[user]
signingkey = ssh-ed25519 ...
[gpg]
format = ssh
[gpg "ssh"]
program = "/opt/1Password/op-ssh-sign"
# This ensures that the IdentityAgent is not overwritten
# when the agent is forwarded from the client
Match host * exec "test -z $SSH_TTY"
IdentityAgent ~/.1password/agent.sock
(work in progress)
To enable authentication with Yubikey, run:
# Writes the key to the "allowed keys" file
mkdir -p ~/.config/Yubico
pamu2fcfg > ~/.config/Yubico/u2f_keys
sudo dnf install pam-u2f
sudo authselect enable-feature with-pam-u2f
sudo authselect apply-changes