<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>guide on james(bl)og</title>
    <link>https://jamesog.net/tags/guide/</link>
    <description>Recent content in guide on james(bl)og</description>
    <generator>Hugo</generator>
    <language>en-gb</language>
    <lastBuildDate>Sat, 28 Mar 2026 16:00:00 +0000</lastBuildDate>
    <atom:link href="https://jamesog.net/tags/guide/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>YubiKey as an SSH Certificate Authority</title>
      <link>https://jamesog.net/2023/03/03/yubikey-as-an-ssh-certificate-authority/</link>
      <pubDate>Fri, 03 Mar 2023 16:00:00 +0000</pubDate>
      <guid>https://jamesog.net/2023/03/03/yubikey-as-an-ssh-certificate-authority/</guid>
      <description>&lt;p&gt;This is a guide to setting up a YubiKey for use as an offline SSH certificate authority.&lt;/p&gt;&#xA;&lt;p&gt;This assumes a brand new YubiKey with no prior configuration on it, to be used solely as a CA.&lt;/p&gt;&#xA;&lt;h2 id=&#34;why&#34;&gt;Why?&lt;/h2&gt;&#xA;&lt;p&gt;Typically a CA should be on a secured, isolated machine. Using a dedicated YubiKey means you can isolate your CA and keep it in a drawer so that it can&amp;rsquo;t be accessed. YubiKeys offer protections such as requiring a PIN and/or touching the key for &lt;a href=&#34;https://developers.yubico.com/PIV/&#34;&gt;PIV&lt;/a&gt; operations.&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
