Yubikey: Difference between revisions

From DWIKI
mNo edit summary
mNo edit summary
 
(3 intermediate revisions by the same user not shown)
Line 1: Line 1:


 
 


= Links =
= Links =


*[https://github.com/drduh/YubiKey-Guide YubiKey Guide]
*[https://github.com/drduh/YubiKey-Guide YubiKey Guide]  
*[https://www.yubico.com/products/services-software/download/ Download the tool]  
*[https://www.yubico.com/products/services-software/download/ Download the tool]  
*[https://developers.yubico.com/OTP/Guides/Self-hosted_OTP_validation.html Setup of a self-hosted Yubico OTP validation server]  
*[https://developers.yubico.com/OTP/Guides/Self-hosted_OTP_validation.html Setup of a self-hosted Yubico OTP validation server]  
Line 15: Line 15:
*[https://gist.github.com/ageis/14adc308087859e199912b4c79c4aaa4 https://gist.github.com/ageis/14adc308087859e199912b4c79c4aaa4] YubiKey 4 series GPG and SSH setup guide]  
*[https://gist.github.com/ageis/14adc308087859e199912b4c79c4aaa4 https://gist.github.com/ageis/14adc308087859e199912b4c79c4aaa4] YubiKey 4 series GPG and SSH setup guide]  


&nbs
=Notes=


Starting with Chrome version 39, you will be able to use the YubiKey NEO or YubiKey NEO-n in U2F+HID mode. HOW??
Starting with Chrome version 39, you will be able to use the YubiKey NEO or YubiKey NEO-n in U2F+HID mode. HOW??
Line 21: Line 21:
[https://github.com/liyanchang/yubikey-setup https://github.com/liyanchang/yubikey-setup]
[https://github.com/liyanchang/yubikey-setup https://github.com/liyanchang/yubikey-setup]


 
 
 
= HOWTO =


== Registering yubikey cloud ==
== Registering yubikey cloud ==
Line 44: Line 46:


 
 
== Using key with linux ==
[https://support.yubico.com/hc/en-us/articles/360013708900-Using-Your-U2F-YubiKey-with-Linux https://support.yubico.com/hc/en-us/articles/360013708900-Using-Your-U2F-YubiKey-with-Linux]
wget -O /etc/udev/rules.d/70-u2f.rules [https://raw.githubusercontent.com/Yubico/libu2f-host/master/70-u2f.rules https://raw.githubusercontent.com/Yubico/libu2f-host/master/70-u2f.rules]
apt install libyubikey-udev
udevadm trigger
== Test your Yubikey OTP ==
https://demo.yubico.com/otp/verify


= FAQ =
= FAQ =


== What kind of OTP does Yubikey use?==
== What kind of OTP does Yubikey use? ==
 
Single use ordered
Single use ordered


 


== OTP verify url ==


== OTP verify url ==
[https://demo.yubico.com/otp/verify https://demo.yubico.com/otp/verify]
https://demo.yubico.com/otp/verify


== Failled connecting to the Yubikey. Make sure the application has the required permissions ==
== Failled connecting to the Yubikey. Make sure the application has the required permissions ==
Line 65: Line 80:
== Yubico API key signup: Invalid OTP ==
== Yubico API key signup: Invalid OTP ==


got through the upload thing first?
got through the upload thing first? The upload url from doc is bad! remove comma!
The upload url from doc is bad! remove comma!
 


 


 
 

Latest revision as of 10:51, 29 November 2021

 

Links

Notes

Starting with Chrome version 39, you will be able to use the YubiKey NEO or YubiKey NEO-n in U2F+HID mode. HOW??

https://github.com/liyanchang/yubikey-setup


HOWTO

Registering yubikey cloud

Yubico API key signup

Prompts for "YubiKey OTP" THEN WHAT??? Looks like you're supposed to just tap the key

what did i need this for? at least went through upload

 

 

https://devcentral.f5.com/s/articles/two-factor-authentication-using-yubikey-yubicloud-and-apm nigrore this one?

 

https://duo.com/docs/yubikeyalzz.com/doc/25870289/yubikey-for-yubicloud-configuration-guide

 

 

Using key with linux

https://support.yubico.com/hc/en-us/articles/360013708900-Using-Your-U2F-YubiKey-with-Linux

wget -O /etc/udev/rules.d/70-u2f.rules https://raw.githubusercontent.com/Yubico/libu2f-host/master/70-u2f.rules
apt install libyubikey-udev
udevadm trigger

Test your Yubikey OTP

https://demo.yubico.com/otp/verify

FAQ

What kind of OTP does Yubikey use?

Single use ordered

 

OTP verify url

https://demo.yubico.com/otp/verify

Failled connecting to the Yubikey. Make sure the application has the required permissions

yubikey-manager-qt -> OTP install libyubikey-udev or

https://support.yubico.com/hc/en-us/articles/360016648939-Troubleshooting-Failed-connecting-to-the-YubiKey-Make-sure-the-application-has-the-required-permissions-in-YubiKey-Manager

 

Yubico API key signup: Invalid OTP

got through the upload thing first? The upload url from doc is bad! remove comma!

 

 

Using yubikey with github

https://hackernoon.com/use-a-yubikey-as-a-mfa-device-to-replace-google-authenticator-b4f4c0215f2

Run

Github settings->authentication->Account security->Enable two factor authentication->Authenticator app Copy the key

ykman oath accounts add  <SERVICE_NAME> <YOUR_BASE32_KEY>

To get code:

ykman oath code github.com