YubiKey 4: One Device, Many Functions

One-hundred and eighteen years ago, Karl Elsener developed the first Swiss Army knife, introducing versatility never before seen in a simple knife for soldiers.

Today, Yubico pays homage to Elsener’s ingenuity and commitment to multi-feature versatility. The YubiKey is a single device with a wide selection of security and privacy choices under its rugged, molded-plastic exterior.

To expose all the functions of the YubiKey, we recently held a webinar — One Device, Many Functions: Inside the YubiKey. (The recording is embedded below.)

During the presentation, you’ll hear how the YubiKey defines secure access for armies of enterprises and consumers, including remote access and VPN, password managers, computer login, content management systems, and support for popular online services such as GitHub, Dropbox, Google for Work, and other Google Accounts.

Functions such as one-time passcodes (OTP) work with many systems including Salesforce, Okta, and Ping Indentity. Time- and event-based OATH tokens integrate with internal and customer-facing systems while PIV capabilities include support for Microsoft Windows login on select servers and client desktops. OpenPGP is for storing public/private key pairs for encryption, authentication and signing, and the FIDO Alliance’s Universal 2nd Factor (U2F) protocol gives a single YubiKey the ability to support many online services.

In addition, YubiKey allows owners to load and control their own secrets, with nothing revealed to third-parties, including Yubico.

It all adds up to the versatility we hope Elsener would commend.

Talk to our teamTalk to our team

Share this article:


  • FIPS certified vs. FIPS compliant: What’s the real difference?“Is your MFA solution FIPS compliant, or is it certified?”  This is a question we hear a lot, and for good reason. In industries where security and compliance are critical (especially in government contracts), understanding the difference between FIPS certified and FIPS compliant isn’t just semantics – it can mean the difference between meeting requirements […]Read moreFIPSNIST
  • 2025 Global State of Authentication survey: A world of difference in cybersecurity habitsIn a world that’s more connected than ever, the landscape of cybersecurity threats is constantly evolving. Bad actors, now supercharged with artificial intelligence (AI), are becoming increasingly adept at exploiting human error through sophisticated phishing and social engineering attacks. This makes robust cybersecurity a universal issue, impacting everyone from individuals to the largest global enterprises. […]Read moreGlobal State of Authenticationsurvey
  • Making digital security a right: Inside Yubico’s Secure it Forward programTechnology can be a great equalizer — but only if the strongest protection is within reach. Since 2022, Yubico has donated more than 65,000 YubiKeys to hundreds of organizations worldwide — a retail value of over $3.3 million. Each key helps strengthen digital protection for those doing vital work in their communities. This isn’t just […]Read more
  • Yubico LogoYubico liefert PIN-Verbesserungen mit dem neuen YubiKey 5 – Verbesserte PIN-SchlüsselTo prepare for continuously evolving cyber threats, governments around the world are adapting and updating authentication requirements for online services which directly impact thousands of organizations and their employees. While there’s currently no universal regulation for more robust multi-factor authentication (MFA), the need is highlighted across a range of requirements including PSD2, GDPR, and the […]Read moreYubiKey