Skip to content

How To Blog

how to

  • How to Add Custom Watch Faces on Amazfit Bip How-To
  • 9 Must Have Plugins For New WordPress Installs Wordpress
  • How to Find Your Raspberry Pi’s IP Address? Networking
  • How To Add A Business To Google Maps And Apple Maps Computer Tips
  • Basic One-Column and Multi-Column Data Sorting in Excel Spreadsheets Office Tips
  • How to Boost your Laptop Speed in 5 Simple Steps How-To
  • The 4 Best Wearable Translators Product Reviews
  • 4 Ways to Share WiFi Without Giving Away Your Password How-To

How To Set Up a YubiKey As a Two-Step Authentication Method

Posted on October 8, 2020 By blog_786 No Comments on How To Set Up a YubiKey As a Two-Step Authentication Method

A process called two-step verification is absolutely necessary to protect your online accounts. But because of laziness or apathy, few people worry. Most likely, they think that “no one will ever hack my account.” But this is a risk that should never be taken.

If you want a secure and easy way to use 2-Step Verification, consider purchasing a YubiKey.

How To Set Up a YubiKey As a Two-Step Authentication Method

What is 2-step authentication?

Usually when you log into an online account, you need a password. Get the correct password and you’re signed in. But with 2-Step Verification, you need a second code to sign in successfully, which is entered after you successfully enter the first password.

Think of it as unlocking and walking through the front door of a house only to find the second door you need to open. It’s just extra security.

One of the most secure two-step verification methods is Google Authenticator, which puts codes on your phone. The open source alternative is Authy. Other websites send codes to your phone in a text message, which is very dangerous if your phone is cloned. The same is true for codes sent by email, which should be avoided at all costs.

How To Set Up a YubiKey As a Two-Step Authentication Method

Therefore, the YubiKey, which looks like a USB stick, is the best option. As long as you keep the key in a safe place, no one can pick it up remotely, unlike a text message from your phone.

– / –

Some facts about YubiKey

If you think this is a niche product that very few people use, think again. Yubikeys have been endorsed and used by some active gamers including Google, Facebook, Dropbox and the UK government, just to name a few.

The 3G YubiKey also touts itself as “nearly indestructible.” To quote a company:

“The standard size YubiKey is made of injection-molded plastic that covers the circuitry, and the exposed parts are military-grade hardened gold. Waterproof and shockproof, the standard-sized YubiKey attaches to your keychain along with your home and car keys. ”

Plus they are cheap. You can get it on Amazon for $ 27. Google is also known for giving them away for free at conferences.

How it works?

As I said, it looks like a USB stick. You must register the key with online accounts that support this technology using the account’s 2-Step Verification settings.

Then, when you log in, insert the dongle into the USB port. The gold button with the key logo will light up blue. Touch that golden button with your finger and that touch will trigger an electrical charge that enters a one-time code that enters you into your account.

How do you set it up?

Here’s how to set it up for your Gmail account. This will show how convenient this concept is in general.

First, go to your Google account page, under security and 2-Step Verification.

How To Set Up a YubiKey As a Two-Step Authentication Method

Once logged in, to verify your identity, scroll down to the various authentication methods available. One of them is “Electronic Key”. Click “Add dongle”.

How To Set Up a YubiKey As a Two-Step Authentication Method

Then it will ask you to insert the key into the USB port and press the golden button.

How To Set Up a YubiKey As a Two-Step Authentication Method

As soon as you press the golden button, it will inform you that the key has been registered for your account and will prompt you to name it. There is no need to complicate this part.

How To Set Up a YubiKey As a Two-Step Authentication Method

After you click “Finish”, the security key will be displayed as an authentication method.

How To Set Up a YubiKey As a Two-Step Authentication Method

That’s all. The setup is complete. I told you it was easy.

Its advantages

If you are not already using the YubiKey, let’s look at three benefits of using it.

It’s very easy to use

It is completely impossible to screw up your YubiKey usage. Once you’ve set it up for each online account, just insert the dongle into the USB port and press the illuminated button once. This is it. You have to be a complete idiot to screw it up!

Additional account security without the hassle

Two-Step Verification is great, but it can be annoying. When I talk to someone who doesn’t have one, my usual excuse is, “It’s too troublesome.”

While the benefits of 2-Step Verification far outweigh the lack of it, I still get it. Two-Step Verification involves signing in, then getting a code and entering it. Doing it once is not a problem, but when you do it regularly it becomes tiresome.

YubiKey removes this annoyance and forces you to use additional protection. One touch and you are in business.

Unable to get a virus

One of the things I’ve noticed the most while reading about YubiKeys is people saying “will they get infected through a public internet terminal?” No thanks! “.

Although you should not use public Internet connections for security reasons, YubiKeys cannot get viruses as it cannot move any files to it. This is how it differs from a conventional USB device. In addition, all information about the key is write protected.

Its shortcomings

Are there any disadvantages to using the YubiKey? Well, yes, there is. Whether or not they violate the terms of the deal will depend on your individual situation.

This does not work on smartphones and tablets

For a person who uses mobile devices and tablets a lot, this is a huge disadvantage. My iDevices are great, but I have one weakness – no USB port. So where is YubiKey?

The short answer is it won’t go anywhere since YubiKey doesn’t work with smartphones and tablets. When you log into your account, it detects that you are not on a regular computer and reverts to your fallback authentication option. This is why you should always have at least one additional authentication process on your account.

YubiKey also doesn’t work with on-premises email clients like Outlook and Apple Mail.

Only works in Chrome

Don’t ask me to explain it, I don’t understand it. But at the time of this writing, YubiKey only works in Google Chrome. So out of luck users of other browsers.

If someone gets your account key and password, it’s game over

The point is, regular 2-Step Verification is that any attacker would need physical access to your phone in order to receive an SMS or Google Authenticator code. Prevent phone cloning, having a passcode on your phone stops an unauthorized third party from accessing your two-step authentication codes.

But if someone gets hold of your YubiKey and also knows your account password, then that’s it. They won’t have a smartphone password to bypass to access your SMS codes or the Google Authenticator app.

The best solution is to use a very long account password that is difficult to guess (and store it in a password manager). And keep your YubiKey in a very safe place like a keychain in your pocket.

–

How-To Tags:How it works

Post navigation

Previous Post: How To Create a Windows 10 Installation USB Stick
Next Post: How To Make & Run An ISO File On Windows

Related Posts

  • Change the Location of User Folders in Windows How-To
  • How I Removed Malware From my WordPress Site How-To
  • How to Fix “BOOTMGR is Missing” in Windows 10 How-To
  • How to add delete and change password for user in ubuntu 12.04
  • How to Set Parental Controls on Popular Video Streaming Sites How-To
  • How to Use USB Flash Drive on Android and iOS How-To

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

  • Amazon Web Services
  • Apple Watch
  • Computer Tips
  • Cool Websites
  • Free Software Downloads
  • Gadgets
  • Gaming
  • General Software
  • Google Software/Tips
  • Hardware
  • Help Desk
  • How-To
  • iOS
  • iPad
  • iPhone
  • Linux
  • Linux Tips
  • macOS
  • MS Office Tips
  • Networking
  • Office Tips
  • Product Reviews
  • Reviews
  • Safari
  • Smart Home
  • Smartphones
  • Software Reviews
  • technology
  • text
  • Troubleshooting
  • Tutorials
  • Uncategorized
  • Urdu Books PDF
  • Web Site Tips
  • Windows
  • Windows 10
  • Windows 7
  • February 2023
  • January 2023
  • December 2022
  • November 2022
  • September 2022
  • August 2022
  • July 2022
  • June 2022
  • May 2022
  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
  • July 2021
  • April 2021
  • March 2021
  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • July 2020
  • June 2020
  • May 2020
  • April 2020
  • March 2020
  • December 2019
  • July 2019
  • May 2019
  • April 2019
  • January 2019
  • December 2018
  • November 2018
  • October 2018

2021 Android ) Apple apps Best black browser change Chrome Closing words Concluding remarks Conclusion Delete Download Error Facebook file Files Find Free) From games Google Mac make Music Netflix ( online Open Packaging Password phone? Screen sites Tips using Video Videos Watch Websites What With Working? your YouTube

  • 3 Wireless Earbud Alternatives to Apple’s AirPods Hardware
  • How to open a folder from terminal mac Tutorials
  • How to Sign Up for iOS or Android Beta Software Smartphones
  • How to Fix 504 Gateway Timeout error? Help Desk
  • How to Burn an ISO File using Mac OS X Mac OS X
  • Best graphing calculator ti 84 2020

    Best graphing calculator ti 84 2020

  • How to Sync Two Folders in Real Time in Windows Free Software Downloads
  • Use Google Location Sharing to Keep Track of Loved Ones Google Software/Tips

Copyright © 2023 How To Blog.

Powered by PressBook News WordPress theme

Manage Cookie Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
View preferences
{title} {title} {title}
Go to mobile version