
Unlike a file stored on a system somewhere, Yubikeys store the needed credentials away from the drive of a potentially compromised system.We have lots of authentication options available to us – why would one choose the Yubikey over another type of authentication? While there are other aspects to this device, that’s about 90% of what you need to know. When you need to log in to something, put the Yubikey in a USB port and press the button. The Yubikey hardware is very simple: they generally include a USB connector for attaching to a computer or phone, and have a button.

This post is designed to give you the basic concepts needed to use it the other posts will all focus on how to use the Yubikey with a specific application or service.


This the first in a multipart blog series on the Yubikey, a second-factor authentication device that is:
