Home » Password Management » Popular Password Managers that Work with YubiKey

Popular Password Managers that Work with YubiKey


Table of Contents

Not everyone who uses a Password Manager is comfortable with the fact that only a single master password is often required to gain access. Fortunately, the developers behind the most popular Password Managers were already aware of that issue, and new additional authentication methods were added to improve the safety of your data.

Most reputable Password Managers can secure your account with Two-Factor Authentication, which typically means using an Authenticator app like Google Authenticator to generate the 6-digit TOTP code.

However, today I will focus on a more advanced authentication method and a handful of Password Managers that support it.

The U2F or Universal Second Factor relies on the account owner to authenticate using a Hardware Security Key by either inserting the key into the USB port and touching it or using the Near-Field Communication protocol to authenticate wirelessly on a device that supports the NFT.

The Yubico company produces one of the most popular and trusted Hardware Security Keys called YubiKey, and below is the list of Password Managers that work with YubiKey.

The following Password Managers work with YubiKey.

  • LastPass
  • 1Password (Online account only)
  • Dashlane
  • Bitwarden
  • Keeper

All Password Managers from the list above except one will work with YubiKey when unlocking the desktop application and the browser extension installed on your computer.

The exception is 1Password, where only the 1Password.com online account works with the YubiKey. The desktop application and the browser extension will still rely on the master password, pin, or biometric unlock if using the mobile device.

I wanted to give you some advice here; make sure to register a minimum of two YubiKeys, just in case your primary one has been lost.

If you don’t have the YubiKey yet, I would recommend my favorite, YubiKey 5C NFC, a very versatile Security Key with the latest USB-C and NFC technology, allowing you to use with your NFC-enabled devices just by tapping it.

If you are an Apple user, the YubiKey 5Ci is the best next choice, in my opinion.

You may also like: Should I buy a YubiKey Security Key?

But for now, let’s see how we can set up the YubiKey with every Password Manager from the list above.

Setting LastPass to work with YubiKey.

Although I prefer and have been using 1Password for over three years now, the LastPass is admittedly the most popular Password Manager. Adding YubiKey to LastPass takes only a few minutes, and it will dramatically improve the security of your account.

You can visit the LastPass website to check the plans they currently have available.

1) Log in to your LastPass account.

Click the LastPass extension in your browser and press the Open My Vault option to open the account in the browser.

Opening Vault in LastPass password manger.
Opening My Vault in the LastPass browser extension.

Under your account login, select Account Settings.

Account Settings in the LastPass manager.
LastPass Account Settings.

2) Select Multifactor Options.

Select the Multifactor Options tab under the Account Settings.

Selecting Multifactor Options in the LastPass manager.
Click Multifactor Options.

3) Find the Yubico Multifactor Option.

Press the Edit option next to the Yubico Multifactor option.

Adding a YubiKey to the LastPass manager.
Click the pencil icon to edit the Yubico settings.

4) Enable the YubiKey option.

Change the value next to the Enable option to yes using the dropdown field.

Enabling YubiKey in LastPass.
Change the value to Yes to enable the YubiKey.

5) Register the first YubiKey.

Insert your YubiKey into the free port on your computer.

Click inside the first field labeled YubiKey #1 and press the touch bar on your YubiKey until the text field gets filled with data. You may need to hold it for a few seconds.

Resgistering YubiKey in LastPass manager.
Touch and hold the touch bar on the YubiKey to register.

If you like to stop here, that’s all you have to do. You can now press Update and confirm the change by typing your Master Password.

YubiKey setup completed in LastPass.
Completed setup of the YubiKey in LastPass.

Close the form, log out and log back in using your credentials and a YubiKey, which you just configured.

However, I suggest you register a second key as a backup option if you lose or break the primary key. So this is what we are going to do next.

6) Register the second YubiKey as a backup.

Remove the first key and insert your spare one.

Next, click inside the second field labeled YubiKey #2 and press the touch bar on your spare YubiKey until the field fills with data. You may need to hold it for a few seconds.

Adding a second YubiKey to LastPass.
Adding a spare YubiKey to LastPass.

You can now finish the process by pressing the Update button at the bottom of the form. Next time you will have to use your YubiKey and your credentials to log in to LastPass.

Setting the 1Password account to work with YubiKey.

As you may already know, the 1Password is my favorite Password Manager, which I have been using for over three years. However, although 1Password can work with YubiKey, it does so only for the online account. Therefore, you will have to type only your master password when using the browser extension.

Nevertheless, I have decided to include 1Password as I think this is still the best Password Manager currently available. You can try 1Password for FREE for 14 days to see if this is the Password Manager you were looking for.

1) Log in to your 1Password.com account.

Expand the menu by pressing your account name and selecting My Profile.

Selecting My Profile option in 1Password from the menu.
Select My Profile from the 1Password menu.

2) Select More Actions under My Profile.

On the left-hand side, select More Actions, followed by Manage Two-Factor Authentication.

Manage Two Factor Authentication option in 1Password.
Click More Actions followed by Manage Two-Factor Authentication.

3) Press the Set Up App button.

You may notice that there is no YubiKey option available under the Two-Factor Authentication section in 1Password. The option to set up YubiKey remains hidden until we finish setting up an alternative 2FA method using either 1Password or your favorite authenticator app.

Setting up 2FA using authenticator app in 1Password.
Press the Set Up App button.

You can now use your 1Password extension to scan the QR code or use your favorite Authenticator app like Google or Microsoft Authenticator.

If you don’t know how to use 1Password to scan the QR code, I will recommend reading one of my other posts where I have explained how to add a 2FA code to 1Password.

You may also like: 1Password – Tips and Tricks for everyday use.

Alternatively, please read my post on how to add a 2FA account to Google Authenticator.

The 2FA QR code generated by 1Password.
Scan the QR code using 1Password or your favorite authenticator app.

Press the Next button to confirm the 6-digit code generated by the app.

4) Press Next to confirm the 6-Digit Code.

If you have used 1Password to scan the QR code, click inside the text field and let 1Password populate the 6-digit code. Otherwise, type the code generated by the authenticator app.

Confirming the 2FA code generated by the authenticator app.
Confirm the 6-digit TOTP code generated by the app.

5) Reload the page and sign in again.

We now have to reload the page for the option to add YubiKey to 1Password to appear.

You can also click a different section on the page and then return to the Two-Factor Authentication section again. But I think reloading the page is faster.

The authenticator app configured as a 2FA in 1Password.
We now have 2FA configured using an authenticator app.

6) Press Add a Security Key and give it a name.

Again, I would suggest registering at least two YubiKeys, one of which will be your daily driver and another one as a backup that you will keep at your home in a safe location.

Adding YubiKey Security Key in 1Password.
Press Add a Security Key button to configure the YubiKey.

Name your security key; I always type YubiKey1 and press Next.

Naming the YubiKey in 1Password.
Type the name for your YubiKey and press Next.

Follow the instructions on the screen to register your YubiKey in 1Password.

Adding the YubiKey to work with 1Password.
Setting up the YubiKey to work with 1Password.

You can now repeat the steps to add a second security key as a backup option. With a spare YubiKey, you can still log in if your primary key is lost or damaged.

Securing 1Password with YubiKey.
Securing 1Password with the YubiKey.

The spare YubiKey is not a necessity, though. Keep in mind that you still have the other 2FA method to fall into using your Google Authenticator if you don’t have access to your primary key.

After completing this process, your 1Password.com online account will be protected by the YubiKey. However, you will still use only your master password to unlock the app installed on your computer or biometrics on a mobile device.

Setting Dashlane to work with YubiKey.

Similar to other Password Managers, Dashlane can be configured to require a YubiKey when using the browser extension. Make sure to try Dashlane before deciding which Password Manager is for you.

1) Log in using the Dashlane browser extension.

Expand the Dashlane browser extension and press Open the web app to open the online version of the app.

Opening the Dashlane web application.
Open the Dashlane web application.

2) Open the Security Settings.

Expand the My Account menu and select Settings, followed by the Security Settings option.

Opening Dashlane settings in the web app.
Select Settings from the My Account menu.
Opening Security Settings in the Dashlane application.
Select Security Settings.

3) Adding YubiKey to Dashlane.

Toggle the button next to the Unlock with authenticator option to enable the authentication using YubiKey. You may need to confirm the change by retyping your master password.

Enable the Unlock with authenticator option in the Dashlane mamanger.
Adding YubiKey to Dashlane.

In my opinion, the description of this option is confusing. At first, I thought that this option was for setting up 2FA using one of the authenticator apps like Google Authenticator. I was wrong, though, and it is to set up the Security Key like YubiKey.

Press the Add hardware key and follow the instruction on the screen.

Adding a YubiKey Security Key to Dashlane.
Press Add Hardware Key and follow the instruction.

Finally, press Done to complete the process.

Hardware key added notice.
Complete the process by pressing the Done button.

You can also add a spare key by pressing the View Options link followed by a plus sign.

Adding a second YubiKey in Dashlane under View Options.
Add another YubiKey to Dashlane by pressing View options.
Pressing plus sign under the login methods.
Adding a second Security Key.

Setting Bitwarden to work with YubiKey.

Adding YubiKey to Bitwarden can only be done via the online account, and you have to be a premium user.

1) Log in to your Bitwarden online account.

Press Settings followed by the Two-Step Login option.

Adding YubiKey to Bitwarden.
Press Settings followed by the Two-Step Login option.

2) Adding YubiKey to Bitwarden.

Under the Two-Step Login section, press Manage next to the WebAuthn icon.

Managing the WebAuth FIDO2 options in Bitwarden.
Press Manage next to the WebAuth FIDO2 option to add the YubiKey.

You may need to confirm the Master Password to open the TwoStep Login form.

3) Setting up Two-Step Login FIDO2 WebAuthn.

Make sure to read the warning message. The Bitwarden suggests setting up an alternative 2FA method along with the YubiKey in case the platform you are using does not support the FIDO UTF protocol.

For example, you can set up 2FA using the Google authenticator to authenticate and access the Bitwarden vaults when you cant use the YubiKey.

Type the Name for your YubiKey; YubiKey1, for example, if you like to add another spare one later.

Securing Bitwarden with YubiKey.
Type the name of your YubiKey.

Press the Read Key button and follow the instruction on the screen.

Finally, confirm the setup by pressing the Save button.

Confirmation of 2FA option using YubiKey enabled in Bitwarden.
You have successfully added a YubiKey to Bitwarden

At that point, you can add another YubiKey as a backup. Otherwise, press Close to complete the process.

Setting Keeper to work with YubiKey.

Like any other Password Managers in this post, Keeper can also work with YubiKey.

1) Open the Keeper desktop app and log in.

Select your account name and press the Settings option to open the settings window.

Selecting the Settings option in Keeper menu.
Select the Settings option from the menu.

2) Select the Security option.

As with many other Password Managers, the Keeper enforces the rule of having an alternative 2FA method enabled first before adding the YubiKey. The idea is that if you try to use Keeper on a platform that does not support the FIDO UTF technology, you can always log in using the alternative method.

Selecting Security option in the Keeper menu.
Press the Security option.

In this case, the Keeper suggests configuring the Two-Factor Authentication method using one of the popular authenticator apps like Google Authenticator or Duo before setting up the YubiKey.

3) Enable Two-Factor Authentication.

After toggling the Two-Factor Authentication switch, disable the Text Message option as it is widely considered insecure and enable the option labeled Google and Microsoft Authenticator (TOTP).

Enabling Google and Microsoft Authenticator option in Keeper.
Make sure to disable the Text Message option before enabling the Google and Microsoft Authenticator option.

Press Next and scan the QR code generated by the Keeper using either Google or Microsoft Authenticator app. You can read my other post on adding an account to the Google Authenticator app if you have never done it before.

You may also like: Should I use Two-Factor Authentication?

The 2FA QR code generated by the Keeper manager.
Scan the QR code to generate and confirm the 2FA setup.

Paste or type the code generated by the authenticator app in the text field labeled Verification Code and press Next.

Confirming the 2FA setup by typing the TOTP code created by the authenticator app.
Type the 6-digit TOTP code generated by the authenticator app and press Next.

4) Save the Keeper Backup Codes.

You can now save the Backup Codes generated by the application. Each backup code can only be used once and is intended as an emergency login if you have lost your phone with Google Authenticator.

Make sure to copy the codes, print them out and keep them in a safe place in your home.

Finally, press the I have written these codes down button to complete the process.

Backup codes generated by the Keeper manager when setting up 2FA.
Copy or print the Keeper Backup Codes and keep them in a safe place.

5) Adding YubiKey to Keeper.

Now that we have configured an alternative 2FA authentication method, we can finally add the YubiKey Security Key to Keeper.

Press the Setup button next to the Security Key option.

Adding a Security Key to Keeper manager.
Press the Setup button next to the Security Key option.

Remove your security key from the USB port and press Next.

Instruction in Keeper on how to add a YubiKey Security Key.
Remove the YubiKey and press Next.

Insert your YubiKey and give it a name; I like to name it YubiKey1 so I can add another one as a backup.

Press the Register to register your YubiKey and follow the instructions on the screen.

Securing the Keeper with YubiKey.
Type the name for your YubiKey and press the Register button.

Finally, press Done to finish the process.

Confirming the successful setup of the YubiKey in Keeper.
Press Done to complete the YubiKey setup.

You can now add a spare YubiKey to Keeper as a backup option; otherwise, press Done again to close the window.

Adding a second YubiKey Security Key to Keeper.
Add a second YubiKey to Keeper or press Done to complete the process.

Hopefully, this article will help you add the YubiKey to your favorite Password Manager.

My Favorite Software and Hardware.

I appreciate your visit to my blog. I trust that you found the information helpful. To help you further, I'd like to share the software and hardware that I personally use and find valuable. These links are affiliated, meaning that if you make a purchase, I will receive a small commission without any additional cost to you. For more details, please refer to my Disclosure. To be transparent, the software listed is what I have installed on my computer, and the hardware mentioned is what I use to secure my online accounts and store my passwords.

1Password Manager - After three years of use, I can confidently say that 1Password is the best password manager available. Its user-friendly design and robust security features make managing your passwords and personal information a breeze. If you're interested in trying it, head to the 1Password website, where you can start a free trial or take advantage of the latest deals. I assure you, you won't regret switching to 1Password.

YubiKey Security Key - Enhance the security of your digital assets with a hardware authentication device, and I suggest the Yubikey 5C NFC. This is the device I personally use, and it provides additional convenience through its NFC compatibility with your phone. If you're an Apple user, the YubiKey 5Ci is a solid choice and my go-to recommendation.