We are pleased to announce that new OnlyKey software is now available which includes new features and improvements to existing features.

A full list of new features is available here.

To get started, follow the instructions in the upgrade guide here.

Windows Active Directory 2FA with Authlite

Windows Local Active Directory (AD) does not support FIDO security keys and typically users log in via password authentication. 3rd party solutions such as Authlite may be used to implement 2-factor authentication for Windows AD.

With OnlyKey and Authlite one-time passwords are used for Windows AD authentication, more information available at authlite.com.

Why Authlite and OnlyKey?

  • Authlite supports physical security keys
  • Authlite fails closed, unlike DUO which may in many cases be bypassed (e.g., boot into safe mode)
  • Authlite does not require contact with external service, works offline, and only requires install of software on local domain controller
  • Like OnlyKey, Authlite is a one-time cost per user

OpenSSH 2FA Support

OnlyKey now supports the new ed25519-sk key type and FIDO2 resident keys with OpenSSH. This feature is supported in OpenSSH 8.2 and later. Use OnlyKey to store SSH keys that can be used directly in in OpenSSH by following our guide here.

Latest Stories

Visualizza tutto

Securing the Future: Comparing YubiKey and OnlyKey in the Evolving Multifactor Authentication Landscape

Securing the Future: Comparing YubiKey and OnlyKey in the Evolving Multifactor Authentication Landscape

As cybersecurity threats continue to evolve, multifactor authentication (MFA) has become a critical safeguard for protecting sensitive data. YubiKey security keys are among the most widely adopted tools for MFA, enhancing security by requiring a physical device for user authentication....

Continua a leggere

Defragmenting Enterprise Authentication | An Improved Approach to Identity Access Management

Defragmenting Enterprise Authentication | An Improved Approach to Identity Access Management

In the ever-evolving landscape of cybersecurity, Chief Information Security Officers (CISOs) face a persistent challenge: securing authentication mechanisms within their organizations. Despite numerous predictions heralding the end of passwords, they remain a cornerstone of digital security. This article delves into...

Continua a leggere

The Fragility of Centralized Services: A Case for Decentralized Solutions

The Fragility of Centralized Services: A Case for Decentralized Solutions

Centralized services, while convenient, come with significant vulnerabilities. They require users to trust third parties with their data, creating potential single points of failure. When these systems falter, the repercussions can be widespread and severe. For example, CrowdStrike, a prominent...

Continua a leggere