How to setup YubiKey with Isosec

Authored by: Support.com Tech Pro Team

1. Introduction

How to setup YubiKey with Isosec

2. Set Up

There are prerequisites for this guide. They are as follows:

  • iO Identity Agent
  • Virtual Smartcard enrolled
  • Registration Authority's role in the smartcard
  • A PC

The RA (Registration Authority) will need to go through this process with a user.

Registration

To register a Fido2 device, the RA will need to open the VSC Management page.

From the management, the page selects the user to who you wish to add a Fido2 device. Once on the user's page select Add Fido2 Device.

This will bring up the Fido2 device registration box. Give the device a name and select the type of key encryption you would like to use.

A Fido2 device can hold up to a maximum of 25 keys and only 2 may be RSA keys. Authentication is also faster with an elliptical key.

  • RSA encryption creates a large key size and a single Fido2 device will only be able to hold 2 RSA keys
  • The elliptical curve is a smaller key size and a single Fido2 device can hold multiple keys

Once the device has been given a name and the encryption type set select Request Fido2 Device registration.

The Yubikey device will prompt the user to present their Yubikey device and enter the PIN that was set for the device.

Once the device has been presented and the PIN entered (correctly!) then the device will be successfully enrolled for use with Isosec’s Virtual Smartcard.

Authentication

Using the Yubikey as a second factor for authentication with iO is simple. Once the device has been registered to the user's card, as long as iO is configured to require the Yubikey then it will prompt for the device after the Virtual Smartcard passcode has been entered.

Once the passcode has been entered correctly and the device is present in the machine the following prompt will show.                                                  

Press your finger on the device in the highlighted area within 5 seconds and you will be authenticated.