Lines Matching refs:a
5 exposed to the internet to offer a strong second factor option for end
8 The second factor is provided by a device implementing the U2F
9 protocol. In case of a USB U2F security key, it is a USB HID device
12 QEMU supports both pass-through of a host U2F key device to a VM,
13 and software emulation of a U2F key.
18 The ``u2f-passthru`` device allows you to connect a real hardware
19 U2F key on your host to a guest VM. All requests made from the guest
23 In addition, the dedicated pass-through allows you to share a single
24 U2F security key with several guest VMs, which is not possible with a
28 option, which takes the host path to a Linux ``/dev/hidrawN`` device:
35 requires a working libudev):
43 ``u2f-emulated`` is a completely software emulated U2F device.
46 provides a complete implementation of the U2F protocol device part for
59 Assuming that you have a working libu2f-emu installed on the host,
67 all the elements it needs for a single use of the lifetime of the device.
73 You can pass the device the path of a setup directory on the host