The YubiKey-Guide by drduh is a community-maintained, in-depth tutorial and reference on how to use a YubiKey (hardware authentication token) with GPG, SSH, and related cryptographic setups. It explains how to generate, manage, and use keys, configure pin / touch policies, and integrate the YubiKey into secure workflows. Configuration instructions for requiring touch for operations. Step-by-step instructions for generating GPG keys and migrating them to a YubiKey. Troubleshooting and advice for different OS environments. Example commands and script snippets for automation.
Features
- Step-by-step instructions for generating GPG keys and migrating them to a YubiKey
- Configuration instructions for requiring touch for operations
- Guidance for using the YubiKey for SSH / agent forwarding
- Troubleshooting and advice for different OS environments
- Example commands and script snippets for automation
- Explanation of best practices / security tradeoffs
Categories
SecurityLicense
MIT LicenseFollow YubiKey Guide
Other Useful Business Software
The AI workplace management platform
By combining AI workflows, predictive intelligence, and automated insights, OfficeSpace gives leaders a complete view of how their spaces are used and how people work. Facilities, IT, HR, and Real Estate teams use OfficeSpace to optimize space utilization, enhance employee experience, and reduce portfolio costs with precision.
Rate This Project
Login To Rate This Project
User Reviews
Be the first to post a review of YubiKey Guide!