YubiKey is a hardware-authentication device that securely stores your SSH key. You need the physical device to login over SSH, which is protected with both touch (separate button on the device itself) and PIN code (need to be typed to unlock the SSH key).
FIDO2 (Fast Identity Online 2) is a set of standards for secure authentication that aims to replace password-based logins with more secure methods.
- macOS: Recent version (Big Sur or later).
- OpenSSH: Version 8.3p1 or higher (FIDO2 support). The recommended version is installed via Homebrew.
- Homebrew: Must be installed on macOS.
- FIDO2 Device: A YubiKey or any compatible FIDO2 device.
FIDO2 was disabled by Apple on the bundled version of OpenSSH in MacOS as of the last update to this page. Thus, OpenSSH variant from Homebrew must be installed.
-
Update Homebrew:
brew update
-
Install OpenSSH:
brew install openssh
-
Install libfido2:
brew install libfido2
-
Add Homebrew path to the environment, instructions for ZSH:
echo 'export PATH="/opt/homebrew/opt/openssh/bin:$PATH"' >> ~/.zshrc source ~/.zshrc
-
Set YubiKey pin
If the PIN is not set before generating the private key, the SSH server may reject the key. Grab your Yubikey device id:
fido2-token -L
ioreg://4295015862: vendor=0x1e0d, product=0xf1d0 (NEOWAVE NEOWAVE Winkeo FIDO2)
Then run -S
to set multiple digits pin for your device - longer the better. The YubiKey allows the PIN to be any ASCII character: numbers, letters (upper- and lower-case), and even non-alphanumeric characters such as !, %, or # (among others):
fido2-token -S ioreg://429501586
-
Connect your Yubikey device to your computer.
-
Open Terminal and generate the SSH key:
ssh-keygen -t ed25519-sk -O resident -O verify-required -C "YubiKey device" -f ~/.ssh/yubikey
-t ed25519-sk
: Use the ed25519 algorithm with FIDO2 support.-O resident
: Store the key on the FIDO2 device.-O verify-required
: Require user verification (e.g., touch) for each use of the key.-C "Your Comment"
: Add a comment to help identify the key.- For passphrase you can leave it empty (hit enter twice), as the key will be protected by pin
-
Enter your PIN and touch the device when prompted.
-
Keys will be saved in the
~/.ssh
directory.
-
Add the public key to server:
- Open
yubikey.pub
and copy its content. - Log in to the server and edit the
~/.ssh/authorized_keys
file. - Paste the public key content and save the file.
- Open
-
Update ssh config:
vim ~/.ssh/config
SSH config sample
Host server_name HostName <IP Address> User <User_name> IdentityFile ~/.ssh/yubikey ForwardAgent yes
-
Connect to server
# Use -vv for additional debug logs ssh -vv server_name
-
Enter your PIN and touch the device when prompted.
-
OpenSSH Version: Ensure you are using the Homebrew-installed OpenSSH version for FIDO2 support:
which ssh
The result should be:
/opt/homebrew/bin/ssh
-
FIDO2 Device: Ensure your device supports FIDO2 and is properly configured.
-
File Permissions: Ensure the
~/.ssh
directory and theauthorized_keys
file on the server have the correct permissions.