Modernize Federal Identities (2024)

Modernize Federal Identities (1) Modernize Federal Identities (2)

Okta Yubikey Implementation Guide
Version Number Date Change Description
1.0 06/01/2024 Initial draft.

Executive Summary

This guide details the implementation and usage of YubiKey, a durable and portableexternal security device, by federal employees and contractors to enhance the security offederal systems through FIDO2 compliant multi-factor authentication MFA. It highlights thebenefits of YubiKey, emphasizing its resistance to phishing attacks and broad compatibility withvarious platforms, making it an ideal choice for securing sensitive government data.The guide provides comprehensive instructions for initial setup on both MacOS and Windows,including downloading the YubiKey Manager, creating a secure PIN, and configuring the devicewith federal systems such as Okta. Additionally, it addresses questions concerning thenecessity of a PIN for YubiKey, the limitations of using platform authenticators in a federalcontext, and troubleshooting tips for issues like forgotten PINs or device resetting. Thisdocument is a crucial resource for federal employees and contractors tasked with maintaininghigh security standards using YubiKey on federal systems.

Why YubiKey?

The YubiKey is a small, external authenticator, also known as a security key, designed to makeyour online accounts more resistant to phishing and compromise. It is used to perform multifactorauthentication MFA when users access secure systems. The YubiKey represents anadvancement in MFA technology by offering a more secure and user-friendly alternative totraditional methods like text-based codes or mobile authenticator apps. A key feature of theYubiKey is the touch sensor which is used to show that there is someone at that device. Thediagram below shows the different YubiKey Series 5 dongles and highlights the sensors.

Modernize Federal Identities (3)

Using YubiKey is generally considered more secure than conventional MFA methods like OnetimePasswords OTP or Time-based One-time Passwords TOTP used by mobile apps suchas Google Authenticator or Okta Verify. With OTP and TOTP, users must verify the authenticityof a website and secure their connection, introducing elevated phishing risks. The YubiKeySeries 5 employs FIDO2 technology, which uses cryptographic credentials to validateconnections to legitimate websites, thus eliminating the need for users to verify connectionauthenticity. This minimizes phishing risks, including cross-site scripting, typo-squatting, andman-in-the-middle attacks. Additionally, YubiKey requires physical interaction and may usePINs, ensuring data transmission only occurs with user consent, further enhancing security.

Other features of YubiKeys include

  • Rugged and Portable The YubiKey is made with solid materials like glass-fiber reinforcedplastic, can handle water and dust, and it does not need batteries.

  • Easy to Connect YubiKeys are available in USB-A and USB-C formats, as well as having aNear Field Communication NFC option for mobile devices, making it compatible with mostcomputers and smartphones.

  • Broad Compatibility The YubiKey is compatible with many operating systems like Windows,macOS, Chrome OS, Linux, and popular web browsers like Chrome, Safari, and Edge. It canhelp secure access to most online services and platforms.

  • FIPS Certified The YubiKey series also offers FIPS compliant versions which are required bygovernment agencies and regulated industries like healthcare.

Prerequisites

To use YubiKey for FIDO2 authentication on Okta, several prerequisites must be met to ensure a successful deployment and operation

  • Compatible YubiKey Device Ensure that the YubiKey model you intend to use supports FIDO2. YubiKey 5 Series or newer models are typically compatible.

  • Supported Web Browsers The web browser used to access Okta must support WebAuthn. Popular browsers such as Google Chrome, Mozilla Firefox, Microsoft Edge, and Safari typically have this support.

  • Okta Configuration Okta must be configured to allow FIDO2 as an authentication method. This involves setting up and enabling FIDO2 in the Okta admin dashboard under the authentication and security settings. See Device Enrollment Configuration with Okta set-up

  • Operating System Compatibility The operating system on the user’s device must be compatible with the YubiKey model being used. This includes support for the necessary USB or NFC interfaces provided by the YubiKey. User Training and Onboarding - Users will need to learn how to use their YubiKey, including initial setup, PIN creation, and using it to login.

Device enrollment configuration with Okta set-up

Prerequisites

Disable use of Syncable Passkeys

  1. WebAuthn supports enrollment of passkeys, a password-less type of authentication.

  2. Passkeys can be saved to a cloud service such as Apple iCloud and transferred to other devices.

  3. For this reason, it is preferred to disable this functionality for federal accounts.

  4. Navigate to Settings > Features on the left menu.

  5. Ensure the feature “Block passkeys for FIDO2 (WebAuthn) Authenticators” is toggled to the enable position.Modernize Federal Identities (4)

Create a Group for the WebAuthn policy

  1. Okta policies are configured on a user group basis. The first step is to create a group. Users

  2. added to this group will have the ability to use Yubikeys. Modernize Federal Identities (5)

  3. Enter a name and description and save the group.Modernize Federal Identities (6)

Procedure

Enable the Authenticator

  1. On the left menu navigate to Security > Authenticators.

  2. Click “Add Authenticator” Modernize Federal Identities (7)

  3. Under the “FIDO2 (WebAuthn)” tile, click the “Add” button. Modernize Federal Identities (8)

  4. Set “User verification” to “Discouraged”.

  5. Click the “Add” button. Modernize Federal Identities (9)

Optional Device Restrictions

  1. After adding the FIDO2 authenticator you will see the “Authenticator settings” tab.

  2. This allows configuring the accepted devices when enrolling FIDO2 security tokens such asrequiring the use of FIPS compliant security tokens.

Restricting use to only FIPS compliant security tokens

  1. Click the “Add authenticator group” button. Modernize Federal Identities (10)

  2. Enter a name for this group, for example “Yubikey FIPS Only” Modernize Federal Identities (11)

  3. Search for the desired devices and select all that apply. Modernize Federal Identities (12)

  4. When all of the desired devices are selected click “Add authenticator group” Modernize Federal Identities (13)

  5. When finished you will see your group created Modernize Federal Identities (14)

Create Enrollment Policy

  1. The final step is to create an enrollment policy which will apply the desired group.

  2. From the left menu navigate to Security > Authenticators, select the “Enrollment” tab, click “Add Policy”Modernize Federal Identities (15)

  3. Enter a name for the policy.

  4. Select a previously created group for the “Assigned to groups” field.

  5. Optionally set “Allowed authenticators” to the “Authenticators from selected group list”.

  6. Click “Create policy”.Modernize Federal Identities (16)

  7. On the next screen enter a name for the Enrollment Rule, click “Create rule”.Modernize Federal Identities (17)

  8. At this time, you will see your complete policy and rule.

  9. Adjust the enrollment policy priority as desired to meet your requirements.

  10. This concludes the configuration steps.Modernize Federal Identities (18)

First-time setup for new device PIN creation MacOS

Step 1 - Install YubiKey Manager

  1. Download the Yubikey Manager - Access the download link provided and save the file to your Mac.

  2. Run the Installer

  3. Locate the downloaded file, usually in your Downloads folder, and double-click to open it.Modernize Federal Identities (19)

  4. Proceed through the installation wizard by selecting Continue > Continue and then install.

  5. Authorize the Installation

  6. Depending on your Mac’s security settings, you might need to authorize the installation using TouchID, FaceID, or your Mac login password.

  7. Confirm by clicking OK if prompted for access to the downloads folder.

  8. Complete the installation

  9. Once the installation is complete, you will have the option to move the installer to the trash. Click Close to finalize the install.Modernize Federal Identities (20)

  10. Open the YubiKey Manager

  11. You can open the YubiKey Manager either by using Spotlight search Command + Spacebar and type “YubiKey” or by going directly to your Applications folderModernize Federal Identities (21)

  12. Prepare the YubiKey

  13. Plug your YubiKey into the appropriate USB port on your Mac.Modernize Federal Identities (22)

Step 2 - Setup YubiKey PIN

  1. Navigate to PIN Setup

  2. In the YubiKey Manager, go to Applications > FIDO2Modernize Federal Identities (23)

  3. Set Your PIN

  4. Click on Set PIN.Modernize Federal Identities (24)

  5. In the New PIN field, enter a unique combination of at least six characters (FIDO2 requirement).

  6. Your PIN can include both letters and numbers.

  7. Choose a secure and memorable PIN.

    Caution

    Avoid simple sequences or commonly used numbers such as password or 123456.


    Modernize Federal Identities (25)

  8. Re-enter the same PIN in the Confirm PIN field to ensure accuracy.

  9. Confirm PIN Setup

  10. Click Set PIN to finalize your PIN setup. This PIN will be required for enrolling your security key and for subsequent access to Okta.Modernize Federal Identities (26)

Enrolling a Security Key on CMS Okta IDM-MacOS

  1. Login to Okta portal

  2. Navigate to Okta and sign in using your EUA Username and Password.

  3. Click the checkbox to Agree to the Terms & Conditions.

  4. Click Sign In
    Modernize Federal Identities (27)

  5. The page refreshes to display an MFA authentication prompt.

  6. Complete the MFA challenge with your current setup (e.g., Okta Verify mobile app)Modernize Federal Identities (28)

  7. Navigate to Security Settings

  8. Click your name to expand the drop-down link.Modernize Federal Identities (29)

  9. Click Settings.Modernize Federal Identities (30)

  10. Start Security Key Enrollment

  11. Within the Extra Verification menu, click the Setup button next to the Security Key or Biometric Authenticator menu option.

  12. Avoid selecting the YubiKey option. This menu option is used for legacy FIDO devices.Modernize Federal Identities (31)

  13. Enroll Your Security Key

  14. Navigate to the Multifactor Authentication section and then click Setup.Modernize Federal Identities (32)

  15. Click Enroll.Modernize Federal Identities (33)

  16. Click the Use a different passkey button.Modernize Federal Identities (34)

  17. Select the Use a phone, tablet, or security key menu option.Modernize Federal Identities (35)

  18. Activate your YubiKey by touching the gold sensor on the device.

  19. If it doesn’t respond, unplug and re-insert the YubiKeyModernize Federal Identities (36)

  20. Enter your PIN and click NextModernize Federal Identities (37)

  21. Press the gold sensor on the YubiKey again.Modernize Federal Identities (38)

  22. Click Allow to complete the enrollment process.Modernize Federal Identities (39)

  23. Completion

  24. Open your MFA application and navigate to the Extra Verification menu.

  25. Confirm that you see an indication that your security key has been successfully added to your MFA application.Modernize Federal Identities (40)

Login to CMS Okta with Security Key-MacOS

  1. Login to Okta portal

  2. Navigate to Okta and enter your EUA Username and Password into theappropriate fields.

  3. Click the checkbox to Agree to the Terms & Conditions and then click Sign In.

  4. Note - Session cookies from a previous authentication may remain valid and Okta may not prompt you to re-authenticate after login. In this circ*mstance, click your Name in the top right-hand corner to expand the drop-down list and click Log Out to return to the Sign In screen.Modernize Federal Identities (41)

  5. MFA Challenge with Security Key

  6. Open your authenticator application and when prompted, touch the gold sensor on the YubiKey.Modernize Federal Identities (42)

  7. The page refreshes to display additional fields.

  8. Enter the PIN you established earlier and click NextModernize Federal Identities (43)

  9. Touch the gold sensor on the YubiKey once moreModernize Federal Identities (44)

  10. Successful Authentication into Okta

  11. You have successfully completed the security key login process and can access resources protected by CMS ID

First-time setup for new device PIN creation Windows

Step 1 - Install YubiKey Manager

Download the Yubikey Manager

  • Access the download link provided and save the file to your computer.

Run the Installer

  1. Locate the downloaded file, usually in your Downloads folder, and double-click to open it.

  2. Proceed through the installation wizard by selecting Continue > Continue.

  3. Complete the Installation

  4. Click Install.

  5. Depending on your Windows OS security settings, you might need to authorize the installation.

  6. Complete the authorization challenge.

  7. Proceed through the installation wizard by selecting Next > Next and then Install.

  8. After the installation completes, select Finish.

  9. Open the YubiKey Manager

    Notice

    Run the Yubikey Manager as an Administrator for initial setup

  10. The YubiKey Manager opens automatically after installation. If it doesn’t, you can openit by searching for it in the Start menu.Modernize Federal Identities (45)

  11. Prepare the YubiKey

  12. Plug your YubiKey into the appropriate USB port on your Windows systemModernize Federal Identities (46)

Step 2 - Setup YubiKey PIN

  1. Navigate to PIN Setup

  2. In the YubiKey Manager, go to Applications > FIDO2Modernize Federal Identities (47)

  3. Set Your PIN

  4. Click on Set PIN.Modernize Federal Identities (48)

  5. In the New PIN field, enter a unique combination of at least six characters (FIDO2requirement).

  6. Your PIN can include both letters and numbers.

  7. Choose a secure and memorable PIN. Avoid simple sequences or commonly used numbers such as password or 123456.Modernize Federal Identities (49)

  8. Re-enter the same PIN in the Confirm PIN field to ensure accuracy.Confirm PIN Setup

  9. Click Set PIN to finalize your PIN setup. This PIN will be required for enrolling your security key and for subsequent access to Okta.Modernize Federal Identities (50)

Enroll Security Key on Okta-Windows

  1. Login to Okta portal

  2. Use the provided link to sign in with your EUA Username and Password.

  3. Agree to the Terms & Conditions and select Sign InModernize Federal Identities (51)

  4. Complete the MFA challenge with your current setup (e.g., Okta Verify mobile app)Modernize Federal Identities (52)

  5. Navigate to Security Settings

  6. Click on your name at the top right corner and select SettingsModernize Federal Identities (53)

  7. Click Settings.Modernize Federal Identities (54)

  8. Start Security Key Enrollment

  9. Within the Extra Verification menu, click the Setup button next to the Security Key or Biometric Authenticator (FIDO2) menu option.

  10. Avoid selecting the YubiKey option as it is for legacy FIDO devicesModernize Federal Identities (55)

  11. Enroll Your Security Key

  12. Open Okta and navigate to the Multifactor Authentication section and then clickSetup.Modernize Federal Identities (56)

  13. Click Enroll.Modernize Federal Identities (57)

  14. Select the Security Key and then click Next.Modernize Federal Identities (58)

  15. Click OK to continueModernize Federal Identities (59)

  16. Click OK to continueModernize Federal Identities (60)

  17. Enter the PIN you established earlier

  18. Click OKModernize Federal Identities (61)

  19. Activate your YubiKey by touching the gold sensor on the device.

  20. If it doesn’t respond, unplug and re-insert the YubiKeyModernize Federal Identities (62)

  21. The Passkey is saved. Click OK.Modernize Federal Identities (63)

  22. Completion

  23. Open your MFA application and navigate to the Extra Verification menu. Confirm thatyou see an indication that your security key has been successfully added to your MFAapplication.Modernize Federal Identities (64)

Login to Okta with Security Key-Windows

  1. Login to Okta portal

  2. Use the provided link to sign in with your EUA Username and Password.

  3. Agree to the Terms & Conditions and select Sign In

  4. Your session cookie might still be valid and Okta will not require you to reauthenticateto log back in, select your name in the top right hand corner and click LogOutModernize Federal Identities (65)

  5. MFA Challenge with Security Key

  6. Select Security Key and click NextModernize Federal Identities (66)

  7. Enter the PIN you established earlier and click OKModernize Federal Identities (67)

  8. Touch the gold sensor on the YubiKeyModernize Federal Identities (68)

  9. Authenticated with Okta

  10. You have successfully completed the security key login processModernize Federal Identities (69)

Glossary of Terms

FIDO2 Authentication - A modern authentication standard that strengthens security by allowingusers to utilize local biometrics and security keys for passwordless logins or as a part of multifactorauthentication. FIDO2 is an enhancement of the original FIDO standards, adding supportfor passwordless authentication and expanded browser support through its WebAuthncomponent.

WebAuthn Web Authentication - A web standard published by the World Wide WebConsortium W3C in collaboration with the FIDO Alliance, which specifies a built-in browser APIenabling online services to offer a secure, passwordless login experience using public keycryptography. WebAuthn allows users to authenticate themselves on the internet usingbiometrics, mobile devices, or FIDO2 devices like security keys, instead of relying on traditionalpasswords.

FIPS Federal Information Processing Standards - U.S. government standards that coordinatethe requirements for cryptographic modules, including both hardware and software components,used within a security system to protect sensitive but unclassified information.

Passkey - A digital credential used in place of traditional passwords, often part of modernauthentication systems like FIDO2, to provide a more secure and easy login experience.Passkeys enhance security by using cryptographic techniques, meaning they are resistant tophishing and cannot be reused across different sites, significantly reducing the risk of credentialtheft.

PIN Personal Identification Number - A numeric or alphanumeric password used in theauthentication process to verify the identity of a user accessing a system or device.

Multi-Factor Authentication MFA - A security system that requires more than one method ofauthentication from independent categories of credentials to verify the user’s identity for a loginor other transaction.

Security Key - A physical device used to access computers, networks, and online accounts byproving possession of the key as a form of authentication.

USB-C - A type of USB connector that is reversible, allowing it to be plugged in either direction,and supports faster data transfer, increased power flow, and video delivery.

USB-A - The original standard USB connector, which is flat and rectangular in shape, commonlyused to connect devices like keyboards, mice, and external hard drives to computers.

NFC Near Field Communication - A set of communication protocols that enable two electronicdevices, one of which is usually a portable device such as a smartphone, to establishcommunication by bringing them within 4 cm of each other.

YubiKey - A small hardware device produced by Yubico, that provides secure two-factor, multifactor,and passwordless authentication that supports protocols such as FIDO2 and U2F.

Okta - A cloud-based service that provides identity management and access managementsolutions, enabling secure authentication and user verification across various platforms andapplications.

Yubikey FAQs

Why do I need a PIN for my YubiKey?

  1. Think of your YubiKey like a debit card for digital security. Just as your bank carduses a PIN to keep your money safe, your YubiKey uses a PIN for an extra layer ofprotection. This means that if someone ever gets their hands on your security key, theystill can’t use it unless they know your unique PIN. Additionally, the policies whichgovern IDM at Okta requires a PIN when you first set up your security key, ensuring thatit’s really you who’s activating it.

What are Platform Authenticators and how come I can’t use my smartphone to enroll a security key?

  1. Platform authenticators, aka Internal Authenticators - These are devices that youtypically own, such as smartphones and laptops. Depending on the hardware andsoftware version they meet the FIDO2 standards, which allow you to prove your identityusing methods like a PIN, your fingerprint, or facial recognition, utilizing the built-insecurity features of your device just like a YubiKey.

    The core of FIDO2 lies in what we call resident keys also known as “private keys” —think of them as digital versions of a physical key for a locked door. In a typical setup,these private keys are securely stored on your device itself. However, in certainsituations, depending on your device’s setup and type, there’s a possibility that thesekeys could be stored in the cloud. This scenario might present security and audit risks,primarily because of uncertainties about where exactly these private keys are stored.The core of FIDO2 lies in what we call resident keys also known as “private keys” —think of them as digital versions of a physical key for a locked door. In a typical setup,these private keys are securely stored on your device itself. However, in certainsituations, depending on your device’s setup and type, there’s a possibility that thesekeys could be stored in the cloud. This scenario might present security and audit risks,primarily because of uncertainties about where exactly these private keys are stored.

    Since different users have various types of devices and settings, and because of thepotential cloud storage of private keys, platform authenticators might pose securitychallenges in terms of administration and management of organizational securitystandards. This variability is why, in most organizational contexts, platformauthenticators may not be recommended or allowed.Since different users have various types of devices and settings, and because of thepotential cloud storage of private keys, platform authenticators might pose securitychallenges in terms of administration and management of organizational securitystandards. This variability is why, in most organizational contexts, platformauthenticators may not be recommended or allowed.

  2. External authenticators, aka USB Authenticators - Are independent devices such asyour YubiKey that have one single purpose. These store the resident keys directly onthe device itself, meaning the private keys reside solely within the physical bounds ofthe external authenticator. This approach generally offers a higher level of securitybecause the private keys are not stored or replicated anywhere else, thus reducing therisk of unauthorized access.

How do I unlink the YubiKey from Okta?

To remove your YubiKey from Okta

  1. Login to the Okta portal

  2. Click your name to expand the drop down list and then select SettingsModernize Federal Identities (70)Modernize Federal Identities (71)

  3. Navigate to the Extra Verifications section and click the Remove button adjacent to the YubiKey 5 FIPS with NFC menu option.Modernize Federal Identities (72)

What should I do if I forget my YubiKey PIN?

  1. To reset your YubiKey PIN

  2. Navigate to the YubiKey Manager page and click Applications > FIDO2.Modernize Federal Identities (73)

  3. Click the Reset FIDO button and follow the prompts. Please note that resetting yourFIDO2 YubiKey essentially returns it to a “factory new” state. You’ll need to go throughthe process of enrolling a security key, just as you did when you first got it.Modernize Federal Identities (74)

  4. Can’t access or reset your YubiKey?

  5. If you’re without your YubiKey or forgot your PIN and had to reset, you can still access

  6. Okta by choosing an alternative MFA method during the login process

  7. Log into Okta as usual until you reach the MFA prompt.

  8. Click Cancel.Modernize Federal Identities (75)

  9. Click the drop-down list arrow and select an alternate MFA method.Modernize Federal Identities (76)

  10. Select a verification method from the list of previously configured options, such as OktaVerify or Google Authenticator

  11. Click Retry.Modernize Federal Identities (77)

  12. Complete the MFA logon process.

  13. Re-enroll your security key ONLY IF you reset your YubiKey.Modernize Federal Identities (78)

Modernize Federal Identities (2024)
Top Articles
Latest Posts
Article information

Author: Rueben Jacobs

Last Updated:

Views: 6234

Rating: 4.7 / 5 (77 voted)

Reviews: 92% of readers found this page helpful

Author information

Name: Rueben Jacobs

Birthday: 1999-03-14

Address: 951 Caterina Walk, Schambergerside, CA 67667-0896

Phone: +6881806848632

Job: Internal Education Planner

Hobby: Candle making, Cabaret, Poi, Gambling, Rock climbing, Wood carving, Computer programming

Introduction: My name is Rueben Jacobs, I am a cooperative, beautiful, kind, comfortable, glamorous, open, magnificent person who loves writing and wants to share my knowledge and understanding with you.