YubiKey deployment
Step 1: Technical considerations
Follow the technical self-assessment guide to prepare for the technical implementation of YubiKeys.

Step 1 objective
As you begin your YubiKey implementation, the first part should center around your technical considerations. Most notable amongst these is to assess where you are today, and where you would like to go. The second part of your technical considerations is to determine which integrations apply to your project, and how they interact with the YubiKey. The YubiKey is just one core element of building a robust, multi-layered defense strategy that should be developed over time.
Preparation
In part one you will go through a self-assessment document. The intent of this document is to assess your current status prior to the deployment of YubiKeys. Things we will explore in this document include:
- Identity providers setup
- Security protocol needs
- Environment architecture considerations
- User policy needs (groups and privileges)
- YubiKey rollout and life cycle planning
In part two we will introduce you to the Works with YubiKey catalog, a handy tool to find compatible services and set up instructions.
Part 1: Self-assessment

Get started
Start your readiness assessment now:
Part 2: Integration
The second part of your technical considerations is to determine which integrations apply to your project, and how they interact with the YubiKey. The Works With YubiKey (WWYK) catalog is the quickest way to find compatible platforms and supporting documentation. You can easily search by provider name or by type of platform to support your specific goals. Have some fun and explore the catalog, the possibilities are almost endless!