The YubiKey-Guide by drduh is a community-maintained, in-depth tutorial and reference on how to use a YubiKey (hardware authentication token) with GPG, SSH, and related cryptographic setups. It explains how to generate, manage, and use keys, configure pin / touch policies, and integrate the YubiKey into secure workflows. Configuration instructions for requiring touch for operations. Step-by-step instructions for generating GPG keys and migrating them to a YubiKey. Troubleshooting and advice for different OS environments. Example commands and script snippets for automation.
Features
- Step-by-step instructions for generating GPG keys and migrating them to a YubiKey
- Configuration instructions for requiring touch for operations
- Guidance for using the YubiKey for SSH / agent forwarding
- Troubleshooting and advice for different OS environments
- Example commands and script snippets for automation
- Explanation of best practices / security tradeoffs
Categories
SecurityLicense
MIT LicenseFollow YubiKey Guide
Other Useful Business Software
Our Free Plans just got better! | Auth0
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Rate This Project
Login To Rate This Project
User Reviews
Be the first to post a review of YubiKey Guide!