The YubiKey-Guide by drduh is a community-maintained, in-depth tutorial and reference on how to use a YubiKey (hardware authentication token) with GPG, SSH, and related cryptographic setups. It explains how to generate, manage, and use keys, configure pin / touch policies, and integrate the YubiKey into secure workflows. Configuration instructions for requiring touch for operations. Step-by-step instructions for generating GPG keys and migrating them to a YubiKey. Troubleshooting and advice for different OS environments. Example commands and script snippets for automation.
Features
- Step-by-step instructions for generating GPG keys and migrating them to a YubiKey
- Configuration instructions for requiring touch for operations
- Guidance for using the YubiKey for SSH / agent forwarding
- Troubleshooting and advice for different OS environments
- Example commands and script snippets for automation
- Explanation of best practices / security tradeoffs
Categories
SecurityLicense
MIT LicenseFollow YubiKey Guide
Other Useful Business Software
Custom VMs From 1 to 96 vCPUs With 99.95% Uptime
Live migration and automatic failover keep workloads online through maintenance. One free e2-micro VM every month.
Rate This Project
Login To Rate This Project
User Reviews
Be the first to post a review of YubiKey Guide!