A YubiKey hardware security key is required for all tasks on this page.
LUKS disk encryption
Use these tasks to enroll or remove a YubiKey as a second factor for your LUKS-encrypted disk.just agate-luks-setup
Configures your LUKS-encrypted partition to use a YubiKey as a second authentication factor alongside your passphrase.
just agate-luks-remove
Removes the YubiKey from your LUKS configuration, reverting to passphrase-only authentication.
KDE authentication
Use this task to configure KDE to accept a YubiKey for screen unlock andsudo authentication via PAM.
just agate-kde-setup
Configures KDE and PAM to use your YubiKey for screen unlock and login authentication.
Typical setup flow
Enroll your YubiKey for LUKS
Run
agate-luks-setup to add your YubiKey as a second factor for disk encryption. Have your current LUKS passphrase and your YubiKey ready.Configure KDE authentication
Run
agate-kde-setup to enable YubiKey-based screen unlock and sudo authentication in KDE.