{"id":212704,"date":"2020-06-09T15:03:47","date_gmt":"2020-06-09T12:03:47","guid":{"rendered":"https:\/\/shop.thekernel.ua\/using-yubikey-with-github\/"},"modified":"2024-09-17T14:45:26","modified_gmt":"2024-09-17T11:45:26","slug":"using-yubikey-with-github","status":"publish","type":"post","link":"https:\/\/shop.thekernel.ua\/en\/using-yubikey-with-github","title":{"rendered":"How to set up a YubiKey with a GitHub account"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.17.1&#8243; background_image=&#8221;https:\/\/shop.thekernel.ua\/wp-content\/uploads\/2019\/05\/Security-Key-NFC-by-Yubico-Laptop-1030&#215;687.jpg&#8221; parallax=&#8221;on&#8221; min_height=&#8221;610px&#8221; custom_margin=&#8221;-170px||||false|false&#8221; custom_padding=&#8221;50px||50px||true|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row custom_padding_last_edited=&#8221;on|phone&#8221; _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; width_tablet=&#8221;&#8221; width_phone=&#8221;92%&#8221; width_last_edited=&#8221;on|desktop&#8221; custom_margin=&#8221;|auto|0px|auto|false|false&#8221; custom_padding=&#8221;146px||0px|||&#8221; custom_padding_tablet=&#8221;0px||||false|false&#8221; custom_padding_phone=&#8221;84px||||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; text_font=&#8221;|900|||||||&#8221; text_text_color=&#8221;#ffffff&#8221; text_font_size=&#8221;65px&#8221; text_letter_spacing=&#8221;2px&#8221; text_line_height=&#8221;1.8em&#8221; header_font=&#8221;|800|||||||&#8221; header_text_color=&#8221;#ffffff&#8221; header_font_size=&#8221;65px&#8221; header_letter_spacing=&#8221;2px&#8221; header_line_height=&#8221;1.8em&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;0px||||false|false&#8221; custom_margin_phone=&#8221;0px||||false|false&#8221; custom_margin_last_edited=&#8221;off|desktop&#8221; text_font_size_tablet=&#8221;49px&#8221; text_font_size_phone=&#8221;38px&#8221; text_font_size_last_edited=&#8221;on|tablet&#8221; text_line_height_tablet=&#8221;1.8em&#8221; text_line_height_phone=&#8221;1.8em&#8221; text_line_height_last_edited=&#8221;on|desktop&#8221; header_font_size_tablet=&#8221;&#8221; header_font_size_phone=&#8221;38px&#8221; header_font_size_last_edited=&#8221;on|desktop&#8221; text_text_shadow_style=&#8221;preset1&#8243; header_text_shadow_style=&#8221;preset1&#8243; text_text_align=&#8221;center&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h1>Using YubiKey with GitHub<\/h1>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.16&#8243; background_color=&#8221;#f2f2f2&#8243; custom_margin=&#8221;|0px||0px|false|false&#8221; custom_padding=&#8221;|0px||0px|false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.16&#8243; width_tablet=&#8221;91%&#8221; width_phone=&#8221;92%&#8221; width_last_edited=&#8221;on|tablet&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; header_2_text_color=&#8221;#111&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2 style=\"text-align: center;\">How to set up a YubiKey with GitHub?<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.16&#8243; text_text_color=&#8221;#333333&#8243; text_font_size=&#8221;18px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: center;\">With hardware security keys, you can get the additional protection of two-factor authentication to make your login procedure secure. Follow these step-by-step instructions to easily set up a U2F security key to work with GitHub accounts.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; width=&#8221;92%&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; text_text_color=&#8221;#333&#8243; text_font_size=&#8221;16px&#8221; header_text_color=&#8221;#111&#8243; global_colors_info=&#8221;{}&#8221;]          <\/p>\n<h2>Requirements<\/h2>\n<ul>\n<li>A computer with a USB port and the latest version of Google Chrome, Mozilla Firefox, Opera, or Microsoft Edge.*<\/li>\n<li>U2F-enabled security key: <a href=\"https:\/\/shop.thekernel.ua\/en\/security-key\">Security Key, Security Key NFC<\/a>, <a href=\"https:\/\/shop.thekernel.ua\/en\/yubikey-5\">YubiKey 5 NFC, YubiKey 5C, YubiKey 5\/5C Nano<\/a>, <a href=\"https:\/\/shop.thekernel.ua\/en\/shop\/yubikey-c-fips-2\">YubiKey FIPS<\/a>,<br \/><a href=\"https:\/\/shop.thekernel.ua\/en\/yubikeys-fips-series\">YubiKey Nano FIPS, YubiKey C FIPS, YubiKey C Nano FIPS.<\/a><\/li>\n<li>Mobile phone to receive SMS with one-time passwords (or with Google Authenticator installed to receive one-time passwords through the application). <em>Needed for the initial setup and backup.<\/em><\/li>\n<li>A GitHub account.<\/li>\n<\/ul>\n<p><em>If your GitHub account doesn&#8217;t already have two-factor authentication enabled, follow the steps in <strong><a href=\"#step1\">Step 1<\/a><\/strong> to enable this option. If two-step verification is already enabled, continue with <strong><a href=\"#step2\">Step 2<\/a><\/strong><\/em>.<\/p>\n<h2 id=\"step1\">Step 1: Enabling two-factor authentication<\/h2>\n<ol>\n<li>Sign in to your GitHub account.<\/li>\n<li>Click your profile picture in the top right of the screen.<\/li>\n<li>Select <strong>Settings<\/strong><\/li>\n<li>In the left pane select <strong>Security<\/strong>.<\/li>\n<li>Click <strong>Enable two-factor authentication.<\/strong><\/li>\n<li>Select a method for obtaining one-time passwords: <strong>Set up by using an app<\/strong> (Setting up sign-in using the app) or <strong>Set up using SMS<\/strong> (SMS login setup).<\/li>\n<\/ol>\n<h2>Set up by using an app<\/h2>\n<p>To get started, you should install the application for receiving one-time passwords. We recommend using TOTP apps such as:<\/p>\n<ul>\n<li>\n              <a href=\"https:\/\/support.google.com\/accounts\/answer\/1066447?hl=en\">Google Authenticator<\/a>\n            <\/li>\n<li>\n              <a href=\"https:\/\/support.1password.com\/one-time-passwords\/\">1Password<\/a>\n            <\/li>\n<li>\n              <a href=\"https:\/\/authy.com\/guides\/github\/\">Authy<\/a>\n            <\/li>\n<li>\n              <a href=\"https:\/\/helpdesk.lastpass.com\/multifactor-authentication-options\/lastpass-authenticator\/\">LastPass Authenticator<\/a>\n            <\/li>\n<\/ul>\n<p>When the mobile app is already installed:<\/p>\n<ol type=\"1\">\n<li>Click <strong>Set up using an app<\/strong><\/li>\n<li>Save your recovery codes.\n<ul type=\"a\">\n<li>To save the recovery codes on your computer, click <strong>Download<\/strong><\/li>\n<li>To print the recovery codes on paper, click <strong>Print<\/strong>.<\/li>\n<li>To copy the recovery codes to the clipboard, click <strong>Copy.<\/strong><\/li>\n<\/ul>\n<\/li>\n<li>After saving your recovery codes, click <strong>Next<\/strong><\/li>\n<li>On the Two-factor authentication page, do one of the following:\n<ol type=\"a\">\n<li>Scan the QR code with your mobile device\u2019s app. After scanning, the app displays a six-digit code that you can enter on GitHub.<\/li>\n<li>If you can\u2019t scan the QR code, click <strong>enter this text code,<\/strong>to see a code you can copy and manually enter on GitHub instead. If you\u2019re using Microsoft Authenticator, you\u2019ll need to use this method.<\/li>\n<\/ol>\n<\/li>\n<li>The TOTP mobile application saves your GitHub account and generates a new authentication code every few seconds. On GitHub \u2014 on the two-factor authentication page \u2014 enter the code from the application and click <strong>Enable<\/strong>.<\/li>\n<li>After you&#8217;ve saved your backup codes and enabled two-factor authentication, it&#8217;s a good idea to sign out and sign in again. In case of problems, such as a forgotten password or a typo in the specified email address, you can use the backup codes to access your account and troubleshoot.<\/li>\n<\/ol>\n<h2>SMS login setup<\/h2>\n<p>If you are unable to use the mobile TOTP app, you can receive one-time passwords via SMS. You can also provide a second phone number for a fallback login method.<\/p>\n<p>Before using this method, make sure that you have the ability to receive SMS messages. You may also be charged for incoming messages.<\/p>\n<ol type=\"1\">\n<li>Click <strong>Set up using SMS<\/strong>.<\/li>\n<li>Save your recovery codes\n<ul type=\"a\">\n<li>To save the recovery codes on your computer, click <strong>Download.<\/strong><\/li>\n<li>To print the recovery codes on paper, click <strong>Print<\/strong>.<\/li>\n<li>To copy the recovery codes to the clipboard, click <strong>Copy.<\/strong><\/li>\n<\/ul>\n<\/li>\n<li>After you have saved your spare codes, click <strong>Next<\/strong>.<\/li>\n<li>Select a country code and enter your phone number. When your information is correct, click <strong>Send authentication code.<\/strong><\/li>\n<li>You should receive an SMS with a code. Type the code on the Two-factor authentication page, and click <strong>Enable.<\/strong><\/li>\n<li>After you&#8217;ve saved your backup codes and enabled two-factor authentication, it&#8217;s a good idea to sign out and sign in again. In case of problems, such as a forgotten password or typo in your email address, you can use recovery codes to access your account and correct the problem.<\/li>\n<\/ol>\n<h2 id=\"step2\">Step 2: Adding a YubiKey for two-factor authentication<\/h2>\n<p>Once two-factor authentication is set up via mobile app or SMS, you can add the YubiKey hardware security key as a second factor of authentication on GitHub.<\/p>\n<ol>\n<li>Sign in to your GitHub account.<\/li>\n<li>Click your profile picture in the top right of the screen.<\/li>\n<li>Select <strong>Settings.<\/strong><\/li>\n<li>In the left pane select <strong>Security<\/strong>.<\/li>\n<li>To the right of <strong>Security keys<\/strong> click <strong>Add<\/strong>.<\/li>\n<li>Insert your YubiKey into a USB port.<\/li>\n<li>In chapter <strong>Security keys<\/strong> click <strong>Register new device<\/strong>.<\/li>\n<li>Type a nickname for your YubiKey, then click <strong>Add<\/strong>.<\/li>\n<li>Wait your YubiKey to begin flashing, then tap the gold button or edge.<\/li>\n<\/ol>\n<p>That&#8217;s all! You have now added a Security Key by Yubico to your GitHub account. Now you can easily log into your GitHub account, securely protected by two-factor authentication. All that is required to login is to enter your username and password, then touch the button or the gold-colored edge on your YubiKey.<\/p>\n<h2>What browsers versions support using YubiKey?<\/h2>\n<ul>\n<li><strong>Google Chrome: <\/strong>since version 38.<\/li>\n<li><strong>Mozilla Firefox<\/strong>: since version 60.<\/li>\n<li><strong>Opera<\/strong>: since version 40.<\/li>\n<li><strong>Microsoft Edge<\/strong>: since build 17723.<\/li>\n<\/ul>\n<p>\n            <em>* It is recommended to use the latest browser version.<\/em>\n          <\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; fullwidth=&#8221;on&#8221; _builder_version=&#8221;4.17.1&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;||-100px||false|false&#8221; custom_padding=&#8221;50px||||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_fullwidth_post_slider include_categories=&#8221;current&#8221; _builder_version=&#8221;4.17.1&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;RGBA(255,255,255,0)&#8221; background_image=&#8221;https:\/\/shop.thekernel.ua\/wp-content\/uploads\/2022\/04\/090f3141-scaled.jpg&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_fullwidth_post_slider][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Using YubiKey with GitHubHow to set up a YubiKey with GitHub? With hardware security keys, you can get the additional protection of two-factor authentication to make your login procedure secure. Follow these step-by-step instructions to easily set up a U2F security key to work with GitHub accounts. Requirements A computer with a USB port and [&hellip;]<\/p>\n","protected":false},"author":42,"featured_media":239268,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_seopress_robots_primary_cat":"none","_seopress_titles_title":"","_seopress_titles_desc":"Discover how to integrate YubiKey with GitHub for enhanced code repository security. Keep your development work safe from unauthorized access.","_seopress_robots_index":"","_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[402],"tags":[],"class_list":["post-212704","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-settings"],"acf":[],"_links":{"self":[{"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/posts\/212704","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/users\/42"}],"replies":[{"embeddable":true,"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/comments?post=212704"}],"version-history":[{"count":4,"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/posts\/212704\/revisions"}],"predecessor-version":[{"id":239157,"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/posts\/212704\/revisions\/239157"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/media\/239268"}],"wp:attachment":[{"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/media?parent=212704"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/categories?post=212704"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/tags?post=212704"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}