In the last article I gave a quick overview of the hardware tokens and the yubikey. Today we will go more in details and we will see how to set and use GPG keys on the yubikey. Continue reading “Hardware-based authentication: Yubikey configuration”
Hardware-based authentication: Yubikey overview
In this article series, I am going to explain what is an hardware based authentication and how to configure one of the most famous (the yubikey) to work with your accounts and hold your ssh /gpg keys . Continue reading “Hardware-based authentication: Yubikey overview”