Last updated: June 27, 2025 at 02:10 PM
Summary
Yubico Prodcuts
- Yubikey Security Keys
- Can store strong passwords and communicate with cloud services to authenticate users securely.
- Should have at least two keys for redundancy in case of loss.
- Consider the Yubikey 5C NFC for use with a variety of protocols and potential ease of use.
- Yubikey 5C NFC
- Supports a variety of protocols and might be a good option for a student wanting to learn about security.
- Can be used as a 2nd factor or backup in security protocols.
- Yubikey 5
- Offers various functions like FIDO/FIDO2, PIV, and OpenGPG for advanced users.
- YubiKey Bio
- Has a fingerprint reader for additional security, but may not be necessary.
- Yubikey Security Key NFC
- Recommended for basic security needs and supported by several websites like BoA and Wells Fargo.
- Passkeys
- Secure alternatives for some 2FA methods.
- Yubikey 5Ci
- Could be redundant if you already have NFC support.
- YubiKey series
- Should consider a 2-pack for backup in case of loss or damage.
- FIDO2
- Protected by a PIN or biometrics for added security.
Yubico App and Software
- Yubico Authenticator
- Needed on Mac for managing settings and credentials, especially TOTP codes.
- Allows for configuring Yubikey slots and requires Input Monitoring for setup.
- Permission Usage
- Input Monitoring is required for managing pins and configurations on macOS.
- Monitor keystrokes when needed by specific Yubikey applications like the Yubico Authenticator.
- App Permissions
- The app may be used to manage Yubikey settings and credentials.
- Yubico Authenticator needs Input Monitoring permission on macOS for slot configuration.
- Yubikey Authenticator doesn't need wide permissions on mobile devices.
General Security
- Security Concerns
- Yubikeys are secure, but concerns may arise about installing monitoring software like Input Monitoring.
- Verify the source code and trust the Yubikey's privacy protocol.
- IT Compliance
- When using Yubikeys for work, cooperate with IT departments for security measures.
- Review the source code or communicate privacy concerns with the IT team.
This summary encompasses a broad range of Yubico products, their features, necessary permissions, and considerations for enhancing digital security.