YubiKey icon
YubiKey icon

YubiKey

The multi-protocol security key offers the highest assurance, protecting devices with passwordless workflows and strong 2FA against phishing. It plugs into computers, tablets, and mobile devices, integrates PIN or biometric for identity verification, and reduces helpdesk costs.

YubiKey screenshot 1

Cost / License

  • Pay once
  • Proprietary

Application type

Platforms

  • Mac
  • Windows
  • Linux
  • Google Chrome
-
No reviews
34likes
1comment

Features

Suggest and vote on features
  1.  FIDO U2F (2FA) support
  2.  Multiple Account support
  3.  Portable
  4.  Biometric Authentication
  5.  Works Offline
  6.  Two-factor Authentication

 Tags

YubiKey News & Activities

Highlights All activities

Recent News

Show more news

Recent activities

Show all activities

YubiKey information

  • Developed by

    SE flagYubico
  • Licensing

    Proprietary and Commercial product.
  • Pricing

    One time purchase (perpetual license) ranging between $50 and $75.
  • Alternatives

    26 alternatives listed
  • Supported Languages

    • English

Our users have written 1 comments and reviews about YubiKey, and it has gotten 34 likes

YubiKey was added to AlternativeTo by Sharif on and this page was last updated .

Comments and Reviews

   
 Post comment/review
Top Positive Comment
John Fastman
5

Yubikeys are small (or even very small) USB devices purchased from Yubico. Their primary purpose is to increase your online security when configured with supporting online accounts (including Gmail, LastPass and Fastmail, to name a few).

On logging into an account, you enter your password. Then, if your Yubikey has been configured, you are asked for your Yubikey code. You simply plug your Yubikey into a USB port and press it. This generates a one-time password, which is sent to a server for verification, and which cannot be reused. If you have the correct Yubikey, you are logged into your account.

Yubikeys are therefore a type of second-factor authentication (2FA) based on the principle that you should be asked for something you know (a password) as well as something you have (in this case your Yubikey) to authenticate you.

I have used Yubikeys with various online services for 2 years. They are convenient, nearly indestructible and come with several advantages over other 2FA methods. The first is that you can configure multiple Yubikeys with multiple accounts, even with people you trust. So if you lose your Yubikey, a friend can help you with theirs. (Your friend can't log in instead of you though, because they don't know your password.) Secondly, they are anonymous in the sense that Yubikeys hold no information about you, and neither does the manufacturer Yubico. They are also a good alternative to using 2FA apps on mobile phones (e.g. Google Authenticator or Authy). They are very, very tough and much cheaper to replace than a phone.

Featured in Lists

Privacy-enhancing software I trust / recommend. Browsers and their extensions, email providers, VPN services, …

List by John Fastman with 34 apps, updated

The ultimate list of apps/services for better Security, Privacy & Anonymity; Defense against Surveillance. What …

List by Sooraj Sathyanarayanan with 203 apps, updated

Best software and/or services privacy related that you can get. Some choices are really close, some others are based …

List by donateto_opensource with 73 apps, updated

What is YubiKey?

The multi-protocol, highest assurance security key that enables passwordless.

Strongest 2FA

A physical security key, that can be added to a keychain and plugged into a computer, tablet or mobile device, adds an extra layer of protection on top of passwords to offer the strongest second factor authentication protection against phishing attacks.

Strongest MFA

Users can combine the hardware authenticator with a PIN or biometric to meet high assurance identity verification requirements before engaging in sensitive transactions.

Passwordless

Eliminate passwords altogether and move to a more secure and efficient account login experience with passwordless workflows, using the authenticator and PIN or biometric. Reduce calls to the helpdesk and therefore costs and downtime.