Allow for the use of YubiKey to access NPS

Allow the use of Yubikey as a MFA option to login into the platform

5 Likes

Netwrix Privilege Secure (NPS) supports the integration of various MFA providers through the RADIUS connector. You would need to refer to the Yubikey documentation on setting Yubikey to work with RADIUS but in Netwrix Privilege Secure the steps in the following KB article will apply once you have a RADIUS server stood up: Configuring a Custom RADIUS Authentication Connector

Thanks!

2 Likes

That is not for accessing the NPS platform, that for connecting to systems. I want to use a yubiko key to access nps.

1 Like

Hi Dan,

Thanks for reaching out.

The RADIUS connector allows you to use an external RADIUS solution for MFA when accessing NPS.

We do not have a native Yubikey authentication integration at this time.

We do have that in our feature backlog, there is not an estimated release time right now.

Thank you,
-Kevin

2 Likes

Hey Dan, Martin here—product manager for Privilege Secure. I’m glad to see there’s interest in having Yubikey as an authentication option into NPS. As @kevin.horvatin mentioned, it’s on our backlog and something we’re hoping to have in 2026 timeframe.

Can you tell me more about your use case for having Yubikey as an authenticator?

In the meantime, @jerome.diggs’ response on using the custom RADIUS authentication connector Allow for the use of YubiKey to access NPS - #2 by Jerome.diggs is our best alternative in the interim. Let me know what you think!

3 Likes

Hi Dan,

I’m the head of product security here at Netwrix. One other option for achieving this is to integrate Privilege Secure with your identity provider (e.g. Okta, Entra ID) with its support for SAML and OIDC. Most identity providers natively support WebAuthn today, which would allow you to use your Yubikey now.

The general direction for Netwrix products is to support SAML and OIDC, integrate them within your broader identity management ecosystem, and rely less on native support for the various authentication methods.

Regards,
Gerrit

2 Likes