{"id":261123,"date":"2021-06-22T16:08:46","date_gmt":"2021-06-22T13:08:46","guid":{"rendered":"https:\/\/shop.thekernel.ua\/how-to-configure-yubikey-on-linux-using-u2f-function"},"modified":"2023-06-22T16:13:19","modified_gmt":"2023-06-22T13:13:19","slug":"how-to-configure-yubikey-on-linux-using-u2f-function","status":"publish","type":"post","link":"https:\/\/shop.thekernel.ua\/en\/how-to-configure-yubikey-on-linux-using-u2f-function","title":{"rendered":"How to configure YubiKey on Linux using U2F function"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Roboto||||||||&#8221; text_font_size=&#8221;20px&#8221; text_line_height=&#8221;1.8em&#8221; background_color=&#8221;#efefef&#8221; module_alignment=&#8221;center&#8221; custom_padding=&#8221;2%|4%|2%|4%|true|true&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span style=\"font-weight: 400;\">With the help of YubiKey hardware security keys, your system receives an increased level of protection, and the process of logging into accounts becomes faster and more convenient. To easily configure the necessary parameters on a Linux system, you should follow the instructions below.<\/span><\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;16px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span style=\"font-weight: 400;\">Setting up the YubiKey in a Linux environment is slightly different from setting up in other operating systems such as <\/span><a href=\"https:\/\/shop.thekernel.ua\/en\/using-yubikey-with-windows-10\"><span style=\"font-weight: 400;\">Windows<\/span><\/a><span style=\"font-weight: 400;\">. First, you&#8217;ll have to do things through the terminal, not the GUI, for setup. Second, you&#8217;ll need to make a few adjustments to prevent attackers from bypassing certain restrictions. At the same time, it is important that you do not block yourself from accessing the system.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Steps to be followed:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\"><a href=\"#1\">installing Yubico software;<\/a><\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\"><a href=\"#2\">setting up and binding the YubiKey security key;<\/a><\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\"><a href=\"#3\">setting up the system to use keys;<\/a><\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\"><a href=\"#4\">elimination of possible malfunctions.<\/a><\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">If you plan to use Security Key or YubiKey Bio series keys, please follow the U2F (<\/span><a href=\"https:\/\/shop.thekernel.ua\/en\/two-factor-authentication\"><span style=\"font-weight: 400;\">Two-Factor Authentication<\/span><\/a><span style=\"font-weight: 400;\">) key setup instructions below.<\/span><\/p>\n<h2><b>Compatible keys<\/b><\/h2>\n<hr>\n<p><span style=\"font-weight: 400;\">To configure the YubiKey using the U2F function, you can use keys of any series available in our<\/span> <a href=\"https:\/\/shop.thekernel.ua\/en\/online-store\"><span style=\"font-weight: 400;\">online store<\/span><\/a><span style=\"font-weight: 400;\">, even Security Key and YubiKey Bio.<\/span><\/p>\n<h2 id=\"1\"><b>Ways to install Yubico software<\/b><\/h2>\n<hr>\n<p><span style=\"font-weight: 400;\">There are several ways to install Yubico software on Linux. For example:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Installing Yubico Authenticator:<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Installing the YubiKey Manager.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Using built-in repositories.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Using PPAs from Yubico.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Compilation from the source code.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">More information in the article: \u201c<\/span><a href=\"https:\/\/docs.google.com\/document\/d\/1wEiP9qxcAMiGZtmMXcJ52BeNe0eEQR_GpzDO8pJzpuk\/edit#\"><span style=\"font-weight: 400;\">How to install Yubico software on Linux<\/span><\/a><span style=\"font-weight: 400;\">\u201d.<\/span><\/p>\n<h2 id=\"2\"><b>Configuring the YubiKey security key<\/b><\/h2>\n<hr>\n<p><span style=\"font-weight: 400;\">Consider configuring the YubiKey on an Ubuntu system using the U2F feature in the Security Key or YubiKey Bio series (or others). Based on this example, you will be able to make similar settings in systems similar to Ubuntu.<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Open a terminal and run the command that installs the appropriate software in Ubuntu: <\/span><span style=\"font-weight: 400;\"><code>sudo apt-get install libpam-u2f<\/code><\/span><span style=\"font-weight: 400;\">. <\/span> <\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Insert the Security Key or YubiKey Bio.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">First run the command <\/span><span style=\"font-weight: 400;\"><code>mkdir -p ~\/.config\/Yubico<\/code><\/span><span style=\"font-weight: 400;\">, then <\/span><span style=\"font-weight: 400;\"><code>pamu2fcfg &gt; ~\/.config\/Yubico\/u2f_keys. <\/code><\/span><span style=\"font-weight: 400;\">The system may then ask for a PIN code to activate the FIDO2 function.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">When the key starts flashing, tap it to confirm your presence. <\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">In order not to lose access to your personal device if the key is lost, add a backup security key. To do this, insert an additional key, run the command in the terminal <\/span><span style=\"font-weight: 400;\"><code>pamu2fcfg -n &gt;&gt; ~\/.config\/Yubico\/u2f_keys<\/code><\/span><span style=\"font-weight: 400;\"> and tap the key when it flashes. If you don&#8217;t have a spare key yet, you can skip this step and come back to it later. <\/span><\/p>\n<p><b>For an added layer of security,<\/b><span style=\"font-weight: 400;\"> you&#8217;ll also need to move the file <\/span><b>u2f_keys<\/b><span style=\"font-weight: 400;\"> to a safer place. Where you need sudo permission to edit a file (eg <\/span><span style=\"font-weight: 400;\">\/etc<\/span><span style=\"font-weight: 400;\">). <\/span> <\/p>\n<p><span style=\"font-weight: 400;\">For this:<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Create a directory (folder) named Yubico <\/span><span style=\"font-weight: 400;\">(eg \/etc\/Yubico)<\/span><span style=\"font-weight: 400;\">. <\/span> <\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Move the file from<\/span><strong> ~\/.config\/Yubico<\/strong><span style=\"font-weight: 400;\">to<\/span><span style=\"font-weight: 400;\">the folder <strong>\/etc\/Yubico<\/strong><\/span><span style=\"font-weight: 400;\">, by running the command: <\/span><span style=\"font-weight: 400;\"><code>sudo mv ~\/.config\/Yubico\/u2f_keys \/etc\/Yubico\/u2f_keys<\/code><\/span><span style=\"font-weight: 400;\">.<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">After the file <\/span><b>u2f_keys<\/b><span style=\"font-weight: 400;\"> will be moved to a safe location, you will need to modify the PAM file as well so that the u2f PAM module can find it later. This is done by adding &#8220;<\/span><span style=\"font-weight: 400;\"><code>authfile=\/etc\/Yubico\/u2f_keys<\/code><\/span><span style=\"font-weight: 400;\">&#8221; to the end of the file line <\/span><b>pam_u2f.so<\/b><span style=\"font-weight: 400;\"> inside the file required for authentication. It is usually located at <\/span><strong>\/usr\/lib\/x86_64-linux-gnu\/security\/pam_u2f.so<\/strong><span style=\"font-weight: 400;\">, but it may vary depending on the settings.<\/span><\/p>\n<p><b>Note that<\/b><span style=\"font-weight: 400;\">, that after performing these actions, you will lose the ability to modify the file without the key, which may lead to the loss of access to your device. Therefore, we do not recommend performing this step without having a backup security key.<\/span><\/p>\n<h2 id=\"3\"><b>Configuring the system to use security keys<\/b><\/h2>\n<hr>\n<p><span style=\"font-weight: 400;\">In this section, we will consider how to configure the keys for the entrance and the terminal and at the same time not to block the entrance. We will also consider how to adjust the system in case of errors. <\/span><\/p>\n<h3><b>Checking the configuration using the sudo command<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">The sudo command is used to test that a user does not accidentally lock out their computer. To use it:<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Open the terminal and enter the command: <\/span><span style=\"font-weight: 400;\"><code>sudo nano \/etc\/pam.d\/sudo.<\/code><\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">After the answer, find the line <\/span><b>\u00ab@include common-auth\u00bb<\/b><span style=\"font-weight: 400;\"> and add the line to it: <\/span> <span style=\"font-weight: 400;\"><code>auth       required   pam_u2f.so<\/code><\/span><\/li>\n<\/ol>\n<p><b>Pay attention!<\/b><span style=\"font-weight: 400;\"> If you moved the <\/span><b>u2f_keys<\/b><span style=\"font-weight: 400;\"> file to the <\/span><b>\/etc\/Yubico\/u2f_keys <\/b><span style=\"font-weight: 400;\">for<\/span> <span style=\"font-weight: 400;\">increased security, then you will need to add the authentication file and PAM configuration path like this: <\/span><span style=\"font-weight: 400;\">auth required pam_u2f.so authfile=\/etc\/Yubico\/u2f_keys<\/span><span style=\"font-weight: 400;\">.<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Next click <\/span><b>Ctrl+O<\/b><span style=\"font-weight: 400;\">, and then <\/span><b>Enter<\/b><span style=\"font-weight: 400;\">to save the settings. At the same time, do not close the terminal window until the settings are complete. <\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Open a new terminal and enter the command: <\/span><span style=\"font-weight: 400;\"><code>sudo echo test<\/code><\/span><span style=\"font-weight: 400;\">. The program should prompt you to enter a password. Enter the password and click <\/span><b>Enter<\/b><span style=\"font-weight: 400;\">. <\/span> <\/li>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Please note that without an inserted YubiKey U2F, authentication will not occur. If it passes successfully, it means that the U2F PAM module is not installed, or there are errors in the file <\/span><b>\/etc \/pam.d\/sudo<\/b><span style=\"font-weight: 400;\">, which you changed. <\/span> <\/li>\n<\/ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Insert the YubiKey, open a new terminal and type the command again: <\/span><span style=\"font-weight: 400;\">sudo echo test<\/span><span style=\"font-weight: 400;\">. Enter your password when prompted. After that, you will see the key flashing. Touch its metal part to reveal your presence. <\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">If U2F authentication is successful after completing all the steps, it means that you have everything set up correctly. So you can move on to the next step. <\/span><\/p>\n<p><b>Note:<\/b><span style=\"font-weight: 400;\"> If you don&#8217;t want to be prompted for a key when you run sudo, remove the line you just added to the file <\/span><b>\/etc\/pam.d\/sudo<\/b><span style=\"font-weight: 400;\">. <\/span> <\/p>\n<h4><b>Adding similar sudo commands to request a security key<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">Because the sudo states have different authentication paths in different OS versions, you may need to edit a different directory to configure the PAM information file and make it valid. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">List of editable files to configure authentication available in Ubuntu 22.04. <\/span><\/p>\n<p>&nbsp;<\/p>\n<table>\n<tbody>\n<tr>\n<td><b>The name of the file<\/b><\/td>\n<td><b>File location<\/b><\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/manpages.ubuntu.com\/manpages\/jammy\/en\/man1\/runuser.1.html\"><span style=\"font-weight: 400;\">runuser<\/span><\/a><\/td>\n<td><span style=\"font-weight: 400;\">\/etc\/pam.d\/runuser<\/span><\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/manpages.ubuntu.com\/manpages\/jammy\/en\/man1\/runuser.1.html\"><span style=\"font-weight: 400;\">runuser -l<\/span><\/a><\/td>\n<td><span style=\"font-weight: 400;\">\/etc\/pam.d\/runuser-l<\/span><\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/manpages.ubuntu.com\/manpages\/jammy\/en\/man1\/su.1.html\"><span style=\"font-weight: 400;\">su<\/span><\/a><span style=\"font-weight: 400;\"> <\/span><\/td>\n<td><span style=\"font-weight: 400;\">\/etc\/pam.d\/su<\/span><\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/manpages.ubuntu.com\/manpages\/jammy\/en\/man8\/sudo.8.html\"><span style=\"font-weight: 400;\">sudo -i<\/span><\/a><\/td>\n<td><span style=\"font-weight: 400;\">\/etc\/pam.d\/sudo-i<\/span><\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/manpages.ubuntu.com\/manpages\/jammy\/en\/man1\/su.1.html\"><span style=\"font-weight: 400;\">su -l<\/span><\/a><span style=\"font-weight: 400;\"> <\/span><\/td>\n<td><span style=\"font-weight: 400;\">\/etc\/pam.d\/su-l<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Find the file you want and add the following line below the &#8220;@include common-auth&#8221; entry: <\/span><span style=\"font-weight: 400;\"><code>auth       required   pam_u2f.so<\/code><\/span><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><b>Note.<\/b><span style=\"font-weight: 400;\"> If you moved the <\/span><b>u2f_keys<\/b><span style=\"font-weight: 400;\"> file to <\/span><b>\/etc\/Yubico\/u2f_keys<\/b><span style=\"font-weight: 400;\">, then you will need to add the authentication file and path to the PAM configuration as follows: <\/span><span style=\"font-weight: 400;\"><code>auth       required   pam_u2f.so authfile=\/etc\/Yubico\/u2f_keys<\/code><\/span><span style=\"font-weight: 400;\">. <\/span> <\/p>\n<p><span style=\"font-weight: 400;\">After saving your changes, you need to configure your system to require the YubiKey when using this app.<\/span><\/p>\n<h3><b>Configuring the system for a remote key when entering the system<\/b><\/h3>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Open the terminal and enter the command: <\/span><span style=\"font-weight: 400;\"><code>sudo nano \/etc\/pam.d\/gdm-password<\/code><\/span><span style=\"font-weight: 400;\">. You should receive an answer:<\/span><\/li>\n<\/ol>\n<p><code><span style=\"font-weight: 400;\">#for Password + YubiKey<\/span><\/code><\/p>\n<p><code><span style=\"font-weight: 400;\">Add the line below the \u201c@include common-auth\u201d line. <\/span><\/code><\/p>\n<p><code><span style=\"font-weight: 400;\">@include yubico-required<\/span><\/code><\/p>\n<p>&nbsp;<\/p>\n<p><code><span style=\"font-weight: 400;\">#for YubiKey only <\/span><\/code><\/p>\n<p><code><span style=\"font-weight: 400;\">Add the line above the \u201c@include common-auth\u201d line. <\/span><\/code><\/p>\n<p><code><span style=\"font-weight: 400;\">@include yubico-sufficient<\/span><\/code><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">After that, press <\/span><b>Ctrl+X<\/b><span style=\"font-weight: 400;\">, then <\/span><b>Enter<\/b><span style=\"font-weight: 400;\">, to save the settings.<\/span><\/li>\n<\/ol>\n<h3><b>System settings on demand when using the terminal<\/b><\/h3>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Open a terminal and run the command:<\/span> <span style=\"font-weight: 400;\"><code>sudo nano \/etc\/pam.d\/login<\/code><\/span><span style=\"font-weight: 400;\">.<\/span> <\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Add the line after &#8220;@include common-auth&#8221;: <\/span><span style=\"font-weight: 400;\"><code>auth       required   pam_u2f.so<\/code><\/span><span style=\"font-weight: 400;\"> <\/span><\/li>\n<\/ol>\n<p><b>Pay attention! <\/b><span style=\"font-weight: 400;\">If you moved the <\/span><b>u2f_keys <\/b><span style=\"font-weight: 400;\">file to<\/span><b> \/etc\/Yubico\/u2f_keys<\/b><span style=\"font-weight: 400;\">, then you will need to add the authentication file and path to the PAM configuration as follows:\u200b\u200b <\/span><span style=\"font-weight: 400;\"><code>auth       required   pam_u2f.so authfile=\/etc\/Yubico\/u2f_keys<\/code><\/span><span style=\"font-weight: 400;\">. <\/span> <\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Press <\/span><b>Ctrl+X<\/b><span style=\"font-weight: 400;\">, then <\/span><b>Enter<\/b> <span style=\"font-weight: 400;\">\u2014to save your settings and close the file.<\/span> <\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">After doing these steps, you won&#8217;t be able to log in without U2F. <\/span><\/p>\n<h2 id=\"4\"><b>Elimination of possible malfunctions<\/b><\/h2>\n<hr>\n<p><span style=\"font-weight: 400;\">If you&#8217;re having trouble logging in but can&#8217;t find the cause, enable debugging in the Yubico PAM module. This way you can track errors. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">For this:<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Open a terminal and run the command <code>sudo touch \/var\/log\/pam_u2f.log<\/code><\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">If your system is <\/span><b>Ubuntu 17.10<\/b><span style=\"font-weight: 400;\"> or later, run: <\/span><span style=\"font-weight: 400;\">sudo nano \/etc\/pam.d\/gdm-password<\/span><span style=\"font-weight: 400;\">. If your system <\/span><b>Ubuntu 17.04<\/b><span style=\"font-weight: 400;\"> or older, run: <\/span> <span style=\"font-weight: 400;\"><code>sudo nano \/etc\/pam.d\/lightdm<\/code><\/span><span style=\"font-weight: 400;\"><\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Add an entry\u00ab<\/span><span style=\"font-weight: 400;\"><code>debug debug_file=\/var\/log\/pam_u2f.log<\/code><\/span><span style=\"font-weight: 400;\">\u00bb at the end of the line that contains <\/span><b>pam_u2f.so<\/b><span style=\"font-weight: 400;\">. <\/span> <\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">After doing these steps, all your subsequent events will be saved to the file <\/span><b>\/var\/log\/pam_u2f.log<\/b><span style=\"font-weight: 400;\">. <\/span> <\/p>\n<p><span style=\"font-weight: 400;\"><\/span><\/p>\n<p><span style=\"font-weight: 400;\"><\/span><\/p>\n<hr>\n<p><span style=\"font-weight: 400;\">This completes our instruction. If you have not yet chosen a dongle or are looking for an additional hardware device, we recommend that you take a look at the offers available in our <\/span><a href=\"https:\/\/shop.thekernel.ua\/en\/online-store\"><span style=\"font-weight: 400;\">online store<\/span><\/a><span style=\"font-weight: 400;\">. If you have any questions about key compatibility, please contact <\/span><a href=\"https:\/\/shop.thekernel.ua\/en\/contacts\"><span style=\"font-weight: 400;\">our managers<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;RGBA(255,255,255,0)&#8221; use_background_color_gradient=&#8221;on&#8221; background_enable_mask_style=&#8221;on&#8221; background_mask_style=&#8221;honeycomb&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2 style=\"text-align: center;\">Similar materials in the Knowledge Base<\/h2>\n<p>[\/et_pb_text][et_pb_blog fullwidth=&#8221;off&#8221; posts_number=&#8221;3&#8243; include_categories=&#8221;399&#8243; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_blog][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>With the help of YubiKey hardware security keys, your system receives an increased level of protection, and the process of logging into accounts becomes faster and more convenient. To easily configure the necessary parameters on a Linux system, you should follow the instructions below.Setting up the YubiKey in a Linux environment is slightly different from [&hellip;]<\/p>\n","protected":false},"author":55,"featured_media":261126,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_seopress_robots_primary_cat":"none","_seopress_titles_title":"Configuring the YubiKey on Linux using the U2F function","_seopress_titles_desc":"Setting up YubiKey in Linux is quite different from setting up in other OS. We tell you how to configure the security key with the U2F function.","_seopress_robots_index":"","_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[402,439],"tags":[],"class_list":["post-261123","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-settings","category-settings-en"],"acf":[],"_links":{"self":[{"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/posts\/261123","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/users\/55"}],"replies":[{"embeddable":true,"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/comments?post=261123"}],"version-history":[{"count":3,"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/posts\/261123\/revisions"}],"predecessor-version":[{"id":261129,"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/posts\/261123\/revisions\/261129"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/media\/261126"}],"wp:attachment":[{"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/media?parent=261123"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/categories?post=261123"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/tags?post=261123"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}