How a biopharmaceutical company solved NFC authentication

One of the greatest things about the YubiKey is that it can be used in virtually any environment and by any user. While we all know about the common user experience of plugging in your YubiKey then touching to authenticate, we often hear unique stories from our customers about how they used creativity to address a certain use case. 

We’re sharing the below story anonymously for confidentiality reasons, but this narrative is sure to be able to play across many different industries. 

This particular customer is in the biopharmaceutical industry, where they were faced with a challenge rolling out YubiKey MFA for use with PingID. They required MFA in a mobile restricted and sanitary lab environment where all workers were fully covered in personal protection equipment (PPE). Because of the PPE, authenticating with the YubiKey wasn’t a streamlined experience. Employees had to remove their PPE, plug in their YubiKey, authenticate by touch, scrub to sterilize, and ultimately put their PPE back on. This around-the-way authentication flow created a major impact to productivity and an estimated average of nearly 10 minutes lost for each time they needed to authenticate.  

The challenge was to figure out how to allow their staff to securely and quickly authenticate to their systems in a sanitized environment. 

The solution? Simple – create your own wearable YubiKey wristband that utilizes the NFC capabilities of the YubiKey 5 NFC. They successfully tested the YubiKey in a silicon wristband, specifically a Pocketband, with FIDO U2F over NFC to authenticate to PingID and perform SSO to other applications. The PocketBand allows the YubiKey to be stashed safely into the band itself, staying sterile, and most importantly, remaining conductive to NFC communications.

What was achieved? As you can see, this smart thinking allowed for easy, tap-and-go NFC-enabled authentication with the YubiKey. Physical touch or removal of PPE was no longer required, resulting in immediate time savings while reinforcing trust in accessing their systems with the highest level of hardware authentication required. 

We love to hear these types of stories. Do you have a unique YubiKey use case that you have solved in an interesting way? If so, please send us an email at press@yubico.com to potentially be featured in our upcoming Customer YubiStories series.       

Talk to our teamTalk to our team

Share this article:


  • Ditching passwords for good: Celebrating the inaugural World Passkey DayHave you ever been stuck in a relationship with someone who constantly lets you down, exposes your secrets, and leaves you vulnerable? Odds are you cut your losses, packed up your things and moved on. Today is the day to do the same with your passwords: say goodbye forever! The reality is a majority of […]Read morepasskeyspasswordlessWorld Passkey Day
  • Digital security’s unique role in protecting our environmentAs sustainability expands to include social, economic, and technological challenges, cybersecurity has emerged as a top global threat – with cybercrime projected to cost $12 trillion this year. Stolen credentials and phishing account for 80% of breaches. At Yubico, making the world more secure is just part of how we care for the world around […]Read moreCSREarth DaySecure It ForwardSustainability
  • Breaking down Australia’s plan to combat AI-driven phishing scamsAcross Australia, cybercrime continues to be a major challenge impacting businesses, critical infrastructure and consumers alike. The use of AI by bad actors across the spectrum of cybercrime is on the rise, and as a result, credential phishing scams are becoming increasingly sophisticated. AI is effectively helping to lower the cost of phishing and increase […]Read moreAIAPACAustraliaphishing
  • 5 fast cybersecurity tips to clean up your digital lifeWith today being Identity Management Day, now is the perfect time to take stock of your online presence, update security settings, and ensure that your personal data remains protected from cyber threats like phishing. We’re also seeing increasing concerns of DeepSeek and other AI tools around data privacy making these kinds of attacks more successful […]Read morebest practices