Difference between revisions of "Universal 2nd Factor (U2F)"

From wikieduonline
Jump to navigation Jump to search
 
(10 intermediate revisions by 2 users not shown)
Line 1: Line 1:
[[wikipedia:Universal 2nd Factor]] uses [[NFC]] or USB.
+
[[wikipedia:Universal 2nd Factor]] (2014) uses [[NFC]] or USB.
  
  
Line 5: Line 5:
  
 
== Support and use ==
 
== Support and use ==
U2F security keys are supported by [[Google Chrome]] since version 38<ref name="Using Security Key" /> and [[Opera (web browser)|Opera]] since version 40. U2F security keys can be used as an additional method of two-step verification on online services that support the U2F protocol, including Google,<ref name="Using Security Key" /> [[Dropbox (service)|Dropbox]],<ref name="Auto58-1"/> [[GitHub]],<ref name="Auto58-2"/> [[GitLab]],<ref name="Auto58-3"/> [[Bitbucket]],<ref name="Auto58-4"/> [[Nextcloud]],<ref name="Auto58-5"/> [[Facebook]],<ref name="Auto58-6"/> and others.<ref name="Auto58-7"/>
+
[[U2F security keys]] are supported by [[Google Chrome]] since version 38<ref name="Using Security Key" /> and [[Opera (web browser)|Opera]] since version 40. U2F security keys can be used as an additional method of two-step verification on online services that support the U2F protocol, including Google,<ref name="Using Security Key" /> [[Dropbox (service)|Dropbox]],<ref name="Auto58-1"/> [[GitHub]],<ref name="Auto58-2"/> [[GitLab]],<ref name="Auto58-3"/> [[Bitbucket]],<ref name="Auto58-4"/> [[Nextcloud]],<ref name="Auto58-5"/> [[Facebook]],<ref name="Auto58-6"/> and others.<ref name="Auto58-7"/>
  
 
Chrome, [[Firefox]], and Opera were, {{as of|2015|lc=y}}, the only browsers supporting U2F natively. [[Microsoft]] has enabled FIDO 2.0 support for [[Windows 10]]'s [[Windows 10#System security|Windows Hello]] login platform.<ref name="Auto58-8"/> Microsoft [[Microsoft Edge|Edge]]<ref name="Auto58-9"/> browser gained support for U2F in the October 2018 Windows Update. [[Microsoft account]]s, including [[Office 365]], [[OneDrive]], and other Microsoft services, do not yet have U2F support. [[Mozilla]] has integrated it into Firefox 57, and enabled it by default in Firefox 60<ref name="Auto58-10"/><ref name="Auto58-11"/><ref name="Auto58-12"/><ref name="Auto58-13"/> and [[Mozilla Thunderbird|Thunderbird]] 60.<ref name="Auto58-14"/> [[Microsoft Edge]] starting from build 17723 support FIDO2.<ref name="Auto58-15"/>. As of iOS and iPadOS 13.3 Apple now supports U2F in the Safari browser on those platforms.
 
Chrome, [[Firefox]], and Opera were, {{as of|2015|lc=y}}, the only browsers supporting U2F natively. [[Microsoft]] has enabled FIDO 2.0 support for [[Windows 10]]'s [[Windows 10#System security|Windows Hello]] login platform.<ref name="Auto58-8"/> Microsoft [[Microsoft Edge|Edge]]<ref name="Auto58-9"/> browser gained support for U2F in the October 2018 Windows Update. [[Microsoft account]]s, including [[Office 365]], [[OneDrive]], and other Microsoft services, do not yet have U2F support. [[Mozilla]] has integrated it into Firefox 57, and enabled it by default in Firefox 60<ref name="Auto58-10"/><ref name="Auto58-11"/><ref name="Auto58-12"/><ref name="Auto58-13"/> and [[Mozilla Thunderbird|Thunderbird]] 60.<ref name="Auto58-14"/> [[Microsoft Edge]] starting from build 17723 support FIDO2.<ref name="Auto58-15"/>. As of iOS and iPadOS 13.3 Apple now supports U2F in the Safari browser on those platforms.
 +
 +
 +
[[AWS CLI v2]] doesn’t yet support Universal 2nd factor (U2F) [[Configure MFA on AWS|MFA]].  As a workaround, you can use [[YubiKey]] as a [[virtual device MFA]]. <ref>https://aws.amazon.com/blogs/security/enhance-programmatic-access-for-iam-users-using-yubikey-for-multi-factor-authentication/</ref>
  
 
== Related terms ==
 
== Related terms ==
Line 15: Line 18:
 
* [[S/KEY]]
 
* [[S/KEY]]
 
* [[Universal 2nd Factor (U2F)]]
 
* [[Universal 2nd Factor (U2F)]]
 +
* [[arn:aws:iam]]::123456789012:[[u2f/]]
  
 
== See also ==
 
== See also ==
Line 20: Line 24:
 
* {{MFA}}
 
* {{MFA}}
 
* {{AAA}}
 
* {{AAA}}
* {{security}}
+
* {{Authentication}}
  
  
 
[[Category:Security]]
 
[[Category:Security]]
 +
[[Category:MFA]]
  
 
{{CC license}} Source: wikipedia
 
{{CC license}} Source: wikipedia

Latest revision as of 12:08, 15 February 2024

wikipedia:Universal 2nd Factor (2014) uses NFC or USB.


Support and use[edit]

U2F security keys are supported by Google Chrome since version 38[1] and Opera since version 40. U2F security keys can be used as an additional method of two-step verification on online services that support the U2F protocol, including Google,[1] Dropbox,[2] GitHub,[3] GitLab,[4] Bitbucket,[5] Nextcloud,[6] Facebook,[7] and others.[8]

Chrome, Firefox, and Opera were, Template:As of, the only browsers supporting U2F natively. Microsoft has enabled FIDO 2.0 support for Windows 10's Windows Hello login platform.[9] Microsoft Edge[10] browser gained support for U2F in the October 2018 Windows Update. Microsoft accounts, including Office 365, OneDrive, and other Microsoft services, do not yet have U2F support. Mozilla has integrated it into Firefox 57, and enabled it by default in Firefox 60[11][12][13][14] and Thunderbird 60.[15] Microsoft Edge starting from build 17723 support FIDO2.[16]. As of iOS and iPadOS 13.3 Apple now supports U2F in the Safari browser on those platforms.


AWS CLI v2 doesn’t yet support Universal 2nd factor (U2F) MFA. As a workaround, you can use YubiKey as a virtual device MFA. [17]

Related terms[edit]

See also[edit]

Text is available under the Creative Commons Attribution-ShareAlike License; additional terms may apply. By using this site, you agree to the Terms of Use and Privacy Policy. Source: wikipedia

  1. 1.0 1.1 Cite error: Invalid <ref> tag; no text was provided for refs named Using Security Key
  2. Cite error: Invalid <ref> tag; no text was provided for refs named Auto58-1
  3. Cite error: Invalid <ref> tag; no text was provided for refs named Auto58-2
  4. Cite error: Invalid <ref> tag; no text was provided for refs named Auto58-3
  5. Cite error: Invalid <ref> tag; no text was provided for refs named Auto58-4
  6. Cite error: Invalid <ref> tag; no text was provided for refs named Auto58-5
  7. Cite error: Invalid <ref> tag; no text was provided for refs named Auto58-6
  8. Cite error: Invalid <ref> tag; no text was provided for refs named Auto58-7
  9. Cite error: Invalid <ref> tag; no text was provided for refs named Auto58-8
  10. Cite error: Invalid <ref> tag; no text was provided for refs named Auto58-9
  11. Cite error: Invalid <ref> tag; no text was provided for refs named Auto58-10
  12. Cite error: Invalid <ref> tag; no text was provided for refs named Auto58-11
  13. Cite error: Invalid <ref> tag; no text was provided for refs named Auto58-12
  14. Cite error: Invalid <ref> tag; no text was provided for refs named Auto58-13
  15. Cite error: Invalid <ref> tag; no text was provided for refs named Auto58-14
  16. Cite error: Invalid <ref> tag; no text was provided for refs named Auto58-15
  17. https://aws.amazon.com/blogs/security/enhance-programmatic-access-for-iam-users-using-yubikey-for-multi-factor-authentication/

Advertising: