What is authentication assurance level 3? The NIST is on version 3 of the Authentication Assurance levels, called Authentication Assurance Level 3 (AAL3). Authentication Assurance relies on examination of the cryptographic modules of an authenticator. Level 3 requirements (AAL3) means that the code is within a tamper-proof container so that keys used in the cryptography are destroyed […]
Read moremacOS Smart Card Applications and Tools Use the YubiKey Manager to pair your YubiKey with your macOS user account for local login. Windows Smart Card Applications and Tools IT administrators can set up their Windows domain to allow YubiKeys to be used as smart cards for login to connected Windows systems. Use the YubiKey Manager for Windows, which […]
Read moreAbout the YubiKey and smart card capabilities YubiKey 5 NFC, YubiKey 5 Nano, YubiKey 5C, and YubiKey 5C Nano provide Smart Card functionality based on the Personal Identity Verification (PIV) interface specified in NIST SP 800-73, “Cryptographic Algorithms and Key Sizes for PIV.” Performs RSA or ECC sign/decrypt operations using a private key stored on […]
Read moreGenetec increases identity strength while eliminating passwords across their organization.
Read moreState gov’t takes a proactive approach, selecting strong authentication for 1000+ election workers.
Read moreIn the matter of just one week, Google reported that it saw more than 18 million daily malware and phishing emails related to COVID-19. That’s an astonishing number, and one that is not likely to slow down any time soon. For organizations across the globe, it is imperative to quickly, securely, and affordably fill existing […]
Read moreNew open authentication standards, FIDO2 and WebAuthn, have been getting a lot of attention lately with tech giants like Apple joining industry adoption. As a core creator of these standards, we celebrate these milestones, but our mission here at Yubico is to make a safer internet for all. In addition to driving new open web […]
Read moreFor years, both the public and private sector have faced similar challenges when securing the confidentiality, integrity, and availability (CIA triad) of their information systems. Older technologies and policies have historically conflicted with business/organizational objectives when striving for high security. Today, advancements in cryptography and the adoption of newer, improved open standards are eliminating usability […]
Read moreThe humble smart card dates back to the 1970s, but the mature technology is not without innovation in a world of new-fangled authentication. Personal Identity Verification (PIV) smart cards, best known as staples in government agencies, incorporate standards developed by the National Institute of Standards and Technology (NIST). Yubico’s recent webinar, “YubiKey Smart Code Mode […]
Read moreHave you ever wanted to use your YubiKey to protect your Mac? Starting today, PIV-enabled YubiKeys can be used to log in to your Mac and your Keychain on macOS Sierra without complex configurations or software. Up until the release of Mac OS X Lion (10.7) in July 2011, Apple included native support for login […]
Read more