The Hardware Tokens page of Starling Two-Factor Authentication is used for adding and managing the hardware tokens (for example, YubiKey 5 NFC) that are used for authentication by your configured users.
The following hardware token file types are currently usable with Starling Two-Factor Authentication:
The Hardware Tokens page is displayed when Hardware Tokens is clicked in the navigation bar. The Hardware Tokens page is used to add and manage hardware tokens.
The following buttons appear at the top of the page:
Clicking this button opens the Import Hardware Tokens dialog where you can configure a new token for use with Starling Two-Factor Authentication. For more information, see Importing hardware tokens.
Clicking this button opens the Delete Token dialog where you can remove the token from Starling Two-Factor Authentication. For more information, see Deleting hardware tokens.
Clicking this button refreshes the Hardware Tokens table.
This field is used to search for a token based on the manufacturer, serial number, or assigned user. To use the search functionality, start typing in the field. The table will automatically update to display results that match.
The following information and option appear in the table on this page:
If included in the imported file, this column displays the name of the token manufacturer.
The serial number for the token.
This column displays the type of token.
This is the response length for the token.
Clicking the link in this column displays the email, name, and mobile number of the user (or users) the token is currently assigned to within Starling Two-Factor Authentication. This column will display None if the token is not currently assigned to a user.
The following configuration options may appear on this drop-down depending on the current state of the token and collaborator type:
To begin using hardware tokens for authentication with Starling Two-Factor Authentication they must first be imported.
To import hardware tokens
IMPORTANT: Before using hardware tokens with Starling Two-Factor Authentication, ensure you have followed all installation and configuration requirements from the token manufacturer to ensure tokens are ready for use.
- On the Hardware Tokens page, click Import.
- In the Import Hardware Tokens dialog, click Choose file.
- Select the CSV or PSKC file containing the token information. This file should have been generated according to the instructions provided by your token manufacturer and match the file requirements (Additional hardware and software requirements).
- (Optional) If using an encrypted PSKC file or DPX file you need to enter your file key.
- Click Open.
- In the Import Hardware Tokens dialog, click Next.
- Select the check box associated with the token or tokens to be imported. Any issues found with tokens identified in the file will be indicated by a icon. Hover over the icon for more information as to why the token was not imported.
- Click Import tokens. Each successfully imported token will appear listed on the Hardware Tokens page and can be assigned to a user. For more information, see Assigning a hardware token to a user.