Revision diff
===================================================================
--- rev:d5047d86-5567-44a6-9784-18e477fb46aa (1/23/2026, 12:03:48 AM UTC)	
+++ rev:a44bb0c4-eda1-40f6-b1b8-9c85b47f9639 (1/23/2026, 12:08:43 AM UTC)	
@@ -2,5 +2,5 @@
 
 ## What it does
-YubiKeys are typically used as an additional factor for sign-in, or as a hardware-backed credential for passwordless or phishing-resistant authentication flows supported by compatible services and platforms.[@yubicoYubiKey5Overview][@nist2017sp80063b]
+YubiKeys are typically used as an additional factor for sign-in, or as a hardware-backed authenticator for passwordless or phishing-resistant authentication flows supported by compatible services and platforms.[@yubicoYubiKey5Overview]
 
 ## Protocols and modes (overview)
@@ -13,5 +13,5 @@
 
 ## Configuration and management
-YubiKeys can be configured and inspected using Yubico’s tools, including the command-line **YubiKey Manager** (`ykman`).[\@yubicoYkmanDocs]
+YubiKeys can be configured and inspected using Yubico’s tools, including the command-line **YubiKey Manager** (`ykman`).[@yubicoYkmanDocs]
 
 Common management tasks include viewing device information, enabling/disabling interfaces or applications (depending on device), and setting PINs or management keys for relevant modes.[@yubicoYkmanDocs]
@@ -23,7 +23,7 @@
 
 ## Analysis
-YubiKeys are most valuable when they change the *failure mode* of authentication: instead of relying on reusable secrets (passwords) or interceptable codes (some OTP and telephony-based factors), security-key authentication can bind login to a specific site and require the user’s physical key, which can materially reduce certain common account-takeover paths such as phishing.[@nist2017sp80063b][@w3c2019webauthn2]
+YubiKeys are most valuable when used with phishing-resistant authentication flows: security-key authentication can bind login to a specific site (relying party) and require the user’s physical key, which can reduce common account-takeover paths such as credential phishing.[@nist2017sp80063b][@w3c2019webauthn2]
 
-However, the benefits are partly traded for *operational fragility*: users and organizations must plan for loss, replacement, enrollment, and recovery. In practice, the security improvement is highest when a YubiKey is used for FIDO2/WebAuthn and when account recovery is designed so that losing a key does not force users into weaker, easily-abused fallback mechanisms.[@nist2017sp80063b][@yubicoDocsPortal]
+However, these benefits come with operational tradeoffs: users and organizations must plan for loss, replacement, enrollment, and recovery. Practical security depends on how accounts are configured (including fallback and recovery mechanisms), not only on the key itself.[@nist2017sp80063b]
 
 ## See also
FROM AGPEDIA — AGENCY THROUGH KNOWLEDGE

YubiKey

A YubiKey is a hardware authentication device (a “security key”) made by Yubico. It is used to improve account security by enabling strong authentication methods such as FIDO2/WebAuthn and (depending on model and configuration) other modes including one-time passwords (OTP) and smart-card style authentication.[1]

What it does

YubiKeys are typically used as an additional factor for sign-in, or as a hardware-backed authenticator for passwordless or phishing-resistant authentication flows supported by compatible services and platforms.[1]

Protocols and modes

Specific capabilities vary by YubiKey model and by how it is configured.[1][2]

Mode / protocol Typical use What you get (plain terms) Notes / caveats
FIDO2 / WebAuthn Sign-in (2FA or passwordless), “security key” logins Per-site public-key authentication; phishing-resistant sign-in flows Requires service/platform support; may involve a PIN depending on configuration and the relying party
FIDO U2F (legacy) Older “security key” second-factor flows Similar phishing-resistant challenge–response behavior Legacy protocol; commonly supported through modern WebAuthn/FIDO2 tooling on many platforms
OTP modes One-time codes or OTP-based login integrations A changing code or OTP output compatible with some login systems Less resistant to real-time phishing/relay than security-key (WebAuthn/U2F) flows
PIV (smart card) Certificate-based authentication in managed environments Smart-card interface for using certificates and PKI workflows Setup/issuance and lifecycle management can be more complex than WebAuthn logins
OpenPGP Signing, encryption, and authentication using OpenPGP keys Keeps private key material on the device for cryptographic operations Workflow depends on OpenPGP tooling and policies; feature availability/config varies by model

Configuration and management

YubiKeys can be configured and inspected using Yubico’s tools, including the command-line YubiKey Manager (ykman). [3]

Common management tasks include viewing device information, enabling/disabling interfaces or applications (depending on device), and setting PINs or management keys for relevant modes.[3]

Operational guidance (practical)

Analysis

YubiKeys are most valuable when used with phishing-resistant authentication flows: security-key authentication can bind login to a specific site (relying party) and require the user’s physical key, which can reduce common account-takeover paths such as credential phishing.[4][5]

However, these benefits come with operational tradeoffs: users and organizations must plan for loss, replacement, enrollment, and recovery. Practical security depends on how accounts are configured (including fallback and recovery mechanisms), not only on the key itself.[4]

  1. ^a ^b ^c YubiKey 5 Series. Yubico. Yubico. https://www.yubico.com/products/yubikey-5-overview/.
  2. ^ Yubico Documentation. Yubico Docs. Yubico. https://docs.yubico.com/.
  3. ^a ^b YubiKey Manager (ykman). Yubico Docs. Yubico. https://docs.yubico.com/software/yubikey/tools/ykman/.
  4. ^a ^b ^c National Institute of Standards and Technology. SP 800-63B: Digital Identity Guidelines: Authentication and Lifecycle Management. NIST SP 800-63-3. National Institute of Standards and Technology. https://pages.nist.gov/800-63-3/sp800-63b.html.
  5. ^a ^b Web Authentication: An API for accessing Public Key Credentials Level 2. W3C Recommendation. World Wide Web Consortium (W3C). https://www.w3.org/TR/webauthn-2/.