Your Nitrokey is now ready to use. Checkout the various use cases and supported applications.
Note: For many use cases described, it is necessary to have either OpenPGP or S/MIME keys installed on the device (see below).
sudo apt-get update && sudo apt-get install libccid
Your Nitrokey is now ready to use. Checkout the various use cases and supported applications.
Note: For many use cases described, it is necessary to have either OpenPGP or S/MIME keys installed on the device (see below).
Important: Once you plug in the Nitrokey, your computer will start the Keyboard Setup Assistant. Don't run through this assistant but exit it right away.
Your Nitrokey is now ready to use. Checkout the various use cases and supported applications.
Note: For some Versions of MacOS it is necessary to install custom ccid driver (for information see here), but in general MacOS should have the driver onboard.
Note: For many use cases described, it is necessary to have either OpenPGP or S/MIME keys installed on the device (see below).
Your Nitrokey is now ready to use. Checkout the various use cases and supported applications.
Note: For many use cases described, it is necessary to have either OpenPGP or S/MIME keys installed on the device (see below).
To access the OpenPGP smart card of the Nitrokey, install the package libccid.
On Debian/Ubuntu based Distributions type in terminal: sudo apt-get update && sudo apt-get install libccid
Note: If your distribution has a rather old version of libccid (<1.4.21) you have to add the device information by yourself (for example if you are using Ubuntu 14.04 or older). In this case please follow these instructions.
Your Nitrokey is now ready to use. Checkout the various use cases and supported applications.
Note: For many use cases described, it is necessary to have either OpenPGP or S/MIME keys installed on the device (see below).
Your Nitrokey is now ready to use. Checkout the various use cases and supported applications.
Note: For some Versions of MacOS it is necessary to install custom ccid driver (for information see here), but in general MacOS should have the driver onboard.
Note: For many use cases described, it is necessary to have either OpenPGP or S/MIME keys installed on the device (see below).
Your Nitrokey is now ready to use. Checkout the various use cases and supported applications.
apt update && apt install scdaemon gpg2
on Ubuntu).Your Nitrokey is now ready to use. Checkout the various use cases and supported applications.
gpg: OpenPGP card not available: No such deviceplease install the Nitrokey App or type the following commands in the terminal to download and install the UDEV rules:
wget https://raw.githubusercontent.com/Nitrokey/libnitrokey/master/data/41-nitrokey.rules sudo mv 41-nitrokey.rules /etc/udev/rules.d/
Your Nitrokey is now ready to use. Checkout the various use cases and supported applications.
The first time you plug in the Nitrokey FIDO U2F Windows may need some time to configure the device.
The Nitrokey FIDO U2F can be used with these browsers:
Open one of the websites supporting U2F. Login to the website and have a look at the settings for enabling two-factor authentication. Connect the Nitrokey FIDO U2F for registering it with your website account when requested to. After successfully configuring the device you need to connect your Nitrokey FIDO U2F for every login to this website.
If you can't find the settings for two-factor authentication, you may have a look at dongleauth.info. In most cases there is a link to the documentation of the supported webservice.
Note: Google only accepts the Chrome browser for registering the Nitrokey FIDO U2F. Logging in with the Nitrokey FIDO U2F works fine with Firefox though.
Open one of the websites supporting U2F. Login to the website and have a look at the settings for enabling two-factor authentication. Connect the Nitrokey FIDO U2F for registering it with your website account when requested to. After successfully configuring the device you need to connect your Nitrokey FIDO U2F for every login to this website.
If you can't find the settings for two-factor authentication, you may have a look at dongleauth.info. In most cases there is a link to the documentation of the supported webservice.
Note: Google only accepts the Chrome/Chromium browser for registering the Nitrokey FIDO U2F. Logging in with the Nitrokey FIDO U2F works fine with Firefox though.
/etc/udev/rules.d/
. After copying the file, restart udev via sudo service udev restart
.
The Nitrokey FIDO U2F can be used with these browsers:
Open one of the websites supporting U2F. Login to the website and have a look at the settings for enabling two-factor authentication. Connect the Nitrokey FIDO U2F for registering it with your website account when requested to. After successfully configuring the device you need to connect your Nitrokey FIDO U2F for every login to this website.
If you can't find the settings for two-factor authentication, you may have a look at dongleauth.info. In most cases there is a link to the documentation of the supported webservice.
Note: Google only accepts the Chrome browser for registering the Nitrokey FIDO U2F. Logging in with the Nitrokey FIDO U2F works fine with Firefox though.