U2F Webinar: From Concept To Implementation

Note: This webinar was recorded on Oct. 27, 2015. The video recording is embedded at the end of this blog.

Ever wonder what’s under the Universal 2nd Factor (U2F) covers? How to build U2F into your own service or project? Or what’s the extended value of your YubiKey?

Now that U2F is catching fire as the protocol that defines strong authentication, we get a lot of these inquiries.

On Oct. 27, Yubico’s lead engineer, Dain Nilsson, will lay out all you need to know to understand the power of the protocol, the basic concepts for implementation, and the value of any U2F-enabled YubiKey.

The webinar, “Integrating U2F: From Concept to Implementation,” is scheduled from 8am to 9am PDT. This webinar is for those who use a U2F YubiKey but don’t quite know what happens behind the scenes. Or for those who want to add U2F into their own service or application.

During the webinar’s demonstrations, Nilsson will take an existing service that relies on usernames and passwords and, using Yubico’s open source libraries in combination with U2F,  will add the protocol’s two defined flows — key registration and strong authentication based on public key cryptography.

Nilsson will feature code samples using Python, which will be made available on GitHub, and outline the steps for implementing U2F. He will provide other practical details around enabling U2F with an existing online service.

Major online services — such as GitHub, Google, and Dropbox — are leading the way to protect their employees and global users with U2F. Millions of YubiKeys are in the hands of users across the globe. But U2F isn’t exclusive to mega services with giant dev teams — it’s straightforward to implement and simple enough not to require user training courses.

Yubico will show you how.

Talk to our teamTalk to our team

Share this article:


  • An inside look at Yubico’s transition to passwordlessBefore “passkey” became a familiar term in our industry, Yubico had long delivered hardware-backed and phishing-resistant FIDO2 based authentication. Today, the adoption of passkey usage is accelerating. However, it’s taken quite a bit longer to integrate passwordless authentication into the everyday, enterprise-grade authentication flows that are required for today’s businesses.  As long as it’s been […]Read moreOktapasswordless
  • Mission matters – my reflections on winning the EY World Entrepreneur of the Year “This is the biggest mission any of the entrepreneurs have presented in this competition.”  I heard these words a few weeks ago from one of the judges for the EY World Entrepreneur of the Year award program – whom I had the honor to meet during the final step of the world’s largest entrepreneur competition.  […]Read moreawardsFounderStina Ehrensvard
  • Yubico recognized by TrustRadius 2025 Award for top customer reviewsAs AI-driven cyber threats like credential phishing evolve and grow in complexity, phishing-resistant YubiKeys are an important component toward cyber resilience — and our mission to make the internet more secure has never been more critical. To support this, customer feedback is something we take very seriously and is an invaluable tool to ensure we’re […]Read moreawardsTrustRadius
  • CEO Corner: Maintaining stable growth while navigating global uncertaintyAs we officially close out the first quarter of 2025,  I am pleased we saw a quarter with solid growth and profitability along with ongoing demand for phishing-resistant authentication. We continue to see new types of high-profile cyber attacks appearing regularly, and a major reason for the success of phishing attacks is stolen credentials. As […]Read moreCEOCEO CornerEarningsMattias Danielsson