I experimented on a Ubuntu 19.04 system a bit and took a look here: https://schulz.dk/2019/08/23/using-solokey-for-linux-login/ and here: https://wiki.gnome.org/Projects/GnomeKeyring/Pam#Advanced_configuration
After this created a file named common-fido-auth and included it in
/etc/pam.d/sudo
and /etc/pam.d/gdm-password
The last one looks like this
#%PAM-1.0
session required pam_env.so readenv=1 user_readenv=0
session required pam_env.so readenv=1 envfile=/etc/default/locale user_readenv=0
@include common-fido-auth #instead of @include common-auth
@include common-account
@include common-session-noninteractive
I assumed that common-auth has modules which unlocks the gnome keyring and copied some lines from common-auth
auth include common-fido
auth requisite pam_deny.so
auth required pam_permit.so
auth optional pam_cap.so
Where as common-fido looks like
auth sufficient pam_u2f.so
auth [success=1 default=ignore] pam_unix.so nullok_secure
But it seems to be wrong. The pam_unix.so is not interpereted properly and with the Solokey I have to type in my password for the Gnome Keyring
Has someone any ideas?