Store your unique credential on a hardware-backed security key and take it wherever you go from mobile to desktop. No more storing sensitive secrets on your mobile phone, leaving your account vulnerable to takeovers. With the Yubico Authenticator you can raise the bar for security.
The Yubico Authenticator generates a one time code used to verify your identity as you’re logging into various services. No connectivity needed! This is based on Open Authentication (OATH) time-based TOTP and event-based HOTP one-time password codes.
Setting up the Yubico Authenticator desktop app is easy. Simply download and open the app, insert your YubiKey, and begin adding the accounts you wish to protect by using the QR code provided by each service.
Experience security the modern way with the Yubico Authenticator. Visit yubico.com to learn more about the YubiKey and security solutions for mobile.
Features on desktop include:
Touch Authentication - Touch the YubiKey 5 Series security key to store your credential on the YubiKey
Biometric Authentication - Manage PINs and fingerprints on your FIDO-enabled YubiKeys, as well as add, delete and rename fingerprints on your Yubikey Bio Series keys.
Easy Setup - QR codes available from the services you wish to protect with strong authentication
User Presence - New codes generated with just a touch of the YubiKey
Compatible - Secure all the services currently compatible with other Authenticator apps
Secure - Hardware-backed strong two-factor authentication with secret stored on the YubiKey, not on the desktop
Versatile - Support for multiple work and personal accounts
Portable - Get the same set of codes across our other Yubico Authenticator apps for desktops as well as for all leading mobile platforms
Flexible - Support for time-based and counter-based code generation
This snap bundles its own version of the pcscd daemon, and is not compatible with running a system-wide version of pcscd.
Swap out openSUSE_Leap_15.5 for openSUSE_Leap_15.4 or openSUSE_Tumbleweed if you’re using a different version of openSUSE.
With the repository added, import its GPG key:
sudo zypper --gpg-auto-import-keys refresh
Finally, upgrade the package cache to include the new snappy repository:
sudo zypper dup --from snappy
Snap can now be installed with the following:
sudo zypper install snapd
You then need to either reboot, logout/login or source /etc/profile to have /snap/bin added to PATH.
Additionally, enable and start both the snapd and the snapd.apparmor services with the following commands: