Today we are pleased to announce the OnlyKey DUO launch on Kickstarter! With the same features users love about OnlyKey, OnlyKey DUO is one of the most versatile security keys available and in a small form factor that now supports both USB-A and USB-C.

Fast and Easy to Use

No need to install any software. You can use your OnlyKey DUO immediately for two-factor authentication and passwordless login (FIDO2) supported by major websites such as Microsoft, Google, Facebook, Dropbox, GitHub, Okta, AWS and more. Google and other vendors have recently come out with security keys that support either USB-A or USB-C so users end up buying two security keys or are forced to use an adapter. OnlyKey DUO is like two keys in one. It natively supports both USB types and it is one of the smallest and most portable security keys out there.

Plug into Laptop (USB-C)
Plug into Laptop (USB-C)
Plug into Workstation (USB-A)

Industry-Leading Features

OnlyKey DUO isn’t your run-of-the-mill security key. The proof is in the features. It supports FIDO2 as well as an array of other amazing features such as a hardware password manager, multiple two-factor methods, passwordless SSH login, and OpenPGP. Pre-order OnlyKey DUO from https://www.kickstarter.com/projects/timsteiner/onlykey-duo-portable-protection-for-all-of-your-devices

 

Latest Stories

View all

Securing the Future: Comparing YubiKey and OnlyKey in the Evolving Multifactor Authentication Landscape

Securing the Future: Comparing YubiKey and OnlyKey in the Evolving Multifactor Authentication Landscape

As cybersecurity threats continue to evolve, multifactor authentication (MFA) has become a critical safeguard for protecting sensitive data. YubiKey security keys are among the most widely adopted tools for MFA, enhancing security by requiring a physical device for user authentication....

Read more

Defragmenting Enterprise Authentication | An Improved Approach to Identity Access Management

Defragmenting Enterprise Authentication | An Improved Approach to Identity Access Management

In the ever-evolving landscape of cybersecurity, Chief Information Security Officers (CISOs) face a persistent challenge: securing authentication mechanisms within their organizations. Despite numerous predictions heralding the end of passwords, they remain a cornerstone of digital security. This article delves into...

Read more

The Fragility of Centralized Services: A Case for Decentralized Solutions

The Fragility of Centralized Services: A Case for Decentralized Solutions

Centralized services, while convenient, come with significant vulnerabilities. They require users to trust third parties with their data, creating potential single points of failure. When these systems falter, the repercussions can be widespread and severe. For example, CrowdStrike, a prominent...

Read more