Password Manager

Authentication: How to use a Fido Certified U2F Key

FIDO-KEY-FEATURE

U2F is the acronym for Universal 2nd factor, which is an open protocol based on comparable security technology used in smart cards that enhances and streamlines two-factor authentication utilizing specialized Universal Serial Bus or near-field communication devices. FIDO is the acronym for fast identity online, it is the technological protocol for confirming online user identification. It is applied in situations like fingerprint login and two-factor authentication login, enabling you to access your online accounts using biological characteristics or a FIDO security key. PCs like Windows devices, iPhones and even email accounts like Gmail all accept this verification option since it enhances security, preserves privacy, and makes the verification process simpler. It is usually in a Hardware security key device that resemble USB flash drives and USB keys in appearance. FIDO keys operate similarly to certain USB keys also. To confirm your action, you must touch the buttons on them. FIDO aims to fix the issues with the current username and password system. Public key cryptography is used to ensure that there are no shared secrets between users and online services. With a straightforward authentication sequence, FIDO Authentication will defend your organization’s data from phishing, account takeover, and man-in-the-middle attacks. In this article, we shall be focusing on how to use ePass FIDO Series manufactured by Feiten Technologies. Other useful guides: How to Remove a Device from your Microsoft Account and How to create Windows 11 Bootable USB drive with the Media Creation Tool and How to Add a Device to your Microsoft account also How to use Systemd Timers on Linux

You can also reference other guides here : Quit the Editor: How to exit the Linux Vim or Vi editor and How To Install Google Cloud SDK on a Linux System and How to install and configure Apache Cassandra on Linux Server also How to upgrade from Ubuntu 20.04 LTS to 22.04 LTS and How to add WhatsApp UWP on Windows 11 and How to turn on Windows 10 Tamper Protection for Microsoft Defender

How U2F Operates

Consider Universal 2nd Factor as a new security entry point that user need to go through to access resources that are protected. These users still require passwords to start the process, but to finish your authorization procedures, they also need to be in possession of a physical device.

A U2F process appears as follows, in basic terms:

  • Password: The user accesses a website and inputs login information that is accepted by that domain.
  • Challenge: The system sends a challenge to a key that the user has put into a USB port after recognizing the correct username and password. Transport-level encryption is used for communication.
  • Response: In response, the challenge is acknowledged in some other way, such as the key lighting up. For the connection to be complete, the user clicks a button.

Requirements:

  • Fido Certified U2F Key
  • Chrome
  • Gmail account
  • Internet connection

How to Setup your U2F key for use

We will set it up by following a series of steps as shown below:

Step1: Place the U2F key nearby

As it is about to be set up, you need to have it near you

lastfido
fido key

Step2: Open your chrome Browser

The Chrome web browser may be downloaded at https://chrome.com if it is not already on your computer.

Step3: Go to Google.com. And click “My account” at the very top-right corner.

MANAGE-Account-1
manage accounts

Step4: Go to https://myaccount.google.com/security

When you are there confirm if 2-step verification is turned off or on, if it is turned off, turn it on.

2step
2-step verification page in google

Next follow the steps to get started

You would need to make sure the key is plugged in & touched at the point where there is a light

Touchthekey
touch the key

Finally, we need to name the key

Name-your-Key
name your key

Set-up is complete

Set-up-complete
completed

Summary

U2F is a security entry point that user need to go through to access resources that are protected, and it can be set up by following a series of steps as shown above.

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments
0
Would love your thoughts, please comment.x
()
x