Introductions to the Different YubiKey Series — YubiKey Technical Manual documentation (2024)

  • Introductions to the Different YubiKey Series
  • View page source

Throughout the YubiKey Technical Manual YubiKey 5 Series, the YubiKey 5 FIPS Series and the YubiKey 5 CSPN Series, are referred to collectively as YubiKey 5 (FIPS/CSPN) Series. This label indicates that a certain specification or feature is available on all three Series. This is possible because they all share the same base hardware and many firmware features.

This topic introduces:

  • YubiKey 5 Series
  • YubiKey 5 FIPS Series
  • Security Key Series
  • YubiKey Bio Series
  • YubiKey 5 CSPN Series

YubiKey 5 Series

About the YubiKey 5 Series

The YubiKey 5 Series security keys offer strong authentication with support for multiple protocols, including FIDO2, which is the new standard that enables the replacement of password-based authentication. The YubiKey strengthens security by replacing passwords with strong hardware-based authentication using public key cryptography.

  • For those who just want to use a YubiKey without programming anything, the most useful part of this guide is Understanding the USB Interfaces. This topic describes how the YubiKey connects and indicates what it can connect to.

    For an overview on setting up two-step verification in a typical case, see Google on using a security key for 2-step verification.

  • The full list of the services that work with YubiKeys is on Yubico’s Works With YubiKey page.

  • Most of the rest of this guide targets systems integrators, IT teams, or developers who expect to integrate support for YubiKeys into their environment.

All the YubiKeys in the YubiKey 5 Series have the basic functionalities and capabilities described in this guide. However, it is the firmware version that determines which of the more specialized functionalities and capabilities are available on your YubiKey.

YubiKey 5 FIPS Series

Why FIPS?

Federal Information Processing Standards (FIPS) are developed by the United States government for use in computer systems to establish requirements such as ensuring computer security and interoperability. The National Institute of Standards and Technology (NIST) and the Canadian Centre for Cyber Security (CCCS) run the NIST Cryptographic Module Validation Program (CMVP) as a collaborative effort.

FIPS certification demonstrates that a product has gone through a rigorous audit process and adheres to a security standard that can be measured and quantified.

Many government organizations and government contractors are required to use FIPS-approved products, as are highly-regulated industries in general. Other countries also recognize FIPS 140-2. For the U.S. government, the default is that FIPS is required.

Do You Require FIPS Keys?

If you do not have a security auditor, and/or the auditor does not have a compliance requirement, you probably do not need FIPS. The standard line of YubiKeys offers the same security, algorithms, and functionality. The standard line also evolves at a much more rapid pace because it does not need complete an exhaustive validation process, which commonly takes a year or more. Yubico can release standard firmware with new features and enhancements at any time, whereas FIPS-certified products complete the FIPS validation process every time there is a change.

About the YubiKey 5 FIPS Series

The YubiKey 5 FIPS Series is FIPS 140-2 certified. It offers strong authentication with support for multiple protocols - including FIDO2, which is the new standard that enables the replacement of password-based authentication. The YubiKey strengthens security by replacing passwords with strong hardware-based authentication using public key cryptography.

The cryptographic functionality of the YubiKey 5 FIPS Series devices is powered by the FIPS 140-2 certified YubiKey 5 cryptographic module, a single-chip cryptographic processor with a non-extractable key store that handles all of the cryptographic operations. The YubiKey 5 cryptographic module is FIPS 140-2 certified, both Level 1 and Level 2 (Physical Security Level 3).

The YubiKey 5 FIPS Series cryptographic module is a security feature that supports multiple protocols designed to be embedded in USB security tokens. The module can generate, store, and perform cryptographic operations for sensitive data and is accessed through an external touch-button for Test of User Presence in addition to PIN for smart card authentication. The module implements the following major functions, depending on the firmware version on the YubiKey:

FunctionFirmware Versions
5.4.25.4.3
Yubico One Time Password (OTP)yesyes
OATH OTP authenticationyesyes
OpenPGP (version 3.4)
yes
PIV-compatible smart cardyesyes
FIDO Universal 2nd Factor (U2F)yesyes
FIDO2 WebAuthnyesyes
YubiHSM Auth
yes
SCP03yesyes

The YubiKey 5 FIPS Series hardware with the 5.4 firmware is certified as an authenticator under both FIPS 140-2 Level 1 and Level 2. It meets the highest authenticator assurance level 3 (AAL3) of NIST SP800-63B guidance. To use security keys from the YubiKey 5 FIPS Series as a Level 2, more stringent initialization is required than for Level 1. Guidance for Level 2 is detailed in the following topics.

FIPS-specific Aspects of the YubiKey 5 FIPS Series

The table below lists the YubiKey 5 FIPS Series with the 5.4 firmware includes configuration changes that are set at programming. These are in addition to the configuration available in the YubiKey 5 FIPS Series.

YubiKey 5 FIPS Series 5.4 Configuration Changes
Configuration ChangeDescription
Functional

Enforce power-up self-test (firmware integrity and

algorithm testing)

Minimum PIN length

for FIDO2

6 alphanumeric characters

Identification

(FIDO)

Unique AAGUIDs for the FIDO Attestation

(see AAGUID Values)

Attestation (FIDO)

Attestation certificates for FIDO include

a FIPS OID (1.3.6.1.4.1.41482.12)

FIDO GETINFO

Command returns a listing of FIPS, as well as the

FIPS-specific OIDs in the PIV and FIDO attestation

certificates.(1)

Attestation (PIV)

Attestation certificates for PIV include

the FIPS Form Factor identifier** in the

Form Factor OID (1.3.6.1.4.1.41482.3.9)

YubiKey ManagerForm factor identifies FIPS Series devices.(2)
  1. The certifications that are supported by a FIDO authenticator can be returned in the certifications member of an authenticatorGetInfo response as set out in paragraph 7.3.1. Authenticator Actions of the Client to Authenticator Protocol (CTAP) Review Draft of March 09, 2021.
  2. Form factor is set during manufacturing and returned as a one-byte value. Currently defined values for this are:
Form Factor

Form Factor

Standard

YubiKey Value

Security Key

Value, FW 5.4+

FIPS YubiKey

Value, FW 5.4+

UNDEFINED0x00N/AN/A
Keychain, USB-A0x010x410x81
Nano, USB-A0x02N/A0x82
Keychain, USB-C0x030x430x83
Nano, USB-C0x04N/A0x84

Keychain with

Lightning, USB-C

0x05N/Ax85

Firmware

YubiKeys are programmed in Yubico’s facilities with the latest available firmware and once programmed cannot be updated to another version. The firmware cannot be altered or removed from a YubiKey.

Yubico periodically updates the firmware to take advantage of features and capabilities introduced into the ecosystem.

The firmware version on a YubiKey or an HSM determines whether or not a feature or a capability is available to that device. The quickest and most convenient way to determine your device’s firmware version is to use the YubiKey Manager tool (ykman), a lightweight software package installable on any OS. The YubiKey Manager has both a graphical user interface (GUI) and a command line interface (CLI).

  • Download the YubiKey Manager tool: https://www.yubico.com/products/services-software/download/yubikey-manager/

Yubico submitted the firmware for releases 5.4.2 and 5.4.3 to NIST and the organization approved the certification. The certificates can be found here.

Yubico submitted release 5.4.2 to ANSSI for certification and the organization approved the certification. For more information about the YubiKey 5 CSPN Series see YubiKey 5 CSPN Series.

Security Key Series

The Security Key Series differs from a YubiKey 5 Series in that it comes only with the FIDO (FIDO2/FIDO U2F) protocol and does not have a serial number. It is only available in USB-A + NFC and USB-C + NFC form factors.

The Security Key Series - Enterprise Edition is the same as a Security Key Series but includes a serial number to allow for asset tracking. The serial number can be read visually on the back of the key and programmatically through the FIDO HID interface. It is only available in USB-A + NFC and USB-C + NFC form factors.

Get started with Security Key Series (video tutorial)

YubiKey Bio Series

The YubiKey Bio Series offers the familiar YubiKey experience users have come to know and trust, but adds the convenience of a new biometric touch feature.

The series is comprised of two keys:

  • The YubiKey Bio - FIDO Edition (USB-A form factor)
  • The YubiKey C Bio - FIDO Edition (USB-C form factor)

Protocols Supported

Both keys in the YubiKey Bio Series support the FIDO authentication protocols, and work with sites and applications that support the FIDO2 and FIDO U2F protocols (for more information, see YubiKey Bio and FIDO2 and YubiKey Bio and FIDO U2F). FIDO2 (sometimes referred to as WebAuthn) builds upon FIDO U2F, and is the standard that enables the replacement of password-based authentication.

The YubiKey Bio Series provides firmware applications to support two modes of authentication through the FIDO2 and U2F protocols (see YubiKey Bio and FIDO2 and YubiKey Bio and FIDO U2F). Even though the firmware applications are separate from one another, they both share the same PIN and FIDO reset capability. In fact, a FIDO reset resets both applications. To manage these applications, see Tools.

Using the YubiKey Bio

For a quick start to using the YubiKey Bio Series, without a lot of details, see Yubico’s setup page.

This guide, the YubiKey Technical Manual, provides:

  • An explanation of the way the YubiKey Bio works and descriptions of the different user experiences with the various protocols
  • Full instructions for enrolling fingerprints using platform support:
    • Using Chrome to Enroll Fingerprints and
    • Using Windows to Enroll Fingerprints
  • Brief descriptions of the protocols supported in YubiKey Bio and FIDO2 and YubiKey Bio and FIDO U2F
  • A brief explanation of the role the Yubico Authenticator for Desktop plays in managing the YubiKey Bio, plus links for downloading it and to its documentation.

Usage Notes

The YubiKey Bio implements biometrics as outlined in the CTAP 2.1 specification. The best user experiences are provided by the YubiKey Bio with client applications and browsers that also implement CTAP 2.1. Applications and browsers that implement CTAP 1 or CTAP 2.0 also work with the YubiKey Bio. However, the UI on client devices is not as intuitive and there might be some limitations.

Interfaces and Applications

Interfaces

Like all YubiKeys, the YubiKey Bio Series are USB 2.0 devices.

Note

Developers: The USB PID and iProduct string are 0x0402 and YubiKey FIDO respectively. See YubiKey USB ID Values.

Applications

All keys in the YubiKey Bio Series support WebAuthn sites and applications that support the FIDO2 and FIDO U2F protocols. For more information, see YubiKey Bio and FIDO2 and YubiKey Bio and FIDO U2F. FIDO2 (also known as WebAuthn) is the standard that enables the replacement of password-based authentication.

Each application can be enabled and disabled independently. Up to five fingerprints can be stored on a YubiKey Bio. For management, see Troubleshooting and Tools.

YubiKey 5 CSPN Series

Scope

This document describes how to configure and use the YubiKey 5 in compliance with CSPN (“Certificat de Sécurité de Premier Niveau” [RD1]).

For each YubiKey application that requires specific configuration, the documentation provides a short introduction, the required settings to achieve the target, and a technical description of the configuration.

References

CodeDocument titleReference
[RD1]

Certification de sécurité

de premier niveau des

technologies de l’information

administration/produits

-certifies/cspn/

[RD2]

Certification Report

BSI-DSZ-CC-0879-V4-2020

SharedDocs/Zertifikate_CC/CC/

SmartCards_IC_Cryptolib/

0879_0879V2_0879V3_0879V4.html

[RD3]FIDO2: WebAuthn & CTAPhttps://fidoalliance.org/fido2/
[RD4]

NIST Special Publication

800-73 (PIV)

publications/detail/sp/800-73/4/

final

[RD5]

RFC 4226, An HMAC-Based One-

Time Password Algorithm

https://tools.ietf.org/html/rfc4226
[RD6]

T/Key: Second-Factor

Authentication From Secure

Hash Chains

[RD7]

Universal 2nd Factor (U2F)

Overview

fido-u2f-v1.2-ps-20170411/fido-u2f

overview-v1.2-ps-20170411.html

[RD8]W3C WebAuthn standardhttps://www.w3.org/TR/webauthn-2/
[RD9]YubiKey CSPN security target

2021/09/anssi-cible-cspn-

2021_18en.pdf

Click for Yubico Support.

Introductions to the Different YubiKey Series — YubiKey Technical Manual  documentation (2024)

FAQs

What is the difference between YubiKey 5 series and security key series? ›

The Security Key Series differs from a YubiKey 5 Series in that it comes only with the FIDO (FIDO2/FIDO U2F) protocol and does not have a serial number. It is only available in USB-A + NFC and USB-C + NFC form factors.

What are the different modes of YubiKey? ›

The YubiKey allows three different protocols to be used simultaneously – PIV, as defined by the NIST standard for authentication; OpenPGP for encryption, decryption, and signing; and OATH, for client apps like Yubico Authenticator.

How do I manually enter my YubiKey code? ›

To manually add the secret key, select Add account manually, then enter the credential name, and type the secret key that you previously saved as a backup.

What is the secret key for YubiKey? ›

A Yubico OTP (one-time password) is a unique 44-character string that is generated by the YubiKey when it is touched (while plugged into a host device over USB or Lightning) or scanned by an NFC reader.

Which YubiKey is the most secure? ›

The YubiKey 5 FIPS certified security keys meet the highest level of assurance (AAL3) of the new NIST SP800-63B guidelines.

How many keys can you have on a YubiKey? ›

YubiKeys in the 5 Series can hold up to 25 resident keys. FIDO2 support is available to the iPad Pro via the USB-C or Lightning® connectors of the YubiKey 5Ci. FIDO2/WebAuthn can be achieved over USB-C using any of the following options: ASWebAuthenticationSession.

Which YubiKey has NFC? ›

Convenient and portable: The YubiKey 5 NFC fits easily on your keychain, making it convenient to carry and use wherever you go, ensuring secure access to your accounts at all times.

What is the best practice for YubiKey security? ›

Best practice is to have multiple YubiKeys set up for your accounts. One on your keychain, or one in your wallet, or one in a safe place at home will help to make sure you've always got a backup YubiKey nearby. Many services let users set up multiple YubiKeys with their account for this very reason.

Should I leave my YubiKey plugged in all the time? ›

If it's your first time using a YubiKey and you're used to Touch ID, we suggest using the Nano key and leaving it plugged in. If you're working from home, you can leave it plugged in.

What is the default admin key for YubiKey? ›

The default PIN code is 123456. The default PUK code is 12345678. The default management key (9B) on YubiKeys with firmware up to version 5.7 is a 3DES key with value 010203040506070801020304050607080102030405060708.

Can I use the same YubiKey for multiple accounts? ›

With WebAuthn, you can use the same YubiKey for unlimited sites and accounts. Just make sure to keep your YubiKey in a safe place and don't share it with anyone else.

Does YubiKey require software? ›

The versatile YubiKey requires no software installation or battery and therefore it is ready to use directly out of the package.

How do I view my YubiKey certificates? ›

Perform the below steps on the Windows workstation you enrolled for the certificate using a YubiKey.
  1. Launch PKI Client:
  2. Click on the Security Device icon to view all certificates installed on the YubiKey:
  3. Click on View certificate details to view the contents of the certificate:

Can I use YubiKey instead of password? ›

The YubiKey 5 Series is a hardware based authentication solution that offers strong two-factor, multi-factor and passwordless authentication with support for multiple protocols including FIDO2, U2F, PIV, Yubico OTP, and OATH TOTP.

What is the difference between YubiKey and passkey? ›

Passkey vs YubiKey – Understanding the difference

The crucial difference between passkey and YubiKey devices is that passkeys stored by YubiKeys cannot be copied. Meanwhile, passkeys created through platforms such as Google or Apple are copyable, which allows them to be synced across multiple devices.

What is the difference between YubiKey and OnlyKey? ›

Physically, the Yubikey only has a touch area to activate its TOTP/OTP capabilities. In contrast, the OnlyKey has a whole range of hardware/software combined capabilities and physically a touch-based 6-number keypad to enter a 7- to 10-digit PIN on the device.

What is the difference between YubiKey and Fido security key? ›

Yubikey is a physical authentication device that plugs into a computer or mobile device and uses one-time passwords for authentication. U2F (Universal 2nd Factor) is an open authentication standard developed by the FIDO Alliance, which allows users to securely log into websites and apps with a single tap or click.

What is the best YubiKey for home use? ›

As testers of security keys over the years, we recommend the Yubico YubiKey 5 NFC as the best security key available on the market today. It offers unbeatable security and convenience, making it a worthwhile investment for anyone looking to safeguard their online accounts.

Top Articles
Latest Posts
Article information

Author: Saturnina Altenwerth DVM

Last Updated:

Views: 6696

Rating: 4.3 / 5 (44 voted)

Reviews: 91% of readers found this page helpful

Author information

Name: Saturnina Altenwerth DVM

Birthday: 1992-08-21

Address: Apt. 237 662 Haag Mills, East Verenaport, MO 57071-5493

Phone: +331850833384

Job: District Real-Estate Architect

Hobby: Skateboarding, Taxidermy, Air sports, Painting, Knife making, Letterboxing, Inline skating

Introduction: My name is Saturnina Altenwerth DVM, I am a witty, perfect, combative, beautiful, determined, fancy, determined person who loves writing and wants to share my knowledge and understanding with you.