Yubico
Author: v | 2025-04-25
The latest versions of the Yubico Authenticator app are available to download directly from Yubico and/or via a platform store: macOS. Yubico Authenticator for macOS direct download. Yubico The latest versions of the Yubico Authenticator app are available to download directly from Yubico and/or via a platform store: macOS. Yubico Authenticator for macOS direct download. Yubico
YubiHSM 2 – Yubico - Yubico Support
Your web browser is not compatible with this site. Please use a different browser for the best web experience.HomeSymantec VIP Access Manager vs. Yubico YubiKeyBroadcom and Yubico are both solutions in the Authentication Systems category. Broadcom is ranked #15 with an average rating of 8.0, while Yubico is ranked #7 with an average rating of 9.0. Broadcom holds a 1.7% mindshare in AS, compared to Yubico’s 9.6% mindshare. Additionally, 86% of Broadcom users are willing to recommend the solution, compared to 100% of Yubico users who would recommend it. Comparison Buyer's GuideExecutive SummaryUpdated on Aug 11, 2024 The Yubico YubiKey and Symantec VIP Access Manager cater to user authentication needs. Yubico YubiKey seems to have an advantage in support and pricing, while Symantec VIP Access Manager offers more features. What features are offered by Yubico YubiKey in comparison to Symantec VIP Access Manager?Yubico YubiKey is praised for high security, straightforward integration across multiple platforms, and strong support. Symantec VIP Access Manager offers advanced user authentication options, extensive management tools, and a comprehensive feature set. What areas of improvement can be found in Yubico YubiKey in comparison to Symantec VIP Access Manager?Yubico YubiKey users often mention the need for better documentation, compatibility issues with certain operating systems, and, occasionally, more comprehensive support options. Symantec VIP Access Manager users desire a more intuitive setup process, faster customer support response times, and smoother initial deployment experiences. How is the ease of deployment and customer service of Yubico YubiKey in comparison to Symantec VIP Access Manager?Yubico YubiKey is straightforward to deploy, with minimal issues and high marks for customer service responsiveness. Symantec VIP Access Manager has a steeper learning curve during deployment, but customer service receives high marks once users are onboarded. What setup costs and ROI can be seen with Yubico YubiKey in
Legacy Devices – Yubico - Yubico Support
Argument to pam-u2f in the PAM stack stored under /etc/pam or /etc/pam.d. Yubico has detailed some example scenarios involving the management of the authfile at the center of the issue, including:Where a user-managed authfile, stored in the user home directory, is combined with pam-u2f used as a single-factor authentication method and the “nouserok” option enabled, an attacker could either remove or corrupt the authfile and force the pam-u2f module to return PAM_SUCCESS. “This would lead to local privilege escalation if the user is authorized to sudo,” Yubico said.With a centrally managed authfile, where a file cannot be modified without elevated privileges, and assuming pam-u2f is used as a second-factor authentication method in combination with a user password, Yubico said, an attacker could “attempt to memory-starve the system by allocating large amounts of memory, and triggering a memory allocation error within pam-u2f.” If successful, the second factor would not be verified anymore during an authentication event.ForbesFBI Confirms It Deleted Files From 4,258 U.S.-Based ComputersBy Davey WinderYubico Said No YubiKey Hardware Impacted By 2FA Bypass IssueYubico confirmed that no hardware is impacted by this vulnerability, meaning that the issue does not affect any “ previous or current generation YubiKey Series, YubiKey FIPS Series, Security Key Series, YubiHSM or YubiHSM FIPS devices.”Yubico CVE-2025-23013 Vulnerability ExplainedThe vulnerability in question, CVE-2025-23013, is classified as high-severity and means that in certain scenarios when memory cannot be allocated or the module cannot change privileges it “does not contribute to the final authentication decision performed by PAM.” What this means is that a second or primary authentication factor, depending on the specific use case, would no longer be verified. “A key differentiator between scenarios is the location of the authfile,” Yubico said,.Yubico recommends that affected customers upgrade to the latest version of pam-u2f either by directly downloading from GitHub or getting the latest update via Yubico PPA.I reached out to Yubico for a statement. “We can confirm that Yubico was informed by researchers that an issue was discovered in its open-source pam-u2f software package,” a Yubico spokesperson said, “this software issue does not impact YubiKeys or YubiHSMs.”ForbesMillions OfDevice Specifications – Yubico - Yubico Support
- Better YubiKey Bio - Multi-protocol Edition support.- Improved support for YubiKey 5.7 FIPS: show FIPS status, disable locked features when not in FIPS approved mode, use Secure Channel when needed during NFC connections.- New: app visualizes NFC operations with an overlay.- New: added instructions for NFC restricted devices.- New: enable Enterprise Attestation from the app.- New: Accounts and Passkeys grid view to preserve screen space.- Added more user friendly error messages. Store your unique credential on a hardware-backed security key and take it wherever you go from mobile to desktop. No more storing sensitive secrets on your mobile phone, leaving your account vulnerable to takeovers. With the Yubico Authenticator you can raise the bar for security.• The Yubico Authenticator will work with any USB or NFC-enabled YubiKeysThe Yubico Authenticator securely generates a code used to verify your identity as you are logging into various services. No connectivity needed!Features include:Secure – Hardware-backed strong two-factor authentication with secret stored on the YubiKey, not on the mobile devicePortable – Get the same set of codes across our other Yubico Authenticator apps for desktops as well as for all leading mobile platformsFlexible – Support for time-based and counter-based code generationUSB or NFC usage – Insert the YubiKey into the USB port, or simply tap the YubiKey with NFC to a mobile phone that is NFC-enabled to store your credential on the YubiKeyEasy Setup – QR codes available from the services you wish to protect with strong authenticationUser Presence – Require a touch on the YubiKey sensor, or an extra NFC tap, to generate new codes for sensitive accountsCompatible – Secure all the services currently compatible with other Authenticator appsConfigurable – Ability to configure what happens when you tap a YubiKey against the NFC reader of your phone when the app isn’t runningVersatile – Support for multiple work and personal accountsExperience security the modern way with the Yubico Authenticator. Visit to learn more. Show more Show less This release comes in several variants (we currently have 2). Consult our handy FAQ to see which download is right for you.. The latest versions of the Yubico Authenticator app are available to download directly from Yubico and/or via a platform store: macOS. Yubico Authenticator for macOS direct download. Yubico The latest versions of the Yubico Authenticator app are available to download directly from Yubico and/or via a platform store: macOS. Yubico Authenticator for macOS direct download. YubicoReleases Yubico/yubico-piv-tool - GitHub
Yubico security advisory confirms 2FA bypass vulnerability.LightRocket via Getty Images Update, Jan. 18, 2025: This story, originally published Jan. 17, now includes further information about CVE-2025-23013 and clarification from Yubico regarding the severity rating.Two-factor authentication has increasingly become a security essential over recent years, so when news of anything that can bypass those 2FA protections breaks, it’s not something you can ignore. Be that the perpetual hack attack facing Google users, malicious Chrome extensions, or they Rockstar bypass kit impacting Microsoft users. Now, Yubico has thrown its hat into the 2FA bypass ring with a security advisory that has confirmed a bypass vulnerability in a software module used to support logging in on Linux or macOS using a YubiKey or other FIDO authenticators. Here’s what you need to know.ForbesCritical Hidden Email Hack Warning Issued For Gmail And Outlook UsersYubico 2FA Security Advisory YSA-2025-01Yubico is most likely the first name that comes to mind when you think about two-factor authentication hardware keys and other secure authentication solutions. And for good reason: it has been leading the market in the area of hardware key resources for about as long as I can remember, and I’ve been in the cybersecurity business for multiple decades. So, when Yubico issues a security advisory, I tend to take notice and if you are a Yubico customer, so should you.Yubico security advisory reference YSA-2025-01 relates to a partial authentication bypass in the pam-u2f pluggable authentication module software package that can be deployed to support YubiKey on macOS or Linux platforms.According to the advisory, pam-u2f packages prior to version 1.3.1 are susceptible to a vulnerability that can enable an authentication bypass in some configurations. “An attacker would require the ability to access the system as an unprivileged user,” Yubico explained, and, depending upon the configuration, “the attacker may also need to know the user’s password.”ForbesWarning As PayPal Cyberattacks Continue—What You Need To KnowBy Davey WinderYubico Details Example Attack Scenarios“A key differentiator between scenarios is the location of the authfile,” (the argument itself is called authfile) Yubico said, explaining that the path for the authfile is configured via anGitHub - Yubico/yubioath-flutter: Yubico Authenticator for
Your web browser is not compatible with this site. Please use a different browser for the best web experience.HomeRSA Identity Governance and Lifecycle vs. Yubico YubiKeyThe compared RSA and Yubico solutions aren't in the same category. RSA is ranked #23 in IAM , with an average rating of 7.0, and holds a 1.2% mindshare in the category. Yubico is ranked #7 in AS , with an average rating of 9.0, and holds a 9.6% mindshare. Additionally, 55% of RSA users are willing to recommend the solution, compared to 100% of Yubico users who would recommend it. Comparison Buyer's GuideWe performed a comparison between RSA Identity Governance and Lifecycle and Yubico YubiKey based on real PeerSpot user reviews.Find out what your peers are saying about Microsoft, SailPoint, One Identity and others in Identity Management (IM).To learn more, read our detailed Identity Management (IM) Report (Updated: March 2025).Review summaries and opinionsCategories and RankingSponsoredRanking in other categoriesUser Provisioning Software (3rd), Identity Management (IM) (4th), Identity and Access Management as a Service (IDaaS) (IAMaaS) (5th), Customer Identity and Access Management (CIAM) (3rd)RSA Identity Governance and...Ranking in other categoriesIdentity Management (IM) (23rd)Ranking in other categoriesAuthentication Systems (7th), Passwordless Authentication (4th), Multi-Factor Authentication (MFA) (2nd)Mindshare comparisonFeatured ReviewsQuotes from MembersProsConsPricing and Cost AdviceUse our free recommendation engine to learn which Identity Management (IM) solutions are best for your needs.841,676 professionals have used our research since 2012.Top IndustriesCompany SizeQuestions from the CommunityComparisonsProduct ReportsAlso Known AsOverviewSample Customers Find out what your peers are saying about Microsoft, SailPoint, One IdentityGitHub - Yubico/yubioath-flutter: Yubico Authenticator for Desktop
Comparison to Symantec VIP Access Manager?Yubico YubiKey is considered economical with lower upfront costs and favorable ROI due to robust performance and minimal maintenance needs. Symantec VIP Access Manager carries higher initial setup costs but justifies this with substantial value from its features, providing satisfactory ROI for those willing to invest more initially. To learn more, read our detailed Symantec VIP Access Manager vs. Yubico YubiKey Report (Updated: March 2025).Review summaries and opinionsCategories and RankingSymantec VIP Access ManagerRanking in Authentication Systems15thRanking in other categoriesAccess Management (15th)Ranking in Authentication Systems7thRanking in other categoriesPasswordless Authentication (4th), Multi-Factor Authentication (MFA) (2nd)Mindshare comparisonAs of March 2025, in the Authentication Systems category, the mindshare of Symantec VIP Access Manager is 1.7%, down from 2.7% compared to the previous year. The mindshare of Yubico YubiKey is 9.6%, down from 10.9% compared to the previous year. It is calculated based on PeerSpot user engagement data.Featured ReviewsQuotes from MembersProsConsPricing and Cost AdviceUse our free recommendation engine to learn which Authentication Systems solutions are best for your needs.841,302 professionals have used our research since 2012.Top IndustriesCompany SizeQuestions from the CommunityComparisonsProduct ReportsAlso Known AsOverviewSample Customers Find out what your peers are saying about Symantec VIP Access Manager vs. Yubico YubiKey and other solutions. Updated: March 2025.841,302 professionals have used our research since 2012.See our Symantec VIP Access Manager vs. Yubico YubiKey report. We monitor all Authentication Systems reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.Yubico Authenticator 6.4.0 APK Download by Yubico - APKMirror
Or generate PIV keys or certificatesWhen attempting to import or generate a PIV key/certificate, the operations are greyed-out in Yubico Authenticator:If you have a YubiKey 5 FIPS Series key with firmware version 5.7 or later, you will not be able to add PIV credentials to your YubiKey until the PIV application is in the FIPS approved state. Perform the operations required to achieve FIPS approved status, then try importing/generating PIV credentials again.Slots: Yubico OTPAn error occurs when trying to open the Slots screen on macOSWhen trying to open the Slots screen on macOS, the following error message is seen:If you receive this error, it likely means that input monitoring has not been enabled on your device. Toggle that setting, close and reopen the app, and try again.AndroidUnable to take screenshots of the app on AndroidWhen attempting to capture a screenshot of the Yubico Authenticator app on an Android device, only a blank screen is saved.By default, screenshots are disabled on Yubico Authenticator for Android. To enable screenshots, do the following:Click the menu icon in the upper left corner of the app and select Home.Click Help and about under Application. To find the Application menu in a narrow app window, click the three dots in the upper right corner.Under Troubleshooting, click Allow screenshots.NFC wireless connectionsNFC activation requiredWhen attempting to use a brand new YubiKey with Yubico Authenticator over NFC, a message appears in the app that says NFC activation is required:This message indicates that the key has the Restricted NFC feature. The latest versions of the Yubico Authenticator app are available to download directly from Yubico and/or via a platform store: macOS. Yubico Authenticator for macOS direct download. Yubico
Yubico Authenticator 6.2.0 APK Download by Yubico - APKMirror
The NFC icon in Yubico Authenticator and place your YubiKey on top of a desktop NFC reader. The key must maintain constant contact with the reader throughout the operation.To connect via NFC on Android, tap your YubiKey on the back of your device to scan.Click Help and about under Application. To find the Application menu in a narrow app window, click the three dots in the upper right corner.Under Troubleshooting, select the relevant log type from the Log level drop-down menu.If there is a particular operation you want to collect logs on, perform that operation. Now go back to Troubleshooting and click Copy log. This copies the log information to the clipboard. Paste the log information into a text file (or other document) and save it.To generate diagnostic data (desktop only), click Run diagnostics. When the operation has completed, it will copy the data to the clipboard automatically. Paste this data into a text file (or other document) and save it.Generating logs at the command lineTo generate logs at the command line, do the following:Open a terminal.Plug your YubiKey into your device.To connect via NFC on desktop, click the NFC icon in Yubico Authenticator and place your YubiKey on top of a desktop NFC reader. The key must maintain constant contact with the reader throughout the operation.Start the app and set your desired log level with the --log-level LEVEL argument, where LEVEL should be one of error, warning, info, debug, or traffic:macOS:open -a "Yubico Authenticator" --args --log-level LEVELWindows:\Program Files\Yubico\Yubico Authenticator\authenticator.exeYubico Authenticator 7.0.0 APK Download by Yubico - APKMirror
There's many ways you can add an extra layer of protection to a PC, but having a separate piece of hardware required to gain access is hard to beat. Yubico now offers all Windows users an easy way to do just that using its YubiKey security keys. As ZDNet reports, Yubico has spent the last six months testing an app called Yubico Login for Windows (formerly called the Windows Logon Tool), but it's finally available to use in stable form. When installed on a Windows PC, it allows your Windows login to be protected by a hardware security key inserted into a USB port. The so-called multi-factor authentication method can be setup for use with Windows 7, Windows 8.1, and Windows 10 computers, allowing for local account security. Yubico says it's very simple to configure, and for anyone concerned about losing their hardware key, it's easy to create backups and to perform a recovery. The app is available to download for free for 32-bit and 64-bit Windows installations, but you'll have to purchase a YubiKey for it to function. There's a number of YubiKey devices available to buy, but as the app uses the challenge-response authentication protocol you'll need a YubiKey 5 Series, which can be purchased for as little as $45. It may be possible to get a discount for buying more than one key, and if you select one with NFC it can be used with your Android or iOS device, too. If you're interested in using a. The latest versions of the Yubico Authenticator app are available to download directly from Yubico and/or via a platform store: macOS. Yubico Authenticator for macOS direct download. Yubico The latest versions of the Yubico Authenticator app are available to download directly from Yubico and/or via a platform store: macOS. Yubico Authenticator for macOS direct download. YubicoYubico Authenticator 7.0.1 APK Download by Yubico - APKMirror
Opt for greater flexibility with subscription, compared to a one-time purchasing model. Businesses with 500+ users qualify for YubiEnterprise Subscription. YubiKeys as a service, via subscription, delivers peace of mind in an uncertain world. Not sure which keys to buy? Compare keys to help you decide. Trusted Maximize security by adopting phishing-resistant MFA that is proven to stop account takeovers and trusted by millions of users worldwide.Scalable From corporate access management to social media accounts, YubiKeys provide strong MFA, 2FA and Passwordless solutions for business and personal users.Durable Built to last with glass-fiber reinforced plastic. IP68 rated (water and dust resistant), crush resistant, no batteries required, no moving parts. Tough enough to carry on a key ring.User-Friendly Yubico offers a simple and convenient authentication with plug-and-play functionality, eliminating the need for passwords or complex setups. Log in up to 4X faster with YubiKey 5. More info Quick links How to setup Get started with your YubiKey in a few seconds Buy from reseller Find authorized resellers on your local market Large volume orders Contact sales for YubiEnterprise orders Product sheet Find out all details Product overview Key features Broad ecosystem Deploy instantly with Centrify, Ping, Okta, Google and more. Configurable Easily configure multiple protocols across computers, networks, and online applications and services. Easy to use No battery or network connectivity required, users simply insert and tap to authenticate. High quality Built to last with glass-fiber reinforced plastic. IP68 rated (water and dust resistant), crush resistant, no batteries required, no moving parts. Trusted partner The YubiKey is deployed and loved by 9 of the top 10 internet brands and by millions of users. Multi-protocol Support for WebAuthn, FIDO2 CTAP1, FIDO2 CTAP2, FIDO2 CTAP2.1, Universal 2nd Factor (U2F), Smart card (PIV-compatible), Yubico OTP, OATH – HOTP (Event), OATH – TOTP (Time), OpenPGP, Secure Static Passwords. Works with Facebook, Twitter, Google Account, Microsoft account, Salesforce.com, Dropbox, Keeper®, 1Password, Bitwarden Premium, AWS Identity and Access Management (IAM), Duo Security, Forgerock, Idaptive, Microsoft Azure AD, Okta, OneLogin, Ping Identity. Yubico authenticator app Compatible with the Yubico Authenticator App. The safest authenticator app experience across mobileComments
Your web browser is not compatible with this site. Please use a different browser for the best web experience.HomeSymantec VIP Access Manager vs. Yubico YubiKeyBroadcom and Yubico are both solutions in the Authentication Systems category. Broadcom is ranked #15 with an average rating of 8.0, while Yubico is ranked #7 with an average rating of 9.0. Broadcom holds a 1.7% mindshare in AS, compared to Yubico’s 9.6% mindshare. Additionally, 86% of Broadcom users are willing to recommend the solution, compared to 100% of Yubico users who would recommend it. Comparison Buyer's GuideExecutive SummaryUpdated on Aug 11, 2024 The Yubico YubiKey and Symantec VIP Access Manager cater to user authentication needs. Yubico YubiKey seems to have an advantage in support and pricing, while Symantec VIP Access Manager offers more features. What features are offered by Yubico YubiKey in comparison to Symantec VIP Access Manager?Yubico YubiKey is praised for high security, straightforward integration across multiple platforms, and strong support. Symantec VIP Access Manager offers advanced user authentication options, extensive management tools, and a comprehensive feature set. What areas of improvement can be found in Yubico YubiKey in comparison to Symantec VIP Access Manager?Yubico YubiKey users often mention the need for better documentation, compatibility issues with certain operating systems, and, occasionally, more comprehensive support options. Symantec VIP Access Manager users desire a more intuitive setup process, faster customer support response times, and smoother initial deployment experiences. How is the ease of deployment and customer service of Yubico YubiKey in comparison to Symantec VIP Access Manager?Yubico YubiKey is straightforward to deploy, with minimal issues and high marks for customer service responsiveness. Symantec VIP Access Manager has a steeper learning curve during deployment, but customer service receives high marks once users are onboarded. What setup costs and ROI can be seen with Yubico YubiKey in
2025-04-11Argument to pam-u2f in the PAM stack stored under /etc/pam or /etc/pam.d. Yubico has detailed some example scenarios involving the management of the authfile at the center of the issue, including:Where a user-managed authfile, stored in the user home directory, is combined with pam-u2f used as a single-factor authentication method and the “nouserok” option enabled, an attacker could either remove or corrupt the authfile and force the pam-u2f module to return PAM_SUCCESS. “This would lead to local privilege escalation if the user is authorized to sudo,” Yubico said.With a centrally managed authfile, where a file cannot be modified without elevated privileges, and assuming pam-u2f is used as a second-factor authentication method in combination with a user password, Yubico said, an attacker could “attempt to memory-starve the system by allocating large amounts of memory, and triggering a memory allocation error within pam-u2f.” If successful, the second factor would not be verified anymore during an authentication event.ForbesFBI Confirms It Deleted Files From 4,258 U.S.-Based ComputersBy Davey WinderYubico Said No YubiKey Hardware Impacted By 2FA Bypass IssueYubico confirmed that no hardware is impacted by this vulnerability, meaning that the issue does not affect any “ previous or current generation YubiKey Series, YubiKey FIPS Series, Security Key Series, YubiHSM or YubiHSM FIPS devices.”Yubico CVE-2025-23013 Vulnerability ExplainedThe vulnerability in question, CVE-2025-23013, is classified as high-severity and means that in certain scenarios when memory cannot be allocated or the module cannot change privileges it “does not contribute to the final authentication decision performed by PAM.” What this means is that a second or primary authentication factor, depending on the specific use case, would no longer be verified. “A key differentiator between scenarios is the location of the authfile,” Yubico said,.Yubico recommends that affected customers upgrade to the latest version of pam-u2f either by directly downloading from GitHub or getting the latest update via Yubico PPA.I reached out to Yubico for a statement. “We can confirm that Yubico was informed by researchers that an issue was discovered in its open-source pam-u2f software package,” a Yubico spokesperson said, “this software issue does not impact YubiKeys or YubiHSMs.”ForbesMillions Of
2025-03-31Yubico security advisory confirms 2FA bypass vulnerability.LightRocket via Getty Images Update, Jan. 18, 2025: This story, originally published Jan. 17, now includes further information about CVE-2025-23013 and clarification from Yubico regarding the severity rating.Two-factor authentication has increasingly become a security essential over recent years, so when news of anything that can bypass those 2FA protections breaks, it’s not something you can ignore. Be that the perpetual hack attack facing Google users, malicious Chrome extensions, or they Rockstar bypass kit impacting Microsoft users. Now, Yubico has thrown its hat into the 2FA bypass ring with a security advisory that has confirmed a bypass vulnerability in a software module used to support logging in on Linux or macOS using a YubiKey or other FIDO authenticators. Here’s what you need to know.ForbesCritical Hidden Email Hack Warning Issued For Gmail And Outlook UsersYubico 2FA Security Advisory YSA-2025-01Yubico is most likely the first name that comes to mind when you think about two-factor authentication hardware keys and other secure authentication solutions. And for good reason: it has been leading the market in the area of hardware key resources for about as long as I can remember, and I’ve been in the cybersecurity business for multiple decades. So, when Yubico issues a security advisory, I tend to take notice and if you are a Yubico customer, so should you.Yubico security advisory reference YSA-2025-01 relates to a partial authentication bypass in the pam-u2f pluggable authentication module software package that can be deployed to support YubiKey on macOS or Linux platforms.According to the advisory, pam-u2f packages prior to version 1.3.1 are susceptible to a vulnerability that can enable an authentication bypass in some configurations. “An attacker would require the ability to access the system as an unprivileged user,” Yubico explained, and, depending upon the configuration, “the attacker may also need to know the user’s password.”ForbesWarning As PayPal Cyberattacks Continue—What You Need To KnowBy Davey WinderYubico Details Example Attack Scenarios“A key differentiator between scenarios is the location of the authfile,” (the argument itself is called authfile) Yubico said, explaining that the path for the authfile is configured via an
2025-04-24Your web browser is not compatible with this site. Please use a different browser for the best web experience.HomeRSA Identity Governance and Lifecycle vs. Yubico YubiKeyThe compared RSA and Yubico solutions aren't in the same category. RSA is ranked #23 in IAM , with an average rating of 7.0, and holds a 1.2% mindshare in the category. Yubico is ranked #7 in AS , with an average rating of 9.0, and holds a 9.6% mindshare. Additionally, 55% of RSA users are willing to recommend the solution, compared to 100% of Yubico users who would recommend it. Comparison Buyer's GuideWe performed a comparison between RSA Identity Governance and Lifecycle and Yubico YubiKey based on real PeerSpot user reviews.Find out what your peers are saying about Microsoft, SailPoint, One Identity and others in Identity Management (IM).To learn more, read our detailed Identity Management (IM) Report (Updated: March 2025).Review summaries and opinionsCategories and RankingSponsoredRanking in other categoriesUser Provisioning Software (3rd), Identity Management (IM) (4th), Identity and Access Management as a Service (IDaaS) (IAMaaS) (5th), Customer Identity and Access Management (CIAM) (3rd)RSA Identity Governance and...Ranking in other categoriesIdentity Management (IM) (23rd)Ranking in other categoriesAuthentication Systems (7th), Passwordless Authentication (4th), Multi-Factor Authentication (MFA) (2nd)Mindshare comparisonFeatured ReviewsQuotes from MembersProsConsPricing and Cost AdviceUse our free recommendation engine to learn which Identity Management (IM) solutions are best for your needs.841,676 professionals have used our research since 2012.Top IndustriesCompany SizeQuestions from the CommunityComparisonsProduct ReportsAlso Known AsOverviewSample Customers Find out what your peers are saying about Microsoft, SailPoint, One Identity
2025-04-01Or generate PIV keys or certificatesWhen attempting to import or generate a PIV key/certificate, the operations are greyed-out in Yubico Authenticator:If you have a YubiKey 5 FIPS Series key with firmware version 5.7 or later, you will not be able to add PIV credentials to your YubiKey until the PIV application is in the FIPS approved state. Perform the operations required to achieve FIPS approved status, then try importing/generating PIV credentials again.Slots: Yubico OTPAn error occurs when trying to open the Slots screen on macOSWhen trying to open the Slots screen on macOS, the following error message is seen:If you receive this error, it likely means that input monitoring has not been enabled on your device. Toggle that setting, close and reopen the app, and try again.AndroidUnable to take screenshots of the app on AndroidWhen attempting to capture a screenshot of the Yubico Authenticator app on an Android device, only a blank screen is saved.By default, screenshots are disabled on Yubico Authenticator for Android. To enable screenshots, do the following:Click the menu icon in the upper left corner of the app and select Home.Click Help and about under Application. To find the Application menu in a narrow app window, click the three dots in the upper right corner.Under Troubleshooting, click Allow screenshots.NFC wireless connectionsNFC activation requiredWhen attempting to use a brand new YubiKey with Yubico Authenticator over NFC, a message appears in the app that says NFC activation is required:This message indicates that the key has the Restricted NFC feature
2025-04-17