I've been coding for over 20 years now! (WOAH, do I feel old)
I've touched just about every resource imaginable under the Sun (too bad they were bought out by Oracle)
This also depends on which authentication method you're using your Yubikeys for.
In my particular case, I use it as my private SSH key, so the "button" auth text generation doesn't really mean a whole lot to me.
Yubikeys can be tied directly into the SSH client, so the private key verification happens entirely on the key, and the key also prevents extraction of the private key which allows it to remain secured.
This also means I can hop on virtually any terminal in the world, insert my yubikey, and have direct SSH access back to my infrastructure. Remove the Yubikey, and that machine no longer has access, regardless of if it were to be compromised or not.
I've been coding for over 20 years now! (WOAH, do I feel old)
I've touched just about every resource imaginable under the Sun (too bad they were bought out by Oracle)
I actually own four separate Yubikeys for different purposes, all self purchased.
Got one on my personal Windows desktop, one on my personal MacBook Air, one on my "work" laptop, and the last one stays on my key chain so its mobile with me wherever I go.
Each have a separate private/public key pair, and I have a text file available in a git repo that contains all 4 public keys, so it is an easy copy-paste from there into whatever service I want any (or all) keys associated with.
Each key is also a different model, so I have experience with many of their various styles :)
For further actions, you may consider blocking this person and/or reporting abuse
We're a place where coders share, stay up-to-date and grow their careers.
This also depends on which authentication method you're using your Yubikeys for.
In my particular case, I use it as my private SSH key, so the "button" auth text generation doesn't really mean a whole lot to me.
Yubikeys can be tied directly into the SSH client, so the private key verification happens entirely on the key, and the key also prevents extraction of the private key which allows it to remain secured.
This also means I can hop on virtually any terminal in the world, insert my yubikey, and have direct SSH access back to my infrastructure. Remove the Yubikey, and that machine no longer has access, regardless of if it were to be compromised or not.
That's really cool! Did you buy a personal YubiKey for this purpose? The one I have is controlled by my enterprise. I may buy a second one for myself.
I actually own four separate Yubikeys for different purposes, all self purchased.
Got one on my personal Windows desktop, one on my personal MacBook Air, one on my "work" laptop, and the last one stays on my key chain so its mobile with me wherever I go.
Each have a separate private/public key pair, and I have a text file available in a git repo that contains all 4 public keys, so it is an easy copy-paste from there into whatever service I want any (or all) keys associated with.
Each key is also a different model, so I have experience with many of their various styles :)