Works with YubiKey Spotlight: How Yubico works with industry leaders who share the commitment to strong authentication

As the cyber threat landscape continues to evolve rapidly in the form of more sophisticated attacks like phishing and ransomware, the need for industry collaborations and partnerships are more critical than ever to help businesses and consumers stay secure online. We first launched the Works with YubiKey (WWYK) program in 2018 with this in mind – a program with a focus on building and bolstering our technology alliance program for products, apps, and services that integrate with Yubico hardware and software.Since then, the program has seen immense growth and interest – growing to hundreds of companies globally who share the same commitment to protecting devices, accounts, and the people using them.

While the YubiKey operates independently as a powerful phishing-resistant multi-factor authentication (MFA) tool to secure online accounts and prevent phishing attacks, one great  feature is its versatility and ability to integrate with countless other solutions and software. The YubiKey works with a wide range of products, services, and applications while supporting various security protocols including FIDO2/WebAuthn (passkeys), FIDO U2F, PIV/Smart Card, OATH-HOTP, OATH-TOTP,  OpenPGP and more. The YubiKey can be used to protect critical business platforms, work accounts, email, social media, cloud storage, cryptocurrency, and gaming – just to name a few.

With so many possible uses, these can only be brought to reality with our network of partner integrations which support the use of the YubiKey for authentication. But where can you start to understand how and where you can use your YubiKey? You can find all these integrations in our Works with YubiKey catalog, a comprehensive collection of integrations that have been verified by Yubico or self-verified by our technology partners. 

Together, we are making the internet more secure for everyone through great partnerships that fuel innovation, accelerate growth, and build best-of-breed services to stop account takeovers at scale. If your organization is interested in joining the Works with YubiKey program, click here to get started with a Yubico-verified integration or a self-verified integration. 

Here, we’ll introduce you to some of the popular, new, and updated listings you can find in the Works with YubiKey catalog.

Some of the most popular WWYK catalog listings to-date

Apple-logo-blog-august@2x
Apple iCloud Apple iCloud 
Apple-logo-blog-august@2x
AWS Identity and Access Management AWS Identity and Access Management 
Apple-logo-blog-august@2x
GitHubGitHub
HYPR Cloud Platform HYPR Cloud Platform 
MIcrosoft-logo-blog-august@2x
Microsoft accounts Microsoft accounts 
Okta-logo-blog-august@2x
OktaOkta

New listings to the WWYK catalog

0pass-logo-blog-august@2x
0passCitadel 0passCitadel 
macmon-logo-blog-august@2x
macmon SDP macmon SDP 
SendQuick-logo-blog-august@2x
SendQuick Conexa SendQuick Conexa 
trustworthy logo
Trustworthy Trustworthy 

Stay tuned for our next WWYK Spotlight Series post  where we’ll highlight other popular and new integrations. Until then, feel free to email us at wwyk@yubico.com with any questions about the Works with YubiKey catalog or to submit products you love that work with the YubiKey to appear in our catalog for other users to discover.

Talk to our teamTalk to our team

Share this article:


  • FIPS certified vs. FIPS compliant: What’s the real difference?“Is your MFA solution FIPS compliant, or is it certified?”  This is a question we hear a lot, and for good reason. In industries where security and compliance are critical (especially in government contracts), understanding the difference between FIPS certified and FIPS compliant isn’t just semantics – it can mean the difference between meeting requirements […]Read moreFIPSNIST
  • 2025 Global State of Authentication survey: A world of difference in cybersecurity habitsIn a world that’s more connected than ever, the landscape of cybersecurity threats is constantly evolving. Bad actors, now supercharged with artificial intelligence (AI), are becoming increasingly adept at exploiting human error through sophisticated phishing and social engineering attacks. This makes robust cybersecurity a universal issue, impacting everyone from individuals to the largest global enterprises. […]Read moreGlobal State of Authenticationsurvey
  • Making digital security a right: Inside Yubico’s Secure it Forward programTechnology can be a great equalizer — but only if the strongest protection is within reach. Since 2022, Yubico has donated more than 65,000 YubiKeys to hundreds of organizations worldwide — a retail value of over $3.3 million. Each key helps strengthen digital protection for those doing vital work in their communities. This isn’t just […]Read more
  • Yubico LogoYubico liefert PIN-Verbesserungen mit dem neuen YubiKey 5 – Verbesserte PIN-SchlüsselTo prepare for continuously evolving cyber threats, governments around the world are adapting and updating authentication requirements for online services which directly impact thousands of organizations and their employees. While there’s currently no universal regulation for more robust multi-factor authentication (MFA), the need is highlighted across a range of requirements including PSD2, GDPR, and the […]Read moreYubiKey