<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ed25519-sk and ssh in Secure Access Discussions</title>
    <link>https://community.cisco.com/t5/secure-access-discussions/ed25519-sk-and-ssh/m-p/5368381#M152</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1881255"&gt;@Andi1075&lt;/a&gt;&amp;nbsp;Per my best knowledge, this capability is not there. If you want 100% confirmation outside of your already performed tests, open a TAC case. Additionally, also reach to Yubikey support, they usually they have good understanding of what's supported on which vendors.&lt;/P&gt;
&lt;P&gt;Good luck,&lt;BR /&gt;Cristian.&lt;/P&gt;</description>
    <pubDate>Sat, 07 Feb 2026 08:02:49 GMT</pubDate>
    <dc:creator>Cristian Matei</dc:creator>
    <dc:date>2026-02-07T08:02:49Z</dc:date>
    <item>
      <title>ed25519-sk and ssh</title>
      <link>https://community.cisco.com/t5/secure-access-discussions/ed25519-sk-and-ssh/m-p/5366916#M151</link>
      <description>&lt;P&gt;Hallo Community,&lt;/P&gt;&lt;P&gt;I was wondering if it's possible to establish a ssh connection with ed25519-sk certificates using f.e. Nitrokey or Yubikey.&amp;nbsp;&lt;BR /&gt;I was able to use ed25519 or ecdsa certs - but the switch refuses to take the "sk" ones. Is there any work arround or something I missed ?&amp;nbsp;&lt;/P&gt;&lt;P&gt;B/R&lt;BR /&gt;Andy&lt;/P&gt;</description>
      <pubDate>Mon, 02 Feb 2026 18:11:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/secure-access-discussions/ed25519-sk-and-ssh/m-p/5366916#M151</guid>
      <dc:creator>Andi1075</dc:creator>
      <dc:date>2026-02-02T18:11:31Z</dc:date>
    </item>
    <item>
      <title>Re: ed25519-sk and ssh</title>
      <link>https://community.cisco.com/t5/secure-access-discussions/ed25519-sk-and-ssh/m-p/5368381#M152</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1881255"&gt;@Andi1075&lt;/a&gt;&amp;nbsp;Per my best knowledge, this capability is not there. If you want 100% confirmation outside of your already performed tests, open a TAC case. Additionally, also reach to Yubikey support, they usually they have good understanding of what's supported on which vendors.&lt;/P&gt;
&lt;P&gt;Good luck,&lt;BR /&gt;Cristian.&lt;/P&gt;</description>
      <pubDate>Sat, 07 Feb 2026 08:02:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/secure-access-discussions/ed25519-sk-and-ssh/m-p/5368381#M152</guid>
      <dc:creator>Cristian Matei</dc:creator>
      <dc:date>2026-02-07T08:02:49Z</dc:date>
    </item>
    <item>
      <title>Re: ed25519-sk and ssh</title>
      <link>https://community.cisco.com/t5/secure-access-discussions/ed25519-sk-and-ssh/m-p/5368531#M153</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/295226"&gt;@Cristian Matei&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;Thank u Cristian - I will ask Yubico and post the answer here. In this case we might need to use PKI instead.&lt;/P&gt;</description>
      <pubDate>Sun, 08 Feb 2026 14:39:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/secure-access-discussions/ed25519-sk-and-ssh/m-p/5368531#M153</guid>
      <dc:creator>Andi1075</dc:creator>
      <dc:date>2026-02-08T14:39:54Z</dc:date>
    </item>
  </channel>
</rss>

