

If you already have an Azure environment, you might be interested in our industry-unique Windows Hello for Business Yubikey integration. Furthermore, this method doesn’t allow you to implement effective role-based access control.

Even if you don’t mind setting up and maintaining the Debian installation, scaling up YubiKey configuration (and inevitable reconfiguration) for the whole organization is a daunting task. Obviously that’s not an optimal configuration for the majority of organizations. It requires you to use FreeRADIUS configured with PAM in a Debian environment, and every key has to be manually configured via command prompts. The first method is the one detailed on the Yubico site, but both the documentation and the configuration leave something to be desired.

There are a few ways to set up YubiKeys to authenticate to a RADIUS. Users enjoy the same quick, passwordless access to the software they use on a daily basis without the hassle or risk of credential management. Since it’s tied directly to the user’s identity in your IDP, the Yubikey can be used to authenticate email clients and other web services using the FIDO2 and U2F protocol. Yubikeys can be configured with client certificates that are tied to users’ directory profile, enabling dynamic role-based access control with SecureW2’s CloudRADIUS.įor more information on how to use Yubikeys for real-time policy enforcement, click here to talk to our experts.Įven after users have used their Yubikey to login to their workstation and to connect to your 802.1X network, the security key’s work is not done. With SecureW2’s Yubikey solution, you can create certificate templates that enable Yubikeys to authenticate desktop login, Wi-Fi, VPN, SSH, and more. The ability to use custom certificates issued by your PKI is a big upgrade to the base abilities of the Yubikey. It can also be configured to store externally generated certificates with the help of a third-party smart card management system (SCMS) like SecureW2. This secure cryptoprocessor can generate its own certificate for attestation, an important part of the process of establishing trust. Since so many of those features are based on principles of public key cryptography, it makes them well-suited for use in a network with a Public Key Infrastructure (PKI).įor example, many models of Yubikey come equipped with a hardware security module (HSM).

YubiKeys are capable of multiple factors of authentication by themselves: There’s a lot crammed into that tiny, USB-equipped package.
