Storing the credentials on a YubiKey NEO ensures that your credentials are safe, even if your phone is compromised.
It also makes it easy to move between multiple Android devices.
NOTE: This app was previously known as YubiOATH. The name has been changed to Yubico Authenticator.
Once installed the app does not need to be started. Just swiping the YubiKey NEO against the phones NFC reader will cause it to run, displaying a message to indicate that the OTP has been copied, all without leaving the currently running app.
Note that the default NDEF programming needs to be used. If you've reprogrammed the NDEF tag of your YubiKey NEO, you will need to change it back to the URL: https://my.yubico.com/neo/
This can be done using the personalization tool: http://opensource.yubico.com/yubikey-personalization-gui/
When using a YubiKey NEO with a static password in scan code mode you will need to configure which keyboard layout to use in the YubiClip Settings. Currently only the US layout is supported. If you would like to see additional layout support, please consider contributing code via a pull request to our source code repositiory: https://github.com/Yubico/yubiclip-android/
The functionality of this app has been superseded by the YubiOATH app: https://play.google.com/store/apps/details?id=com.yubico.yubioath
The new app allows multiple OATH secrets to be stored and does not require the use of the YubiKeys slots. Note that the new app does require the installation of an applet on the YubiKey NEO device itself. Instructions on how to do so can be found in the description of the YubiOATH app.
This helper App allows you to generate OATH TOTP codes with the secret [or seed] stored in a YubiKey NEO's secure element. Using this App, you can use 2-step verification with services such as Google Apps/Gmail or DropBox without having the 2nd steps' secret stored on your Android device - this is a concern to many who are using the same device to access the service.
This App is community supported, and there is a forum thread at http://forum.yubico.com
Source code and issue tracker for this app is available at https://github.com/Yubico/yubitotp-android
Enable 2-step verification to protect your account from hijacking by adding another layer of security. With 2-step verification signing in will require a code generated by the Google Authenticator app in addition to your account password.
Start by visiting accounts.google.com/SmsAuthConfig
* Generates codes even in airplane mode!
* Support for multiple accounts
* Support for multiple languages