About the Yubico Developer Program

The Yubico developer program provides the tools you need to develop, integrate, and launch your Works with YubiKey product.

Developer Workflow

  1. Learn about YubiKey products and software

    • Read about the open standards and protocols

    • Explore the open source libraries and APIs

    • Check out example projects, guides, and how-to’s

  2. Connect with the the Yubico developer community

    • Ask technical questions

    • Report bugs and request features

    • Explore Yubico’s knowledge base

  3. Integrate with Yubico

    • Integrate open standards into your product or service

    • Submit a request for a technical integration review

    • Once approved, share your content and imagery with Yubico and get added to the Works with YubiKey catalog

Developer Guides

The Yubico Developer Program provides workshops, documentation, implementation guides, APIs and SDKs to aid in rapid integration of Yubico technologies including YubiKey integration using any of the supported protocols: FIDO U2F, FIDO2, One-time password (OTP), PIV (smart card), and OpenPGP. These resources can all be found on the developer site.


The FIDO2/WebAuthn open authentication specifications enable strong first-factor, second-factor, and multi-factor authentication options.

One-Time Password (OTP)

Yubico OTP is a simple yet strong authentication mechanism that is supported by all YubiKeys. Yubico OTP can be used as the second factor in a 2-factor authentication model or on its own, providing first-factor authentication.

Personal Identity Verification (PIV)

The YubiKey provides smart card features based on the Personal Identity and Verification Card (PIV) standard over the CCID protocol, which supports smart cards on a USB interface. This enables you to perform RSA or ECC sign and decrypt operations using a private key stored on the YubiKey.


OpenPGP is a standards-based public key cryptography for signing, encrypting, and decrypting texts, e-mails, files, SSH, etc. Both the YubiKey 4 series and Yubikey NEO can securely hold a PGP key.

YubiHSM 2

The YubiHSM 2 provides advanced cryptography, including hashing, asymmetric and symmetric key cryptography, to protect the cryptographic keys that secure critical applications, identities, and sensitive data in an enterprise for certificate authorities, databases, code signing and more.


There are several communities where you can engage with Yubico developers and enthusiasts.

Ask Technical Questions

For technical questions, try Stack Exchange sites. Stack Exchange is a network of question and answer sites for developers to learn and share their knowledge, which includes Stack Overflow.

If you’ve never used a Stack Exchange site then you should review their guide for asking good questions. Use the Yubico tag when asking a question.

Report bugs and request features

Yubico offers many libraries and tools to help you integrate with YubiKeys and YubiHSMs. Many of these are hosted on GitHub.

If you’ve never used Github before then you should review Github Guides, particularly the Mastering Issues guide which helps explain how to use Github Issues to report bugs or request features.

Explore the knowledge base

Yubico’s knowledge base contains guides, troubleshooting tips, and details about all of Yubico’s products. It can help you get started if you are new to YubiKeys.


Join the Works with YubiKey program. If your service works with YubiKey then submit your integration for a technical review. Once approved, learn how to get your service listed in the Works with YubiKey catalog.