GitHub, one of the world’s largest software development platforms, has announced that it now supports the use of U2F and FIDO2 security keys for SSH (Secure Shell) through a new collaboration with security key maker Yubico.
“[W]e’re honored to have been an early collaborator in working with GitHub on developing this feature,” Yubico says in a recent blog post announcing the collaboration with Github. “This makes it easier than ever to use YubiKeys to secure all your GitHub access, making your SSH keys much more secure while maintaining a great user experience.”
In order to use the new feature, users will need to make sure that they have OpenSSH version 8.2 or later and have libfido2 installed. The blog post goes on to offer detailed step-by-step instructions that guide users through the process of getting set up.
Yubico has been a very vocal proponent of multi-factor authentication (MFA) practices over the past year, especially in light of the increasing security concerns that have been brought on by the ongoing COVID-19 pandemic. Just last month, the company released the results of a survey that pointed to signs that businesses have been increasingly adopting MFA practices in light of the pandemic.
“The pandemic and the move to cloud-based office applications has been a turning point for enterprises to implement and modernize their multi-factor authentication,” said Yubico Founder and CEO Stina Ehrensvärd. “This research shows that while there is an appetite for strong security, many companies stick with less effective old habits and technologies.”
Yubico also recently launched its new Android and iOS SDKs, following a public beta program that began in December of 2020. The SDKs make it easier for organizations to implement YubiKey security across multiple channels with a more consistent authentication experience for end users.