This site requires JavaScript to be enabled
An updated version of this article is available
Knowledge Base: Public
Category: Information Security / Duo (Multi-Factor Authentication) / Security Key
37327 views

40.0 - Last modified on 2025-04-29 Revised by Tobi Paton

39.0 - Last modified on 2025-02-25 Revised by Noah Chang

38.0 - Last modified on 2025-02-25 Revised by Tobi Paton

37.0 - Last modified on 2025-02-25 Revised by Walter Allen

36.0 - Last modified on 2025-02-25 Revised by Walter Allen

35.0 - Last modified on 2025-02-13 Revised by Walter Allen

34.0 - Last modified on 2025-02-13 Revised by Walter Allen

33.0 - Last modified on 2025-02-13 Revised by Stephanie Holmes

32.0 - Last modified on 2025-02-13 Revised by Stephanie Holmes

31.0 - Last modified on 2025-02-12 Revised by Noah Chang

30.0 - Last modified on 2025-02-11 Revised by Tobi Paton

29.0 - Last modified on 2025-02-11 Revised by Iris Chelaru

28.0 - Last modified on 2025-02-09 Revised by Iris Chelaru

27.0 - Last modified on 2025-02-07 Revised by Tobi Paton

26.0 - Last modified on 2025-02-07 Revised by Noah Chang

25.0 - Last modified on 2025-02-07 Revised by Tobi Paton

24.0 - Last modified on 2025-02-07 Revised by Tobi Paton

23.0 - Last modified on 2025-02-07 Revised by Noah Chang

22.0 - Last modified on 2025-02-06 Revised by Edgar Nunez

21.0 - Last modified on 2025-02-06 Revised by Walter Allen

20.0 - Last modified on 2025-02-06 Revised by Edgar Nunez

19.0 - Last modified on 2025-02-06 Revised by Noah Chang

18.0 - Last modified on 2025-02-05 Revised by Noah Chang

17.0 - Last modified on 2025-02-05 Revised by Tobi Paton

16.0 - Last modified on 2025-02-05 Revised by Tobi Paton

15.0 - Last modified on 2025-02-05 Revised by Tobi Paton

14.0 - Last modified on 2025-02-05 Revised by Walter Allen

13.0 - Last modified on 2025-02-04 Revised by Edgar Nunez

12.0 - Last modified on 2025-02-04 Revised by Walter Allen

11.0 - Last modified on 2025-02-03 Revised by Walter Allen

10.0 - Last modified on 2025-02-03 Revised by Walter Allen

9.0 - Last modified on 2025-02-03 Revised by Walter Allen

8.0 - Last modified on 2024-10-11 Revised by Stephanie Holmes

7.0 - Last modified on 2024-08-06 Revised by Stephanie Holmes

6.0 - Last modified on 2024-04-03 Revised by Tobi Paton

5.0 - Last modified on 2024-02-21 Revised by Tobi Paton

4.0 - Last modified on 2024-02-21 Revised by Tobi Paton

3.0 - Last modified on 2024-02-21 Revised by Tobi Paton

2.0 - Last modified on 2023-11-16 Revised by Logan Hill

1.0 - Created on 2018-06-29 Authored by IET

*Announcement * 

Switch to the Duo Mobile app: Texts & callbacks to be discontinued 2/15

As text messages and phone callbacks will no longer be available for Duo after February 15, 2025, we understand the need for information on additional options, especially for those who may not have access to a smartphone or have other accessibility needs. Security keys are an option for those looking for an alternative.

About Security Keys

A security key is a hardware security device that helps verify users' identities through multi-factor authentication. 

FIDO2 compliant security keys are recommended. The Information Security Office (ISO) recommends the following two models:

Access to Security Keys

The UCD Bookstore plans to sell the YubiKey security devices. Departments can also purchase these devices from the Aggie Enterprise CDW-G and Amazon Punchout. 

For financial or accessibility needs: