Yubikey Integration
Manjikaze integrates Yubikey hardware tokens to enhance system security. Yubikeys are hardware security devices that provide strong authentication and can be used for various security functions. This document outlines how Yubikey is used in Manjikaze.
Yubikey Features in Manjikaze
Manjikaze supports the following Yubikey security features:
- Full Disk Encryption Authentication - Use your Yubikey as a second factor when unlocking your encrypted disk during boot
- System Authentication - Configure your Yubikey for system login, sudo access, and other PAM authentication
- Auto-Lock on Removal - Automatically lock, suspend, or log out when your Yubikey is removed
Yubikey Touch Detector
The Yubikey Touch Detector is a utility that shows an on-screen notification when your Yubikey is waiting for a touch confirmation. This is particularly useful when using the Yubikey with applications that require touch confirmation without making it obvious that user interaction is required.
The notification helps you know exactly when you need to touch your Yubikey to confirm an operation, improving the user experience when working with touch-required operations.
Yubikey for Full Disk Encryption
Using a Yubikey as a second factor for disk encryption adds a significant layer of security to your system. Manjikaze uses the yubikey-full-disk-encryption package to implement this functionality.
To set up Yubikey for disk encryption:
First, configure your Yubikey slot for challenge-response mode:
bashmanjikazeNavigate to: Security → Generate Yubikey Secret for Disk Encryption
Then, configure the Yubikey for disk encryption. Navigate to: Security → Configure Yubikey as MFA for Disk Encryption
For more details about the disk encryption implementation, see the Disk Encryption documentation.
Yubikey for System Authentication
Manjikaze allows you to use your Yubikey for system-wide authentication, including:
- Login authentication
- Sudo command authentication
- Polkit authentication (GUI password prompts)
- GNOME Keyring unlocking
To set up Yubikey for system authentication:
manjikazeNavigate to: Security → Configure Yubikey as MFA for System
This configuration uses the PAM (Pluggable Authentication Modules) system to enable Yubikey challenge-response authentication. Once configured, you can authenticate by either:
- Inserting your Yubikey and touching it when prompted, without typing your password
- Using your password alone as a fallback when your Yubikey is not available
Auto-Lock on Yubikey Removal
Manjikaze can be configured to automatically secure your system when your Yubikey is removed. This provides additional security by ensuring that your workstation is locked if you walk away with your Yubikey.
To set up auto-lock on Yubikey removal:
manjikazeNavigate to: Security → Auto Lock on Yubikey Removal
You can choose from three actions when your Yubikey is removed:
- Lock - Lock the screen, requiring authentication to unlock
- Suspend - Lock the screen and put the system into sleep mode
- Logout - End your current session completely
Replacing a Faulty Yubikey
If your Yubikey is lost or damaged, you can replace it using the Manjikaze menu:
manjikazeNavigate to: Security → Replace Faulty Yubikey
Follow the prompts to configure your new Yubikey with the same security features as your previous one.