Such a token and its secrets can not be copied by large malware attacks.Īpplications and services that have to authenticate your access can use a physical token as a factor of ownership and identification. ![]() Hardware security tokens are a physical, cryptographically secured storage for secrets. In times of sophisticated malware and always-and-everything-on(line), software based storage of credentials becomes at least unsettling. This article explains how to configure Yubico’s YubiKey, a hardware security token, and Fedora Linux Workstation for typical use-cases such as logging into GDM, authentication for the sudo command, OpenSSH authentication and key management, or as a second-factor on the web.
0 Comments
Leave a Reply. |