- Some people use this to mitigate the risk/impact of their password getting compromised.
- Others use it to reduce (but not elimitate) the risk of authenticating to their webemail account from a potentially compromised computer. The one-time password requires the attacker to conduct an active attack on the token or the session instead of simply/passively capturing your password.
The plugin is known to be working with Roundcube version 1.0 to 1.1.4.
- Support alternative API servers - see
- Validation of the token is done via HMAC-SHA1 authentication over HTTPS (with certificate and hostname validation)
- Usage enforcement or in other words disallow yubikey opt-out (disabled by default) - see
- Multiple keys by users.
- Curl PHP module with TLS support.
Install the code in the plugin directory and name it exactly yubikey_authentication (roundcube/plugins/yubikey_authentication/)
Add the plugin name in the
pluginsarray of the config file (config/config.inc.php formely main.inc.php). It must match the name of the directory used in #1.
$config['plugins'] = array('yubikey_authentication');
Set your API keys in plugins/yubikey_authentication/config.inc.php by visiting https://upgrade.yubico.com/getapikey/
$rcmail_config['yubikey_api_id'] = 'ID HERE'; $rcmail_config['yubikey_api_key'] = 'KEY HERE';
Login normally and configure your yubikey in "Settings/Server Settings" menu:
Ensure "Require YubiKey OTP" is checked
Set your "YubiKey ID" by simply pressing on your yubikey (only the first 12 chars will be used).
Test your installation. You're done!
This code is based on work done by Oliver Martin which was using patches from dirkm.
- Stuart Henderson - support alternative API servers and some cosmetic tweaks
- Peter Kahl - disallow yubikey opt-out
- Florian Götz - multiple keys per users
Danny Fullerton - Mantor Organization