|Item Weight||0.176 ounces|
|Product Dimensions||0.51 x 0.47 x 0.12 inches|
|Item model number||Y-240_SML|
|Is Discontinued By Manufacturer||No|
|Number of Items||1|
|Size||YubiKey 5 Nano|
|Manufacturer Part Number||Y-240_SML|
Yubico YubiKey 5 Nano - Two Factor Authentication USB Security Key, Fits USB-A Ports - Protect Your Online Accounts with More Than a Password, FIDO Certified USB Password Key, Extra Compact Size
- Make sure this fits by entering your model number.
- SECURITY KEY: Protect your online accounts against unauthorized access by using 2 factor authentication with the Yubico YubiKey 5 Nano security key - the world's most protective USB security key that works with more online services/apps than any other.
- FIDO: The YubiKey 5 Nano is FIDO certified and works with Google Chrome and any FIDO-compliant application on Windows, Mac OS or Linux. Secure your login and protect your Gmail, Facebook, Dropbox, Outlook, LastPass, Dashlane accounts, 1Password, and more.
- FITS USB-A PORTS: Once registered, each service will request you to insert the YubiKey PC security key into a USB-A port and simply tap to gain access. The extra compact size is designed to stay in the port so you can stay connected and secure anywhere.
- DURABLE AND SECURE: Extremely secure and durable, YubiKeys are tamper resistant, water resistant, and crush resistant. The YubiKey 5 Nano is designed to protect your online accounts from phishing and account takeovers.
Consider this Amazon's Choice product that delivers quickly
Buy it with
Have a question?
Find answers in product info, Q&As, reviews
Your question might be answered by sellers, manufacturers, or customers who bought this product.
Please make sure that you are posting in the form of a question.
Please enter a question.
The YubiKey 5 Nano combines hardware-based authentication and public key cryptography to protect against account takeovers. Simply insert into a USB slot and authenticate with a touch. YubiKey 5 authentication is four times faster than typing a One Time Passcode and does not require a battery nor network connectivity so it is always accessible.
- Strong two-factor hardware-based authentication
- Easy and fast authentication with a single touch
- Reduces IT operational costs
- Multi-protocol support on a single key
- Durable and water-resistant
- Made in the USA
- Supported protocols: FIDO U2F, FIDO2, smart card (PIV), Yubico OTP, OpenPGP, OATH-TOTP, OATH-HOTP, and Challenge-Response
- Secure element hardware to protect cryptographic keys
- Crypto Algorithms: RSA 2048, ECC p256, ECC p384
- Interface: USB-A
- Works on Microsoft Windows, Mac OS X, Linux, Chrome OS operating systems, and on major browsers
- Now works with Twitter!
- PIV smart card compatible, minidriver available on Windows
- Support for PKCS#1
|YubiKey 5 Nano||YubiKey 5 NFC||YubiKey 5C||YubiKey 5C Nano||YubiKey 5Ci|
|Connector Type||USB-A||USB-A||USB-C||USB-C||USB-C / Lightning|
|Form Factor||Stays in port||Keychain||Keychain||Stays in port||Keychain|
|Mobile Authentication via NFC||✓|
|Water and Crush Resistant||✓||✓|
|Works with Google Accounts||✓||✓||✓||✓||✓|
|Works with Microsoft accounts||✓||✓||✓||✓||✓|
|Works with LastPass||✓||✓||✓||✓||✓|
|Works with 1Password, Keeper, and Dashlane||✓||✓||✓||✓||✓|
|FIDO U2F / FIDO2||✓||✓||✓||✓||✓|
|TOTP / HOTP / PIV / PGP||✓||✓||✓||✓||✓|
Reviews with images
Top reviews from the United States
There was a problem filtering reviews right now. Please try again later.
It's low profile so i just leave it in a usb port. I have 'un-trusted' my computer, so now logging into LastPass is just a matter of entering my LastPass password and touching the gizmo with my finger for maybe a second. I figure that if someone steals my computer with the yubikey in it, then by the time the thief figures out the password I will have already disabled the yubikey from another device as a second authentication method.
Really, its main purpose as a LastPass authentication device seems to be to prevent a remote password hack of a trusted computer and theft of information before the trust period expires, which it accomplishes quite elegantly by requiring a human body to be present to touch a key in a usb port. Much faster and easier than other authentication methods.
That's my inexpert view of it anyway. I think I sleep a little better having it.
Also, the nano comes without the string shown on the picture, so it is too tiny to handle and too easy to lose. Attach some string before you try to mess with it.
The device supports a number of different popular and emerging security protocols. The Yubico.com web site contains a wealth of information about the device. That includes documentation, downloadable code modules, and lots of open-source code. The level of detail is intimidating, even for professionals.
This is a leading-edge security product for employees of companies who require it, professionals who need it for high security sites, and serious geeks who just want to try the latest thing. In my opinion it's not for everyday consumer use, just yet. Most people will find a solution like the Google Authenticator (an Android App) nearly as good, and a lot easier to use.
By Someone on May 14, 2020
Top reviews from other countries
You can set it to use PAM so that touching this is required after you enter your password, but then you still have to enter your password, no good if you're trying to avoid just that.
Special demerits to the terrible instructions on their website. There's a lot of terms and concepts left unexplained, and the setup is hopelessly convoluted.
PIV section on Yubikey Manager app throws "Failed to load the application on the Yubikey", despite it supposedly being supported.
Firstly, it's a MULTI-FACTOR device, it's not supposed to replace passwords (yet), hence the term MULTI-FACTOR, there are MULTIPLE FACTORS to your login procedure, the first one being your username and password, the second being this key.
Secondly, it doesn't type out your password on screen, it types a cryptographically-calculated string which changes each time and is specific to the hardware key itself. The interaction of touching the device is in place to work with your chosen software when it prompts for a U2F device, where you need to press the key to activate it. This is to stop automated log ins when the key is connected, it requires a human to physically activate it. Pressing the key at any other time will output a meaningless code onto your computer, which means nothing to unconfigured software, so this is not a security risk.
Thirdly, not all services support hardware keys yet. New hardware and software takes a VERY long time to be supported by all platforms and always starts with the biggest (Google, Microsoft, Amazon, Facebook, etc). You should check that the services you want to use this for actually support hardware keys.
Lastly, this is supposed to be small. If you're complaining about it's size when there are other options available like the standard Yubikey 5 or Yubikey 5C, then that's your problem not the product's. This is supposed to be a static key that can be removed if necessary, such as for a personal laptop, and should be used in conjunction with another 2FA method as a fallback e.g. mobile authenticator app.
This is a great product that does the job it's designed for. It's working well with Yubico Windows login software and a number of online accounts.
It turns out that the key cannot be used as any sort of authentication to log in to your PC, which is very disappointing. To be fair, the description is for "Online Accounts"; Windows itself has a misleading section "Manage how you sign in to your device" but this is basically Microsoft telling fibs again - you cannot use a key for logging in to Windows.
Right now I am struggling to see a single use or benefit for this key - it does not protect my PC or the Google Chrome password manager whatsoever, so can offer no additional security *to me* at all.
Unless you *really* know what you are doing, I would not recommend this device - there are just far too many questions unanswered.
The Hardware is VERY SMALL and if it is to be removed often it NEEDS a Lanyard or it is highly likely to be lost.
Being so small it can be left in situ, but then that has a new set of problems.
Using this YubiKey does avoid the probability of unintentional 'contact' by a part of a body passing too close, where it would be easy to imagine the external part of a standard YubiKey being broken off in a worst case scenario.