Products
Platform
Products Modules
Resources
Products
Platform
Products Modules
Products
Platform
Products Modules
You want the YubiKey. We deliver the platform to help you succeed.
You want the YubiKey. We deliver the platform to help you succeed.
You want the YubiKey. We deliver the platform to help you succeed.
You want the YubiKey. We deliver the platform to help you succeed.
You want the YubiKey. We deliver the platform to help you succeed.
Citadel is a powerful way to protect every corporate resource with YubiKeys. It’s easy to manage—with integrations into all your systems and a sleek app to enroll your users. When YubiKeys are centrally managed and bound to identity, you get the strongest authentication at enterprise scale.
Citadel is a powerful way to protect every corporate resource with YubiKeys. It’s easy to manage—with integrations into all your systems and a sleek app to enroll your users. When YubiKeys are centrally managed and bound to identity, you get the strongest authentication at enterprise scale.
Citadel is a powerful way to protect every corporate resource with YubiKeys. It’s easy to manage—with integrations into all your systems and a sleek app to enroll your users. When YubiKeys are centrally managed and bound to identity, you get the strongest authentication at enterprise scale.
Citadel is a powerful way to protect every corporate resource with YubiKeys. It’s easy to manage—with integrations into all your systems and a sleek app to enroll your users. When YubiKeys are centrally managed and bound to identity, you get the strongest authentication at enterprise scale.
Built by a team of infosec engineers from
Built by a team of infosec engineers from





Enroll Employees
Let employees enroll YubiKeys themselves
Enroll Employees
Let employees enroll YubiKeys themselves
Enroll Employees
Let employees enroll YubiKeys themselves
Enroll Employees
Let employees enroll YubiKeys themselves
Enroll Employees
Let employees enroll YubiKeys themselves
Integrate YubiKeys
Use keys across all corporate resources
Integrate YubiKeys
Use keys across all corporate resources
Integrate YubiKeys
Use keys across all corporate resources
Integrate YubiKeys
Use keys across all corporate resources
Integrate YubiKeys
Use keys across all corporate resources
YubiKey Management
Manage authenticators and security settings
YubiKey Management
Manage authenticators and security settings
YubiKey Management
Manage authenticators and security settings
YubiKey Management
Manage authenticators and security settings
YubiKey Management
Manage authenticators and security settings


Make YubiKeys the strong login for your entire organization.
Make YubiKeys the strong login for your entire organization.
Make YubiKeys the strong login for your entire organization.
Enrolling employees
is a breeze
Want to get thousands of employees using YubiKeys? 0pass App will let users self-enroll, transforming each YubiKey into a trusted security device, tied to employee identity, and configured to be ready for every login.
Want to get thousands of employees using YubiKeys? 0pass App will let users self-enroll, transforming each YubiKey into a trusted security device, tied to employee identity, and configured to be ready for every login.
Want to get thousands of employees using YubiKeys? 0pass App will let users self-enroll, transforming each YubiKey into a trusted security device, tied to employee identity, and configured to be ready for every login.
Integrating systems? We have tools for that.
Integrating systems? We have tools for that.
Integrating systems? We have tools for that.
Every part of your infrastructure interacts with YubiKeys using different protocols and standards. We are the channel to converge your identity provider, enterprise applications, servers, and workstations into a unified login experience with a YubiKey.
Every part of your infrastructure interacts with YubiKeys using different protocols and standards. We are the channel to converge your identity provider, enterprise applications, servers, and workstations into a unified login experience with a YubiKey.
Every part of your infrastructure interacts with YubiKeys using different protocols and standards. We are the channel to converge your identity provider, enterprise applications, servers, and workstations into a unified login experience with a YubiKey.
Orchestration. Management.Observation.
Orchestration. Management.Observation.
Orchestration. Management.Observation.
Enterprise scale deployment means managing users, keys, and their access to enroll in different levels of trust. What about adjusting security settings or exporting audit logs? That’s the power that Citadel’s admin portal puts at your finger tips.
Enterprise scale deployment means managing users, keys, and their access to enroll in different levels of trust. What about adjusting security settings or exporting audit logs? That’s the power that Citadel’s admin portal puts at your finger tips.
Enterprise scale deployment means managing users, keys, and their access to enroll in different levels of trust. What about adjusting security settings or exporting audit logs? That’s the power that Citadel’s admin portal puts at your finger tips.
Trust. Authority.
Identity.
Trust. Authority.
Identity.
Bring proof-of-identity to the key with your certificate authority (CA) or Citadel’s. A key signed by the CA creates cryptographic trust between it and the accounts that it unlocks. We do the heavy lifting for certificate issuing, management, revocation, and renewals.
Bring proof-of-identity to the key with your certificate authority (CA) or Citadel’s. A key signed by the CA creates cryptographic trust between it and the accounts that it unlocks. We do the heavy lifting for certificate issuing, management, revocation, and renewals.
Bring proof-of-identity to the key with your certificate authority (CA) or Citadel’s. A key signed by the CA creates cryptographic trust between it and the accounts that it unlocks. We do the heavy lifting for certificate issuing, management, revocation, and renewals.
We only use frameworks that are best in class
We only use frameworks that are best in class
We only use frameworks that are best in class
We only implement authentication that complies with standards like FIDO2 and PIV
under NIST which are the benchmark for secure authentications.
FIDO2
PIV / Smart card
We only implement authentication that complies with standards like FIDO2 and PIV
under NIST which are the benchmark for secure authentications.
FIDO2
PIV / Smart card





The power of the YubiKey.
We unleash it.
The power of the YubiKey.
We unleash it.
The power of the YubiKey.
We unleash it.
Airtight seal on credentials
Airtight seal on credentials
Under the hood, your employees are logging in with a managed keypair. The private key is stored in the YubiKey’s secure processor and can never leave the device.
Under the hood, your employees are logging in with a managed keypair. The private key is stored in the YubiKey’s secure processor and can never leave the device.
Airtight seal on credentials
Under the hood, your employees are logging in with a managed keypair. The private key is stored in the YubiKey’s secure processor and can never leave the device.
No wiggle room for intruders
No wiggle room for intruders
Putting all credentials in the YubiKey’s secure processor is like locking every door in your house and taking the keys. Attackers can’t use credentials to gain access, escalate privileges, or move laterally.
Putting all credentials in the YubiKey’s secure processor is like locking every door in your house and taking the keys. Attackers can’t use credentials to gain access, escalate privileges, or move laterally.
No wiggle room for intruders
Putting all credentials in the YubiKey’s secure processor is like locking every door in your house and taking the keys. Attackers can’t use credentials to gain access, escalate privileges, or move laterally.
Can be integrated everywhere
Can be integrated everywhere
What are all the resources your team needs for work? Every service at your organization can be imbued with phishing & theft-proof MFA by moving authentication to trusted YubiKeys.
What are all the resources your team needs for work? Every service at your organization can be imbued with phishing & theft-proof MFA by moving authentication to trusted YubiKeys.
Can be integrated everywhere
What are all the resources your team needs for work? Every service at your organization can be imbued with phishing & theft-proof MFA by moving authentication to trusted YubiKeys.



Try it for free
Try it for free
Try it for free
Ready to get started?
Ready
to get started?
Ready to get started?
Request access to a demo with free a 30-day trial.
Request access to a demo with free a 30-day trial.
Here’s how we would
take this on together
Here’s how we would
take this on together
Here’s how we would
take this on together
Deploy 0pass across your
infrastructure.
Deploy 0pass across your
infrastructure.
Deploy 0pass across your
infrastructure.
We’ll give you all the tools you need. We have the tools, configurations,
and integrations to get your servers, web apps, and workstations ready.
We’ll give you all the tools you need. We have the tools, configurations, and integrations to get your servers, web apps, and workstations ready.






Employees enroll easily
with 0pass App.
Employees enroll easily
with 0pass App.
Employees enroll easily
with 0pass App.
Your users only use the app to enroll and
periodically rotate certificates.
We’ll give you all the tools you need. We have the tools, configurations, and integrations to get your servers, web apps, and workstations ready.
Users touch their
Yubikeys to access
services.
Users touch their
Yubikeys to access
services.
Users touch their
Yubikeys to access
services.
Now, your users log in everywhere with one PIN and one touch.
We’ll give you all the tools you need. We have the tools, configurations, and integrations to get your servers, web apps, and workstations ready.




You are now resistant to
phishing and credential theft.
You are now resistant
to phishing and
credential theft.
You are now resistant to
phishing and credential theft.
Not only is your organization using the strongest possible
authentication, you can reach any regulatory or compliance hurdle.
We’ll give you all the tools you need. We have the tools, configurations, and integrations to get your servers, web apps, and workstations ready.
How you can get started
Request a demo with
a free 30-day trial
Get a taste of the strongest authentication. End your vulnerability to phishing and credential theft.
Enroll devices
Get help from experts
Access all features
How you can get started
Request a demo with
a free 30-day trial
Get a taste of the strongest authentication. End your vulnerability to phishing and credential theft.