First-time setup. Scan the QR code with Yubico Authenticator, then verify.
Requirements: YubiKey (NFC or USB) + Yubico Authenticator
Enter your TOTP code to access KeyTap.
Your TOTP enrollment is complete. This tab shows the enrollment flow for demonstration.
Upload a file, compute its SHA-256, and sign it with your YubiKey via WebAuthn.
Prove which security key you are using. WebAuthn attestation reveals the authenticator model via AAGUID.
Touch your security key when prompted.
Enumerate what your security key and browser combination can do.
Prove that a security key belongs to a trusted fleet. Enterprise attestation may reveal device identity and manufacturer metadata.
Insert or tap your YubiKey. Some browsers may ask for permission.
Discover credentials stored on your security key or platform authenticator using resident keys / discoverable credentials.
Tap your YubiKey when prompted.
Verify signatures created with hardware security keys. Upload the original file and signature.json.
Paste or upload WebAuthn payloads for decoding. Supports attestationObject, authenticatorData, clientDataJSON, and COSE public keys.