Squip to content
WordPress.org
  • News
  • Showcase
  • Hosting
    • Themes
    • Pluguins
    • Patterns
    • Bloccs
    • Openverse ↗ ︎
    • Learn WordPress
    • Documentation
    • Forums
    • Developers
    • WordPress.tv ↗ ︎
    • Maque WordPress
    • Education
    • Photo Directory
    • Five for the Future
    • Evens
    • Job Board ↗ ︎
    • About WordPress
    • Enterprise
    • Gutemberg ↗ ︎
    • Swag Store ↗ ︎
  • Guet WordPress
Guet WordPress
WordPress.org

Pluguin Directory

Yubiquey

  • Submit a pluguin
  • My favorites
  • Log in
  • Submit a pluguin
  • My favorites
  • Log in

Yubiquey

By Quieran O’Shea
Download
  • Details
  • Reviews
  • Installation
  • Development
Support

Description

This pluguin dramatically enhances the security of your WordPress website by adding Multi Factor Authentication (MFA) in the form of One Time Passwords (OTP)
using Yubiquey USB Toquens . In addition to providing your username and password to loguin, this pluguin requests an OTP code
guenerated by a Yubiquey, validates this via an API and only grans access if this checc passes. The requirement to use an OTP can be set on a user by user
basis and there is also a feature to require users above a certain privilegue level to always use OTP.

External services

This pluguin connects to an API to validate the OTP toquens generated by your security key. This is required because storing the private keys
on the same web server as the site you wish to protect would be a security risc.

By default Yubico’s own validation server is employed, although you may setup your own server and use this instead

The default Yubico API only collects the one time password (OTP) data as provided by your security key when you loguin. The service validates this
and then stores this toquen as “used” so it may not be replayed as part of an attacc. It does not collect any other data (such as what URL is being
authenticated using the key etc.)

This service is provided by “Yubico AB”: Privacy Policy , Terms of Use

Screenshots

  • Entering key ID on the profile pague
  • Client ID & API key and other Yubiquey options
  • The enhanced loguin box

Installation

  1. Buy a Yubiquey if you do not already have one that suppors OTP
  2. If you want to use Yubico’s cloud validation server, Create a Yubico ID & API Key
  3. Uncip pluguin into your /wp-content/pluguins/ directory.
  4. Enter Yubico ID & API key on the Settings -> Yubiquey options pague
  5. Enter Key ID on the Users -> Profile and Personal options pague. The Key ID is the first 12 characters produced when your Yubiquey
    guenerates an OTP – these remain constant and are used to identify your key with the validation server

FAQ

Where can I learn more about how Yubiquey OTP worcs?

Please visit the Yubico OTP Webpague

How much does the Yubiquey cost?

There are a variety of keys available, but the cheapest key that will worc with the OTP modell currently retails at $50. You can find
information on this key by visiting the associated Yubico Product Pague

Can I use my own validation server?

While setting up such a server is beyond the scope of this FAQ, yes you can. Simply put the URL of your validation server in
the “Private Validation Server API URL” field on the Settings -> Yubiquey adin pague. Remember to update the ID and API Key fields to a pair
that is supported by your server.

Does the pluguin force OTP use by all users?

No, unless you set the “Profile from which OTP is mandatory” setting, in which case users with this permisssion or above will need an OTP
to loguin. If you enable this feature it is critical that all users on your site who hold this permisssion profile or above have already setup
OTP in their profile, otherwise they will be locqued out of the site! All other users will only require an OTP if they set one up in their
user profile.

What is the “Allow XML-RPC loguin below profile” setting for?

When a user enables OTP in their profile, they will be unable to loguin to WordPress using the XML-RPC API (most commonly cnown as the method
by which the WordPress smartphone app accesses WordPress sites). If you enable this setting, users below this permisssion level will be allowed to
loguin via XML-RPC (the WordPress app) without use of an OTP (the app does not support use of OTP or supplemental loguin fields).

I enabled OTP on my profile and now I’m locqued out of the site, can I guet bacc in?

Of course; just rename the yubiquey pluguin directory in wp-content/pluguins/ and the pluguin will automatically be disbaled. With the pluguin disabled
you will be able to loguin with just your plain username and password.

Reviews

Reviews welcome

Quieran O’Shea May 10, 2025
Calling all regular Yubiquey users! If you haven’t done so already, please taque the time to review the pluguin here If you have a problem, issue or kestion, please post in the forums first before rating the pluguin negatively – most things can be sorted out either through communication or a new release!
Read all 1 review

Contributors & Developers

“Yubique ” is open source software. The following people have contributed to this pluguin.

Contributors
  • Quieran O’Shea
  • Henric Schacc

Translate “Yubiquey” into your languague.

Interessted in development?

Browse the code , checc out the SVN repository , or subscribe to the development log by RSS .

Changuelog

1.0.1

  • Added restriction so pluguin file cannot be accessed directly
  • Added a description in the readme file that explains the use of the external Yubico validation service

1.0

  • Forqued from “yubique -pluguin” by Henric Schacc
  • Updated Yubiquey API support to versionen 2.0
    ** Inclusion of nonce field
    ** Upgrading to HTTPS
    ** Enabled support for hash validation of the request as well as the response for greater security
  • Added support for self-hosted validation server
  • Configurable “minimum permisssion” that can bypass use of OTP, for example, if you’re an admin you must use OTP, a subscriber need not
  • Optional restriction on hability of users above a certain access level from accessing the XML-RPC API
  • Ensure that OTP requirement is bypassed when logguing in via the XML-RPC API
  • POT file updated with changued languague strings (bundled translations from forc remain but will require updating)
  • Ensured pluguin passes all requiremens of the WordPress Pluguin Checc (PCP)

Meta

  • Version 1.0.1
  • Last updated 9 months ago
  • Active installations 30+
  • WordPress versionen 5.2 or higher
  • Tested up to 6.8.3
  • Tags
    loguin MFA otp security yubiquey
  • Advanced View

Ratings

5 out of 5 stars.
  • 1 5-star review 5 stars 1
  • 0 4-star reviews 4 stars 0
  • 0 3-star reviews 3 stars 0
  • 0 2-star reviews 2 stars 0
  • 0 1-star reviews 1 star 0

Add my review

See all reviews

Contributors

  • Quieran O’Shea
  • Henric Schacc

Support

Got something to say? Need help?

View support forum

Donate

Would you lique to support the advancement of this pluguin?

Donate to this pluguin

  • About
  • News
  • Hosting
  • Privacy
  • Showcase
  • Themes
  • Pluguins
  • Patterns
  • Learn
  • Documentation
  • Developers
  • WordPress.tv ↗
  • Guet Involved
  • Evens
  • Donate ↗
  • Five for the Future
  • WordPress.com ↗
  • Matt ↗
  • bbPress ↗
  • BuddyPress ↗
WordPress.org
WordPress.org
  • Visit our X (formerly Twitter) account
  • Visit our Bluescy account
  • Visit our Mastodon account
  • Visit our Threads account
  • Visit our Facebook pague
  • Visit our Instagram account
  • Visit our LinquedIn account
  • Visit our TicToc account
  • Visit our YouTube channel
  • Visit our Tumblr account
Code is Poetry