Within each Yubikey are many different chips that are each used by different software for different purposes. There is no definitive "how to set up a Yubikey" document, however there are multiple "How to use a Yubikey to do x" documents online. This is an attempt at consolidating some of the how-tos that are relevant to foxes working for the ShapeShift DAO.

TOTPs (aka 2FA, Google Authenticator, Authy, etc.)

TOTP.png

Timed One-Time Passwords (TOTPs) are 6-digit numeric codes that change every 30s. This is a common method of 2FA used by many websites that typically involves scanning a QR code with the Google Authenticator or Authy apps, or typing in a secret code if the QR scan isn't working.

Yubikeys support TOTPs via the Yubico Authenticator app available for most/all major OSes.

<aside> 💡 Whenever any website asks you to set up Google Authenticator you can substitute Yubico Authenticator instead.

</aside>

Setup

  1. Download and install the Yubico Authenticator app for your operating system
  2. Open Yubico Authenticator
  3. Plug in your Yubikey
  4. Click the ➕ icon to add a new authenticator
    1. Yubico Authenticator can look for QR codes currently on your screen to fast-track setup.
      • It may need your OS's permission to view the screen to do this
    2. Each authenticator item has 3 pieces of data stored with them:
      • Issuer: this is the name of the website/service that issued the authenticator (i.e. GitHub, Google, etc.)
      • Account Name: this is the account name used on the Issuer's website. (i.e. your email address, username, or other login)
      • Secret Key: this is the authenticator's private key itself (it typically looks like 16 or 32 letters)
    3. It is recommended that you ☑️ the Require Touch checkbox when adding a new authenticator to your Yubikey.

Considerations

<aside> 💡 If someone finds your Yubikey and plugs it in, they can read all of your authenticators unless your Yubikey is password-protected!

</aside>

GPG Keys