You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This is an optional step if you have a use case which requires [additional identities](https://github.com/drduh/YubiKey-Guide/issues/445). Some non-exhaustive example use cases are:
436
+
This is an optional step for use cases requiring [additional identities](https://github.com/drduh/YubiKey-Guide/issues/445), for example:
439
437
440
438
- different email addresses for different languages
441
439
- different email addresses for professional versus personal but please see alternative reason below for not tying these addresses together
@@ -446,24 +444,22 @@ An alternative would be to have distinct keys but you would then require multipl
446
444
- if you have different email addresses for professional versus personal use cases, having distinct keys allow you to disassociate the identities
447
445
- if you are also using the YubiKey as a U2F or FIDO2 device, having multiple YubiKeys is generally recommended as a backup measure
448
446
449
-
## Steps
450
-
451
-
Define an array containing additional uids. As this is bash syntax, each array element should be surrounded by quotes and each element should be separated by a space:
447
+
Define an array containing additional user IDs. Each array element must be wrapped in quotes and each element must be space-delimited:
Use the following command to generate Signature, Encryption and Authentication Subkeys using the previously configured key type, passphrase and expiration:
477
+
Generate Signature, Encryption and Authentication Subkeys using the previously configured key type, passphrase and expiration:
481
478
482
479
```console
483
480
for SUBKEY in sign encrypt auth ; do \
@@ -497,12 +494,12 @@ gpg -K
497
494
The output will display **[C]ertify, [S]ignature, [E]ncryption and [A]uthentication** keys:
0 commit comments