Yubico YubiHSM 2 FIPS / USB security key | 5060408464557
Product Features
- Secure key storage and operations
Create, import, and store keys, then perform all crypto operations in the HSM hardware to prevent theft of keys while at rest or in use. This protects against both logical attacks against the server, such as zero-day exploits or malware, and physical theft of a server or its hard drive. - Extensive cryptographic capabilities
YubiHSM 2 supports hashing, key wrapping, asymmetric signing and decryption operations including advanced signing using ed25519. Attestation is also supported for asymmetric key pairs generated on-device. - Secure session between HSM and application
The integrity and privacy of commands and data in transit between the HSM and applications are protected using a mutually authenticated, integrity and confidentiality protected tunnel. - Role-based access controls for key management and key usage
All cryptographic keys and other objects in the HSM belong to one or more security domains. Access rights are assigned for each authentication key at creation time which allow a specific set of cryptographic or management operations to be performed per security domain. Admins assign rights to authentication keys based on its use case, such as an event monitoring app that needs the ability to read all audit logs in the HSM, or a Registration Authority that needs to issue (sign) end user digital certificates, or a domain security admin who needs to create and delete crypto keys. - 16 concurrent connections
Multiple applications can establish sessions with a YubiHSM to perform cryptographic operations. Sessions can be automatically terminated after inactivity or be long-lived to improve performance by eliminating session creation time. - Tamper-evident Audit Logging
The YubiHSM internally stores a log of all management and crypto operation events that occur in the device and that log can be exported for monitoring and reporting. Each event (row) in the log is hash chained with the previous row and signed so that it's possible to determine if any events are modified or deleted. - Direct USB support
The YubiHSM 2 can talk directly to the USB layer without the need for an intermediate HTTP mechanism. This delivers an improved experience for the developers who are developing solutions for virtualized environments.
Special Features
- Secure key storage and operations
- Extensive cryptographic capabilities
- Secure session between HSM and application
- Role-based access controls for key management and key usage
- 16 concurrent connections
- Tamper-evident Audit Logging
- Direct USB support
Product Specification
Product Type | USB security key |
Width | 1.2 cm |
Depth | 1.3 cm |
Thickness | 3.1 mm |
Weight | 1 g |
Interface Provided | Interface Provided |
Connector Provided | 4 pin USB Type A x 1 |
Miscellaneous | Miscellaneous |
Features | True Random Number Generator (TRNG), crush-resistant, asymmetric cryptography |
Compliant Standards | FCC, SHA-384, SHA-512, FIPS 140-2 Level 3, RoHS, WEEE, SHA-1, SHA-256, IP68, ECDH, ECDSA |
System Requirements | System Requirements |
OS Required | Ubuntu 14.04, CentOS 7.0, Ubuntu 16.04, Apple macOS Sierra 10.12, Apple macOS High Sierra 10.13, Apple macOS Mojave 10.14, Ubuntu 18.04, Linux Fedora 28, Ubuntu 18.10, Ubuntu 19.04, Ubuntu 19.10, Linux Fedora 31, Linux Fedora 30, Windows 10 / Windows Server 2012 / Windows Server 2016 / Windows Server 2019 |
Manufacturer Warranty | Manufacturer Warranty |
Service & Support | Limited warranty - 1 year |