<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en-gb">
<link rel="self" type="application/atom+xml" href="https://forum.yubico.com/feed.php?f=8&amp;t=1942" />

<title>Yubico Forum</title>
<subtitle>...visit our web-store at</subtitle>
<link href="https://forum.yubico.com/index.php" />
<updated>2015-07-01T07:05:03+01:00</updated>

<author><name><![CDATA[Yubico Forum]]></name></author>
<id>https://forum.yubico.com/feed.php?f=8&amp;t=1942</id>
<entry>
<author><name><![CDATA[JFontana]]></name></author>
<updated>2015-07-01T07:05:03+01:00</updated>
<published>2015-07-01T07:05:03+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=1942&amp;p=7509#p7509</id>
<link href="https://forum.yubico.com/viewtopic.php?t=1942&amp;p=7509#p7509"/>
<title type="html"><![CDATA[3rd-Party Labs (3PL) - YubiKey Innovations and Inspirations]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=1942&amp;p=7509#p7509"><![CDATA[
<span style="font-size: 110%; line-height: normal">Yubico often discovers independent community projects, platforms, tools, tutorials, etc. that incorporate a YubiKey or other Yubico technology and often use our open source tools. The <strong>3PL </strong>is an area where we can aggregate and share what we find or where you can contribute. The hope is that you, the community, will help us by evaluating these projects, which are not endorsed by Yubico, and create a valuable community resource. </span><br /><br />If you would like to contribute your own work post it in our Community Projects Forum. We will evaluate it for inclusion in the 3PL. Entries in the 3PL are marked with available information including Category or Platform name, Project name, Description, License, Platforms. If you are looking for a list of our formal partners, click here. <a href="https://www.yubico.com/support/partners/" class="postlink">https://www.yubico.com/support/partners/</a><br /><br /><br /><span style="color: #0000FF"><strong>YubiKing 2015 winning entries</strong></span><br /><br /><ul><em><strong>Projects:</strong></em> <br /><ul><li><strong>MFAStack: </strong>Two-factor authentication support for federation and single sign-on platform; LAMP <a href="http://yubigit.buckhill.co.uk/explore/projects" class="postlink">http://yubigit.buckhill.co.uk/explore/projects</a><br /><li><strong>Enrollment Station:</strong> Smart Card enrollment station for enterprises with Microsoft AD Certificate Services and certificate-based logins; MIT License; Windows <a href="https://github.com/CSIS/EnrollmentStation" class="postlink">https://github.com/CSIS/EnrollmentStation</a></li><li><strong>OpenKeychain for Android:</strong> OpenPGP encryption, decryption, digital signatures to protect messages on Android smartphone; GPLv3; Android <a href="https://github.com/open-keychain/open-keychain" class="postlink">https://github.com/open-keychain/open-keychain</a></li></ul></li></ul><br /><br /><span style="color: #0000FF"><strong>Projects, free software, instructions for incorporating YubiKey</strong></span><br /><br /><ul><em><strong>Handbooks:</strong></em> <br /><ul><li><strong>YubiKey Handbook:</strong> Details setup and use cases, such as U2F, OTP, SSH, GPG, OpenPGP, PIV, and macOS integration, for YubiKey 4 and YubiKey 4 Nano. Some adaptations can be made for YubiKey NEO. Author: Rui Marinho <a href="https://github.com/ruimarinho/yubikey-handbook#introduction" class="postlink">https://github.com/ruimarinho/yubikey-handbook#introduction</a></ul><em><strong>Projects:</strong></em> <br /><ul><li><strong>go-yubiauth:</strong> YubiKey Authorization Server implemented in GO programming language; BSD license <a href="https://github.com/dgryski/go-yubiauth" class="postlink">https://github.com/dgryski/go-yubiauth</a></li><li><strong>KeeChallenge:</strong> Keepass2 plug-in implements HMAC-SHA1 challenge-response to create a composite Keepass key; GPL2; Windows, Linux, Mac <a href="http://sourceforge.net/projects/keechallenge/" class="postlink">http://sourceforge.net/projects/keechallenge/</a></li><li><strong>eID Login for WordPress:</strong> A helper plugin to login using client side certificates, including European identity cards (eID, EstEID, beID, etc.), requires at least WordPress version 4.0. Tested up to v4.4. Screenshot <a href="https://github.com/kasparsd/eid-login/blob/master/screenshot-4.png" class="postlink">https://github.com/kasparsd/eid-login/blob/master/screenshot-4.png</a></li><li><strong>YubiGPGKeyer:</strong> Automate generating RSA keys on YubiKeys; MIT License; <a href="https://github.com/etsy/yubigpgkeyer" class="postlink">https://github.com/etsy/yubigpgkeyer</a></li></ul><em><strong>Libraries:</strong></em> <br /><ul><li><strong>Ruby: </strong>Library for verifying, decoding, decrypting and parsing YubiKey one-time passwords <a href="https://github.com/titanous/yubikey" class="postlink">https://github.com/titanous/yubikey</a></li></ul><em><strong>Tutorials:</strong></em> <br /><ul><li><strong>PAM Module for Fedora 20:</strong> Step-by-step Instructions for adding Yubico PAM module to Fedora 20 <a href="https://mozkeeler.github.io/blog/2015/02/02/my-weekend-with-pam/" class="postlink">https://mozkeeler.github.io/blog/2015/02/02/my-weekend-with-pam/</a></li><li><strong>Hardware storage, PGP Secret Keys:</strong> YubiKey hardware storage of your PGP Secret Keys <a href="https://trmm.net/Yubikey" class="postlink">https://trmm.net/Yubikey</a></li><li><strong>Two-factor authentication for ownCloud:</strong> Use privacyIDEA and YubiKey for OTP authentication to ownCloud; GNU Affero General Public License v3; <a href="https://www.howtoforge.com/tutorial/two-factor-authentication-with-owncloud" class="postlink">https://www.howtoforge.com/tutorial/two-factor-authentication-with-owncloud</a><br /><strong></li><li>Yubikey/OpenPGP Smartcards for Newbies (LInux Mint 17 MATE):</strong> YubiKey NEO installation for GPG encryption and SSH authentification; <a href="https://www.2realities.com/blog/2014/11/04/yubikey-slash-openpgp-smartcards-for-newbies" class="postlink">https://www.2realities.com/blog/2014/11/04/yubikey-slash-openpgp-smartcards-for-newbies</a><br /><strong></li><li>What YubiKey can do in Unix environment?:</strong> SSH servers using YubiKey as second factor for login (text and video); <a href="http://www.kilala.nl/Sysadmin/index.php?id=2340" class="postlink">http://www.kilala.nl/Sysadmin/index.php?id=2340</a></li></ul></li></ul><br /><br /><span style="color: #0000FF"><strong>YubiKeys and FIDO U2F</strong></span><br /><br /><ul><em><strong>Projects:</strong></em><br /><ul><li><strong>Gluu Server: </strong>Enables applications to leverage your domain's U2F service using OpenID Connect or SAML API's; Apache v2 <a href="https://www.youtube.com/watch?v=XQ-XT8yTblQ&amp;feature=youtu.be" class="postlink">https://www.youtube.com/watch?v=XQ-XT8yTblQ&amp;feature=youtu.be</a><br /><li><strong>ruby-u2f: </strong>U2F library in Ruby; MIT License <a href="https://github.com/castle/ruby-u2f" class="postlink">https://github.com/castle/ruby-u2f</a></li><li><strong>TwoFactorAuth: </strong>Ruby + Rails support for the FIDO U2F security key standard; Affero General Public License v3 <a href="https://github.com/TwoFactorAuth/ruby" class="postlink">https://github.com/TwoFactorAuth/ruby</a></li><li><strong>u2f-login: </strong>Make WordPress login secure with U2F protocol; AGPLv3 or later <a href="https://github.com/shield-9/u2f-login/" class="postlink">https://github.com/shield-9/u2f-login/</a></li><li><strong>privacyIDEA: </strong>Authenticate with a U2F token registered with privacyIDEA to a simpleSAMLphp Identity Provider (IdP); Affero General Public License v3; Linux <a href="https://www.privacyidea.org/?s=U2F" class="postlink">https://www.privacyidea.org/?s=U2F</a> Video: <a href="https://www.youtube.com/watch?v=0VKFGSAlL80" class="postlink">https://www.youtube.com/watch?v=0VKFGSAlL80</a></li><li><strong>Flask: </strong>Plugin to simplify usage and management of U2F devices in this Python microframework; MIT License; <a href="https://github.com/herrjemand/flask-fido-u2f" class="postlink">https://github.com/herrjemand/flask-fido-u2f</a></li></ul></li></ul><br /><br /><span style="color: #0000FF"><strong>Tools/Utilities</strong></span><br /><br /><ul><strong><em>Utilities:</em></strong><br /><ul><li><strong>Deadbolt:</strong> Locks your Mac when you remove YubiKey; Mac <a href="https://github.com/DEGoodmanWilson/deadbolt" class="postlink">https://github.com/DEGoodmanWilson/deadbolt</a><br /><li><strong>YubiKey Monitor:</strong> Detects a currently connected Yubikey, monitors it's presence and locks the workstation when it is removed; License TBD; .Net <a href="http://sourceforge.net/projects/yubimonistd-gt/" class="postlink">http://sourceforge.net/projects/yubimonistd-gt/</a></li><li><strong>YubiSwitch:</strong> An OSX status-bar app to avoid sending accidental OTP passwords; Mac <a href="https://www.dyne.org/software/yubiswitch/" class="postlink">https://www.dyne.org/software/yubiswitch/</a></li><li><strong>YubiGuard:</strong> A tiny Python script to protect against accidental triggering of your YubiKey - does not require root privilege; GNU General Public License; Supports many popular Linux distributions. All YubiKey models tested. <a href="https://bfelder.github.io/YubiGuard/" class="postlink">https://bfelder.github.io/YubiGuard/</a></li></ul></li></ul> <br /><br /><br /><span style="color: #0000FF"><strong>Development projects targeted at YubiKeys, platforms, servers</strong></span><br /><br /><ul><ul><strong><li>Citrix Netscaler Dual Gateway:</strong> YubiKey two-factor authentication support <a href="http://www.shaunritchie.co.uk/netscaler-gateway-dual-factor-using-yubikey" class="postlink">http://www.shaunritchie.co.uk/netscaler-gateway-dual-factor-using-yubikey</a><br /><strong><li>JBoss Application Server: </strong>Yubico OTP integrated into JBoss EAP or Wildfly 8 via Yubico JAAS Login Module. <a href="https://developer.jboss.org/wiki/YubicoOTPAndJBossEAP6OrWildfly8?_sscc=t" class="postlink">https://developer.jboss.org/wiki/YubicoOTPAndJBossEAP6OrWildfly8?_sscc=t</a><br />     (French: version) <a href="http://gautric.github.io/blog/2015/03/19/otp-yubico-jboss-eap-wildfly-login-module.html" class="postlink">http://gautric.github.io/blog/2015/03/19/otp-yubico-jboss-eap-wildfly-login-module.html</a><br /><strong></li><li>JBoss Application Server:</strong> Two Factor Authen. (2FA) w/ Yubico OTP and JBoss EAP 6 or Wildfly 8 <a href="https://developer.jboss.org/wiki/YubicoOTPAndJBossEAP6OrWildfly8?_sscc=t" class="postlink">https://developer.jboss.org/wiki/YubicoOTPAndJBossEAP6OrWildfly8?_sscc=t</a><br /><strong></li><li>Joomla:</strong> Two-factor authentication plugin for use with YubiKey OTP; GNU GPLv2; <a href="https://code.google.com/p/joomla-yubikey-authentication/" class="postlink">https://code.google.com/p/joomla-yubikey-authentication/</a><strong></li><li>Magento e-commerce platform:</strong> YubiKey two-factor authentication to secure Admin logins <a href="http://www.magentocommerce.com/magento-connect/yubikey-authentification-for-admin-logins.html" class="postlink">http://www.magentocommerce.com/magento-connect/yubikey-authentification-for-admin-logins.html</a><br /><strong></li><li>django:</strong> django-yubikey-admin provides two-factor authentication with a YubiKey OTP to access django admin; MIT License; django and django-grappelli <a href="https://github.com/LyricalSecurity/django-yubikey-admin" class="postlink">https://github.com/LyricalSecurity/django-yubikey-admin</a><br /><strong></li><li>django OTP:</strong> django-otp 0.3.3 is a pluggable framework for adding two-factor authentication to Django using one-time passwords; BSD <a href="https://pypi.python.org/pypi/django-otp" class="postlink">https://pypi.python.org/pypi/django-otp</a><br /><strong></li><li>Liferay:</strong> yubikey-login-hook-liferay-6-x uses YubiKey OTP API to create strong authentication option for Liferay, a free and open source web CMS for building websites and portals; GNU Lesser GPL <a href="https://github.com/pastuweb/yubikey-login-hook-liferay-6-x" class="postlink">https://github.com/pastuweb/yubikey-login-hook-liferay-6-x</a><br /><strong></li><li>Dumpster: </strong>A lightweight, self-hosted and API-based file upload server supporting YubiKey OTP authentication; Mozilla Public License 2.0;  <a href="https://github.com/nmaggioni/Dumpster" class="postlink">https://github.com/nmaggioni/Dumpster</a></li></ul></li></ul><br /><br /><span style="color: #0000FF"><strong>Vendors that have built YubiKey Integration</strong></span><br /><br /><ul><ul><strong><li>iControlwp; WordPress Admin:</strong> Implements two-factor authentication login <a href="https://www.icontrolwp.com/2013/07/wordpress-simple-firewall-security-plugin/" class="postlink">https://www.icontrolwp.com/2013/07/wordpress-simple-firewall-security-plugin/</a><br /><strong><li>Mandrill; transactional email:</strong> Two-factor authorization using YubiKey, for Mandrill login <a href="https://mandrill.zendesk.com/hc/en-us/articles/205582477-Using-Multifactor-Authentication-with-Mandrill" class="postlink">https://mandrill.zendesk.com/hc/en-us/articles/205582477-Using-Multifactor-Authentication-with-Mandrill</a><br /><strong></li><li>MouseStats; UX Analysis tools:</strong> Use a YubiKey OTP for two-factor login <a href="http://www.mousestats.com/docs/wiki/34/enable-yubikey-otp-athentication" class="postlink">http://www.mousestats.com/docs/wiki/34/enable-yubikey-otp-athentication</a><br /><strong></li><li>Lieberman Software; Enterprise Random Password Manager:</strong> Support for Yubico OATH-compliant multi-factor authentication <a href="http://www.liebsoft.com/Yubico_Integrations/" class="postlink">http://www.liebsoft.com/Yubico_Integrations/</a></li></ul></li></ul>[/list][/list]<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=3691">JFontana</a> — Wed Jul 01, 2015 7:05 am</p><hr />
]]></content>
</entry>
</feed>