How a biopharmaceutical company solved NFC authentication

One of the greatest things about the YubiKey is that it can be used in virtually any environment and by any user. While we all know about the common user experience of plugging in your YubiKey then touching to authenticate, we often hear unique stories from our customers about how they used creativity to address a certain use case. 

We’re sharing the below story anonymously for confidentiality reasons, but this narrative is sure to be able to play across many different industries. 

This particular customer is in the biopharmaceutical industry, where they were faced with a challenge rolling out YubiKey MFA for use with PingID. They required MFA in a mobile restricted and sanitary lab environment where all workers were fully covered in personal protection equipment (PPE). Because of the PPE, authenticating with the YubiKey wasn’t a streamlined experience. Employees had to remove their PPE, plug in their YubiKey, authenticate by touch, scrub to sterilize, and ultimately put their PPE back on. This around-the-way authentication flow created a major impact to productivity and an estimated average of nearly 10 minutes lost for each time they needed to authenticate.  

The challenge was to figure out how to allow their staff to securely and quickly authenticate to their systems in a sanitized environment. 

The solution? Simple – create your own wearable YubiKey wristband that utilizes the NFC capabilities of the YubiKey 5 NFC. They successfully tested the YubiKey in a silicon wristband, specifically a Pocketband, with FIDO U2F over NFC to authenticate to PingID and perform SSO to other applications. The PocketBand allows the YubiKey to be stashed safely into the band itself, staying sterile, and most importantly, remaining conductive to NFC communications.

What was achieved? As you can see, this smart thinking allowed for easy, tap-and-go NFC-enabled authentication with the YubiKey. Physical touch or removal of PPE was no longer required, resulting in immediate time savings while reinforcing trust in accessing their systems with the highest level of hardware authentication required. 

We love to hear these types of stories. Do you have a unique YubiKey use case that you have solved in an interesting way? If so, please send us an email at press@yubico.com to potentially be featured in our upcoming Customer YubiStories series.       

Talk to our teamTalk to our team

Share this article:


  • Introducing new features for Yubico Authenticator for iOSWe’re excited to share the new features now available for Yubico Authenticator for iOS in the latest app update on the App Store. Many of these improvements aim to address frequently requested features from our customers, while providing additional new functionalities for a seamless authentication experience on iOS.  With increased interest in going passwordless and […]Read moreiOSYubico Authenticator
  • Platform independent digital identity for all Many are understandably concerned that the great invention called the Internet, initially created by researchers for sharing information, has become a major threat to democracy, security and trust. The majority of these challenges are caused by stolen, misused or fake identities. To mitigate these risks, some claim that we have to choose between security, usability […]Read moreDigital IdentityEUDIFounderStina Ehrensvard
  • Q&A with Yubico’s CEO: Our move to the main Nasdaq market in StockholmAs 2024 draws to a close, it’s the perfect time to reflect on the incredible journey we’ve had this year and how it has shaped where we stand today as a company. To mark this moment, I sat down with our CEO, Mattias Danielsson, to look back on the milestones and achievements of 2024—culminating in […]Read moreCEOMattias Danielsson
  • Exploring DORA: A look at the next major EU mandateFinancial institutions have historically managed operational risk using capital allocation, but under EU Regulation 2022/2554 – also known as the Digital Operational Resilience Act (DORA) – the financial sector and associated entities in the European Economic Area (EEA) must also soon follow new rules. These new rules focus on the protection, detection, containment, and the […]Read moreDORAEU