Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Implement FIDO2 resident key management #224

Open
mocmocamoc opened this issue Jan 3, 2020 · 3 comments
Open

Implement FIDO2 resident key management #224

mocmocamoc opened this issue Jan 3, 2020 · 3 comments

Comments

@mocmocamoc
Copy link

The Manager needs a way to view and delete FIDO2 resident keys, as the CLI currently provides via the "fido list" and "fido delete" commands. This will become increasingly important as more services implement passwordless authentication, given that the Yubikey 5 can only store 25 resident credentials.

@dagheyman
Copy link

Thanks. Yes this is on the roadmap in some form, no ETA currently though.

@emmachase
Copy link

Any update on this? Seems like a core feature to have, otherwise you expect your users to use the command line if they ever run out of slots.

@fdennis
Copy link
Contributor

fdennis commented Nov 7, 2022

@emmachase Yubico Authenticator for Desktop is our recommended software for FIDO management. Version 5.1 added support for FIDO-enabled YubiKeys. If you are interested in trying the authenticator you can find it here https://developers.yubico.com/yubioath-desktop/Releases/

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Development

No branches or pull requests

4 participants