Yubikey: Difference between revisions

From DWIKI
mNo edit summary
 
(2 intermediate revisions by the same user not shown)
Line 15: Line 15:
*[https://gist.github.com/ageis/14adc308087859e199912b4c79c4aaa4 https://gist.github.com/ageis/14adc308087859e199912b4c79c4aaa4] YubiKey 4 series GPG and SSH setup guide]  
*[https://gist.github.com/ageis/14adc308087859e199912b4c79c4aaa4 https://gist.github.com/ageis/14adc308087859e199912b4c79c4aaa4] YubiKey 4 series GPG and SSH setup guide]  


&nbs
=Notes=


Starting with Chrome version 39, you will be able to use the YubiKey NEO or YubiKey NEO-n in U2F+HID mode. HOW??
Starting with Chrome version 39, you will be able to use the YubiKey NEO or YubiKey NEO-n in U2F+HID mode. HOW??
Line 21: Line 21:
[https://github.com/liyanchang/yubikey-setup https://github.com/liyanchang/yubikey-setup]
[https://github.com/liyanchang/yubikey-setup https://github.com/liyanchang/yubikey-setup]


 




Line 30: Line 29:
Yubico API key signup
Yubico API key signup


Prompts for "YubiKey OTP" THEN WHAT??? Looks like you're supposed to just tap the key
Prompts for "YubiKey OTP" Looks like you're supposed to just tap the key


what did i need this for? at least went through upload
what did i need this for? at least went through upload


 
;
 
 


[https://devcentral.f5.com/s/articles/two-factor-authentication-using-yubikey-yubicloud-and-apm https://devcentral.f5.com/s/articles/two-factor-authentication-using-yubikey-yubicloud-and-apm] nigrore this one?
[https://devcentral.f5.com/s/articles/two-factor-authentication-using-yubikey-yubicloud-and-apm https://devcentral.f5.com/s/articles/two-factor-authentication-using-yubikey-yubicloud-and-apm] nigrore this one?
Line 52: Line 49:
[https://support.yubico.com/hc/en-us/articles/360013708900-Using-Your-U2F-YubiKey-with-Linux https://support.yubico.com/hc/en-us/articles/360013708900-Using-Your-U2F-YubiKey-with-Linux]
[https://support.yubico.com/hc/en-us/articles/360013708900-Using-Your-U2F-YubiKey-with-Linux https://support.yubico.com/hc/en-us/articles/360013708900-Using-Your-U2F-YubiKey-with-Linux]


  wget -O /etc/udev/rules.d/70-u2f.rules https://raw.githubusercontent.com/Yubico/libu2f-host/master/70-u2f.rules
  wget -O /etc/udev/rules.d/70-u2f.rules [https://raw.githubusercontent.com/Yubico/libu2f-host/master/70-u2f.rules https://raw.githubusercontent.com/Yubico/libu2f-host/master/70-u2f.rules]
  apt install libyubikey-udev
  apt install libyubikey-udev
  udevadm trigger
  udevadm trigger
== Test your Yubikey OTP ==
https://demo.yubico.com/otp/verify


= FAQ =
= FAQ =

Latest revision as of 16:18, 10 September 2024

 

Links

Notes

Starting with Chrome version 39, you will be able to use the YubiKey NEO or YubiKey NEO-n in U2F+HID mode. HOW??

https://github.com/liyanchang/yubikey-setup


HOWTO

Registering yubikey cloud

Yubico API key signup

Prompts for "YubiKey OTP" Looks like you're supposed to just tap the key

what did i need this for? at least went through upload

https://devcentral.f5.com/s/articles/two-factor-authentication-using-yubikey-yubicloud-and-apm nigrore this one?

 

https://duo.com/docs/yubikeyalzz.com/doc/25870289/yubikey-for-yubicloud-configuration-guide

 

 

Using key with linux

https://support.yubico.com/hc/en-us/articles/360013708900-Using-Your-U2F-YubiKey-with-Linux

wget -O /etc/udev/rules.d/70-u2f.rules https://raw.githubusercontent.com/Yubico/libu2f-host/master/70-u2f.rules
apt install libyubikey-udev
udevadm trigger

Test your Yubikey OTP

https://demo.yubico.com/otp/verify

FAQ

What kind of OTP does Yubikey use?

Single use ordered

 

OTP verify url

https://demo.yubico.com/otp/verify

Failled connecting to the Yubikey. Make sure the application has the required permissions

yubikey-manager-qt -> OTP install libyubikey-udev or

https://support.yubico.com/hc/en-us/articles/360016648939-Troubleshooting-Failed-connecting-to-the-YubiKey-Make-sure-the-application-has-the-required-permissions-in-YubiKey-Manager

 

Yubico API key signup: Invalid OTP

got through the upload thing first? The upload url from doc is bad! remove comma!

 

 

Using yubikey with github

https://hackernoon.com/use-a-yubikey-as-a-mfa-device-to-replace-google-authenticator-b4f4c0215f2

Run

Github settings->authentication->Account security->Enable two factor authentication->Authenticator app Copy the key

ykman oath accounts add  <SERVICE_NAME> <YOUR_BASE32_KEY>

To get code:

ykman oath code github.com