GitHub now supports security keys in a move away from passwords

Move to prevent account compromise for SSH Git operations

A padlock on a motherboard surrounded by keys

GitHub has added support for FIDO2 security keys to prevent account compromise in SSH Git operations and start moving away from solely relying on passwords, the company announced.

In a blog post,  GitHub security engineer Kevin Jones said that the company was always looking for new standards that increase security and usability. GitHub users can now use portable FIDO2 devices for SSH authentication to secure Git operations against private key exposure.

"Once generated, you add these new keys to your account just like any other SSH key," said Jones. "You'll still create a public and private key pair, but secret bits are generated and stored in the security key, with the public part stored on your machine like any other SSH public key. "

Jones said that a private key will still be stored on a user’s computer, but this will only reference the security key device itself. If your private key file on your computer is stolen, it would be useless without the security key. 

"When using SSH with a security key, none of the sensitive information ever leaves the physical security key device," added Jones. "If you're the only person with physical access to your security key, it's safe to leave plugged in at all times."

Related Resource

Security awareness training strategies for account takeover protection

Why you need an inside-the-perimeter strategy for internal threats

Security awareness training strategies for account takeover protection - whitepaper from MimecastDownload now

Users were urged to remove previously registered SSH keys and use only SSH keys backed by security keys. 

“Using only SSH keys backed by security keys gives you strong assurance that you are the only person pulling your Git data via SSH as long as you keep the security key safe like any other private key,” said Jones.

The move toward using security keys comes as the firm looks to avoid using traditional passwords and embrace more secure forms of authentication.

"We recognize that passwords are convenient, but they are a consistent source of account security challenges," said Jones. “We believe passwords represent the present and past, but not the future.”

He added that removing password support for Git — GitHub has already done so for its API — would “raise the baseline security hygiene for every user and organization, and the resulting software supply chain”.

To move over to using security keys, users must log in to the service and follow the instructions in its documentation to create a new key and add it to their account.

Featured Resources

How virtual desktop infrastructure enables digital transformation

Challenges and benefits of VDI

Free download

The Okta digital trust index

Exploring the human edge of trust

Free download

Optimising workload placement in your hybrid cloud

Deliver increased IT agility with the cloud

Free Download

Modernise endpoint protection and leave your legacy challenges behind

The risk of keeping your legacy endpoint security tools

Download now

Recommended

Russia's "politically motivated" REvil raid could be used as leverage, experts warn
ransomware

Russia's "politically motivated" REvil raid could be used as leverage, experts warn

17 Jan 2022
Meta files lawsuit to uncover hackers targeting Facebook, WhatsApp
phishing

Meta files lawsuit to uncover hackers targeting Facebook, WhatsApp

21 Dec 2021
NCA donates 225 million passwords to Have I Been Pwned
cyber security

NCA donates 225 million passwords to Have I Been Pwned

21 Dec 2021
Five things to consider before choosing an MFA solution
Security

Five things to consider before choosing an MFA solution

17 Dec 2021

Most Popular

How to move Microsoft's Windows 11 from a hard drive to an SSD
Microsoft Windows

How to move Microsoft's Windows 11 from a hard drive to an SSD

4 Jan 2022
How to boot Windows 11 in Safe Mode
Microsoft Windows

How to boot Windows 11 in Safe Mode

6 Jan 2022
Microsoft Exchange servers break thanks to 'Y2K22' bug
email delivery

Microsoft Exchange servers break thanks to 'Y2K22' bug

4 Jan 2022