Key Integration Guides for Yubico Software

After exploring our software portfolio, this page will guide you to the next step. Here you will find our primary integration guides, which show you how to solve common security challenges using the specific tools, libraries, and SDKs developed by Yubico.

---

Implementing Phishing-Resistant MFA (Passkeys & FIDO2/WebAuthn)

Passwordless authentication is the future for secure web applications. These guides provide the foundation for building modern, phishing-resistant login experiences using the FIDO2 and WebAuthn standards.

Read the Passkey & WebAuthn Integration Guide Learn the architecture for both server-side (Relying Party) and client-side integrations to support passwordless authentication with YubiKeys.

Relevant Software from our Portfolio:

  • Server-Side Development:

    • java-webauthn-server: For building your WebAuthn Relying Party (server) in Java.

    • Passkey Workshop: Demonstrates end-to-end high assurance authentication best practices over web, mobile, and backend applications.

  • Client-Side & Advanced Operations:

    • libfido2: A C library for creating FIDO2 clients and interacting with authenticators.

    • python-fido2: For client-side and server-side FIDO2 logic in Python.

    • Yubico.NET.SDK: For client-side FIDO2/PIV/Security Domain/YubiHSM Auth/OTP/OATH logic in .NET environments.

---

Integrating with Smart Cards (PIV)

The Personal Identity Verification (PIV) interface on YubiKeys provides powerful, certificate-based authentication and code signing. These resources are for developers and administrators working in enterprise, government, and other high-security environments.

Read the PIV Integration Overview Discover the fundamentals of PIV, including certificate management, authentication flows, and common use cases.

Relevant Software from our Portfolio:

---

Securing Mobile Applications (iOS & Android)

Integrate hardware-backed security directly into your mobile applications. Our SDKs allow you to communicate with YubiKeys over NFC, USB, and Lightning, enabling everything from passwordless login to secure operations on a mobile device.

Read the Mobile App Integration Guide Learn best practices for using YubiKeys in your iOS and Android applications.

Relevant Software from our Portfolio:

  • Android SDK:

  • iOS SDKs:

    • yubikit-ios: Software development in ObjectiveC for the Apple ecosystem.

    • yubikit-swift: Software development in Swift for the Apple ecosystem.

---

Securing System & SSH Access

Enhance the security of your Linux systems and SSH connections by requiring a hardware-backed key for login and authentication.

Read the Securing SSH with the YubiKey Guide Follow this detailed guide to configure user accounts and SSH servers for public-key authentication using your YubiKey’s PIV or PGP capabilities.

Relevant Software from our Portfolio:

  • Linux Login:

    • pam-u2f: Pluggable Authentication Module (PAM) for Linux, enabling FIDO U2F or FIDO2 authentication..

  • Key Management:

---

Working with the YubiHSM 2

For backend applications requiring the highest level of security for cryptographic keys, the YubiHSM 2 provides a physically secure environment. These resources help you integrate the YubiHSM 2 into your infrastructure.

Read the YubiHSM 2 Developer Overview Get started with YubiHSM 2 concepts, initialization, and programming interfaces.

Relevant Software from our Portfolio:

---

Community & Contribution

We believe in the power of open source and welcome community feedback and contributions.