Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.


...

Div
classbreadcrumbs

HomeSingle Sign-On and MFAMulti-Factor Authentication / Current: Integrating Yubico OTP


Anchorintegrating-yubico-otpintegrating-yubico-otp

Integrating Yubico OTP

{{#markdown}}

In order to use Yubico OTP as a multi-factor authentication type, you must get an API key from Yubico and register the

**

Client ID

** and **

 and Secret Key

** generated

 generated by Yubico in

EmpoweID

EmpowerID. Upon successful integration, you can add Yubico OTP to any Password Manager Policy as a multi-factor authentication type.

###

To integrate Yubico

OTP1. From

OTP

  1. In the Navigation Sidebar,
navigate to the **EmpowerID System Settings** page by expanding **Admin > Miscellaneous** and clicking **
  1. expand Admin, then Miscellaneous and click EmpowerID System Settings
**
  1. .
2.
  1. Search for
**
  1. Yubico
**. You should see settings for **YubicoOTPApiKey** and **YubicoOTPClientID** in the grid.![]({{root}}assets/img/managingappsandsso/yubicosystemsettings.png)3.
  1. . Settings for YubicoOTPApiKey and YubicoOTPClientID appear in the grid.

    Image Added

  2. From the grid, click the
**
  1. Edit
** button
  1.  button for the
**
  1. YubicoOTPApiKey
** setting.![]({{root}}assets/img/managingappsandsso/yubicosystemsettings_editapikey.png)4.
  1.  setting.

    Image Added

  2. In the dialog that appears, enter the
**
  1. Secret Key
** you
  1.  you received from Yubico in the
**
  1. Value
** field
  1.  field and click
**
  1. Save
**.![]({{root}}assets/img/managingappsandsso/yubicoapikeyvalue.png)6.
  1. .

    Image Added

  2. Back in the grid, click the
**
  1. Edit
** button
  1.  button for the
**
  1. YubicoOTPClientID
** setting.7.
  1.  setting.
  2. In the dialog that appears, enter the
**
  1. Client ID
** you
  1.  you received from
YUbico
  1. Yubico in the
**
  1. Value
** field
  1.  field and click
**
  1. Save
**.![]({{root}}assets/img/managingappsandsso/yubicoclientidvalue.png)
  1. .

    Image Added


Now that you have registered your Yubico Client ID and Secret Key in EmpowerID, the next step to using it for MFA in EmpowerID is to add it to a Password Manager policy as a multi-factor authentication type. For directions on how to do so, see

[

Assigning MFA Types to Password Manager Policies

](assigningmfatypestopasswordmanagerpolicies

.

html).{{/markdown}} Related Topics Anchorconceptsconcepts

Concepts:

Anchoradministrative-proceduresadministrative-procedures

Administrative Procedures:

Anchoruser-tasksuser-tasks

User Tasks

  • Using Duo Two-Factor Authentication
  • Using Yubikey OTP
  • Using OATH Tokens
  • Using FIDO Universal 2nd Factor
  • Using EmpowerID One-Time Password
  • Using Device Registration


    Info
    iconfalse
    titleRelated Content