Thanks for pointing it out: learning 😊It is not a USB key. It is a secure enclave with a USB interface. Very different things.
When you touch it to use it , is it because it reads your fingerprint?
Last edited:
Thanks for pointing it out: learning 😊It is not a USB key. It is a secure enclave with a USB interface. Very different things.
Thanks for pointing it out: learning 😊
When you touch it to use it , is it because it reads your fingerprint?
I am using a family plan, but that does make sense. I did briefly think yesterday that if a Yubikey stopped me from having to enter my password I might forget it... hah!The reason why 1Password requires you to re-enter the password from time to time is to prevent you from forgetting your password, which is the secret that is used to encrypt all passwords. Unless you are using a family plan, there is no way to recover your password if you forget it.
This is why it has to be done this way.
Undoubtedly, but if the providers of my password manager didn’t think it was safe to also use it for 2FA, then why’d they add the feature?Doesn't using 1Password for 2FA wipe out the benefits of 2FA. You have gone from someone needing to steal two things, your password and yubikey to needing just one, your 1Password password.
I have two factor enabled for lastpass so they cannot get access just by knowing my lastpass login details. I dont use lastpass 2FA tool either so all my eggs are not in one basket.I am using a family plan, but that does make sense. I did briefly think yesterday that if a Yubikey stopped me from having to enter my password I might forget it... hah!
Undoubtedly, but if the providers of my password manager didn’t think it was safe to also use it for 2FA, then why’d they add the feature?
For now, I’m glad I actually invested in it and went through every single password.
I am using a family plan, but that does make sense. I did briefly think yesterday that if a Yubikey stopped me from having to enter my password I might forget it... hah!
Beyond 2FA, the interesting application of this will be "Passwordless". I'm not gonna convince mom and dad to use anything other than "petname123". Plenty of office knuckleheads will continue leaving their passwords on sticky notes. It's much easier to give them a physical object than to get them to use a password manager and regularly update passwords.
If you could get Authkey + Face ID/Fingerprint, then passwordless security is a no-brainer.
And people used to sticky note their current system generated passwords on the back of their SecureID tokens and leave them on their desks
It is possible through iCloud now. My mother is a ‘child’ so I can manage things if need be. I then also set up 1Password and explained how that works. Things are pretty good, for now.I could not make her a 'child' account of mine as at the time they didn't exist (do they now?).
Nice story!That was the funny thing about 2FA. I worked at a 'big ten' uni, and the department I worked in as a programmer, dealt with student records and financial type stuff. They had SecureID thick credit card token badge things for e to the moment I got home and took the shirt off. I was a good minion)
What happens if you lose it, break it, or malfunctions?
Can't you just transform any USB into a 2-factor authentication key?
It is possible through iCloud now. My mother is a ‘child’ so I can manage things if need be. I then also set up 1Password and explained how that works. Things are pretty good, for now.
Nice story!
Still not compatible with USB C iPad Pros though which stops me from getting one.
You need a backup. In most applications where you can configure a security key, you will be able to set up "multiple factors". So in addition to a security key, you can set up something like Google Authenticator as another factor. When you log in, the apps prompt you to "insert security key", but will have another button for "try another way" that lets you use your other factors.
YubiKey also suggests just having 2 security keys, one you keep somewhere safe, as a backup. It's not truly a backup, as the second key had different security keys on it, and for every app you setup, you need to provision BOTH you primary and backup keys.
These keys (YubiKey, Google's version) implement a "Secure Enclave" using hardware. What that means is, the chip inside the key will generate a public/private key pair, and the private key is stored in hardware in such a way that it physically cannot be accessed. The private key can never leave the device.
When an application needs to check authentication, it sends some data to the key to be signed. The chip on the key won't sign the data with the private key unless you physically touch the device (to provide "proof" that you have physical access to the key). The result is returned to the application, verified with your public key, and voila, you're in.
Also, the device actually has multiple keys on it, and they can be rotated. So different authentication schemes can use different keys.
I've got one, but usually just default to using 2FA via One-Time-Password, as I often have left my keys somewhere no near my machine, or don't want to fiddle with plugging the key in every time I need to authenticate somewhere.
[automerge]1599735450[/automerge]
[automerge]1599735481[/automerge]
You need a backup. In most applications where you can configure a security key, you will be able to set up "multiple factors". So in addition to a security key, you can set up something like Google Authenticator as another factor. When you log in, the apps prompt you to "insert security key", but will have another button for "try another way" that lets you use your other factors.
YubiKey also suggests just having 2 security keys, one you keep somewhere safe, as a backup. It's not truly a backup, as the second key had different security keys on it, and for every app you setup, you need to provision BOTH you primary and backup keys.
These keys (YubiKey, Google's version) implement a "Secure Enclave" using hardware. What that means is, the chip inside the key will generate a public/private key pair, and the private key is stored in hardware in such a way that it physically cannot be accessed. The private key can never leave the device.
When an application needs to check authentication, it sends some data to the key to be signed. The chip on the key won't sign the data with the private key unless you physically touch the device (to provide "proof" that you have physical access to the key). The result is returned to the application, verified with your public key, and voila, you're in.
Also, the device actually has multiple keys on it, and they can be rotated. So different authentication schemes can use different keys.
I've got one, but usually just default to using 2FA via One-Time-Password, as I often have left my keys somewhere no near my machine, or don't want to fiddle with plugging the key in every time I need to authenticate somewhere.
The chip on the key won't sign the data with the private key unless you physically touch the device (to provide "proof" that you have physical access to the key).