An Edge over the Bad Guys

The one thing end-users don’t seem to have over hackers these days is an edge.

Yubico is changing that.

Today, we introduce a new key we’ve dubbed the YubiKey Edge. The goal is a cost-effective key with a collection of second-factor authentication options that guard against attacks on your accounts either via malware, phishing and other techniques. YubiKey Edge also includes an option to create a strong static password for use with apps and services that require a login but do not support one-time passwords.

YubiKey Edge, which comes in both the Standard and Nano format, includes the one-time password (OTP) features that are the foundation of YubiKeys, including Yubico OTP, OATH, and Challenge-Response. The OTP provides a secure 128-bit AES encrypted single-use password. The features work with apps such as Salesforce and LastPass.

In addition, we’ve added support for the FIDO Alliance’s Universal 2nd Factor (U2F) protocol, which provides easy-to-use public key cryptography.

YubiKey Edge shows itself as a USB keyboard when used in an OTP mode. There are two configuration “slots” on the key that are active at one time, which in essence turns the key into two keys in one. (A longer touch to the key activates the configuration in the second slot.)

For example, Slot 1 could be configured to provide a complex static password that replaces your traditional password. In Slot 1, the static password is activated with a quick touch to the key. Slot 2 could be configured with a second-factor OTP activated with a longer, multi-second touch of the key.

This configuration is easily achieved with a personalization tool available free from Yubico.

The static password can be used to replace your current password (just change your password using the “change password” feature of your app or service and when needed the Yubikey will enter the password you have configured).

This is only one example, the slots on the Yubikey can be a combination of any of the OTP or static password options.

On the U2F side, the key presents itself as an HID (Human Interface Device), similar to mice, game controllers and display devices that plug into USB ports. U2F works via the browser, with Google Chrome offering initial support and Mozilla’s Firefox under development. Gmail and other applications such as WordPress are supported, and additional U2F-compliant apps and services are in the queue for release by various vendors in the coming months.

U2F does not require any client software or drivers, and is available on every version of Yubikey except the YubiKey Standard and YubiKey Nano.

As part of the YubiKey Edge introduction, Yubico has released a new version of its NEO Manager that supports YubiKey Edge.

Talk to our teamTalk to our team

Share this article:


  • Platform independent digital identity for all Many are understandably concerned that the great invention called the Internet, initially created by researchers for sharing information, has become a major threat to democracy, security and trust. The majority of these challenges are caused by stolen, misused or fake identities. To mitigate these risks, some claim that we have to choose between security, usability […]Read moreDigital IdentityEUDIFounderStina Ehrensvard
  • Q&A with Yubico’s CEO: Our move to the main Nasdaq market in StockholmAs 2024 draws to a close, it’s the perfect time to reflect on the incredible journey we’ve had this year and how it has shaped where we stand today as a company. To mark this moment, I sat down with our CEO, Mattias Danielsson, to look back on the milestones and achievements of 2024—culminating in […]Read moreCEOMattias Danielsson
  • Exploring DORA: A look at the next major EU mandateFinancial institutions have historically managed operational risk using capital allocation, but under EU Regulation 2022/2554 – also known as the Digital Operational Resilience Act (DORA) – the financial sector and associated entities in the European Economic Area (EEA) must also soon follow new rules. These new rules focus on the protection, detection, containment, and the […]Read moreDORAEU
  • Securing critical infrastructure from modern cyber threats with phishing-resistant authenticationAcross the globe, 2024 has seen a whirlwind of change. With ongoing wars, recent political change-ups and more, growth in data breaches targeting critical infrastructure continue to be on the rise. Critical infrastructure is integral to our everyday life – from the energy and natural resources powering our hospitals and providing clean drinking water, telco […]Read moreCISAcritical infrastructurezero trust