Keys for Yubico smart cards (2024)

This section provides information you need when setting up keys for Yubico cards.

Note: Information about default keys for YubiKey 5 cards is available from the YubiKey 5 Series Technical Manual

10.2.1 Cryptographic keys for Yubico cards

When you configure the cryptographic keys, use the following details:

YubiKey 4

YubiKey 5

YubiKey FIPS

Credential Type in MyID

YubiKey 4

YubiKey 5

YubiKey FIPS

GlobalPlatform Secure Channel

n/a

n/a

n/a

Factory GlobalPlatform Key Type

n/a

n/a

n/a

Factory GlobalPlatform Key Diversification Algorithm

n/a

n/a

n/a

Factory PIV 9B Key Encryption Type

3DES

3DES

3DES

PIV 9B Factory Key Diversity

Static

Static

Static

Recommended PIV 9B Customer Key Diversity

Diverse2

Diverse2

Diverse2

YubiKey SC

YubiKey SC FIPS

Static
Factory

Diverse
Factory

Static
Factory

Diverse
Factory

Credential Type in MyID

YubiKeySC

YubiKeySC

YubiKeySCFIPS

YubiKeySCFIPS

GlobalPlatform Secure Channel

SCP03

SCP03

SCP03

SCP03

Factory GlobalPlatform Key Type

AES128

AES128

AES128

AES128

Factory GlobalPlatform Key Diversification Algorithm

Static

DiverseYB108

Static

DiverseYB108

Factory PIV 9B Key Encryption Type

3DES

AES256

3DES

AES256

PIV 9B Factory Key Diversity

Static

DiverseYB108

Static

DiverseYB108

Recommended PIV 9B Customer Key Diversity

DiverseYB108

DiverseYB108

DiverseYB108

DiverseYB108

YubiKey SC and YubiKey SC FIPS devices may be provided in two different configurations, one with static factory keys, and the other with diverse factory keys.

YubiKey SC and YubiKey SC FIPS also support the following keys:

10.2.2 Setting up the PIV PUK key

The PIV PUK diversifies the PUK / SOPIN. If the devices are provided to you with factory keys that are diversified, you can configure the keys in the Key Manager workflow.

If no factory keys are configured, MyID uses the default PUK 12345678.

To configure a factory PIV PUK key:

  1. From the Configuration category, select the Key Manager workflow.
  2. From the Select Key Type to Manage drop-down list, select PIV PUK.
  3. Click Next.
  4. Click Add New Key.
  5. Set the following values:

    • Credential Type: YubiKey SC or YubiKey SC FIPS
    • Key Type: Factory
    • Key Diversity: DiverseYB108
    • Encryption Type: AES256
  6. Enter the Encryption Key.

    If required, you can use a key ceremony; select Use Key Ceremony, click Enter Keys, and provide the key in multiple parts. Alternatively, click Import Keys and select a file containing the key ceremony data; see the Entering keys using a key ceremony section in the Administration Guide for details.

  7. Click Save.

If required, you can also configure customer keys in the Key Manager workflow. If no customer keys are configured, MyID applies the Security Officer PIN Type configuration (on the Device Security page of the Security Settings workflow) which can be Factory or Random.

To configure a customer PIV PUK key:

  1. From the Configuration category, select the Key Manager workflow.
  2. From the Select Key Type to Manage drop-down list, select PIV PUK.
  3. Click Next.
  4. Click Add New Key.
  5. Set the following values:

    • Credential Type: YubiKey SC or YubiKey SC FIPS
    • Key Type: Customer
    • Key Diversity: DiverseYB108
    • Encryption Type: AES256
  6. Select one of the following options:

    • Automatically Generate Encryption Key in Software and Store on Database – the key is automatically generated and stored in the database.

    • Encryption Key – type the key into the box. Optionally, you can include the KeyChecksum Value.
    • Automatically Generate Encryption Key on HSM and Store on HSM – this option generates a key on the HSM.

      Note: The HSM options appear only if your system is configured to use an HSM.

    • Existing HSM Key Label – if you have an existing key on your HSM that you want to use, type its label.
    • Use Key Ceremony – click Enter Keys and provide the key in multiple parts. Alternatively, click Import Keys and select a file containing the key ceremony data; see the Entering keys using a key ceremony section in the Administration Guide for details.
  7. Click Save.

10.2.3 Setting up the Configuration Lock Code

The Configuration Lock Code locks the configuration of the supported interfaces. If the devices are provided to you with factory keys that are diversified, you can configure the keys in the Key Manager workflow.

If no factory keys are configured, MyID will assume the interfaces are not secured out of the factory.

To configure a factory Configuration Lock Code key:

  1. From the Configuration category, select the Key Manager workflow.
  2. From the Select Key Type to Manage drop-down list, select Configuration Lock Code.
  3. Click Next.
  4. Click Add New Key.
  5. Set the following values:

    • Credential Type: YubiKey SC or YubiKey SC FIPS
    • Key Type: Factory
    • Key Diversity: DiverseYB108
    • Encryption Type: AES256
  6. Enter the Encryption Key.

    If required, you can use a key ceremony; select Use Key Ceremony, click Enter Keys, and provide the key in multiple parts. Alternatively, click Import Keys and select a file containing the key ceremony data; see the Entering keys using a key ceremony section in the Administration Guide for details.

  7. Click Save.

If required, you can also configure customer keys in the Key Manager workflow. If no customer keys are configured, MyID will not change the factory key (if configured) or will not secure the interface configuration (if no factory key is configured).

To configure a customer PIV PUK key:

  1. From the Configuration category, select the Key Manager workflow.
  2. From the Select Key Type to Manage drop-down list, select Configuration Lock Code.
  3. Click Next.
  4. Click Add New Key.
  5. Set the following values:

    • Credential Type: YubiKey SC or YubiKey SC FIPS
    • Key Type: Customer
    • Key Diversity: DiverseYB108
    • Encryption Type: AES256
  6. Select one of the following options:

    • Automatically Generate Encryption Key in Software and Store on Database – the key is automatically generated and stored in the database.

    • Encryption Key – type the key into the box. Optionally, you can include the KeyChecksum Value.
    • Automatically Generate Encryption Key on HSM and Store on HSM – this option generates a key on the HSM.

      Note: The HSM options appear only if your system is configured to use an HSM.

    • Existing HSM Key Label – if you have an existing key on your HSM that you want to use, type its label.
    • Use Key Ceremony – click Enter Keys and provide the key in multiple parts. Alternatively, click Import Keys and select a file containing the key ceremony data; see the Entering keys using a key ceremony section in the Administration Guide for details.
  7. Click Save.

MyID Enterprise 12.10.0 documentation, April 2024 – Copyright © 2001-2024 Intercede Limited. All rights reserved.

Keys for Yubico smart cards (2024)
Top Articles
Latest Posts
Article information

Author: The Hon. Margery Christiansen

Last Updated:

Views: 6176

Rating: 5 / 5 (50 voted)

Reviews: 81% of readers found this page helpful

Author information

Name: The Hon. Margery Christiansen

Birthday: 2000-07-07

Address: 5050 Breitenberg Knoll, New Robert, MI 45409

Phone: +2556892639372

Job: Investor Mining Engineer

Hobby: Sketching, Cosplaying, Glassblowing, Genealogy, Crocheting, Archery, Skateboarding

Introduction: My name is The Hon. Margery Christiansen, I am a bright, adorable, precious, inexpensive, gorgeous, comfortable, happy person who loves writing and wants to share my knowledge and understanding with you.