diff --git a/user/security-in-qubes/mfa.md b/user/security-in-qubes/mfa.md index a555e285..95f07044 100644 --- a/user/security-in-qubes/mfa.md +++ b/user/security-in-qubes/mfa.md @@ -207,7 +207,7 @@ website](https://docs.nitrokey.com/software/nitropy/all-platforms/installation). YubiKey](https://www.qubes-os.org/doc/how-to-use-usb-devices/) to this app qube though) or directly on the sys-usb vm. - This command will configure your Yubikey: + This command will configure your Yubikey, given a 20 character (all lowercase) secret key, like the example below: `ykpersonalize -2 -ochal-resp -ochal-hmac -ohmac-lt64 -ochal-btn-trig -a 303132333435363738393a3b3c3d3e3f40414243` @@ -216,6 +216,7 @@ though) or directly on the sys-usb vm. - Challenge-Response Mode: `HMAC-SHA1`, - Require usser input (Optional, but Recommended): `true`, - HMAC-SHA1 Mode: `fixed 64 bit input` + - Secret Key (example): `303132333435363738393a3b3c3d3e3f40414243` **Yubikey (via GUI)**