YubiKey Lifecycle Management#
Audience: End Users, Administrators
Prerequisites: Kleidia account
Outcome: Understand YubiKey lifecycle from registration to retirement
Lifecycle Overview#
YubiKey devices go through several stages:
- Registration: Device registered in system
- Configuration: PIN/PUK/management key setup
- Active Use: Device used for operations
- Maintenance: PIN/PUK changes, certificate updates
- Revocation: Device revoked by administrator
- Retirement: Device removed from system
Registration Phase#
New Device Registration#
- Connect Device: Insert YubiKey into computer
- Detect Device: System automatically detects YubiKey
- Enter Information: Provide device details and credentials
- Store Secrets: PIN/PUK/management key stored in Vault
- Complete Registration: Device appears in system
Initial Configuration#
- PIN Setup: Set initial PIN (if not already set)
- PUK Setup: Set initial PUK (if not already set)
- Management Key: Generate and store management key
- Certificate Generation: Generate certificates automatically (subject:
yubikey-<serial-number>)
Active Use Phase#
Normal Operations#
During active use, users can:
- Change PIN: Update PIN as needed
- Change PUK: Update PUK as needed
- Generate Certificates: Create new certificates
- View Device Status: Check device information
- Manage Certificates: View and manage certificates
Certificate Lifecycle#
- CSR Generation: System automatically generates Certificate Signing Request on YubiKey with subject
yubikey-<serial-number>(or custom subject via advanced CSR management) - Certificate Signing: Backend signs CSR via OpenBao PKI
- Certificate Import: Import signed certificate to YubiKey automatically
- Certificate Usage: Use certificate for authentication/signing
- Certificate Renewal: Renew before expiration
- Certificate Revocation: Administrators can revoke certificates if compromised (users cannot revoke certificates)
Maintenance Phase#
Regular Maintenance#
- PIN Changes: Change PIN periodically for security
- Certificate Renewal: Renew certificates before expiration
- Firmware Updates: Keep YubiKey firmware updated
- Status Checks: Regularly check device status
Security Maintenance#
- Default Credential Checks: Verify PIN/PUK not using defaults
- Certificate Expiration: Monitor certificate expiration dates
- Revocation Checks: Check for revoked certificates
- Policy Compliance: Ensure device meets security policies
Revocation Phase#
Device Revocation#
When a device needs to be revoked (lost, stolen, compromised, or user departure):
- Admin Action: Administrator navigates to Admin Panel → YubiKeys and clicks “Revoke Device”
- Confirmation: Admin confirms revocation action
- System Actions:
- Device marked as revoked in database
- All associated certificates revoked
- Device secrets removed from Vault
- Automatic Wipe: If device is connected to an admin workstation, system attempts to wipe PIV data (reset PIV application)
- Revocation logged in audit trail
- Device Status: Device marked as revoked and removed from active devices list
- Re-registration: If device is recovered and needs to be reused, it must be re-registered as a new device
Important Notes:
- Automatic Wipe: When a revoked device is connected to an admin workstation (where an agent is running), the system automatically attempts to wipe the PIV application. This ensures the device cannot be used even if physically recovered.
- Permanent Action: Revocation cannot be undone. The device must be re-registered if needed again.
- Returned Status: The system tracks “returned” devices in statistics, but there is no separate UI action for marking devices as returned. Use “Revoke Device” for all device retirement scenarios.
Retirement Phase#
Device Removal#
When device is permanently retired:
- Remove from System: Device removed from database
- Revoke Certificates: All certificates revoked
- Clean Up Secrets: Secrets removed from Vault
- Audit Trail: Removal logged in audit trail
Lifecycle Best Practices#
For Users#
- ✅ Register devices immediately upon receipt
- ✅ Change default PIN/PUK immediately
- ✅ Keep certificates current
- ✅ Report lost/stolen devices immediately
- ✅ Contact administrator to revoke devices when no longer needed
For Administrators#
- ✅ Track device lifecycle stages
- ✅ Monitor device status regularly
- ✅ Enforce security policies
- ✅ Maintain audit trail
- ✅ Revoke devices promptly when users depart or devices are lost/stolen
- ✅ Ensure revoked devices are wiped when connected to admin workstations
- ✅ Securely dispose of retired devices