Yubikey: Difference between revisions

From DWIKI
mNo edit summary
mNo edit summary
 
(11 intermediate revisions by the same user not shown)
Line 1: Line 1:
=Links=
 
*[https://developers.yubico.com/OTP/Guides/Self-hosted_OTP_validation.html Setup of a self-hosted Yubico OTP validation server]
 
*[https://www.christiaanconover.com/blog/yubikeyconfig/ How To Configure Your Yubikey for Maximum Usefulness & Security]
 
*[http://www.andybotting.com/using-the-yubikey-for-two-factor-authentication-on-linux Using the Yubikey for two-factor authentication on Linux]
= Links =
*https://github.com/cgkades/yubiserver/blob/master/README
 
*[https://www.esev.com/blog/post/2015-01-pgp-ssh-key-on-yubikey-neo/ PGP and SSH keys on a Yubikey NEO]
*[https://github.com/drduh/YubiKey-Guide YubiKey Guide]
*[https://www.yubico.com/products/services-software/download/ Download the tool]
*[https://developers.yubico.com/OTP/Guides/Self-hosted_OTP_validation.html Setup of a self-hosted Yubico OTP validation server]
*[https://github.com/enygma/yubikey Yubikey PHP Library]  
*[https://www.christiaanconover.com/blog/yubikeyconfig/ How To Configure Your Yubikey for Maximum Usefulness & Security]  
*[http://www.andybotting.com/using-the-yubikey-for-two-factor-authentication-on-linux Using the Yubikey for two-factor authentication on Linux]  
*[https://github.com/cgkades/yubiserver/blob/master/README https://github.com/cgkades/yubiserver/blob/master/README]
*[https://www.esev.com/blog/post/2015-01-pgp-ssh-key-on-yubikey-neo/ PGP and SSH keys on a Yubikey NEO]  
*[https://support.yubico.com/hc/en-us/articles/360013790259-Using-Your-YubiKey-with-OpenPGP Yubikey and GPG]
*[https://gist.github.com/ageis/14adc308087859e199912b4c79c4aaa4 https://gist.github.com/ageis/14adc308087859e199912b4c79c4aaa4] YubiKey 4 series GPG and SSH setup guide]
 
=Notes=
 
Starting with Chrome version 39, you will be able to use the YubiKey NEO or YubiKey NEO-n in U2F+HID mode. HOW??
 
[https://github.com/liyanchang/yubikey-setup https://github.com/liyanchang/yubikey-setup]
 
 
 
= HOWTO =
 
== Registering yubikey cloud ==
 
Yubico API key signup
 
Prompts for "YubiKey OTP" THEN WHAT??? Looks like you're supposed to just tap the key
 
what did i need this for? at least went through upload
 
 
 
 
 
[https://devcentral.f5.com/s/articles/two-factor-authentication-using-yubikey-yubicloud-and-apm https://devcentral.f5.com/s/articles/two-factor-authentication-using-yubikey-yubicloud-and-apm] nigrore this one?
 
 
 
[https://duo.com/docs/yubikeyalzz.com/doc/25870289/yubikey-for-yubicloud-configuration-guide https://duo.com/docs/yubikeyalzz.com/doc/25870289/yubikey-for-yubicloud-configuration-guide]
 
 
 
 
 
== Using key with linux ==
 
[https://support.yubico.com/hc/en-us/articles/360013708900-Using-Your-U2F-YubiKey-with-Linux https://support.yubico.com/hc/en-us/articles/360013708900-Using-Your-U2F-YubiKey-with-Linux]
 
wget -O /etc/udev/rules.d/70-u2f.rules [https://raw.githubusercontent.com/Yubico/libu2f-host/master/70-u2f.rules https://raw.githubusercontent.com/Yubico/libu2f-host/master/70-u2f.rules]
apt install libyubikey-udev
udevadm trigger
 
== Test your Yubikey OTP ==
https://demo.yubico.com/otp/verify
 
= FAQ =
 
== What kind of OTP does Yubikey use? ==
 
Single use ordered
 
 
 
== OTP verify url ==
 
[https://demo.yubico.com/otp/verify https://demo.yubico.com/otp/verify]
 
== Failled connecting to the Yubikey. Make sure the application has the required permissions ==
 
yubikey-manager-qt -> OTP install libyubikey-udev or
 
[https://support.yubico.com/hc/en-us/articles/360016648939-Troubleshooting-Failed-connecting-to-the-YubiKey-Make-sure-the-application-has-the-required-permissions-in-YubiKey-Manager https://support.yubico.com/hc/en-us/articles/360016648939-Troubleshooting-Failed-connecting-to-the-YubiKey-Make-sure-the-application-has-the-required-permissions-in-YubiKey-Manager]
 
 
 
== Yubico API key signup: Invalid OTP ==
 
got through the upload thing first? The upload url from doc is bad! remove comma!
 
 
 
 
 
== Using yubikey with github ==
 
[https://hackernoon.com/use-a-yubikey-as-a-mfa-device-to-replace-google-authenticator-b4f4c0215f2 https://hackernoon.com/use-a-yubikey-as-a-mfa-device-to-replace-google-authenticator-b4f4c0215f2]
 
Run
 
Github settings->authentication->Account security->Enable two factor authentication->Authenticator app Copy the key
 
ykman oath accounts add  <SERVICE_NAME> <YOUR_BASE32_KEY>
 
To get code:
 
ykman oath code github.com

Latest revision as of 09:51, 29 November 2021

 

Links

Notes

Starting with Chrome version 39, you will be able to use the YubiKey NEO or YubiKey NEO-n in U2F+HID mode. HOW??

https://github.com/liyanchang/yubikey-setup


HOWTO

Registering yubikey cloud

Yubico API key signup

Prompts for "YubiKey OTP" THEN WHAT??? Looks like you're supposed to just tap the key

what did i need this for? at least went through upload

 

 

https://devcentral.f5.com/s/articles/two-factor-authentication-using-yubikey-yubicloud-and-apm nigrore this one?

 

https://duo.com/docs/yubikeyalzz.com/doc/25870289/yubikey-for-yubicloud-configuration-guide

 

 

Using key with linux

https://support.yubico.com/hc/en-us/articles/360013708900-Using-Your-U2F-YubiKey-with-Linux

wget -O /etc/udev/rules.d/70-u2f.rules https://raw.githubusercontent.com/Yubico/libu2f-host/master/70-u2f.rules
apt install libyubikey-udev
udevadm trigger

Test your Yubikey OTP

https://demo.yubico.com/otp/verify

FAQ

What kind of OTP does Yubikey use?

Single use ordered

 

OTP verify url

https://demo.yubico.com/otp/verify

Failled connecting to the Yubikey. Make sure the application has the required permissions

yubikey-manager-qt -> OTP install libyubikey-udev or

https://support.yubico.com/hc/en-us/articles/360016648939-Troubleshooting-Failed-connecting-to-the-YubiKey-Make-sure-the-application-has-the-required-permissions-in-YubiKey-Manager

 

Yubico API key signup: Invalid OTP

got through the upload thing first? The upload url from doc is bad! remove comma!

 

 

Using yubikey with github

https://hackernoon.com/use-a-yubikey-as-a-mfa-device-to-replace-google-authenticator-b4f4c0215f2

Run

Github settings->authentication->Account security->Enable two factor authentication->Authenticator app Copy the key

ykman oath accounts add  <SERVICE_NAME> <YOUR_BASE32_KEY>

To get code:

ykman oath code github.com