YubiKey powers Salesforce 2FA platform

In the next three weeks, Salesforce will add a second major piece within the past year to its identity and access management capabilities. At its annual Dreamforce conference, Salesforce will unveil the Winter 15 edition, including a new feature called Login Flows that allows Salesforce admins to customize the login experience for their users.

On Day One of Dreamforce, I’ll take the stage with Salesforce engineers to show off YubiKey for Salesforce. This is an application that integrates with Login Flows, and the small YubiKey device that provides a one touch, two-factor authentication experience for logging into a Salesforce account.

The hardware-based YubiKey defines ease-of-use and helps prevent replay and brute force attacks that have defined recent password hacks. Because the YubiKey identifies itself to your computer as an external keyboard, there are no drivers to install and it ‘s compatible with any platform. In addition, there isn’t a battery to replace and malware cannot infect the firmware, a needed improvement over software-based authentication tokens.

Last year, Salesforce modernized its authentication platform with the introduction of Salesforce Identity, a set of Open APIs to support identity protocols such as SAML, OAuth, OpenID Connect and SCIM for single sign-on and federation.

This year, Salesforce is adding Login Flows to its platform in order to answer customer requests for the ability to add extra security and features like 2fa to end-user authentication. Yubico is adding YubiKey for Salesforce into that environment.

The solution is comprised of the YubiKey USB key and an application to validate Yubico one-time passwords against the YubiCloud service. The app also includes a console for IT to manage YubiKeys, including the ability to deal with lost YubiKeys, and an option for users to self-provision YubiKeys.

The end-user experience begins after the user enters their regular Salesforce username and password. Next, the user simply touches the lighted gold contact on the Yubikey inserted in their computer’s USB port – that’s it.  The touch produces a unique, one-time 44-character code that is passed to the computer as a second factor of authentication.

In addition, users with existing YubiKeys running under their default configuration will be able to use those keys with the YubiKey for Salesforce app.

We believe this stealth hardware device is the wave of the future — easy-to-use, simple, and secure.

 

For more information, see our Works with YubiKey page for Salesforce.com

Talk to our teamTalk to our team

Share this article:


  • AI is booming — but proving you’re human matters more than everIf you walked the show floor at the RSA Conference this year, you probably noticed the same thing I did: Artificial Intelligence (AI) is everywhere. Agentic AI. AI in threat detection. AI in firewalls. AI in identity management. AI-generated demos. AI everything. The energy around AI was undeniable, and we’re seeing real innovation, efficiency gains […]Read moreAIArtificial IntelligencephishingRSAC
  • Ditching passwords for good: Celebrating the inaugural World Passkey DayHave you ever been stuck in a relationship with someone who constantly lets you down, exposes your secrets, and leaves you vulnerable? Odds are you cut your losses, packed up your things and moved on. Today is the day to do the same with your passwords: say goodbye forever! The reality is a majority of […]Read morepasskeyspasswordlessWorld Passkey Day
  • Digital security’s unique role in protecting our environmentAs sustainability expands to include social, economic, and technological challenges, cybersecurity has emerged as a top global threat – with cybercrime projected to cost $12 trillion this year. Stolen credentials and phishing account for 80% of breaches. At Yubico, making the world more secure is just part of how we care for the world around […]Read moreCSREarth DaySecure It ForwardSustainability
  • Breaking down Australia’s plan to combat AI-driven phishing scamsAcross Australia, cybercrime continues to be a major challenge impacting businesses, critical infrastructure and consumers alike. The use of AI by bad actors across the spectrum of cybercrime is on the rise, and as a result, credential phishing scams are becoming increasingly sophisticated. AI is effectively helping to lower the cost of phishing and increase […]Read moreAIAPACAustraliaphishing