See Icon Explanation for documentation specific symbols.
Two Factor Authentication. Combines two different factors to provide strong authentication:
Something you know.
Something you have.
Something you are.
- Yubikey Manager
Application that will manage Yubikey configuration. There is a GUI Yubikey Manager and a CLI Yubikey Manager.
- Yubikey Password/PINs
adminaccounts for a Yubikey. Can be up to 127 ASCII characters long.
The user password is used whenever GPG material needs to be accessed on the card. Daily usage.
The admin password is used to reset the user password and perform administrative functions on the Yubikey itself. Limited usage.
- Signing Key
Key used to cryptographically sign data. This enables others to verify that data sent by you has not been altered.
- Encryption Key
Key used to encrypt data. Data is typically signed with the Signing Key after encryption.
- Authentication Key
Key used to Authenicate to systems (e.g. SSH). This will allow other systems to load your public GPG key and enable access to systems without needing any information from you.
Domain Key Identified Mail: DKIM provides a method for validating a domain name identity that is associated with an email message through cryptographic authentication.
Domain-based Message Authentication, Reporting & Conformance:, is an email authentication, policy, and reporting protocol. It builds on the widely deployed SPF and DKIM protocols, adding linkage to the author (“From:”) domain name, published policies for recipient handling of authentication failures, and reporting from receivers to senders, to improve and monitor protection of the domain from fraudulent email.
Mail Transport Agent: handles mail server to server (e.g. other domains).
Mail Delivery Agent: handles user access to email (e.g. IMAP).
Mail User Agent: user client to check email (e.g. thunderbird/outlook).
Sender Policy Framework: Email authentication method designed to detect forging sender addresses during the delivery of the email.
See VLAN 101 for Unifi network specific terms.
Group Policy for Windows. Provides centralized management and configuration of operating systems, applications, and users’ settings
The most restrictive GPO is applied if both machine and user GPO’s are set.
Policies can be manually applied with:
Hierarchical database that stores low-level settings for Windows and applications that opt to use the registry.
Windows Subsystem for Linux. Run linux distros in windows 10. See Windows Subsystem for Linux (WSL).