• Contact Sales
  • Resellers
  • Support
Yubico Header Text LogoYubico Header Text Logo
Why Yubicoexpand_more
Why Yubico
  • Enterprises
  • SMBs
  • Individuals
  • Developers
  • Careers
  • Partner programs
  • Affiliate program
  • Contact Sales
  • Events
  • Press room
  • Yubico Blog
  • Yubico Executive Connect
  • About us
  • The team
  • Innovation history
  • Secure it Forward
Easy-to-use, secure authentication

With YubiKey there’s no tradeoff between great security and usability

Why YubiKey
  • authentication
  • FIPS 140-2
  • NIST
  • YubiKey FIPS Series
Proven at scale at Google

Google defends against account takeovers and reduces IT costs

Google Case Study
  • authentication
  • FIPS 140-2
  • NIST
  • YubiKey FIPS Series
Protecting vulnerable organizations

Secure it Forward: One YubiKey donated for every 20 sold

Learn about Secure it Forward
  • authentication
  • FIPS 140-2
  • NIST
  • YubiKey FIPS Series
Productsexpand_more
All products
  • YubiKey 5 Series
  • YubiKey 5 FIPS Series
  • YubiKey Bio Series
  • Security Key Series
  • YubiKey 5 CSPN Series
  • YubiHSM 2 & YubiHSM 2 FIPS
  • YubiEnterprise Subscription
  • YubiEnterprise Delivery
  • Yubico Authenticator
  • Computer login tools
  • Software Development Toolkits
  • YubiCloud
  • Using YubiKey is easy
  • Find the right YubiKey
  • Works with YubiKey
  • Compare YubiKeys
One key for hundreds of apps and services

YubiKey works out-of-the-box and has no client software or battery

Yubico protects you
  • authentication
  • FIPS 140-2
  • NIST
  • YubiKey FIPS Series
See YubiKeys as a Service
YubiEnterprise Subscription delivers scale and savings

Gain a future-proofed solution and faster MFA rollouts

See YubiKeys as a Service
  • authentication
  • FIPS 140-2
  • NIST
  • YubiKey FIPS Series
Solutionsexpand_more
Solutions overview
  • Zero Trust
  • Executive Order OMB M-22-09
  • Phishing-resistant MFA
  • Passwordless
  • Compliance
  • Cyber Insurance
  • Secure supply chain
  • Hybrid & remote workers
  • Secure privileged users
  • Mobile restricted environments
  • Call centers
  • Shared workstations
  • Microsoft ecosystem
  • Salesforce workspace
  • IAM solutions
  • AWS environment
The Bridge to Passwordless

Begin the journey to make your organization passwordless

Get the white paper
  • authentication
  • FIPS 140-2
  • NIST
  • YubiKey FIPS Series
Accelerate your Zero Trust Strategy

7 best strong authentication practices to jumpstart your Zero Trust program

Get the white paper
  • authentication
  • FIPS 140-2
  • NIST
  • YubiKey FIPS Series
Federal cybersecurity requirements

See guidance for CIOs and leaders to prepare for the modern cyber threat era

Get the white paper
  • authentication
  • FIPS 140-2
  • NIST
  • YubiKey FIPS Series
Industriesexpand_more
Industries overview
  • High tech
  • Federal government
  • State & local government
  • Education
  • Financial services
  • Manufacturing
  • Energy & natural resources
  • Retail & hospitality
  • Telecommunications
  • Healthcare
  • Pharmaceuticals
  • Cryptocurrency
  • Elections & campaigns
Manufacturing and supply chain security

Authentication best practices for manufacturing using highest-assurance security

Get the white paper
  • authentication
  • FIPS 140-2
  • NIST
  • YubiKey FIPS Series
Phishing-resistant MFA: Fact vs. Fiction

Meet requirements for phishing-resistant MFA in OMB M-22-09 guidelines

Get the white paper
  • authentication
  • FIPS 140-2
  • NIST
  • YubiKey FIPS Series
Secure energy and natural resources from cyber threats

Best practices for phishing-resistant MFA to safeguard your critical infrastructure

Get the white paper
  • authentication
  • FIPS 140-2
  • NIST
  • YubiKey FIPS Series
Resourcesexpand_more
All resources
  • Yubico Blog
  • Cybersecurity glossary
  • Authentication standards
  • Resource library
  • Developer program
  • Product briefs
  • Solution briefs
  • Case studies
  • Get a pilot started
  • White papers and reports
  • Webinars
BeyondTrust: secured with a subscription

A leader in Privileged Access Management simplifies YubiKey deployment

How they optimized ROI
  • authentication
  • FIPS 140-2
  • NIST
  • YubiKey FIPS Series
S&P Global Market Intelligence report: old habits die hard

Only 46% of respondents protect their applications with MFA. How about you?

Read the report
  • authentication
  • FIPS 140-2
  • NIST
  • YubiKey FIPS Series
Secure shared workstations against cyber threats

Shared workstations can be secured with phishing-resistant MFA

Get the white paper
  • authentication
  • FIPS 140-2
  • NIST
  • YubiKey FIPS Series
Supportexpand_more
Support home
  • Find the right YubiKey
  • Set up your YubiKey
  • Downloads
  • Product documentation
  • Support articles
  • Support Services
  • Professional Services
  • YubiEnterprise Subscription
  • Works with YubiKey Program
  • Buying and shipping information
  • Security advisories
  • Help center
How to set up your YubiKey

Follow our guided tutorials to start protecting your favorite services

Set up your YubiKey
  • authentication
  • FIPS 140-2
  • NIST
  • YubiKey FIPS Series
Find the best YubiKey for your needs

Take the guided quiz and see which YubiKey best fits your or your businesses needs

Take the quiz
  • authentication
  • FIPS 140-2
  • NIST
  • YubiKey FIPS Series
Accelerate your YubiKey deployment

Technical and operational guidance for your YubiKey implementation and rollout

Professional Services
  • authentication
  • FIPS 140-2
  • NIST
  • YubiKey FIPS Series
SubscribeStore
  • Home » Products » YubiKey FIPS Series

    YubiKey 5 FIPS Series

    FIPS 140-2 validation enables government agencies and regulated industries to meet the highest authenticator assurance level 3 (AAL3) requirements from the new NIST SP800-63B guidance.
    Buy now

    Security at scale: YubiEnterprise Subscription

    Home » Products » YubiKey FIPS Series

    FIPS 140-2 validated security keys

    Meets stringent compliance requirements for highly security-conscious organizations

    locl
    Superior authentication

    FIPS 140-2 validated (Overall Level 1 and Level 2, Physical Security Level 3) Meets the highest authenticator assurance level 3 (AAL3) of NIST SP800-63B guidance.

    YubiKey
    Easy, fast, reliable

    Hardware authenticator, offering one-touch strong authentication. Does not require a battery or network connectivity.

    graph
    Reduces IT costs

    Reduces password support incidents by 92% and dramatically lowers IT support costs.


    The YubiKey 5 FIPS Series

    Choose from six different YubiKey models depending on your needs. The keychain model is designed to go anywhere on a keychain. The Nano model is small enough to stay in the USB port of your computer.  Multiple form factors with support for USB-A, USB-C, NFC and Lightning. The YubiKey 5 FIPS Series is IP68 rated, crush resistant, no batteries required, and no moving parts.

    Read the YubiKey 5 FIPS Series product brief >


    For businesses with 500 users or more

    Subscribe

    For SMBs or for individuals

    Buy now


    Need to deploy MFA per President Biden’s Executive Order on Improving the Nation’s Cybersecurity? Yubico can help you meet the 180 day deadline with DOD approved strong authentication.

    Contact Sales


    The series at a glance

    YubiKey 5C NFC FIPS

    Slim USB-C form factor with NFC capabilities and easy to carry on a keychain

    Buy now
    YubiKey 5 NFC FIPS

    Slim USB-A form factor with NFC capabilities and easy to carry on a keychain

    Buy now
    YubiKey 5Ci FIPS

    Dual connector capabilities supporting USB-C and Lightning

    Buy now
    YubiKey 5C FIPS

    Slim USB-C form factor for easy to carry on a keychain

    Buy now
    YubiKey 5 Nano FIPS

    Slim USB-A form for semi-permanent installation and convenience

    Buy now
    YubiKey 5C Nano FIPS

    Ultra-slim USB-C form factor for semi-permanent installation and convenience

    Buy now


    Certifications

    NIST | National Institute of Standards

    Cryptographic module validation for YubiKey

    Cryptographic module validation testing is performed using the Derived Test Requirements [DTR] for FIPS PUB 140-2, Security Requirements for Cryptographic Modules. The DTR lists all of the vendor and tester requirements for validating a cryptographic module, and it is the basis of testing done by the CST accredited laboratories.

    NIST level 1 certificate
    NIST level 2 certificate

    Learn more about the YubiKey 5 FIPS Series

    Choice of form factor
    • All YubiKey 5 FIPS Series security keys include same functionality
    • The YubiKey 5 FIPS Series offers a choice of keys designed for USB-A, USB-C, NFC and Lightning
    • YubiKey 5 NFC FIPS features a slim USB-A form factor with NFC capabilities and easy to carry on a keychain 
    • YubiKey 5C NFC FIPS features a slim USB-C form factor with NFC capabilities and easy to carry on a keychain
    • YubiKey 5Ci FIPS features dual connector capabilities supporting USB-C and Lightning for use with the range of iOS devices you love, and easy to carry on a keychain
    • YubiKey 5 Nano FIPS features a slim USB-A form for semi-permanent installation and convenience
    • YubiKey 5C Nano FIPS features an ultra-slim USB-C form factor for use with  the latest Mac, PC, and Android computing devices
    Features
    • FIPS 140-2, Overall Level 1 and Level 2, Physical Security Level 3
    • Strong multi-factor authentication
    • Easy and fast authentication
    • Crush resistant & water resistant
    • Multiprotocol support on a single key
    • Convenient sizes
    • Made in the USA

    Technical specifications
    • Supported protocols: FIDO2/WebAuthn, FIDO U2F, smart card (PIV), Yubico OTP, OATH-TOTP, OATH-HOTP, OpenPGP, and Challenge Response
    • Works on Microsoft Windows, Mac OS X, Linux, Chrome OS operating systems, and on major browsers
    • PIV smart card compatible, minidriver available on Windows
    • Support for PKCS#11
    • Crypto Algorithms: RSA 2048, ECC p256, ECC p384
    • Hardware secure element to protect cryptographic keys

    Is the YubiKey 5 FIPS Series right for you?
    Do you want to authenticate using passwordless or strong 2FA with a FIPS 140-2 validated security key?Yes
    Are you interested in using a range of legacy and modern authentication protocols — i.e. OTP, FIDO U2F, FIDO2/WebAuthn, Smart card/PIV?Yes
    Are you operating in a hybrid legacy and modern cloud environment?Yes
    Are you interested in securing a wide range of business scenarios across privileged users, office workers, shared workstations, mobile-restricted environments, remote workforce, end customers, and 3rd party users?Yes
    Still not sure? Use our handy compare chart or take the quiz.

    Risk reduction, business growth, and efficiency enabled by YubiKeys

    A recent Forrester Consulting Total Economic Impact™ (TEI) study commissioned by Yubico found that a composite organization representative of interviewed customers who use YubiKeys reduced risk of successful phishing and credential theft attacks by 99.9%, saw a drop in password-related helpdesk tickets by 75%, and experienced a 203% 3-year ROI with YubiKeys.

    BUT…. all organizations are different. Enter your own company data to create a custom Dynamic TEI study and instantly see how Yubico’s solutions can help your organization!

    Create my custom study
    TEI Forrester report

    Procuring YubiKeys

    YubiKeys are available for procurement through multiple convenient channels

    Engage with the YubiKey Public Sector team for strategic implementations:
    Yubico Inc.
    5201 Great America Pkwy #122
    Santa Clara, CA 95054, United States

    Purchase via GSA or SEWP V contract
    RockITek = GSA Contract # 47QTCA19D0085
    Immix = GSA Contract # GS-35F-0511T / SEWP V NNG15SC16B (Category A, Group A) & NNG15SC39B (Category B, Group D)
    DUNS: 046832835
    CAGE Code: 6UUE2


    Get started

    We can help

    Talk to our sales department to find the best options for your regulated environment

    Contact sales
    Get protected today

    Browse our online store today and buy the right YubiKey for you.

    Buy now

Yubico Text LogoYubico Text Logo
  • RSS
  • Twitter
  • LinkedIn
  • Facebook
  • Instagram
  • YouTube
  • GitHub
  • Product finder quiz
  • Find set-up guides
  • Buy online
  • Contact sales
  • Get Yubico updates
  • Careers
  • Events
  • Press room
  • About us
  • Partner programs
  • Affiliate program
  • YubiKey 5 Series
  • YubiKey 5 FIPS Series
  • YubiKey Bio Series
  • Security Key Series
  • YubiKey 5 CSPN Series
  • YubiHSM 2 & YubiHSM 2 FIPS
  • Yubico Authenticator
  • Zero Trust
  • Phishing-resistant MFA
  • Passwordless
  • Cyber insurance
  • More solutions
  • Industries overview
  • Yubico blog
  • Resource library
  • Cybersecurity glossary
  • Authentication standards
  • Developer program
  • Works with YubiKey
  • Help center
  • Downloads
  • Product documentation
  • Support Services
  • Professional Services
  • Professional Services
  • Contact support
Yubico © 2023 All Rights Reserved.
  • Sitemap
  • Cookies
  • Legal
  • Privacy
  • Patents
  • Terms of use
  • Trust
We use cookies to ensure that you get the best experience on our site and to present relevant content and advertising. By browsing this site without restricting the use of cookies, you consent to our and third party use of cookies as set out in our Cookie Notice.

PreferencesAccept all
Yubico Privacy and Cookies Policy

Privacy Overview

Yubico.com uses cookies to improve your experience while navigating through the website. When you visit any website, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences or your device and is mostly used to make the site work as you expect it to. The information does not usually identify you, but it can give you a more personalized web experience.

Because we respect your right to privacy, you can choose not to allow some types of cookies.

Click on the different category headings to find out more and change our default settings.

Blocking some types of cookies may impact your experience on our site and the services we are able to offer.
Strictly necessary cookies
Always Enabled

These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. These cookies do not store any personally identifiable information.

Functional cookies

These cookies enable the website to provide enhanced functionality and personalization. They may set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly.

Performance cookies

These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance.

Targeting cookies

These cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.

Uncategorized

Undefined cookies are those that are being analyzed and have not been classified into a category as yet.

Matomo Anonymized Tracking
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
CookieDurationDescription
_hjIncludedInSessionSample_8352762 minutesDescription is currently not available.
_hjSession_83527630 minutesDescription is currently not available.
_hjSessionUser_8352761 yearDescription is currently not available.
_schn13 minutesDescription is currently not available.
_scid_r1 year 1 monthDescription is currently not available.
_vis_opt_exp_186_combi3 months 8 daysDescription is currently not available.
_vis_opt_exp_186_combi_choose3 months 8 daysDescription is currently not available.
_vis_opt_exp_187_combi3 months 8 daysDescription is currently not available.
_vis_opt_exp_187_combi_choose3 months 8 daysDescription is currently not available.
_vis_opt_exp_188_combi3 months 8 daysDescription is currently not available.
_vis_opt_exp_188_combi_choose3 months 8 daysDescription is currently not available.
cookielawinfo-checkbox-matomo1 yearDescription is currently not available.
loglevelneverNo description available.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
CookieDurationDescription
_ga_*1 year 1 month 4 daysGoogle Analytics sets this cookie to store and count page views.
_gat_UA-*1 minuteGoogle Analytics sets this cookie for user behaviour tracking.
_hjFirstSeen30 minutesHotjar sets this cookie to identify a new user’s first session. It stores the true/false value, indicating whether it was the first time Hotjar saw this user.
_hjRecordingEnabledneverHotjar sets this cookie when a Recording starts and is read when the recording module is initialized, to see if the user is already in a recording in a particular session.
_hjRecordingLastActivityneverHotjar sets this cookie when a user recording starts and when data is sent through the WebSocket.
ln_or1 dayLinkedin sets this cookie to registers statistical data on users' behaviour on the website for internal analytics.
Save & Accept