|Item model number||Y-072|
|Item Weight||0.16 ounces|
|Product Dimensions||1.8 x 0.7 x 0.1 inches|
|Item Dimensions L x W x H||1.77 x 0.71 x 0.12 inches|
Yubico YubiKey NEO - USB-A, NFC, Two-Factor Authentication
- Make sure this fits by entering your model number.
- Protect online accounts against unauthorized access by using two factor authentication with this security key.
- Works with Gmail, Facebook, Dropbox, Twitter, Dashlane, LastPass and hundreds of other services
- Durable, waterproof, and crush resistant
- Touch based authentication for NFC supported Android and iOS devices and applications. Fits USB-A computer ports and designed to fit on your keychain
- Multi-protocol support: FIDO U2F, Yubico OTP, OATH-TOTP, OATH-HOTP, Smart card (PIV), OpenPGP, Challenge-Response; Made in USA
Frequently bought together
Customers who viewed this item also viewed
Customers who bought this item also bought
Have a question?
Find answers in product info, Q&As, reviews
The YubiKey combines hardware-based authentication and public key cryptography to eliminate account takeovers. Simply tap the YubiKey NEO to your NFC enabled device or insert into a USB-A slot and authenticate with a touch. YubiKey authentication is four times faster than typing a One Time Passcode and does not require a battery nor network connectivity so it is always on and accessible.
- Strong two-factor hardware based authentication
- Easy and fast authentication with a single touch or tap to NFC enabled device
- Reduces IT operational costs
- Crush resistant & waterproof
- Multiprotocol support on a single key
- Made in the USA & Sweden
- Supported protocols: FIDO U2F, smart card (PIV), Yubico OTP, OpenPGP, OATH-TOTP, OATH-HOTP, and Challenge-Response
- Secure element hardware to protect cryptographic keys
- Crypto Algorithms: RSA 2048 and ECC p256
- Interface: USB-A and NFC
- Works on Microsoft Windows, Mac OS X, Linux, Chrome OS operating systems, and on major browsers
- Now works with Twitter! Learn more
- PIV smart card compatible, minidriver available on Windows
- Support for PKCS#11
- Size: 18mm x 45mm x 3.3mm, 3g
- Weight: 3G
Keep YubiKey NEO nearby, wherever you go. Its high quality and crush-resistant body stands up to life's little dings.
Whether it's a puddle or a washing machine, YubiKey NEO beats water with a sealed design, no batteries, and no moving parts.
Authenticate on the go with YubiKey NEO's NFC functionality. Simply tap the key to your NFC enabled device.
Follow the easy instructions provided by the services where you choose to pair your YubiKey NEO. No software required.
Strong authentication across leading mobile platforms
YubiKey NEO works among iOS, Android, Windows 10 smartphones and tablets.
Legal DisclaimerNot for use with computers that have non-compliant power systems.
Seller Warranty Description1 year warranty on materials and workmanship.
Top customer reviews
There was a problem filtering reviews right now. Please try again later.
You visit myaccount on google, you click 2-Step Verification, and you click "Add Security Key". It then prompts you to plug-in your YubiKey and tap the button. Nothing happens. Now you're stuck.
By default, at least on mine, only OTP mode is enabled on the device. U2F mode is disabled by default, which is required by Google for it to work. In order to enable it, you'll need to download the YubiKey NEO Manager on their website. Once downloaded, run the application, plugin your device and click the "Change connection mode [OTP]" button. Here you'll have an option to enable U2F! And voila! It now works with your Google account. You also have an option to enable CCID in here, but I left it off as I'm not 100% sure what that's for, but may be needed some time in the future.
Hope this helps! I would have given this a 5 star review if only there was better documentation out there to explain this. You would assume that a device that says it supports U2F would have it enabled. There was no intuitive way of knowing this, and quite disappointing for a $50 product.
- Stores all my OTPs which I can access using Yubico Authenticator from any mobile device with NFC (except iPhones)
- Is associated with my Lastpass account allowing me to access my vault from any computer or mobile device with NFC (except iPhones)
- Is set up as a security key for my Google and Google Apps accounts.
- Using the second configuration slot I have also added a static password which I use for different things.
A couple things to consider:
- U2F is not enabled out of the box. You have to download and install NEO manager to activate it. As of 10/23/2014, U2F is supported only by Chrome and Chrome OS ver. 38+.
- Update: As of 11/19 U2F, OTP and CCID modes can now be enabled via NEO Manager. See https://www.yubico.com/2014/11/neo-supports-u2f-otp-key-time/.
- U2F is not (as of 10/23/2014) supported over NFC. You'll therefore have to still use OTPs to access U2F enabled services from mobile devices.
- In order to add the static password I had to download the personalization tool from Yubico and add it to the second configuration slot. DO NOT OVERWRITE THE FIRST CONFIGURATION SLOT UNLESS YOU WANT A HEADACHE. See https://www.yubico.com/products/services-software/personalization-tools/use/.
Here's the deal. If you use PasswordSafe or some other well known tool that is Yubikey friendly, you'll love this thing. If you want to use it for OAUTH or using really long safe passwords, it's quite well suited to that took. I use ridiculous passwords and change them frequently and that's why these are so 'must have' or me.
Fair warning though - installation and use are going to probably be a real challenge for the uninitiated. I can almost guarantee that. There is plenty of support material for it from Yubico, there are plenty of people blogging about it and there are plenty of videos, but until you understand what you're doing it's going to be tough at first. IMHO, it's well worth the hassle of learning and the learning process is tremendously valuable in and of itself.
However, that's where I can't emphasize a point strongly enough. MAKE BACKUPS. It's very easy to change the configuration in a way that you end up locking yourself out of important apps you have precisely b/c it does its job so well. It's a feature that can behave like a bug as the expression says but it's easily remedied by just using backups every time before making a change. Buy two of them if you get one just so you have a backup, you don't want to be stuck if you lose it and have to wait for another one to arrive.
And make really sure that you understand the basics objectives of what it's intended to do. Products that are friendly to it are being added regularly and as useful and just plain awesome as these things are, I'm sure that will grow. However the initial configuration coupled with learning what you're doing is enough to make many people want to throw up their hands and rage quit. I certainly felt like that at first. The learning process alone justifies the cost of buying one. Plan on spending at least two hours minimum learning what it does and how to configure it and realistically, if you want to really 'trick it out' plan on spending quite a bit more time. That said, if you even remotely care about security, every second of that learning time will be useful. Not just because it will help you learn to use the tool, but by seeing that certain features are even available you'll learn a lot about good security practice and you'll probably end up changing the way you do things to become more security focused. These aren't cheap and Yubico has lower priced models that accomplish much of the same but within 3 days of getting my first one, I wanted to upgrade and then I want for a Nano as well.
I love this so much that I actually purchased several for friends of mine, employees and peers that care about security just because I want to see these take off. I don't want to scare you off about the initial configuration but the best way to say it is that some not everything is plug and play. Like most things of real value, you're not going to be able to just run a wizard and be an expert at it. In this case, you'll likely spend a little while frustrated at first getting it to work with whatever the first feature is you decide to use it for. From there you'll almost certainly find yourself in a position of wanting to 'see what else I can do with it' which is where the backups become critical. And like I said, if you only have one, you're vulnerable to being stuck if you lose it so redundancy is your friend here. I've purchased around 20 different keys and all three models and I'll be buying more. I am so smitten with it that I find myself looking to try to convince people who aren't security conscious of how vulnerable they make themselves and convincing them to change their behavior.. Because of my enthusiasm and people seeing what it does for me (for instance, if I look at DropBox or Facebook from my phone people see me putting it up to my phone and asking what I'm doing), I've convinced a few people to adopt them. The others were already looking to try them but hearing my excitement was enough to get them to adopt it. These aren't that cheap that I'd typically go around and indiscriminately buy them for people just to get them to try it but that's what it's done. And so far, I've had two people say "not interested', another 2 give up in frustration and the rest have become as fanatical about them as I am.
Also, you can use the app that Google provides for Gmail and its other services but there's a risk of introducing a vulenerability by using that. Like anything security related, you trade convenience for security. I wasn't overly worried about someone pulling off the attack before when I was using Google's app but it's still there depending on how important the stuff you want to protect is. Nonetheless, so many other services now support Yubikeys, PasswordSafe being the initial impetus for trying it (I have no connection to this company or Password safe, but Bruce Schneier turned me on to PasswordSafe and I definitely trust his judgment on anything security related. If you are security focused you'll know who he is, if you're not, I'd encourage you to check out his blog and follow his advice. In that regard, think about it this way. Is there anything in your email or dropbox or facebook that you wouldn't want the world knowing? Note how many popular YouTubers for instance have had their accounts hacked and commandeered recently. None of them woke up that morning thinking "I'm about to lose control of my stuff". And once your information is taken from you, there's not putting that genie back in the bottle. You 'leak' more information than you can possibly fathom these days and even if you password protect your phone, losing it means the only thing protecting your personal information and secrets from the world seeing them is some malicious person using a Cellebrite machine or similar tool to get through your password. You may think I'm being dramatic but if you think I'm exaggerating in the least (i'm actually not doing the threat justice) go look around at Cellebrite's UFED or similar tools and see how 30 seconds is the only speedbump someone would hit if they had access to your phone and the desire to get your info.
It explains how you can manually enable both U2F and OTP to run simultaneously on the NEO. You need to have 3.3.0 firmware on the Neo and believe that is any Yubikey Neo shipped since October 2014. (the firmware can't be changed) Also, you need to install Chrome Beta 39.
Just follow the instructions in the link if you want to use your Yubikey Neo for both U2F and OTP simultaneously. I did it and it is working great for me, I now have Google set up as U2F, Lastpass as OTP as well as the Yubico Authenticator for Android (http://goo.gl/7yXcIo) installed and setup with multiple accounts, Github, Facebook, Dropbox, AWS, Microsoft, Dropbox, etc.
Also, in regards to the 2 ways it can be use, USB and NFC. They both work great. I use USB on my Desktop and Notebook and NFC on my Nexus 5 and Nexus 7 to validate both U2F and OTP. Works flawlessly every time for me. This thing is great.
Most recent customer reviews
No problem with the Android phone either.