Verify your YubiKey integration and manage your listing on the online catalog. Please use this checklist to verify your product integration’s usability. Applicants that receive a passing mark on the checklist will progress to the catalog listing form requesting details on your product integration. Any questions? Please email wwyk@yubico.com. Read more about how Yubico uses […]
Read moreUse this form to provide high-level product information about your YubiKey integration. We’ll review your submission and let you know once it’s listed on our catalog. Any questions? Please email wwyk-mktg@yubico.com. Read more about how Yubico uses the personal data you submit If the above form isn’t visible to you, you can access it directly on […]
Read moreGreat news YubiFans! As of today, Twitter made it a lot easier for you to tweet safely and keep your accounts secure. Phishing-resistant YubiKey authentication via WebAuthn is now supported on Twitter’s desktop, Android and iOS mobile applications. With native WebAuthn support throughout the Twitter platform, you can register and use a USB-, NFC-, or Lightning-compatible security key, like […]
Read moreAnother win for FIDO at the heels of its first industry conference, Authenticate 2020. AWS Single Sign-On (SSO) has introduced native WebAuthn support to secure user access to AWS accounts and business applications using strong, FIDO-based multi-factor authentication (MFA) with YubiKeys. Broader choice of authentication methods by AWS SSO is a win for modern authentication that has historically […]
Read moreThe Works with YubiKey program One place to showcase your product’s integrations and find all the ways you, your customers, or employees can stay secure with a YubiKey Showcase your commitment to security We welcome all product and solution owners that integrate with the YubiKey to join the hundreds of companies already dedicated to showcasing […]
Read moreThe YubiKey offers the highest security and best user experience for protecting Microsoft 365.
Read moreMicrosoft 365 comes with some shortcomings in the areas of security.
Read more