Yubikey: Difference between revisions
mNo edit summary |
mNo edit summary |
||
Line 10: | Line 10: | ||
*[https://www.esev.com/blog/post/2015-01-pgp-ssh-key-on-yubikey-neo/ PGP and SSH keys on a Yubikey NEO] | *[https://www.esev.com/blog/post/2015-01-pgp-ssh-key-on-yubikey-neo/ PGP and SSH keys on a Yubikey NEO] | ||
*[https://gist.github.com/ageis/14adc308087859e199912b4c79c4aaa4 https://gist.github.com/ageis/14adc308087859e199912b4c79c4aaa4] YubiKey 4 series GPG and SSH setup guide] | *[https://gist.github.com/ageis/14adc308087859e199912b4c79c4aaa4 https://gist.github.com/ageis/14adc308087859e199912b4c79c4aaa4] YubiKey 4 series GPG and SSH setup guide] | ||
&nbs | |||
https://support.yubico.com/hc/en-us/articles/360016648939-Troubleshooting-Failed-connecting-to-the-YubiKey-Make-sure-the-application-has-the-required-permissions-in-YubiKey-Manager | Starting with Chrome version 39, you will be able to use the YubiKey NEO or YubiKey NEO-n in U2F+HID mode. HOW?? | ||
[https://github.com/liyanchang/yubikey-setup https://github.com/liyanchang/yubikey-setup] | |||
| |||
== Registering yubikey cloud == | |||
Yubico API key signup | |||
Prompts for "YubiKey OTP" THEN WHAT??? Looks like you're supposed to just tap the key | |||
what did i need this for? at least went through upload | |||
| |||
| |||
[https://devcentral.f5.com/s/articles/two-factor-authentication-using-yubikey-yubicloud-and-apm https://devcentral.f5.com/s/articles/two-factor-authentication-using-yubikey-yubicloud-and-apm] nigrore this one? | |||
| |||
[https://duo.com/docs/yubikeyalzz.com/doc/25870289/yubikey-for-yubicloud-configuration-guide https://duo.com/docs/yubikeyalzz.com/doc/25870289/yubikey-for-yubicloud-configuration-guide] | |||
| |||
| |||
= FAQ = | |||
== Failled connecting to the Yubikey. Make sure the application has the required permissions == | |||
yubikey-manager-qt -> OTP install libyubikey-udev or | |||
[https://support.yubico.com/hc/en-us/articles/360016648939-Troubleshooting-Failed-connecting-to-the-YubiKey-Make-sure-the-application-has-the-required-permissions-in-YubiKey-Manager https://support.yubico.com/hc/en-us/articles/360016648939-Troubleshooting-Failed-connecting-to-the-YubiKey-Make-sure-the-application-has-the-required-permissions-in-YubiKey-Manager] | |||
| |||
== Yubico API key signup: Invalid OTP == | |||
got through the upload thing first? | |||
| |||
== Using yubikey with github == | |||
[https://hackernoon.com/use-a-yubikey-as-a-mfa-device-to-replace-google-authenticator-b4f4c0215f2 https://hackernoon.com/use-a-yubikey-as-a-mfa-device-to-replace-google-authenticator-b4f4c0215f2] | |||
Run | |||
Github settings->authentication->Account security->Enable two factor authentication->Authenticator app Copy the key | |||
ykman oath accounts add <SERVICE_NAME> <YOUR_BASE32_KEY> | |||
To get code: | |||
ykman oath code github.com |
Revision as of 20:20, 27 November 2021
Links
- Download the tool
- Setup of a self-hosted Yubico OTP validation server
- Yubikey PHP Library
- How To Configure Your Yubikey for Maximum Usefulness & Security
- Using the Yubikey for two-factor authentication on Linux
- https://github.com/cgkades/yubiserver/blob/master/README
- PGP and SSH keys on a Yubikey NEO
- https://gist.github.com/ageis/14adc308087859e199912b4c79c4aaa4 YubiKey 4 series GPG and SSH setup guide]
&nbs
Starting with Chrome version 39, you will be able to use the YubiKey NEO or YubiKey NEO-n in U2F+HID mode. HOW??
https://github.com/liyanchang/yubikey-setup
Registering yubikey cloud
Yubico API key signup
Prompts for "YubiKey OTP" THEN WHAT??? Looks like you're supposed to just tap the key
what did i need this for? at least went through upload
https://devcentral.f5.com/s/articles/two-factor-authentication-using-yubikey-yubicloud-and-apm nigrore this one?
https://duo.com/docs/yubikeyalzz.com/doc/25870289/yubikey-for-yubicloud-configuration-guide
FAQ
Failled connecting to the Yubikey. Make sure the application has the required permissions
yubikey-manager-qt -> OTP install libyubikey-udev or
Yubico API key signup: Invalid OTP
got through the upload thing first?
Using yubikey with github
https://hackernoon.com/use-a-yubikey-as-a-mfa-device-to-replace-google-authenticator-b4f4c0215f2
Run
Github settings->authentication->Account security->Enable two factor authentication->Authenticator app Copy the key
ykman oath accounts add <SERVICE_NAME> <YOUR_BASE32_KEY>
To get code:
ykman oath code github.com