Yubico authenticator
Author: n | 2025-04-24
With the Yubico Authenticator you can raise the bar for security. The Yubico Authenticator will work with any USB or NFC-enabled YubiKeys. The Yubico Authenticator
GitHub - Yubico/yubioath-flutter: Yubico Authenticator for
- Better YubiKey Bio - Multi-protocol Edition support.- Improved support for YubiKey 5.7 FIPS: show FIPS status, disable locked features when not in FIPS approved mode, use Secure Channel when needed during NFC connections.- New: app visualizes NFC operations with an overlay.- New: added instructions for NFC restricted devices.- New: enable Enterprise Attestation from the app.- New: Accounts and Passkeys grid view to preserve screen space.- Added more user friendly error messages. Store your unique credential on a hardware-backed security key and take it wherever you go from mobile to desktop. No more storing sensitive secrets on your mobile phone, leaving your account vulnerable to takeovers. With the Yubico Authenticator you can raise the bar for security.• The Yubico Authenticator will work with any USB or NFC-enabled YubiKeysThe Yubico Authenticator securely generates a code used to verify your identity as you are logging into various services. No connectivity needed!Features include:Secure – Hardware-backed strong two-factor authentication with secret stored on the YubiKey, not on the mobile devicePortable – Get the same set of codes across our other Yubico Authenticator apps for desktops as well as for all leading mobile platformsFlexible – Support for time-based and counter-based code generationUSB or NFC usage – Insert the YubiKey into the USB port, or simply tap the YubiKey with NFC to a mobile phone that is NFC-enabled to store your credential on the YubiKeyEasy Setup – QR codes available from the services you wish to protect with strong authenticationUser Presence – Require a touch on the YubiKey sensor, or an extra NFC tap, to generate new codes for sensitive accountsCompatible – Secure all the services currently compatible with other Authenticator appsConfigurable – Ability to configure what happens when you tap a YubiKey against the NFC reader of your phone when the app isn’t runningVersatile – Support for multiple work and personal accountsExperience security the modern way with the Yubico Authenticator. Visit to learn more. Show more Show less This release comes in several variants (we currently have 2). Consult our handy FAQ to see which download is right for you.
GitHub - Yubico/yubioath-flutter: Yubico Authenticator for Desktop
The NFC icon in Yubico Authenticator and place your YubiKey on top of a desktop NFC reader. The key must maintain constant contact with the reader throughout the operation.To connect via NFC on Android, tap your YubiKey on the back of your device to scan.Click Help and about under Application. To find the Application menu in a narrow app window, click the three dots in the upper right corner.Under Troubleshooting, select the relevant log type from the Log level drop-down menu.If there is a particular operation you want to collect logs on, perform that operation. Now go back to Troubleshooting and click Copy log. This copies the log information to the clipboard. Paste the log information into a text file (or other document) and save it.To generate diagnostic data (desktop only), click Run diagnostics. When the operation has completed, it will copy the data to the clipboard automatically. Paste this data into a text file (or other document) and save it.Generating logs at the command lineTo generate logs at the command line, do the following:Open a terminal.Plug your YubiKey into your device.To connect via NFC on desktop, click the NFC icon in Yubico Authenticator and place your YubiKey on top of a desktop NFC reader. The key must maintain constant contact with the reader throughout the operation.Start the app and set your desired log level with the --log-level LEVEL argument, where LEVEL should be one of error, warning, info, debug, or traffic:macOS:open -a "Yubico Authenticator" --args --log-level LEVELWindows:\Program Files\Yubico\Yubico Authenticator\authenticator.exeYubico Authenticator 6.4.0 APK Download by Yubico - APKMirror
Yubico’s ykman is a cross-platform application for managing and configuring YubiKeys. It has a command line interface (CLI) that uses a Python 3.6 (or later) library.The YubiKey Manager is also a cross-platform application for managing and configuring a YubiKey via a graphical user interface (GUI). However, unlike ykman, the YubiKey Manager (GUI) cannot handle all the newest YubiKey firmware features. It is limited in scope. Therefore we recommend using Yubico Authenticator which supersedes the YubiKey Manager (GUI).The Yubico Authenticator, the YubiKey Manager and ykman all provide an easy way to perform the most common configuration tasks on a YubiKey, such as:Displaying the serial number and firmware version of a YubiKey. See YubiKey Firmware.Configuring a FIDO2 PINResetting the FIDO applicationsConfiguring the OTP application. A YubiKey has two slots (Short Touch and Long Touch). These tools can configure:a Yubico OTP credentiala static passworda challenge-response credential oran OATH HOTP credential in either or both of these slots.Managing certificates and PINs for the PIV applicationSwapping the credentials between two configured slotsEnabling and disabling USB and NFC interfaces.ImportantThe installer for the YubiKey Manager GUI bundles together the GUI with an older version of the ykman CLI. The ykman CLI that is bundled with the YubiKey Manager GUI is not the most recent version.To use the ykman CLI, install the latest version found at Releases. See also Installation.NoteThe Yubico site from which you download the ykman CLI - Releases - refers to the ykman CLI version as yubiKey-manager. In general, when installing, the distinction between the tools is made by calling one of them YubiKey Manager GUI and the other YubiKey Manager CLI. Also, the GUI has qt in its download URL. This guide makes the distinction by calling the CLI ykman after its command line.This guide contains the instructions for using both YubiKey Manager GUI and ykman CLI.For common GUI tasks, see Using the YubiKey Manager GUI in this guide.For CLI commands, see the balance of this guide. The commands are organized by protocol. CLIs that do not relate specifically to a particular protocol are listed in Base Commands.If you attempt to use a CLI command or GUI option and it fails, check the release notes to confirm the command is supported in the ykman version you are using.ykman [YubiKey Manager - sic] CLI Release Notes.YubiKey Manager GUI Release Notes.FIPS-Approved ModeNIST classified the YubiKey 5 Series FIPS as “composite authenticators”. As such, no device in that series can be taken out of the FIPS-approved mode after initialization without zeroizing the function. This means that once the YubiKey is correctly configured, it remains in the correct configuration. This is what renders the --check-fips command unnecessary. As long as the crypto officer ensures that the YubiKey 5. With the Yubico Authenticator you can raise the bar for security. The Yubico Authenticator will work with any USB or NFC-enabled YubiKeys. The Yubico AuthenticatorYubico Authenticator 6.2.0 APK Download by Yubico - APKMirror
Or generate PIV keys or certificatesWhen attempting to import or generate a PIV key/certificate, the operations are greyed-out in Yubico Authenticator:If you have a YubiKey 5 FIPS Series key with firmware version 5.7 or later, you will not be able to add PIV credentials to your YubiKey until the PIV application is in the FIPS approved state. Perform the operations required to achieve FIPS approved status, then try importing/generating PIV credentials again.Slots: Yubico OTPAn error occurs when trying to open the Slots screen on macOSWhen trying to open the Slots screen on macOS, the following error message is seen:If you receive this error, it likely means that input monitoring has not been enabled on your device. Toggle that setting, close and reopen the app, and try again.AndroidUnable to take screenshots of the app on AndroidWhen attempting to capture a screenshot of the Yubico Authenticator app on an Android device, only a blank screen is saved.By default, screenshots are disabled on Yubico Authenticator for Android. To enable screenshots, do the following:Click the menu icon in the upper left corner of the app and select Home.Click Help and about under Application. To find the Application menu in a narrow app window, click the three dots in the upper right corner.Under Troubleshooting, click Allow screenshots.NFC wireless connectionsNFC activation requiredWhen attempting to use a brand new YubiKey with Yubico Authenticator over NFC, a message appears in the app that says NFC activation is required:This message indicates that the key has the Restricted NFC featureYubico Authenticator 7.0.0 APK Download by Yubico - APKMirror
– HOTP (Event), OATH – TOTP (Time), OpenPGP, Secure Static Passwords. Works with Facebook, Twitter, Google Account, Microsoft account, Salesforce.com, Dropbox, Keeper®, 1Password, Bitwarden Premium, AWS Identity and Access Management (IAM), Duo Security, Forgerock, Idaptive, Microsoft Azure AD, Okta, OneLogin, Ping Identity. Yubico authenticator app Compatible with the Yubico Authenticator App. The safest authenticator app experience across mobile and desktop. Search See if your service is supported POPULAR SERVICES Search results (displaying 12 of 12) Protecting vulnerable populations one security key at a time. Yubico matches up to 5% of the number of YubiKeys purchased on Yubico.com, donating them to non-profit organizations, election campaigns, journalists and humanitarian workers around the world. The YubiKey offers seamless, passwordless authentication and enhances the staff experience Folks that aren’t really computer savvy are able to register so quickly, so painlessly, and then begin using their YubiKey so effortlessly and instantaneously – that’s an easy win for us. Art Chernobrov - Hyatt PC Magazine Editor’s Choice award and a 5.0 Exemplary rating Although there are many ways to do MFA, security keys are a highly secure and convenient option. Login codes sent via text message can be intercepted, and authentication apps require that your phone be charged and available. PCMag - PCMAG.COM Protecting the digital you New and constantly evolving threats to our digital lives demand better security solutions. A YubiKey isn’t just for companies; it’s a critical security tool that every individual should be using for their online accounts. Josh Summers - Creator atYubico Authenticator 7.0.1 APK Download by Yubico - APKMirror
Yubico Authenticator User Guide Running into problems with Yubico Authenticator? Check the guidance in this chapter for information on solving common issues and how to get additional support.Accounts: OATHOATH account renaming and/or deletion doesn’t work over NFC on iOS/iPadOSWhen attempting to edit an OATH account name or delete an OATH account on iOS/iPadOS over an NFC connection, the name changes don’t save or the account isn’t successfully deleted despite following the correct steps. The app never prompts you to scan your key to complete the operation.To solve this issue, close the app, reopen it, and try the operation again.OTP authentication fails due to incorrect TOTP codesIf an OATH account’s TOTP codes are getting rejected as invalid during an authentication attempt and they have not expired at the time of submission, the clock on your device may be out of sync with the relying party (your account/service provider).Reset the clock by following the instructions for your operating system or device. For example, Dell laptop users can reset the Real-Time Clock (RTC) by following the Dell knowledge base article instructions.Cannot add OATH accountWhen attempting to add an OATH account to your YubiKey, the operation is greyed-out in Yubico Authenticator:If you have a YubiKey 5 FIPS Series key with firmware version 5.7 or later, you will not be able to add OATH accounts to your YubiKey until the OATH application is in the FIPS approved state. Perform the operations required to achieve FIPS approved status, then try adding an account again.Certificates: PIVCannot import. With the Yubico Authenticator you can raise the bar for security. The Yubico Authenticator will work with any USB or NFC-enabled YubiKeys. The Yubico AuthenticatorComments
- Better YubiKey Bio - Multi-protocol Edition support.- Improved support for YubiKey 5.7 FIPS: show FIPS status, disable locked features when not in FIPS approved mode, use Secure Channel when needed during NFC connections.- New: app visualizes NFC operations with an overlay.- New: added instructions for NFC restricted devices.- New: enable Enterprise Attestation from the app.- New: Accounts and Passkeys grid view to preserve screen space.- Added more user friendly error messages. Store your unique credential on a hardware-backed security key and take it wherever you go from mobile to desktop. No more storing sensitive secrets on your mobile phone, leaving your account vulnerable to takeovers. With the Yubico Authenticator you can raise the bar for security.• The Yubico Authenticator will work with any USB or NFC-enabled YubiKeysThe Yubico Authenticator securely generates a code used to verify your identity as you are logging into various services. No connectivity needed!Features include:Secure – Hardware-backed strong two-factor authentication with secret stored on the YubiKey, not on the mobile devicePortable – Get the same set of codes across our other Yubico Authenticator apps for desktops as well as for all leading mobile platformsFlexible – Support for time-based and counter-based code generationUSB or NFC usage – Insert the YubiKey into the USB port, or simply tap the YubiKey with NFC to a mobile phone that is NFC-enabled to store your credential on the YubiKeyEasy Setup – QR codes available from the services you wish to protect with strong authenticationUser Presence – Require a touch on the YubiKey sensor, or an extra NFC tap, to generate new codes for sensitive accountsCompatible – Secure all the services currently compatible with other Authenticator appsConfigurable – Ability to configure what happens when you tap a YubiKey against the NFC reader of your phone when the app isn’t runningVersatile – Support for multiple work and personal accountsExperience security the modern way with the Yubico Authenticator. Visit to learn more. Show more Show less This release comes in several variants (we currently have 2). Consult our handy FAQ to see which download is right for you.
2025-04-01The NFC icon in Yubico Authenticator and place your YubiKey on top of a desktop NFC reader. The key must maintain constant contact with the reader throughout the operation.To connect via NFC on Android, tap your YubiKey on the back of your device to scan.Click Help and about under Application. To find the Application menu in a narrow app window, click the three dots in the upper right corner.Under Troubleshooting, select the relevant log type from the Log level drop-down menu.If there is a particular operation you want to collect logs on, perform that operation. Now go back to Troubleshooting and click Copy log. This copies the log information to the clipboard. Paste the log information into a text file (or other document) and save it.To generate diagnostic data (desktop only), click Run diagnostics. When the operation has completed, it will copy the data to the clipboard automatically. Paste this data into a text file (or other document) and save it.Generating logs at the command lineTo generate logs at the command line, do the following:Open a terminal.Plug your YubiKey into your device.To connect via NFC on desktop, click the NFC icon in Yubico Authenticator and place your YubiKey on top of a desktop NFC reader. The key must maintain constant contact with the reader throughout the operation.Start the app and set your desired log level with the --log-level LEVEL argument, where LEVEL should be one of error, warning, info, debug, or traffic:macOS:open -a "Yubico Authenticator" --args --log-level LEVELWindows:\Program Files\Yubico\Yubico Authenticator\authenticator.exe
2025-04-02Or generate PIV keys or certificatesWhen attempting to import or generate a PIV key/certificate, the operations are greyed-out in Yubico Authenticator:If you have a YubiKey 5 FIPS Series key with firmware version 5.7 or later, you will not be able to add PIV credentials to your YubiKey until the PIV application is in the FIPS approved state. Perform the operations required to achieve FIPS approved status, then try importing/generating PIV credentials again.Slots: Yubico OTPAn error occurs when trying to open the Slots screen on macOSWhen trying to open the Slots screen on macOS, the following error message is seen:If you receive this error, it likely means that input monitoring has not been enabled on your device. Toggle that setting, close and reopen the app, and try again.AndroidUnable to take screenshots of the app on AndroidWhen attempting to capture a screenshot of the Yubico Authenticator app on an Android device, only a blank screen is saved.By default, screenshots are disabled on Yubico Authenticator for Android. To enable screenshots, do the following:Click the menu icon in the upper left corner of the app and select Home.Click Help and about under Application. To find the Application menu in a narrow app window, click the three dots in the upper right corner.Under Troubleshooting, click Allow screenshots.NFC wireless connectionsNFC activation requiredWhen attempting to use a brand new YubiKey with Yubico Authenticator over NFC, a message appears in the app that says NFC activation is required:This message indicates that the key has the Restricted NFC feature
2025-03-31– HOTP (Event), OATH – TOTP (Time), OpenPGP, Secure Static Passwords. Works with Facebook, Twitter, Google Account, Microsoft account, Salesforce.com, Dropbox, Keeper®, 1Password, Bitwarden Premium, AWS Identity and Access Management (IAM), Duo Security, Forgerock, Idaptive, Microsoft Azure AD, Okta, OneLogin, Ping Identity. Yubico authenticator app Compatible with the Yubico Authenticator App. The safest authenticator app experience across mobile and desktop. Search See if your service is supported POPULAR SERVICES Search results (displaying 12 of 12) Protecting vulnerable populations one security key at a time. Yubico matches up to 5% of the number of YubiKeys purchased on Yubico.com, donating them to non-profit organizations, election campaigns, journalists and humanitarian workers around the world. The YubiKey offers seamless, passwordless authentication and enhances the staff experience Folks that aren’t really computer savvy are able to register so quickly, so painlessly, and then begin using their YubiKey so effortlessly and instantaneously – that’s an easy win for us. Art Chernobrov - Hyatt PC Magazine Editor’s Choice award and a 5.0 Exemplary rating Although there are many ways to do MFA, security keys are a highly secure and convenient option. Login codes sent via text message can be intercepted, and authentication apps require that your phone be charged and available. PCMag - PCMAG.COM Protecting the digital you New and constantly evolving threats to our digital lives demand better security solutions. A YubiKey isn’t just for companies; it’s a critical security tool that every individual should be using for their online accounts. Josh Summers - Creator at
2025-04-05Opt for greater flexibility with subscription, compared to a one-time purchasing model. Businesses with 500+ users qualify for YubiEnterprise Subscription. YubiKeys as a service, via subscription, delivers peace of mind in an uncertain world. Not sure which keys to buy? Compare keys to help you decide. Trusted Maximize security by adopting phishing-resistant MFA that is proven to stop account takeovers and trusted by millions of users worldwide.Scalable From corporate access management to social media accounts, YubiKeys provide strong MFA, 2FA and Passwordless solutions for business and personal users.Durable Built to last with glass-fiber reinforced plastic. IP68 rated (water and dust resistant), crush resistant, no batteries required, no moving parts. Tough enough to carry on a key ring.User-Friendly Yubico offers a simple and convenient authentication with plug-and-play functionality, eliminating the need for passwords or complex setups. Log in up to 4X faster with YubiKey 5. More info Quick links How to setup Get started with your YubiKey in a few seconds Buy from reseller Find authorized resellers on your local market Large volume orders Contact sales for YubiEnterprise orders Product sheet Find out all details Product overview Key features Broad ecosystem Deploy instantly with Centrify, Ping, Okta, Google and more. Configurable Easily configure multiple protocols across computers, networks, and online applications and services. Easy to use No battery or network connectivity required, users simply insert and tap to authenticate. High quality Built to last with glass-fiber reinforced plastic. IP68 rated (water and dust resistant), crush resistant, no batteries required, no moving parts. Trusted partner The YubiKey is deployed and loved by 9 of the top 10 internet brands and by millions of users. Multi-protocol Support for WebAuthn, FIDO2 CTAP1, FIDO2 CTAP2, FIDO2 CTAP2.1, Universal 2nd Factor (U2F), Smart card (PIV-compatible), Yubico OTP, OATH – HOTP (Event), OATH – TOTP (Time), OpenPGP, Secure Static Passwords. Works with Facebook, Twitter, Google Account, Microsoft account, Salesforce.com, Dropbox, Keeper®, 1Password, Bitwarden Premium, AWS Identity and Access Management (IAM), Duo Security, Forgerock, Idaptive, Microsoft Azure AD, Okta, OneLogin, Ping Identity. Yubico authenticator app Compatible with the Yubico Authenticator App. The safest authenticator app experience across mobile
2025-03-29