Yubico Bitwarden



  1. Bitwarden Server
  2. Docker Compose Bitwarden
  3. Bitwarden On Prem
  4. Yubico Bitwardenrs

Bitwarden, the open source password manager, makes it easy to generate and store unique passwords for any browser or device. Create your free account on the platform with end-to-end encryption and flexible integration options for you or your business. Yubico Authenticator I considered using my YubiKeys to generate TOTP codes using Yubico Authenticator, but a YubiKey can only store 32 TOTP secrets, and I already have 49 of them since I enable TOTP-based 2FA whenever possible. Bitwarden I currently use LastPass to manage my passwords, but I am going to switch to 1Password soon. Bitwarden is an incredibly lightweight enterprise password manager that delivers strong, reliable multi-layered authentication with the YubiKey. As per my current testing YubiKey 5 NFC is working as expected on iOS 14.3 with an iPhone SE 2020 and Bitwarden 2.7.2 (you just need to hold it in the correct spot at the back of the device, near the camera.

Reading Time: 3minutesBitwardenBitwarden local install

Introduction

Yubico Bitwarden

Password Managers is still a necessity in 2020, and will be for a long time. I’ve been using Bitwarden with YubiKeys for a while now, so it was about time to share some experience, and how easy it’s to get started.

Yubico Bitwarden

Bitwarden https://bitwarden.com/ is an Open Source Password Manager that is hosted on GitHub https://github.com/bitwarden. This means that you have full control over source code, and you also could contribute to the project. With Bitwarden you can simply self-host it, or run their Organization Plans that is hosted on Azure https://bitwarden.com/help/article/cloud-server-security/. Bitwarden offers different Organization Plans. To see what fits your demand go to https://bitwarden.com/#organizations. The Enteprises Plan supports Azure AD integration. I will cover this in another blog post.

Configure Bitwarden with your Favorite FIDO key

Bitwarden supports a whole range of Providers. When enabling 2FA you will also be prompted to download recover Code. Download these first, before proceeding to the 2FA setup! And Keep the Recovery codes safe, in case things went south!

To configure your FIDO key with YubiKey.
Go to:
1) Settings
2) Two-step Login
3) Manage

Just add your YubiKey with the Touch/Tap were it will populate the OTP or U2F, I recommend at least two YubiKeys, in case you lose your primary key. With the second backup key you can access your account if you ever lost your key! Yes, that will eventually happen 🙂 You could also configure Bitwarden with another supported OTP/U2F key if you have another brand in your possession. If you do not have one, Authenticator Apps like Authy, Google, Duo is supported as well.

Bitwarden Server

Yubico Bitwarden

The list of supported Yubico keys that will works with Bitwarden https://www.yubico.com/works-with-yubikey/catalog/bitwarden-premium/

If you need to support an NFC compatible key, use the NFC support. I have NFC supported key, so I can access the Bitwarden on go with my Phone.

Test Login

After you have saved the settings, it’s time to test the login from your browser of preference. The login site https://vault.bitwarden.com

Let’s also test a login with iOS with an NFC compatible YubiKey

Docker Compose Bitwarden

Summary

It’s without doubt that configuring 2FA with Bitwarden is straightforward with some simple steps. Just remember! Do not only configure one single YubiKey, that is not good practice.

Bitwarden On Prem

Bitwarden is feature-packed and should tick all your boxed if you have strong requirements for a password manager. With the wide range of supported OTP/U2F, I think this password manger will make you delighted for a long time. And yes, it’s Open Source that is a big bonus!

Documentation

Yubico Bitwardenrs

Hi there,
I have bitwarden_rs running on a Synology NAS in Docker. I have configured the env parameters for yubikey.
When I want to enable the yubikey in my user account on the web panel, I receive the error Invalid Yubikey OTP provided.
What am I doing wrong? Does the communication with the standard yubikey server work? How can I check that.
When I perform a test with my yubikey on https://demo.yubico.com/otp/verify all looks good.
I have also generated the OTP into notepad and copied it manually into the web interface - but always the same result.
Any ideas are appreciated
Thanks,
Sebastian





Comments are closed.