How a biopharmaceutical company solved NFC authentication

One of the greatest things about the YubiKey is that it can be used in virtually any environment and by any user. While we all know about the common user experience of plugging in your YubiKey then touching to authenticate, we often hear unique stories from our customers about how they used creativity to address a certain use case. 

We’re sharing the below story anonymously for confidentiality reasons, but this narrative is sure to be able to play across many different industries. 

This particular customer is in the biopharmaceutical industry, where they were faced with a challenge rolling out YubiKey MFA for use with PingID. They required MFA in a mobile restricted and sanitary lab environment where all workers were fully covered in personal protection equipment (PPE). Because of the PPE, authenticating with the YubiKey wasn’t a streamlined experience. Employees had to remove their PPE, plug in their YubiKey, authenticate by touch, scrub to sterilize, and ultimately put their PPE back on. This around-the-way authentication flow created a major impact to productivity and an estimated average of nearly 10 minutes lost for each time they needed to authenticate.  

The challenge was to figure out how to allow their staff to securely and quickly authenticate to their systems in a sanitized environment. 

The solution? Simple – create your own wearable YubiKey wristband that utilizes the NFC capabilities of the YubiKey 5 NFC. They successfully tested the YubiKey in a silicon wristband, specifically a Pocketband, with FIDO U2F over NFC to authenticate to PingID and perform SSO to other applications. The PocketBand allows the YubiKey to be stashed safely into the band itself, staying sterile, and most importantly, remaining conductive to NFC communications.

What was achieved? As you can see, this smart thinking allowed for easy, tap-and-go NFC-enabled authentication with the YubiKey. Physical touch or removal of PPE was no longer required, resulting in immediate time savings while reinforcing trust in accessing their systems with the highest level of hardware authentication required. 

We love to hear these types of stories. Do you have a unique YubiKey use case that you have solved in an interesting way? If so, please send us an email at press@yubico.com to potentially be featured in our upcoming Customer YubiStories series.       

Talk to our teamTalk to our team

Share this article:


  • Piloting Europe’s future ID: Passkeys securing digital walletsOver the last several years, passkeys have become ubiquitous. They are available on every mobile platform, in every leading browser, as part of all major enterprise IAM solutions, and in most major cloud services. Until wwWallet came along, the only place where passkeys hadn’t yet made an impact is in the rapidly developing world of […]Read moredigital identity walletspasskeysSIROSwwWallet
  • We’re excited for what’s to come – meet us in-person to find out whyIt’s been a busy year for our team, filled with exciting company and product updates aimed at better serving our customers and helping them achieve cyber resilience as AI-driven phishing threats continue evolving globally. Between industry award recognitions and key new executive leadership hires to lead Yubico to its next stage of growth and a […]Read more
  • FIPS certified vs. FIPS compliant: What’s the real difference?“Is your MFA solution FIPS compliant, or is it certified?”  This is a question we hear a lot, and for good reason. In industries where security and compliance are critical (especially in government contracts), understanding the difference between FIPS certified and FIPS compliant isn’t just semantics – it can mean the difference between meeting requirements […]Read moreFIPSNIST
  • 2025 Global State of Authentication survey: A world of difference in cybersecurity habitsIn a world that’s more connected than ever, the landscape of cybersecurity threats is constantly evolving. Bad actors, now supercharged with artificial intelligence (AI), are becoming increasingly adept at exploiting human error through sophisticated phishing and social engineering attacks. This makes robust cybersecurity a universal issue, impacting everyone from individuals to the largest global enterprises. […]Read moreGlobal State of Authenticationsurvey