Administrator action required.
Plug your YubiKey into a USB port on this computer, then click the button below.
System suspended due to excessive failed unlock attempts.
Manual intervention required on server.
First-time setup. Scan the QR code with Yubico Authenticator, then verify.
Requirements: YubiKey (NFC or USB) + Yubico Authenticator
Enter your TOTP code to access KeyTap.
Your TOTP enrollment is complete. This tab shows the enrollment flow for demonstration.
The TOTP secret is encrypted with your YubiKey-derived key. Rotate to bind to a different key.
Upload a file, compute its SHA-256, and sign it with your YubiKey via WebAuthn.
Prove which security key you are using. WebAuthn attestation reveals the authenticator model via AAGUID.
Touch your security key when prompted.
Enumerate what your security key and browser combination can do.
Prove that a security key belongs to a trusted fleet. Enterprise attestation may reveal device identity and manufacturer metadata.
Insert or tap your YubiKey. Some browsers may ask for permission.
Discover credentials stored on your security key or platform authenticator using resident keys / discoverable credentials.
Tap your YubiKey when prompted.
Verify signatures created with hardware security keys. Upload the original file and signature.json.
Paste or upload WebAuthn payloads for decoding. Supports attestationObject, authenticatorData, clientDataJSON, and COSE public keys.