Skip to main content
  1. Blog
  2. Article

Alex Cattle
on 29 March 2020

Smart cards login on Ubuntu


Smart cards have proliferated and are now everywhere, from work ID badges to credit cards and passports. For example, the United States Federal Government uses smart cards to control access to federal facilities and information systems because they offer an extra layer of security and respond to strict government guidelines. If used in a company, these will provide identity confirmation, verification that data has not been changed, and confidentiality via encryption.

This whitepaper will provide information on how to configure Ubuntu 18.04 LTS to operate with a smart card to provide multi-factor authentication when logging into the system both locally and remotely. For the purposes of this whitepaper, a PIVKey smart card is used as an example since they are readily accessible and contain a few basic credentials.

Read our documentation or download the whitepaper to learn more including:

  • The software and hardware prerequisites needed for smart card configuration.
  • How to set up your smart card and configure it to support smart card logins.
  • How to configure SSH smart card login.

Download the whitepaper by filling in the form below:

Related posts


ijlal-loutfi
6 March 2026

Sovereign clouds: enhanced data security with confidential computing 

Confidential computing Article

Increasingly, enterprises are interested in improving their level of control over their data, achieving digital sovereignty, and even building their own sovereign cloud. However, this means moving beyond thinking about just where your data is stored to thinking about the entire data lifecycle.  In this blog, we cover the differences betwe ...


Benjamin Ryzman
24 February 2026

Building quantum-safe telecom infrastructure for 5G and beyond

private mobile network Article

coRAN Labs and Canonical at MWC Barcelona 2026 At MWC Barcelona 2026, coRAN Labs and Canonical are presenting a working demonstration of a cloud-native, quantum-safe telecom platform for 5G and beyond 5G networks. This is not a conceptual exercise. It is a full 5G System (5GS) deployment with post-quantum cryptography embedded across the ...


Lidia Luna Puerta
14 January 2026

How to build DORA-ready infrastructure with verifiable provenance and reliable support

Ubuntu Article

DORA requires organizations to know what they run, where it came from, and how it’s maintained. Learn how to build infrastructure with verifiable provenance. ...