ІТ systems compatible with hardware modules (HSM)

Hardware modules (also known as hardware devices or tokens) are physical devices used to store and process confidential information and provide security in computer systems. They are used for storing cryptographic keys, certificates, and other confidential information. Hardware modules are effective for performing cryptographic operations. The main difference between YubiKey hardware modules is their specification, functions and capabilities, for example:

  • YubiKey YubiHSM 2 is the most compact USB device you can connect to your computer or laptop.
  • It supports various authentication methods, including single-factor, two-factor, and multifactor. It can be used to generate one-time passwords, use keys or certificates to authenticate users.
  • YubiKey supports various security protocols, such as OTP (One-Time Password), FIDO U2F (Universal 2nd Factor), FIDO2, OpenPGP, PIV (Personal Identity Verification) and others. This allows you to use it for a variety of purposes, including logging in, signing electronic documents, encrypting emails, and more.
  • The module has built-in security measures, such as protection against physical tampering, protection against information reading, and protection against software modification attacks. It can also be protected by a password or PIN code to add an extra layer of security.
download

HashiCorp

An open source tool that provides a secure and reliable way to store and distribute secrets such as API keys, access tokens, and passwords.

Setup instructions

Series of compatible security keys
  • HSM Series
Operating systems support
  • Linux
  • macOS
  • Microsoft Windows
API support
  • PKCS#11
microsoft edge

AWS IoT Greengrass

An open source edge environment and cloud service for building, deploying, and managing device software.

Setup instructions

Series of compatible security keys
  • HSM Series
Operating systems support
  • Linux
API support
  • PKCS#11
ecad labs signatory logo

ECAD Labs Signatory

An application for remote signing and secure storage of private keys in YubiHSM2.

Setup instructions

Series of compatible security keys
  • HSM Series
API support
  • YubiHSM Connector via HTTP request
curity logo landscape

Curity

Ready-made solutions for integration – a server with an identification system. Curity is a leading provider of API-based identity management that provides unified security for digital services.

Setup instructions

Series of compatible security keys
  • YubiKey 5 Series
  • FIPS Series
  • HSM Series
Supported protocols
  • One Time Password – Yubico OTP
  • One Time Password – TOTP
Operating systems support
  • Linux
  • macOS
  • Android (Smartphone/Tablet via NFC)
  • iOS (iPhone/iPad via Lightning)
Browser support
  • Google Chrome
  • Mozilla Firefox
  • Safari
primekey logo

PrimeKey EJBCA Community

EJBCA® — is a PKI certification authority software. Reliable, flexible, high-performance, scalable, platform-independent and component-based, EJBCA can be used alone or integrated with other applications as a component of your service.

Setup instructions

Series of compatible security keys
  • HSM Series
Operating systems support
  • Linux
API support
  • PKCS#11
primekey logo

PrimeKey EJBCA Enterprise

Public Key Infrastructure (PKI) software that meets the requirements for efficient issuance and management of digital identities. It works with YubiHSM 2 to combine hardware-based cryptographic protection with flexible PKI software to secure critical data and certificate authority (CA) keys.

Setup instructions

Series of compatible security keys
  • HSM Series
Operating systems support
  • Linux
API support
  • PKCS#11
silex

Silex DS-510

Gigabit server, designed to easily connect and share USB devices over a network. The Silex DS-510 allows you to work in a virtual environment using YubiHSM 2 to securely create, store and manage cryptographic keys.

Setup instructions

Series of compatible security keys
  • HSM Series
Operating systems support
  • Microsoft Windows
API support
  • PKCS#11
micro focus logo

Micro Focus

Authentication solutions to protect corporate assets and information. Micro Focus users can use Yubico’s multiprotocol hardware – YubiKeys and YubiHSM (Hardware Security Module) – to secure access to the Micro Focus.

Setup instructions

Series of compatible security keys
  • YubiKey 5 Series
  • Bio Series
  • FIPS Series
  • Security Key Series
  • YubiHSM
Supported protocols
  • Universal 2nd Factor (U2F)
  • One Time Password – HOTP
  • One Time Password – TOTP
  • PIV-compatible Smart Card
Operating systems support
  • Linux
  • Microsoft Windows
Browser support
  • Google Chrome
  • Microsoft Edge
  • Mozilla Firefox
  • Opera

Didn’t find a suitable service in the catalogue?

Send us a message and get advice from our experts!

15 + 6 =