I primarily use Yubico YubiKey ( /products/yubico-yubikey-reviews ) for authentication in environments such as Active Directory, cloud administration, trading room, and dealing room where phones are not allowed.
Staff of the founders office/IM consultant at a tech services company with 11-50 employees
Real User
May 26, 2023
We use YubiKey to authenticate online services with email, web, and Twitter. We deploy it for some sensitive administrative accounts to improve security.
Senior Staff Technical Program Manager at a manufacturing company with 10,001+ employees
Real User
May 23, 2023
Basically, it works hand in hand with PingID, so PingID will prompt the user for the same use cases, including VPN, bulk application, and desktop or laptop. It'll prompt them to give the user a choice of whether they can do a swipe up on their phone, or they can plug in their YubiKey, and there's a little circle on the top. They touch it, and that releases the cryptographic key on the key itself and sends it back to the PingID back in service, indicating this is the key that you registered with previously. So that's how Yubico works. It lights up, and they touch it, and it releases the key cryptographic key that's on it.
There are some secure projects that my team and I work on that have files that everybody needs to use and we put them into a Yubico YubiKey secured file directory. We secure each file from there.
Authentication Systems ensure secure access by verifying user credentials, crucial for safeguarding sensitive data across digital platforms. They are fundamental in preventing unauthorized network access. Authentication Systems play a crucial role in enhancing security by implementing various verification methods that thwart unauthorized access attempts. Using multi-factor authentication, these systems validate user identity through components like passwords, biometrics, or hardware tokens,...
I primarily use Yubico YubiKey ( /products/yubico-yubikey-reviews ) for authentication in environments such as Active Directory, cloud administration, trading room, and dealing room where phones are not allowed.
We use YubiKey to authenticate online services with email, web, and Twitter. We deploy it for some sensitive administrative accounts to improve security.
Basically, it works hand in hand with PingID, so PingID will prompt the user for the same use cases, including VPN, bulk application, and desktop or laptop. It'll prompt them to give the user a choice of whether they can do a swipe up on their phone, or they can plug in their YubiKey, and there's a little circle on the top. They touch it, and that releases the cryptographic key on the key itself and sends it back to the PingID back in service, indicating this is the key that you registered with previously. So that's how Yubico works. It lights up, and they touch it, and it releases the key cryptographic key that's on it.
There are some secure projects that my team and I work on that have files that everybody needs to use and we put them into a Yubico YubiKey secured file directory. We secure each file from there.