YubiKey deployment
Step 1: Technical considerations

Follow the technical self-assessment guide to prepare for the technical implementation of YubiKeys.
Two YubiKeys on a keychain with a key

Step 1 objective

As you begin your YubiKey implementation, the first part should center around your technical considerations. Most notable amongst these is to assess where you are today, and where you would like to go. The second part of your technical considerations is to determine which integrations apply to your project, and how they interact with the YubiKey. The YubiKey is just one core element of building a robust, multi-layered defense strategy that should be developed over time.

Preparation

In part one you will go through a self-assessment document. The intent of this document is to assess your current status prior to the deployment of YubiKeys. Things we will explore in this document include:

  • Identity providers setup
  • Security protocol needs
  • Environment architecture considerations
  • User policy needs (groups and privileges)
  • YubiKey rollout and life cycle planning

In part two we will introduce you to the Works with YubiKey catalog, a handy tool to find compatible services and set up instructions.

Part 1: Self-assessment

Get started

Start your readiness assessment now:

Part 2: Integration

The second part of your technical considerations is to determine which integrations apply to your project, and how they interact with the YubiKey. The Works With YubiKey (WWYK) catalog is the quickest way to find compatible platforms and supporting documentation. You can easily search by provider name or by type of platform to support your specific goals. Have some fun and explore the catalog, the possibilities are almost endless!


Having trouble?

illustration of gear inside a monitor

Professional Services

As always, if you need help, our Professional Services team has world-class engineers available for fully scoped projects and/or workshops to guide you to a successful deployment!