Works with YubiKey Spotlight: Securing the AI frontier and high-assurance infrastructure

Last month, our team had another incredible experience at RSAC 2026 in San Francisco – with this year bringing a new level of energy at Moscone Center. There were two clear, pivotal focus areas during the conference: the move toward autonomous agentic AI and the concurrent need for low-touch, highest assurance identity security that can be deployed with ease at enterprise scale. 

We were excited to meet this energy and interest with multiple announcements centered around managing the impacts of agentic AI through ‘Human in the Loop’ authorization and accountability: an industry-first partnership with IBM and Auth0, as well as with Delinea. We also announced Yubico is extending FIDO Pre-reg to Ping Identity – enabling organizations using Ping Identity to accelerate passwordless adoption across their workforce by shipping pre-configured YubiKeys directly to users so that activating a YubiKey is as easy and fast as activating a credit card!

Our partnership with IBM and Auth0 establishes a new standard for governing AI intent, and the Works with YubiKey catalog provides the essential operational toolkit to extend this high-assurance model across your entire infrastructure. Leveraging these pre-verified integrations allows organizations to move beyond high-level AI strategy and enforce hardware-backed authentication into accounts, and extend into “human-in-the-loop” authorization of AI-based workflows that are quickly emerging. 

With autonomous systems gaining the capability to execute high-consequence tasks like directory modifications or sensitive data migrations, the critical security question has moved beyond mere identity to a question of intent. As we delegate more power to digital agents, the industry must solve for how to cryptographically prove a verified human actually authorized an AI’s specific action. 

The danger lies in the “autonomy gap,” where AI agents operate on long-lived tokens that are increasingly vulnerable to sophisticated, AI-driven session hijacking. Without a hardware-bound root of trust, a compromised orchestrator could theoretically reconfigure an entire enterprise directory or empty a password vault before a human ever realizes a breach is underway. 

By requiring a physical YubiKey interaction for critical “check-point” actions, organizations can ensure that autonomous workflows remain tethered to hardware-backed, highest-assurance security that succeeds in neutralizing the risk of rogue scripts or hijacked sessions.

Bridging the gap between this high-level AI governance and daily operations requires an ecosystem of tools that recognize the YubiKey as the definitive anchor for human intent. This month, we are highlighting several new and featured listings in the Works with YubiKey catalog that allow you to enforce these high-assurance “check-points” across your directory, network and privileged vaults.

PartnerIntegrationOverview
NetwrixPassword SecureProtect the Keys: Enforce hardware-backed MFA for your most sensitive credential vaults to stop lateral movement in its tracks. View Listing →
NetwrixDirectory ManagerAI Accountability: Secure delegated AD/M365 tasks. Ensure that even automated directory changes require a verified human touch. View Listing →
NetwrixPrivilege DiscoveryVisibility + Security: Identify shadow admin accounts and immediately wrap them in phishing-resistant protection. View Listing →
RadiatorPolicy ServerRADIUS/TACACS+ Ready: Bring YubiKey security to carrier-grade network infrastructure and VPNs where web-based MFA can’t reach. View Listing →
Ping IdentityPingOne (FIDO Pre-reg)Zero-Touch Onboarding: Delivers hardware‑backed authentication using YubiKey to enforce phishing‑resistant access across diverse enterprise environments. View Listing →
VersasecvSEC:CMS (v8.x)Advanced Management: Full lifecycle orchestration for your fleet, supporting the latest high-assurance and PIV standards. View Listing →

The path to resilient automation

The “Trust Anchor” strategy isn’t about adding friction to your workflow; it’s about reclaiming control in an increasingly automated world. Whether you are building your long-term roadmap with IBM Consulting or modernizing your infrastructure with our partners like Versasec, Ping Identity, Netwrix, and Radiator, the goal remains the same: ensuring that every high-consequence action is anchored and verified by a human.

As the boundaries of AI continue to expand, the Works with YubiKey ecosystem is your roadmap for turning strategic intent into operational reality. We are constantly verifying new integrations to ensure that as your business evolves, your root of trust remains unshakeable.

Ready to operationalize your strategy? Browse the Works with YubiKey Catalog

Talk to our team

Share this article: