You want the YubiKey. We deliver the platform to help you succeed.

You want the YubiKey. We deliver the platform to help you succeed.

You want the YubiKey. We deliver the platform to help you succeed.

You want the YubiKey. We deliver the platform to help you succeed.

You want the YubiKey. We deliver the platform to help you succeed.

Citadel is a powerful way to protect every corporate resource with YubiKeys. It’s easy to manage—with integrations into all your systems and a sleek app to enroll your users. When YubiKeys are centrally managed and bound to identity, you get the strongest authentication at enterprise scale.

Citadel is a powerful way to protect every corporate resource with YubiKeys. It’s easy to manage—with integrations into all your systems and a sleek app to enroll your users. When YubiKeys are centrally managed and bound to identity, you get the strongest authentication at enterprise scale.

Citadel is a powerful way to protect every corporate resource with YubiKeys. It’s easy to manage—with integrations into all your systems and a sleek app to enroll your users. When YubiKeys are centrally managed and bound to identity, you get the strongest authentication at enterprise scale.

Citadel is a powerful way to protect every corporate resource with YubiKeys. It’s easy to manage—with integrations into all your systems and a sleek app to enroll your users. When YubiKeys are centrally managed and bound to identity, you get the strongest authentication at enterprise scale.

Built by a team of infosec engineers from

Built by a team of infosec engineers from

Enroll Employees

Let employees enroll YubiKeys themselves

Enroll Employees

Let employees enroll YubiKeys themselves

Enroll Employees

Let employees enroll YubiKeys themselves

Enroll Employees

Let employees enroll YubiKeys themselves

Enroll Employees

Let employees enroll YubiKeys themselves

Integrate YubiKeys

Use keys across all corporate resources

Integrate YubiKeys

Use keys across all corporate resources

Integrate YubiKeys

Use keys across all corporate resources

Integrate YubiKeys

Use keys across all corporate resources

Integrate YubiKeys

Use keys across all corporate resources

YubiKey Management

Manage authenticators and security settings

YubiKey Management

Manage authenticators and security settings

YubiKey Management

Manage authenticators and security settings

YubiKey Management

Manage authenticators and security settings

YubiKey Management

Manage authenticators and security settings

Make YubiKeys the strong login for your entire organization.

Make YubiKeys the strong login for your entire organization.

Make YubiKeys the strong login for your entire organization.

Enrolling employees

is a breeze

Want to get thousands of employees using YubiKeys? 0pass App will let users self-enroll, transforming each YubiKey into a trusted security device, tied to employee identity, and configured to be ready for every login.

Want to get thousands of employees using YubiKeys? 0pass App will let users self-enroll, transforming each YubiKey into a trusted security device, tied to employee identity, and configured to be ready for every login.

Want to get thousands of employees using YubiKeys? 0pass App will let users self-enroll, transforming each YubiKey into a trusted security device, tied to employee identity, and configured to be ready for every login.

Integrating systems? We have tools for that.

Integrating systems? We have tools for that.

Integrating systems? We have tools for that.

Every part of your infrastructure interacts with YubiKeys using different protocols and standards. We are the channel to converge your identity provider, enterprise applications, servers, and workstations into a unified login experience with a YubiKey.

Every part of your infrastructure interacts with YubiKeys using different protocols and standards. We are the channel to converge your identity provider, enterprise applications, servers, and workstations into a unified login experience with a YubiKey.

Every part of your infrastructure interacts with YubiKeys using different protocols and standards. We are the channel to converge your identity provider, enterprise applications, servers, and workstations into a unified login experience with a YubiKey.

Orchestration. Management.Observation.

Orchestration. Management.Observation.

Orchestration. Management.Observation.

Enterprise scale deployment means managing users, keys, and their access to enroll in different levels of trust. What about adjusting security settings or exporting audit logs? That’s the power that Citadel’s admin portal puts at your finger tips.

Enterprise scale deployment means managing users, keys, and their access to enroll in different levels of trust. What about adjusting security settings or exporting audit logs? That’s the power that Citadel’s admin portal puts at your finger tips.

Enterprise scale deployment means managing users, keys, and their access to enroll in different levels of trust. What about adjusting security settings or exporting audit logs? That’s the power that Citadel’s admin portal puts at your finger tips.

Trust. Authority.

Identity.

Trust. Authority.

Identity.

Bring proof-of-identity to the key with your certificate authority (CA) or Citadel’s. A key signed by the CA creates cryptographic trust between it and the accounts that it unlocks. We do the heavy lifting for certificate issuing, management, revocation, and renewals. 

Bring proof-of-identity to the key with your certificate authority (CA) or Citadel’s. A key signed by the CA creates cryptographic trust between it and the accounts that it unlocks. We do the heavy lifting for certificate issuing, management, revocation, and renewals. 

Bring proof-of-identity to the key with your certificate authority (CA) or Citadel’s. A key signed by the CA creates cryptographic trust between it and the accounts that it unlocks. We do the heavy lifting for certificate issuing, management, revocation, and renewals. 

We only use frameworks that are best in class

We only use frameworks that are best in class

We only use frameworks that are best in class

We only implement authentication that complies with standards like FIDO2 and PIV
under NIST which are the benchmark for secure authentications.

  • FIDO2

  • PIV / Smart card

We only implement authentication that complies with standards like FIDO2 and PIV
under NIST which are the benchmark for secure authentications.

  • FIDO2

  • PIV / Smart card

The power of the YubiKey.
We unleash it.

The power of the YubiKey.
We unleash it.

The power of the YubiKey.
We unleash it.

Airtight seal on credentials

Airtight seal on credentials

Under the hood, your employees are logging in with a managed keypair. The private key is stored in the YubiKey’s secure processor and can never leave the device.

Under the hood, your employees are logging in with a managed keypair. The private key is stored in the YubiKey’s secure processor and can never leave the device.

Airtight seal on credentials

Under the hood, your employees are logging in with a managed keypair. The private key is stored in the YubiKey’s secure processor and can never leave the device.

No wiggle room for intruders

No wiggle room for intruders

Putting all credentials in the YubiKey’s secure processor is like locking every door in your house and taking the keys. Attackers can’t use credentials to gain access, escalate privileges, or move laterally.

Putting all credentials in the YubiKey’s secure processor is like locking every door in your house and taking the keys. Attackers can’t use credentials to gain access, escalate privileges, or move laterally.

No wiggle room for intruders

Putting all credentials in the YubiKey’s secure processor is like locking every door in your house and taking the keys. Attackers can’t use credentials to gain access, escalate privileges, or move laterally.

Can be integrated everywhere

Can be integrated everywhere

What are all the resources your team needs for work? Every service at your organization can be imbued with phishing & theft-proof MFA by moving authentication to trusted YubiKeys.

What are all the resources your team needs for work? Every service at your organization can be imbued with phishing & theft-proof MFA by moving authentication to trusted YubiKeys.

Can be integrated everywhere

What are all the resources your team needs for work? Every service at your organization can be imbued with phishing & theft-proof MFA by moving authentication to trusted YubiKeys.

Try it for free

Try it for free

Try it for free

Ready to get started?

Ready
to get started?

Ready to get started?

Request access to a demo with free a 30-day trial.

Request access to a demo with free a 30-day trial.

Here’s how we would
take this on together

Here’s how we would
take this on together

Here’s how we would
take this on together

Deploy 0pass across your

infrastructure.

Deploy 0pass across your

infrastructure.

Deploy 0pass across your

infrastructure.

We’ll give you all the tools you need. We have the tools, configurations,

and integrations to get your servers, web apps, and workstations ready.

We’ll give you all the tools you need. We have the tools, configurations, and integrations to get your servers, web apps, and workstations ready.

Employees enroll easily

with 0pass App.

Employees enroll easily

with 0pass App.

Employees enroll easily

with 0pass App.

Your users only use the app to enroll and

periodically rotate certificates.

We’ll give you all the tools you need. We have the tools, configurations, and integrations to get your servers, web apps, and workstations ready.

Users touch their

Yubikeys to access

services.

Users touch their

Yubikeys to access

services.

Users touch their

Yubikeys to access

services.

Now, your users log in everywhere with one PIN and one touch.

We’ll give you all the tools you need. We have the tools, configurations, and integrations to get your servers, web apps, and workstations ready.

You are now resistant to

phishing and credential theft.

You are now resistant

to phishing and

credential theft.

You are now resistant to

phishing and credential theft.

Not only is your organization using the strongest possible

authentication, you can reach any regulatory or compliance hurdle.

We’ll give you all the tools you need. We have the tools, configurations, and integrations to get your servers, web apps, and workstations ready.

How you can get started

Request a demo with
a free 30-day trial

Get a taste of the strongest authentication. End your vulnerability to phishing and credential theft.

Enroll devices

Get help from experts

Access all features

How you can get started

Request a demo with
a free 30-day trial

Get a taste of the strongest authentication. End your vulnerability to phishing and credential theft.

Enroll devices

Get help from experts

Access all features