Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

...

Integrating Yubico OTP

...

In order to use Yubico OTP as a multi-factor authentication type, you must get an API key from Yubico and register the

...

Client ID

...

 and Secret Key

...

 generated by Yubico in

...

EmpowerID. Upon successful integration, you can add Yubico OTP to any Password Manager Policy as a multi-factor authentication type

...

.

Style
importhttps://docs.empowerid.com/docs.css


To integrate Yubico

OTP1. From

OTP

  1. In the Navigation Sidebar,
navigate to the **EmpowerID System Settings** page by expanding **Admin > Miscellaneous** and clicking **EmpowerID System Settings**.2. Search for **Yubico**. You should see settings for **YubicoOTPApiKey** and **YubicoOTPClientID** in the grid.![]({{root}}assets/img/managingappsandsso/yubicosystemsettings.png)3.
  1. expand Admin, then Miscellaneous and click EmpowerID System Settings.
  2. To obtain Yubico APIKey and ClientID, go to https://upgrade.yubico.com/getapikey/ and enter a valid email address along with the Yubico OTP from any of your YubiKeys.
  3. Search for Yubico. Settings for YubicoOTPApiKey and YubicoOTPClientID appear in the grid.

    Image Added

  4. From the grid, click the
**
  1. Edit
** button
  1.  button for the
**
  1. YubicoOTPApiKey
** setting.![]({{root}}assets/img/managingappsandsso/yubicosystemsettings_editapikey.png)4.
  1.  setting.

    Image Added

  2. In the dialog that appears, enter the
**
  1. Secret Key
** you
  1.  you received from Yubico in the
**
  1. Value
** field
  1.  field and click
**
  1. Save
**.![]({{root}}assets/img/managingappsandsso/yubicoapikeyvalue.png)6.
  1. .

    Image Added

  2. Back in the grid, click the
**
  1. Edit
** button
  1.  button for the
**
  1. YubicoOTPClientID
** setting.7.
  1.  setting.
  2. In the dialog that appears, enter the
**
  1. Client ID
** you
  1.  you received from
YUbico
  1. Yubico in the
**
  1. Value
** field
  1.  field and click
**
  1. Save
**.![]({{root}}assets/img/managingappsandsso/yubicoclientidvalue.png)
  1. .

    Image Added


Tip

Now that you have registered your Yubico Client ID and Secret Key in EmpowerID, the next step to using it for MFA in EmpowerID is to add it to a Password Manager policy as a multi-factor authentication type. For directions on how to do so, see

[

Assigning MFA Types to Password Manager Policies

](assigningmfatypestopasswordmanagerpolicies.html)

.

{{/markdown}} Related Topics Anchorconceptsconcepts

Concepts:

Anchoradministrative-proceduresadministrative-procedures

Administrative Procedures:

Anchoruser-tasksuser-tasks

User Tasks

  • Using Duo Two-Factor Authentication
  • Using Yubikey OTP
  • Using OATH Tokens
  • Using FIDO Universal 2nd Factor
  • Using EmpowerID One-Time Password
  • Using Device Registration