-
-
Notifications
You must be signed in to change notification settings - Fork 14
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[feature req] use pam_service of sudoers to keep touchid after system upgrading #15
Comments
This is the way. |
sudo_local is almost the way in this issue, the latest
For the newer OS (>=14), we should create/edit the In the |
+1 to this. The first thing that came into mind when comparing this method vs. sudo_local was the lack of a safe recovery mechanism. But this would still be the right way on pre-sonoma machines. Maybe change it to /etc/pam.d/sudo_local instead of /etc/pam.d/my-sudo so that its ready for Sonoma+(?) Also, it would have been nice if "pam_reattach" and "pam_watchid" could somehow be chosen as an option during install, instead of having to manually add that too. Wishful thinking on my part. |
The hard part for pre-sonoma is that the OS will be upgrade to sonoma, and the
I'm afraid the cycling includes of sudo and sudo_local would introduce some troubles. |
Using a custom sudoers.d file and a pam.d conf, we can setup touch id auth for sudo with addition features:
.plist
files/etc/pam.d/sudo
, then the touch id function still works after system upgradingWhen installing, the script should generate two files:
/etc/sudoers.d/50-pam-service
, with the content like this:/etc/pam.d/my-sudo
, with the content like this:we can add more sudo auth features in
/etc/pam.d/my-sudo
. when fails, the user with name{admin-user-name}
can quickly restore the default sudo auth method by runningThe text was updated successfully, but these errors were encountered: