sudo" on the command line will now show debug output when run.
92
92
93
-
Add the auth line to the top of this file (after the comment block).
93
+
With the Yubikey plugged into the system simulate a login with the following commands:
94
94
95
-
You may need to run `pam-auth-update` afterwards.
95
+
support@pop-os:~$ sudo -s
96
+
[snip lots of logging]
97
+
[sudo] password for support:
98
+
root@pop-os:/home/support#
96
99
97
-
### /etc/pam.d/login
100
+
Test you setup if you are changing the "sufficient" setting to "required" before removing the "debug" setting. Use new terminal windows to simulate a login both with your Yubikey attached and out of the system. In "required" mode, you should not be able to finish a login with the Yubikey not plugged into your system.
98
101
99
-
Modifying this file is optional. This allows you to authenticate to the Linux terminal with your Yubikey.
102
+
Once you are sure that this works with your testing, remove the debug option:
100
103
101
-
Add the auth line to the top of this file (after the comment block).
102
-
103
-
### /etc/pam.d/gdm-password
104
-
105
-
Modifying this file is also optional. If you want to login to your Desktop Environment, (e.g. GNOME), you will need to add the auth line to the /etc/pam.d/gdm-password file.
106
-
107
-
Add the auth line immediately below the **@include common-auth** line.
**NOTE: This will allow you to login to your desktop without a password, but you may still be asked to use a password to unlock your keyring. This prompt should only appear once upon initial login.**
0 commit comments