AuthLite uses the YubiKey 5-series from Yubico Inc. as an inexpensive, robust one-time-code generating device. YubiKeys have no display or battery, no moving parts, and are waterproof and virtually indestructible even in rugged environments. They draw power from the USB port and are treated as an HID keyboard device so they work without special drivers on all platforms.
The YubiKey platform also contains extra cryptographic security features that allows AuthLite to securely authenticate users to offline (disconnected) domain workstations.
Yubico's Token Types
- AuthLite can use any YubiKey with OTP support, USB A or C, Normal or Nano size, Regular or FIPS certified.
- AuthLite cannot use the “Security Key” or "Bio" tokens because they do not support OTP or challenge/response modes.
If you need NFC support, be sure to select YubiKeys that contain the word "NFC" in the product name.
Soft Tokens (Microsoft/Google Authenticator etc.)
AuthLite is also compatible with OATH Time-based One-time passcodes (TOTP) generated by smart-phone soft-token apps. This is useful for cases where carrying a hardware token is undesirable or plugging in a USB device is impossible (such as authenticating to a 2-factor system from a smart phone).
Soft tokens cannot normally be used for logging into laptops that are offline from the LAN. Please use YubiKeys for this use case. There is a feature to create separate "Offline" OATH tokens, but the usability is challenging because the user must always know to choose the online or offline token by whether their computer can see the LAN.
AuthLite version 2.4.2 and newer contain support for the OnlyKey token running firmware 2.1.1 or newer.
OnlyKeys are programmed with a separate application.
Hardware OATH Tokens
Since AuthLite supports the OATH protocol for Time-based One-time passcodes (TOTP), it is also possible to use any hardware token that supports this protocol. These tokens may only be used for "Online" logons, i.e. authentication to resources that can reach the LAN and the DCs.