In the last article I gave a quick overview of the hardware tokens and the yubikey. Today we will go more in details and we will see how to set and use GPG keys on the yubikey. Continue reading “Hardware-based authentication: Yubikey configuration”
In the last article I gave a quick overview of the hardware tokens and the yubikey. Today we will go more in details and we will see how to set and use GPG keys on the yubikey. Continue reading “Hardware-based authentication: Yubikey configuration”