

Even multi-factor authentication solutions like one-time passwords (OTP), temporary passwords sent via text message (SMS), and/or mobile push (notifications that look like text messages and alerts) are vulnerable to phishing attacks. The number one method for stealing credentials is through phishing attacks. Authenticating with username and password alone is no longer sufficient. Stolen passwords account for 81% of security breaches. YubiKey 5 Series: Key Benefits Strong Authentication that Protects Against Phishing and Eliminates Account Takeovers For a full list of those services, see Works with YubiKey. Note that for individual consumers, the YubiKey only works with services that support one of the many protocols provided by the YubiKey. As the principal inventor of the U2F and FIDO2 authentication standards, Yubico is a recognized, award-winning leader in IT security. It is easy to use, radically reduces IT costs, defends against phishing attacks, and eliminates account takeovers. The YubiKey strengthens security by replacing passwords with strong hardware-based authentication, including multiple protocols and public key cryptography. The YubiKey 5 Series security keys offer strong authentication with support for multiple protocols, including FIDO2, which is the new standard that enables the replacement of password-based authentication. Enter the serial number for the Yubikey device.In addition to describing the new features in the YubiKey 5 Series, this quick start guide points to the documentation on how to get started using YubiKeys in the 5 Series.Use the “Tokens” drop-down menu to select “Yubikey”.Once you reach the multi-factor page, locate the “Tokens” section.Visit VIP claim page and fill out the required fields). (If your security question has not been configured,

Section, then select “Manage Multifactor Authentication”.

Under the “Faculty/Staff” tab, click “View my IDs and manage my passwords”.To begin self-registering Yubikey devices follow these instructions: Or another system will need to reassociate those accounts following this process. Users who have already programmed their Yubikey device for use with Google Authentication This change expedites the registration processįor users and system administrators across the state. Users who utilize Duo Multifactor to authenticate into university IT systems can now self-register YubiKey devices in my.sc.edu without the need for a service ticket. Information Security Advisory Committee.Alignment with State Information Security and Privacy Standards.

