

Now you can enable a YubiKey security key (manufactured by Yubico, a third party provider) as your users’ MFA device. When MFA is enabled, AWS prompts users for their username and password (the first factor – what they know) and also provides an authentication challenge such as one-time passcode (OTP) to their MFA device (the second factor – what they have).

Starting October 8, 2018, you can now enable other U2F security keys as an MFA device for your root and IAM users.ĪWS Identity and Access Management (IAM) best practice is to require all IAM and root users in your account to sign into the AWS Management Console with multi-factor authentication (MFA). Update on October 8, 2018: After we launched support for security devices manufactured by Yubico on September 25, 2018, we received feedback from customers to support other U2F security key providers, as well.
