Tag: FIDO

Built-in FIDO authenticators and YubiKeys are making the internet safer for all

In 2007, Yubico set out to protect as many people as possible by making secure login easy and available for everyone. We are happy Apple has joined Yubico, Google, and Microsoft on this journey by implementing W3C WebAuthn/FIDO compatible platform authenticators and are pleased to say that now all major platforms have adopted the standards

What is a Man-in-the-Middle (MiTM) Attack?

Learn More Why the YubiKey wins Creating the unphishable security key Developer Resources Security breaches and webauthn

What is FIDO U2F?

Where did U2F come from? U2F was created by Google and Yubico, and support from NXP, with the vision to take strong public key crypto to the mass market. Today, the technical specifications are hosted by the open-authentication industry consortium known as the FIDO Alliance. U2F has been successfully deployed by large scale services, including Facebook, Gmail, Dropbox, GitHub, and many more. Click here for a

AWS Expands YubiKey Support with AWS SSO WebAuthn Integration

Another win for FIDO at the heels of its first industry conference, Authenticate 2020.  AWS Single Sign-On (SSO) has introduced native WebAuthn support to secure user access to AWS accounts and business applications using strong, FIDO-based multi-factor authentication (MFA) with YubiKeys.  Broader choice of authentication methods by AWS SSO is a win for modern authentication that has historically

Why we designed the YubiKey the way we did

The first YubiKey was launched in 2008, inspired by the word ‘ubiquity’ and with the mission to make simple and secure logins available for everyone. At the time, we were less than 10 people in the company, but our strategy was simple: if we focused on further developing the YubiKey technology in close collaboration with

Native support for WebAuthn and FIDO is finally here on iPhones and iPads

Yubico was founded with the mission of making simple and secure logins ubiquitous. In 2008, we launched the first YubiKey for seamless, one-touch authentication. In 2012, in close collaboration with Google, Yubico’s inventions evolved into the FIDO Universal 2nd Factor (U2F) open authentication standard, and in 2014 it was launched in Gmail and Chrome. In

Jun 21, 2017

Future of FIDO Authentication demonstrated by Microsoft at CIS

Microsoft unveiled a major FIDO milestone today at the Cloud Identity Summit (CIS) by demonstrating an early implementation of a FIDO 2-based passwordless login on a Microsoft Windows 10 computer through Azure Active Directory (AAD) using a YubiKey. For the demonstrated login flow, the user inserted and touched the YubiKey, using AAD to instantly authenticate

Google publishes two-year study on use of FIDO U2F Security Keys

Key words often associated with two-factor authentication focus on simplicity, privacy, and security. Those words, however, are broad terms that need definition in order for consumers and enterprises to form opinions and make educated buying choices. FIDO Universal Second Factor (U2F) is no different, so Google recently published a research paper titled “Security Keys: Practical

May 21, 2015

YubiKeys Earn FIDO Certified Label

Interoperability is king and today the FIDO Alliance announced its FIDO Certified program and a list of 31 products that have passed conformance and interoperability testing. The three YubiKeys that support FIDO’s Universal 2nd Factor (U2F) protocol ­­– NEO, Edge and Security Key – are now certified and part of this important maturation in FIDO’s design.

FIDO Aims at Standardized Strong Authentication

In the early 1990s, a company called Softswitch found itself at a strategic crossroads in that it held the key to integrating disparate electronic messaging systems. So strategic, in fact, that Lotus Software paid $62 million to acquire the company and send a ripple of fear through its main email competitor Microsoft. In a story