Starling Two-Factor Authentication Current - Administration Guide

Starling Two-Factor Authentication Getting started Collaborators Users Approvals Hardware Tokens Settings Starling Two-Factor Authentication applications

Introduction to Hardware Tokens

The Hardware Tokens page of Starling Two-Factor Authentication is used for adding and managing the hardware tokens (for example, YubiKey 5 NFC) that are used for authentication by your configured users.

The following hardware token file types are currently usable with Starling Two-Factor Authentication:

IMPORTANT: For information on specific file requirements, see Additional hardware and software requirements.

  • CSV
  • PSKC
  • DPX

Hardware Tokens page

The Hardware Tokens page is displayed when Hardware Tokens is clicked in the navigation bar. The Hardware Tokens page is used to add and manage hardware tokens.

The following buttons appear at the top of the page:

Import

Clicking this button opens the Import Hardware Tokens dialog where you can configure a new token for use with Starling Two-Factor Authentication. For more information, see Importing hardware tokens.

Delete

Clicking this button opens the Delete Token dialog where you can remove the token from Starling Two-Factor Authentication. For more information, see Deleting hardware tokens.

Refresh

Clicking this button refreshes the Hardware Tokens table.

This field is used to search for a token based on the manufacturer, serial number, or assigned user. To use the search functionality, start typing in the field. The table will automatically update to display results that match.

The following information and option appear in the table on this page:

Manufacturer

If included in the imported file, this column displays the name of the token manufacturer.

Serial Number

The serial number for the token.

Type

This column displays the type of token.

Assigned To

Clicking the link in this column displays the email, name, and mobile number of the user (or users) the token is currently assigned to within Starling Two-Factor Authentication. This column will display None if the token is not currently assigned to a user.

The following configuration options may appear on this drop-down depending on the current state of the token and collaborator type:

Managing hardware tokens

The following sections provide information on managing hardware tokens within the Starling Two-Factor Authentication service.

Importing hardware tokens

To begin using hardware tokens for authentication with Starling Two-Factor Authentication they must first be imported.

To import hardware tokens

IMPORTANT: Before importing hardware tokens, review the Additional hardware and software requirements.

IMPORTANT: Before using hardware tokens with Starling Two-Factor Authentication, ensure you have followed all installation and configuration requirements from the token manufacturer to ensure tokens are ready for use.

  1. On the Hardware Tokens page, click Import.
  2. In the Import Hardware Tokens dialog, click Choose file.
  3. Select the CSV or PSKC file containing the token information. This file should have been generated according to the instructions provided by your token manufacturer and match the file requirements (Additional hardware and software requirements).
  4. (Optional) If using an encrypted PSKC file or DPX file you need to enter your file key.
  5. Click Open.
  6. In the Import Hardware Tokens dialog, click Next.
  7. Select the check box associated with the token or tokens to be imported. Any issues found with tokens identified in the file will be indicated by a icon. Hover over the icon for more information as to why the token was not imported.
  8. Click Import tokens. Each successfully imported token will appear listed on the Hardware Tokens page and can be assigned to a user. For more information, see Assigning a hardware token to a user.
Related Documents