Yubico Forum

...visit our web-store at store.yubico.com
It is currently Tue Jan 30, 2018 5:33 pm

All times are UTC + 1 hour

Post new topic Reply to topic  [ 2 posts ] 
Author Message
PostPosted: Fri Oct 23, 2009 4:41 pm 

Joined: Fri Oct 23, 2009 2:21 pm
Posts: 1
Location: Tulsa Ok
I just received my yubikey 2.0. I found out about it from Security Now. I have searched the forums for a resolution to my question and may have missed the answer. I want to keep the compatibility with the Yubico Server, for compatibility with LastPass. I also want to be able to use the GRC generated password for Truecrypt. I understand that I need to update configuration 2 and keep the current configuration 1. I do not want to try to type 63 or 64 characters. I would like to be able to cut and paste. I did locate the statickey.wsf script. If understand it. The script will update configuration 1, which I do not want to do. I would also like to be able to backup my current configuration(s) so that I can restore them in case I mess things up or is there a way to setup a configuration that will use the OTP compatability with Yubico server?
Thank you for any help you may be able to provide.

Reply with quote  

Share On:

Share on Facebook FacebookShare on Twitter TwitterShare on Tumblr TumblrShare on Google+ Google+

PostPosted: Mon Oct 26, 2009 10:06 am 
Yubico Team
Yubico Team

Joined: Wed Oct 01, 2008 8:11 am
Posts: 210
You can use the YubiKey configuration utility to program the configuration 2 of the YubiKey 2.0 to static password mode.

The YubiKey configuration utility and the user guide can be downloaded from the following link:


The step by step instructions can be found at the following forum link:


Please note that the actual Static password itself cannot be set by the user. The Static password is generated as a result of an encryption function involving the AES key and YubiKey parameters. Users need to configure this static password in their application(s).

In order to streamline the process for users who want to program their own AES keys in YubiKeys and still have a working key online we have changed the process of handling AES Keys at the online validation server. If you want to again validate the OTP with the online Yubico validation server, please follow the instructions given at the following forum link:


We hope this helps!

Reply with quote  
Display posts from previous:  Sort by  
Post new topic Reply to topic  [ 2 posts ] 

All times are UTC + 1 hour

Who is online

Users browsing this forum: No registered users and 8 guests

You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot post attachments in this forum

Search for:
Jump to:  
Powered by phpBB® Forum Software © phpBB Group