把下面这几个包装上:
libpam-thinkfinger thinkfinger-tools libthinkfinger-doc libthinkfinger0 libthinkfinger-dev
然后
sudo tf-tool --acquire
测试是否正常获取指纹数据,需要正确的刷3遍即可通过。
一般显示如下图所示:
squall@squall-laptop:~$ sudo tf-tool --acquire
[sudo] password for squall:
ThinkFinger 0.3 ( http://thinkfinger.sourceforge.net/ )
Copyright (C) 2006, 2007 Timo Hoenig <thoenig@suse.de>
Initializing... done.
Please swipe your finger (successful swipes 3/3, failed swipes: 0)... done.
Storing data (/home/spark/.thinkfinger.bir)... done.
[sudo] password for squall:
ThinkFinger 0.3 ( http://thinkfinger.sourceforge.net/ )
Copyright (C) 2006, 2007 Timo Hoenig <thoenig@suse.de>
Initializing... done.
Please swipe your finger (successful swipes 3/3, failed swipes: 0)... done.
Storing data (/home/spark/.thinkfinger.bir)... done.
生成的认证文件的位置:~/.thinkfinger.bir。
sudo tf-tool --verify
测试能否正确验证指纹,需要正确的刷1遍即可通过。
squall@squall-laptop:~$ sudo tf-tool --verify
ThinkFinger 0.3 ( http://thinkfinger.sourceforge.net/ )
Copyright (C) 2006, 2007 Timo Hoenig <thoenig@suse.de>
Initializing... done.
Please swipe your finger (successful swipes 1/1, failed swipes: 1)... done.
Result: Fingerprint does match.
ThinkFinger 0.3 ( http://thinkfinger.sourceforge.net/ )
Copyright (C) 2006, 2007 Timo Hoenig <thoenig@suse.de>
Initializing... done.
Please swipe your finger (successful swipes 1/1, failed swipes: 1)... done.
Result: Fingerprint does match.
把~/.thinkfinger.bir拷贝到/etc/pam_thinkfinger下,并改成登录用户的名字,如我的是:
sudo cp ~/.thinkfinger.bir /etc/pam_thinkfinger/squall.dir
修改/etc/pam.d/common-auth文件,在pam_unix2.so这一行的前面加入pam_thinkfinger.so 例如我的就是:
auth sufficient pam_thinkfinger.so
# here are the per-package modules (the "Primary" block)
auth [success=1 default=ignore] pam_unix.so nullok_secure
# here's the fallback if no module succeeds
auth requisite pam_deny.so
# prime the stack with a positive return value if there isn't one already;
# this avoids us returning an error just because nothing sets a success code
# since the modules above will each just jump around
auth required pam_permit.so
# and here are more per-package modules (the "Additional" block)
# end of pam-auth-update config
# here are the per-package modules (the "Primary" block)
auth [success=1 default=ignore] pam_unix.so nullok_secure
# here's the fallback if no module succeeds
auth requisite pam_deny.so
# prime the stack with a positive return value if there isn't one already;
# this avoids us returning an error just because nothing sets a success code
# since the modules above will each just jump around
auth required pam_permit.so
# and here are more per-package modules (the "Additional" block)
# end of pam-auth-update config