YubiKey to Secure Okta Adaptive MFA

There is a trend developing in identity management focused intently on security that incorporates strong two-factor authentication. The YubiKey is an integral part of that trend as evidenced by our new partnership with Okta, providing additional mfa capabilities.

Today, we provide more proof of that trend by announcing our partnership with Okta to integrate YubiKeys into their cloud identity ecosystem. Okta has achieved the status of being the only solution among its peers to occupy the leaders’ quadrant in Gartner’s Magic Quadrant for Identity and Access Management as a Service (IDaaS). Inclusion into Okta’s platform reaffirms the reputation of the YubiKey as a highly sought after authentication technology by many leading software providers and services.

2fa Password Keys

YubiKeys will soon be an option for stronger authentication as part of Okta’s just-released Adaptive Multi-Factor Authentication (MFA). With this service, users will be able to securely and easily authenticate with the YubiKey to Okta’s platform, which lets users authenticate once and access any number of applications.

The YubiKey is a hardware security key that plugs into a USB port and works with a simple touch to trigger a one-time passcode (OTP) that securely authenticates the user. This single touch to activate a second factor makes YubiKey the preferred choice for users logging in with USB password keys.

YubiKeys supporting the upcoming Okta integration include the YubiKey Standard and Nano, YubiKey Edge and Edge-n, and the YubiKey NEO and NEO-n.

Expanding On USB and Hardware Security

In addition, Okta also announced it has joined the FIDO Alliance, which develops open protocols for strong authentication, including the Universal 2nd Factor (U2F) specification. Both OTP and FIDO U2F features are natively supported in a single YubiKey.

Being the co-creators of the FIDO U2F protocol, we are excited that Okta has joined the Alliance. The FIDO protocol uses public key cryptography and is engineered specifically to address phishing and man-in-the-middle (MiTM) attacks.

The YubiKey Edge and YubiKey NEO support FIDO Alliance’s U2F protocol mode together with OTP. In addition, YubiKey NEO and YubiKey NEO-n have other capabilities such as a PIV-compliant CCID smart card and OpenPGP (SSH login, code signing, and more).

Talk to our teamTalk to our team

Share this article:


  • Introducing new features for Yubico Authenticator for iOSWe’re excited to share the new features now available for Yubico Authenticator for iOS in the latest app update on the App Store. Many of these improvements aim to address frequently requested features from our customers, while providing additional new functionalities for a seamless authentication experience on iOS.  With increased interest in going passwordless and […]Read moreiOSYubico Authenticator
  • Platform independent digital identity for all Many are understandably concerned that the great invention called the Internet, initially created by researchers for sharing information, has become a major threat to democracy, security and trust. The majority of these challenges are caused by stolen, misused or fake identities. To mitigate these risks, some claim that we have to choose between security, usability […]Read moreDigital IdentityEUDIFounderStina Ehrensvard
  • Q&A with Yubico’s CEO: Our move to the main Nasdaq market in StockholmAs 2024 draws to a close, it’s the perfect time to reflect on the incredible journey we’ve had this year and how it has shaped where we stand today as a company. To mark this moment, I sat down with our CEO, Mattias Danielsson, to look back on the milestones and achievements of 2024—culminating in […]Read moreCEOMattias Danielsson
  • Exploring DORA: A look at the next major EU mandateFinancial institutions have historically managed operational risk using capital allocation, but under EU Regulation 2022/2554 – also known as the Digital Operational Resilience Act (DORA) – the financial sector and associated entities in the European Economic Area (EEA) must also soon follow new rules. These new rules focus on the protection, detection, containment, and the […]Read moreDORAEU