This will allow you to unlock your luks encrypted disk with an fido2 compatable key
Note: This has only been tested under Fedora 30 using a Solo Key
dnf install cargo cryptsetup-devel -y
``` git clone https://github.com/shimunn/fido2luks.git && cd fido2luks
CARGOINSTALLROOT=/usr sudo -E cargo install -f --path .
echo FIDO2LUKSCREDENTIALID=$(fido2luks credential) >> fido2luks.conf
set -a . fido2luks.conf
sudo -E fido2luks -i add-key /dev/disk/by-uuid/
sudo -E fido2luks -i open /dev/disk/by-uuid/
```
``` cd dracut
sudo make install ```
Add rd.luks.2fa=<CREDENTIAL_ID>:<DISK_UUID>
to GRUB_CMDLINE_LINUX
Note: This is only required for your root disk, systemd will try to unlock all other luks partions using the same key if you added it using fido2luks addkey
grub2-mkconfig > /boot/grub2/grub.cfg
Just reboot and see if it works, if thats the case you should remove your old less secure password from your luks header:
```
cryptsetup luksHeaderBackup /dev/disk/by-uuid/
fido2luks -i add-key --exclusive /dev/disk/by-uuid/