Knowledge Base
  • Security
  • Computing
  • Programming
  • Electronics
  • Hacking
  • Making
  • Math
  • Miscellaneous
    • Security
      • Penetration Testing
      • Recon
      • Social Engineering
      • Physical Security
      • Exploitation
      • Web Security
      • Post-Exploitation
      • Tools
      • Red Teaming
      • Reverse Engineering
      • Fuzzing
      • Learning
      • Crypto
      • Embedded
      • Authentication
      • Cloud Security
      • Network Security
      • Operational Security
      • Wireless Security
      • Container Security
    • Computing
      • Custom Setups
      • Linux
      • Windows
      • Networking
      • Vim
      • tmux
      • Cloud
      • Docker
      • Utilities
      • KVM/Libvirt
      • Raspberry Pi
    • Programming
      • Regular Expressions
    • Electronics
      • Tools
      • JTAG
      • PCB Fabrication
      • Keyboards
      • Motors
      • Flash Memory
      • Useful Parts
    • Hacking
      • Culture
    • Making
      • 3D Printing
    • Math
      • Coupon Problem
      • Eliptic Curves
    • Miscellaneous
      • Writing & Blogging
      • (Giving) Presentations & Talks
      • Awesome Resources
      • Fonts
      • KB Meta

    U2F Authentication

    • Resources
    • Implementations
    • Use Cases

    Resources

    • U2F Protocol Details by Yubico

    Implementations

    • TillitisKey - Using measured boot and DICE, apps loaded from the host, keys based on unique per-device secret.
    • Somu - Tiny open source implementation based on Tomu.
    • Yubikey - Assortment of Yubikey products based on U2F/FIDO2.

    Use Cases

    • Configure SSH with Yubikey Security Keys
    • Arch YubiKey Guide

    Updated: October 26, 2024

    • Matir's Blog
    • Feed
    © 2024 Matir. Powered by Jekyll & Minimal Mistakes.