Using Cryptographic Hardware
- Track: Identity and Access Management devroom
- Room: UD2.119
- Day: Saturday
- Start: 16:10
- End: 16:40
This presentation explains how cryptographic hardware allows the use of private keys while preventing them from being viewed or copied. It focuses primarily on the use of Yubikey cryptographic hardware, in both piv and gpg modes. It explains how to use this hardware with popular software like openssh and Postgres.
Speakers
Bruce Momjian |