yubico-pam VS mkinitcpio-ykfde

Compare yubico-pam vs mkinitcpio-ykfde and see what are their differences.

yubico-pam

Yubico Pluggable Authentication Module (PAM) (by Yubico)

mkinitcpio-ykfde

Full disk encryption with Yubikey (Yubico key) (by eworm-de)
InfluxDB - Power Real-Time Data Analytics at Scale
Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
www.influxdata.com
featured
SaaSHub - Software Alternatives and Reviews
SaaSHub helps you find the best software and product alternatives
www.saashub.com
featured
yubico-pam mkinitcpio-ykfde
6 2
664 105
0.0% -
0.0 2.3
over 1 year ago 4 months ago
C C
BSD 2-clause "Simplified" License GNU General Public License v3.0 only
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.

yubico-pam

Posts with mentions or reviews of yubico-pam. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2022-05-25.

mkinitcpio-ykfde

Posts with mentions or reviews of mkinitcpio-ykfde. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2023-01-31.
  • sd-encrypt, LUKS partition unlock and YubiKey - Erratic behavior
    3 projects | /r/archlinux | 31 Jan 2023
    I am interested in running a self-signed Secure Boot LUKS setup that I could unlock with my YubiKey. I've tried an initramfs hook in my other devices and it works. However, I read this section about unlocking the LUKS partition with systemd and its integrated enrollment tool (systemd-cryptenroll) and my interest was piqued since it meant an integrated solution that doesn't depend on a third-party one.
  • Second factor LUKS encryption via Yubikey on Fedora 33
    1 project | /r/Fedora | 7 Feb 2021
    Found a solution myself: https://github.com/eworm-de/mkinitcpio-ykfde/blob/master/README-dracut.md

What are some alternatives?

When comparing yubico-pam and mkinitcpio-ykfde you can also consider the following projects:

Purse - GnuPG asymmetric password manager

libfido2 - Provides library functionality for FIDO2, including communication with a device over USB or NFC.

OpenKeychain - OpenKeychain is an OpenPGP implementation for Android.

dracut-crypt-ssh - dracut initramfs module to start dropbear sshd during boot to unlock the root filesystem with the (cryptsetup) LUKS passphrase remotely

pam-onelogin - pam-onelogin is a pretty complete pam/nss stack for using OneLogin as authentication source (with MFA) and user/group lookups. Primarily used for SSH.

OpenSSL - TLS/SSL and crypto library

yubico-piv-tool - Command line tool for the YubiKey PIV application

c-toxcore - The future of online communications.

Git - Git Source Code Mirror - This is a publish-only repository but pull requests can be turned into patches to the mailing list via GitGitGadget (https://gitgitgadget.github.io/). Please follow Documentation/SubmittingPatches procedure for any of your improvements.

linux - Arch Linux kernel sources, with patches (Mirror)

glewlwyd - Experimental Single Sign On server, OAuth2, Openid Connect, multiple factor authentication with, HOTP/TOTP, FIDO2, TLS Certificates, etc. extensible via plugins

svntogit-packages - Automatic import of svn 'packages' repo (read-only mirror)