Hardware-Backed Business VPN Security: OpenVPN Connect Added to Yubico's 'Works with YubiKey' Catalog
By Adam Bullock
OpenVPN Connect is officially listed in the Yubico 'Works with YubiKey' catalog. Here's what that means for you.
OpenVPN Connect is now officially listed in Yubico's Works with YubiKey catalog, a curated directory of products Yubico has validated as compatible with its YubiKey hardware security keys. For IT buyers and procurement teams evaluating VPN authentication options, that listing carries weight: it's third-party confirmation that YubiKey and OpenVPN Connect work together as designed.
Explore this content with AI:
ChatGPT | Perplexity | Claude | Google AI Mode
What does being in the Yubico "Works with YubiKey" catalog mean for businesses?
OpenVPN Connect is officially listed in the Yubico Works with YubiKey catalog, confirming compatibility with the YubiKey 5 Series, including NFC, Nano, C, Ci, and FIPS variants. The catalog is Yubico's way of telling buyers: this product has been verified to work with our hardware. It's a tested integration that Yubico stands behind.
The specific YubiKey models listed as compatible with OpenVPN Connect include:
- YubiKey 5 NFC
- YubiKey 5C NFC
- YubiKey 5Ci
- YubiKey 5 Nano
- YubiKey 5C Nano
- YubiKey 5 FIPS Series variants
That FIPS coverage matters for organizations in regulated industries, which we'll cover later. For everyone else, the short version is this: if you own a YubiKey 5 Series device, you can use it to authenticate your OpenVPN Connect sessions today.
What is hardware token authentication, and does it differ from MFA?
Hardware token authentication uses a physical device that stores cryptographic credentials on-chip, so private keys never leave the hardware. This is categorically different from software-based multi-factor authentication (MFA), where a shared secret or one-time code exists on a device that can be compromised.
PKCS#11 (Public-Key Cryptography Standards #11) is the industry-standard cryptographic token interface that enables VPN clients and other applications to use hardware security modules and smartcards for authentication without exposing private keys to the host system. According to the PKCS#11 Cryptographic Token Interface Standard, the private key operations happen inside the hardware — the application never sees the raw key material.
According to YubiKey PIV Introduction: Certificate Slots, YubiKey PIV certificate slots are designed so that private keys stored on-device can never be exported. The YubiKey performs the cryptographic operation internally and returns only the result — not the key itself.
Here's how hardware token authentication compares to software-based MFA:
|
Dimension |
Hardware Token (YubiKey) |
Software MFA (TOTP App) |
|
Phishing resistance |
High — key never leaves device |
Low — OTP codes can be intercepted |
|
SIM-swap vulnerability |
None — physical device required |
Present for SMS-based fallbacks |
|
Device dependency |
Requires a physical YubiKey |
Requires smartphone or authenticator app |
|
FIDO2 certification |
Yes (YubiKey 5 Series) |
No |
|
Private key exportability |
Impossible by design |
Varies by implementation |
If you're currently using time-based one-time password (TOTP) MFA for Access Server, that's a meaningful security improvement over password-only authentication. Hardware token authentication takes it further by making the credential phishing-resistant by design, not just harder to intercept.
Why should businesses care about phishing-resistant VPN authentication?
According to the Verizon 2026 Data Breach Investigations Report, stolen credentials appear in over 80% of hacking-related breaches. Phishing, credential stuffing, and MFA fatigue attacks all exploit the same weakness: authentication factors that can be captured and replayed. A hardware token eliminates that attack surface.
Hardware tokens don't require a security team to be effective. Once a YubiKey is provisioned and bound to a user's VPN profile, authentication requires physical possession of the device plus knowledge of a PIN. An attacker who steals credentials remotely cannot authenticate without the physical key.
The cost argument for hardware tokens has also shifted. YubiKey 5 Series devices cost roughly $50–$60 per key. For an SMB with 10–25 remote employees, that's a few hundred dollars to eliminate the most common attack vector in modern breaches. OpenVPN specializes in business VPN solutions for small business, and incorporating a hardware token into a security stack has never been more affordable.
How does YubiKey work with OpenVPN Connect?
OpenVPN Connect uses the PKCS#11 interface to request a cryptographic signing operation from the YubiKey during the TLS handshake. The private key never leaves the device — the YubiKey performs the operation internally and returns only the signed result.
The YubiKey stores a client certificate in its PIV applet. When OpenVPN Connect initiates a connection, it asks the YubiKey to sign the TLS challenge using the stored private key. The result proves certificate ownership without ever exposing the key to the operating system or the VPN client.
OpenVPN Connect 3.5 added support for ECC (Elliptic Curve Cryptography) certificates on hardware tokens, expanding compatibility beyond RSA-only configurations.
Here's a condensed overview of the setup process. For full platform-specific instructions, see the official documentation on connecting and authorizing a hardware token in OpenVPN Connect.
- Provision a certificate onto the YubiKey PIV slot. Use the yubico-piv-tool, Yubico's official CLI utility for importing certificates and keys into the PIV applet, to generate or import a certificate into slot 9a (Authentication).
- Locate the PKCS#11 vendor module for your OS. On Windows, this is typically ykcs11.dll; on macOS, it's libykcs11.dylib. OpenVPN Connect needs to reference this module to communicate with the YubiKey.
- Assign the external certificate to your OpenVPN Connect profile. In the OpenVPN Connect settings, select the imported certificate from the YubiKey as the authentication credential for the relevant connection profile.
- Connect. OpenVPN Connect will prompt for your YubiKey PIN to authorize the cryptographic operation. Authentication proceeds without exposing any key material.
Good to Know: The YubiKey PIN is separate from a password. It protects the PIV applet itself — even if someone intercepts your VPN credentials, they cannot authenticate without the physical YubiKey and the correct PIN.
How does YubiKey work with Access Server?
OpenVPN Access Server supports PKCS#11 hardware token authentication at the server level, allowing organizations to enforce certificate-based authentication for all VPN connections — not just individual client configurations. This is a meaningful distinction from client-side setup alone.
When a user connects with a YubiKey, Access Server validates the client certificate presented during the TLS handshake. Access Server can be configured to require certificate authentication, meaning a valid hardware-bound certificate is a prerequisite for any successful VPN session — not an optional enhancement.
For full server-side configuration steps, the Access Server PKCS#11 hardware token configuration support article covers the complete setup, including the client steps that complement the server configuration.
Note: Access Server's PKCS#11 implementation currently requires RSA-based certificates. ECC certificate support added in OpenVPN Connect 3.5 applies to client-side operations — server-side enforcement still requires RSA certificates. Verify your certificate type before deployment.
Access Server positions hardware token support within a broader authentication ecosystem that includes LDAP, RADIUS, SAML, and TOTP. See the Access Server integrations hub for the full picture.
Good to Know: For organizations in regulated industries, the YubiKey 5 FIPS Series is listed as compatible in the Yubico Works with YubiKey catalog for OpenVPN Connect. Pairing FIPS-validated hardware keys with FIPS 140-2 compliant Access Server creates an authentication chain that satisfies strict compliance requirements for cryptographic modules.
How does hardware token auth fit into OpenVPN's broader authentication ecosystem?
YubiKey PKCS#11 authentication is one layer in a defense-in-depth strategy, not a replacement for all other authentication methods. Understanding where it fits helps you deploy it without disrupting existing configurations.
Access Server supports a spectrum of authentication options:
- Local authentication — username and password stored in Access Server's local database
- LDAP/RADIUS integration — delegates authentication to your existing directory service
- TOTP MFA — adds a software-based second factor (authenticator app)
- Certificate authentication — client certificates issued by your PKI
- Hardware token (PKCS#11) — certificate stored on a physical YubiKey, operations performed on-device
See the flexible authentication systems in Access Server feature page for a complete reference.
Note: Hardware token authentication and TOTP MFA can be layered. A configuration requiring YubiKey PIN + physical token + VPN credentials creates multiple independent authentication factors — none of which can be phished without physical access to the device.
Ready to add hardware-grade authentication to your VPN?
Access Server gives you full control over your authentication stack — including PKCS#11 hardware token support — with 3 free connections to get started.
Get StartedFrequently Asked Questions: YubiKey and OpenVPN
Does OpenVPN support YubiKey?
Yes. OpenVPN Connect supports YubiKey authentication via the PKCS#11 interface, using the YubiKey's PIV applet to store client certificates and perform cryptographic operations on-device. OpenVPN Access Server supports hardware token authentication on the server side, allowing organizations to enforce certificate-based auth for all VPN connections. Both components are required for a complete deployment.
What is the Works with YubiKey catalog?
The Works with YubiKey catalog is Yubico's directory of products that have been validated as compatible with YubiKey hardware security keys.
What YubiKey models work with OpenVPN Connect?
According to the Yubico Works with YubiKey catalog for OpenVPN Connect, the following models are listed as compatible with OpenVPN Connect: YubiKey 5 NFC, YubiKey 5C NFC, YubiKey 5Ci, YubiKey 5 Nano, YubiKey 5C Nano, and YubiKey 5 FIPS Series variants. All use the PIV applet and PKCS#11 interface for certificate-based VPN authentication.
Is hardware token authentication better than an authenticator app for VPN?
Hardware token authentication provides stronger phishing resistance than software-based authenticator apps. TOTP codes generated by an app can be intercepted and replayed in real time by a phishing proxy. A YubiKey-based client certificate cannot be replicated remotely — the private key never leaves the device, and authentication requires physical possession of the key plus a PIN. For high-risk access scenarios, hardware tokens are a stronger control option.
Can I use a YubiKey with OpenVPN Access Server?
Yes. OpenVPN Access Server supports PKCS#11 hardware token authentication, allowing the server to require and validate client certificates stored on a YubiKey during the TLS handshake. The Access Server PKCS#11 configuration guide covers the complete server-side and client-side setup. Note that server-side enforcement currently requires RSA certificates; ECC support is available on the client side in OpenVPN Connect 3.5.
Ready to see how OpenVPN can help protect your organization from attacks?
Try the self-hosted Access Server solution or managed CloudConnexa service for free — no credit card required.
See Which One is Right for You
Adam has loved tech since the days of the dial-up modem. Read his perspective on the OpenVPN blog.