
Enhance Protection for Cryptographic Keys The most common use case being hardware-based digital signature generation and verification. YubiHSM 2 can be used as a comprehensive cryptographic toolbox for a wide range of open source and commercial applications. Enable Hardware-Based Cryptographic Operations

Deploying YubiHSM 2 to Microsoft Active Directory Certificate services not only guards the CA root keys but also protects all signing and verification services using the root key. YubiHSM 2 provides a hardware-backed key to secure digital keys used in a Microsoft-based PKI implementation. Secure Microsoft Active Directory Certificate Services These keys are most often used by certificate authorities, databases, and code signing, to secure critical applications, identities, and sensitive data in an enterprise.

Its ultra-slim “nano” form factor fits inside a server’s USB port, eliminating the need for bulky additional hardware, and offers flexibility for offline key transfer or backup.Įssential security features, including hashing, asymmetric, and symmetric cryptography to protect cryptographic keys while at rest or in use. The YubiHSM 2 features are accessible through Yubico’s Key Storage Provider (KSP) for industry-standard PKCS#11 or Microsoft’s CNG, or via native Windows, Linux and macOS libraries. It provides the highest levels of security for cryptographic digital key generation, storage, and management, supporting an extensive range of enterprise environments and applications. The YubiHSM 2 is a cost-effective Hardware Security Module (HSM) for servers and IoT gateways, offering advanced digital key protection capabilities and benefits at a price within reach of all organizations.

Root of trust for servers and computing devices
