The YubiKey Bio - first teased almost two years ago at Microsoft Ignite in November 2019 - jumps on the passwordless bandwagon by embedding a built-in fingerprint reader to the key. Microsoft recently rolled out a passwordless sign-in option to all consumer accounts, and Google this year announced plans to eventually eliminate the password. The launch of the YubiKey Bio comes as tech giants transition away from traditional password-based logins, a prime target for cyberattacks. However, developers have improved mobile setup considerably in recent years-it’s about time-so the YubiKey 5Ci works with any device that supports USB-C and Apple Lightning with very few steps required.Yubico, the maker of hardware security keys, has unveiled the YubiKey Bio, its first key to support biometric authentication for passwordless logins and multifactor authentication (2FA) On the former, the process feels a bit easier, if only because computer displays are larger. In most cases, you can set up your YubiKey security key on desktop and mobile. For example, turning on two-factor authentication on Twitter differs significantly from what you must do on Instagram and other social networking sites. This can add some confusion, especially when activating two-factor authentication in the first place. Rather, the process for each app is slightly different than the next. It’s not that setting up keys for your favorite apps is challenging to do. If you’re new to using security keys, expect to experience a modest learning curve. RELATED: What Is Two-Factor Authentication, and Why Do I Need It? How the Yubikey 5Ci Works There are also biometric tools, such as fingerprints and facial scans. First, there are security tokens, which a product like the YubiKey 5Ci provides. For the second factor, you have a choice of options. Under 2FA, passwords (or passcodes) remain the primary authentication factor. Doing so can better protect your credentials and the resources you wish to access.īefore 2FA, a single-factor authentication (SFA), such as a password, protected most online data. It’s a security process that requires you to provide two different authentication factors for verification purposes, usually when logging into a new device for the first time. Two-factor authentication, or 2FA, has existed for many years and comes in many forms. Quick Overview of Two-Factor AuthenticationĬompatibility: Works With Almost Everything
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |