Just yesterday I had to go into Google Authenticator for a code and when I logged into my GitHub account from my husband’s laptop, I needed to enter the code I got by text. But there is another way, and it’s a tiny FIDO U2F security key that I’ve now put on my keychain.
The key I bought is the one on the far right. Next I plugged the key into my PC, it blinked a few times. I entered password/username and clicked next. Registration, done.
Then I had to log out, log in on a different page and then touch the button/touchpad on the security key to complete authentication.
Here’s a little more about the FIDO U2F standard:
Dropbox
Set up Two-Step Verification for your Dropbox account, if you haven’t already. This is also where you will set up your mobile device as a backup in cases where you can’t use the key. Here are the requirements to secure your Dropbox account with the Yubico key:
Latest version of Google Chrome browser (or at least version 38) A YubiKey 4, YubiKey Nano, FIDO U2F Security Key, YubiKey NEO, or YubiKey NEO-n One finger (the YubiKey button is a capacitive sensor, not a biometric) A Dropbox account
Once at Dropbox, navigate to your account settings and then Security. Click Security Keys, and then click Add. Enter your password, and click Next. Click Begin setup.
Insert the key, wait a few seconds, and then click Key Inserted. When you see the message “Scanning for security key,” your key should start to flash. Wait for it to blink, and tap the button.
All done! Hit Finish and move on with your day feeling a little more secure.
Go to the Add a Security Key page section of My Account. Remove the key if it’s already inserted. Click on the Register button. Insert your Security Key into a USB port on your computer. Completing registration varies slightly depending on the type of security key you have: Key with a button: After inserting, you should see a blinking light. Lightly tap the blinking circle. You’ll see a green checkmark to confirm registration. Key without a button: This Security Key turns off after each use. Please remove and reinsert the Security Key each time you need to use it. You’ll see a green checkmark to confirm registration.
Click Done. When logging in from a new PC, you’ll be prompted to authenticate with the USB security key. Insert the key and press the button when you’re asked (if there is a button.) Some devices and browsers (any browser but Chrome, actually) don’t support security keys, so in those cases you can still use SMS verification or another two-step verification method you’ve configured in your Google account security settings.
Github
Login to Github, click your photo in the top right and go to Settings and then Security. Or just click this link to be taken to the security page. Enable 2FA if it isn’t already. Once 2FA is already enabled, click edit.
Next scroll down to the bottom of the page where it says Security Keys and click Register New Device.
Fill in a nickname, click Add, and insert the key into the USB port and tap its button.
Then you’ll have the option of adding another key or deleting existing keys.
U2F for Everyone
Physical security keys, such as the Yubico FIDO U2F one I’m using, are still somewhat unknown and not yet a universal solution. For example, my key only works in connection with Google Chrome and requires a fully fledged PC (a device with a USB port), but don’t underestimate FIDO U2F keys. The FIDO alliance is composed of several industry heavyweights, from financial institutions to technology and chip makers including the Alibaba Group, ARM, Bank of America, Discover, Google, Intel, ING, Lenovo, MasterCard, Microsoft, NTT DoCoMo, NXP Semiconductors, PayPal, Qualcomm, RSA, Samsung, Synaptics, USAA and Visa. It might be impossible to use your U2F key on a lot of websites today, but that’s bound to change. As the industry moves forward FIDO (or FIDO 2.0 which includes Bluetooth and NFC implementations) along with mobile-style payments (Apple/Android pay using biometric authentication) will be shaping the future of e-commerce and online authentication. Update: Some of our readers have showed concern if you were to lose your Yubikey. One valid recommendation is to buy two Yubikeys, keeping the second as backup on a safe place. Note however that services that offer two-factor authentication using Yubikey also have recovery mechanisms so that you shouldn’t be locked out completely if this were to happen.