With the release of GitLab 8.9, GitLab now supports the FIDO Universal 2nd Factor (U2F) protocol for user authentication with the added layer of hardware security from YubiKey. We're excited to expand our authentication capabilities to include U2F devices. U2F changes the game for online authentication because it uses public key cryptography and has built-in support to prevent phishing. This higher level of authentication enables developers to maintain the security of their servers, code, sites, and more from a single source.
With the steady rise of new devices and the growing capabilities of existing ones, the average user logs into networks, applications, or platforms from a variety of different devices. While device flexibility is great from a user perspective, it represents significant security challenges for organizations and developers. Each new access point makes it tougher to fend off malicious attacks particularly phishing while maintaining the integrity of accounts and systems.
YubiKeys reduce the number of steps you have to take to access your accounts, while still maintaining usability and providing secure authentication with just a touch of the YubiKey. With U2F, you can now authenticate by inserting their YubiKey into the USB port when prompted. You'll activate your YubiKey by simply pressing the button on the device.
The same U2F YubiKey that works with GitLab also works for logging into a growing number of other services, including Google, Dropbox, and Dashlane, without any personal data or encryption secrets shared between service providers. With YubiKeys, there are no drivers or client software to install.
GitLab has supported two-factor authentication since the release of GitLab 7.11, adding device-enabled 2nd factor authentication provides an additional layer of security. If you're interested in enabling two-factor authentication with a U2F device, follow the steps in our documentation. Of course, you have the option to choose the authentication method that is best for you.