Important
THESE ARE PRELIMINARY INSTRUCTIONS THAT CANNOT BE FOLLOWED COMPLETELY YET
Important
THESE ARE PRELIMINARY INSTRUCTIONS THAT CANNOT BE FOLLOWED COMPLETELY YET
YubiKey
Configuring Yubikey for the NOAA RDHPCS
A Yubikey is an “electronic physical keyring” that is plugged into an available USB slot on your computer. Like a keyring, a Yubikey holds (stores) several sets of keys (authentication tokens and certificates), and helps prevent the compromise of accounts used to access computers, networks and web applications by requiring the physical possession of a key for successful login.

Important
As of October 1, 2025 YubiKeys or CAC will be required to access the NOAA RDHPCS. Contact your security office to request a Yubikey.
Yubikey Registration
The NOAA Yubikey is issued by your security office.
If you do not have a NOAA issued YubiKey, contact your local I/T staff, your primary email admin, or your security office.
If you do not know any of those details, start by contacting your mail admin. Log into the NOAA Staff Directory. Click your name on the right hand side, then click View my Info. Click the link Primary Mail Admin to send an email to your mail admin to start your Yubikey request.
You must register your NOAA issued YubiKey for use with your NOAA accounts at https://accounts.noaa.gov, and follow the additional steps below to configure and register your Yubikey for RDHPCS use.
Note
If you have lost your NOAA issued Yubikey and have a replacement Yubikey, you will need to delete the lost Yubikey at the AIM MFA page
These steps create a new token on your Yubikey in Slot 2, the Long Press slot. It is separate and different from the Short Press you have been using.
Note
A Long Press means touch and hold for three (3) seconds
Follow these steps to configure Long Press Slot 2 with a Yubico OTP credential. You can safely restart these instructions and re-register the Yubico OTP credential in Long Press Slot 2:
You must have registered your NOAA issued Yubikey at https://accounts.noaa.gov. Navigate to your NOAA Accounts profile page and look at MFA Enrollment for a green checkmark and Yubikey registered

Important
DO NOT PROCEED until you have registered your NOAA issued YubiKey at https://accounts.noaa.gov
Download and install the YubiKey Manager
Note
If you are working on a Government Provided System (Government Furnished Equipment (GFE)) you will need to request a software installation from your local I/T office. You may find it simpler and easier to use a personal computer for the following steps.
Note
If you are a GFDL Linux user, the Yubikey Manager package is installed on the GFDL workstations and does not need to be installed. Proceed with Step 3, below.
Insert your NOAA issued Yubikey into an available USB slot
Open the YubiKey Manager from the Start Menu (Windows) or Applications folder (Mac). Linux users, skip ahead to step 4-Linux.
From the Applications menu, select OTP.

Under Long Touch (Slot 2), select Configure

Under Select Credential Type, select Yubico OTP

Select Next to continue to the Yubico OTP configuration.
Configure Yubico OTP credential
Under Yubico OTP, check and set the following:
Under Public ID, select Use serial.
Under Private ID, select Generate.
Under Secret Key, select Generate.
Ensure Upload is not checked.

Record the Public ID and Secret Key in your favorite plain text editor. You will not be able to retrieve this information again after completion. We will use this information to complete the YubiKey enrollment process.
Select Finish to confirm the changes on the YubiKey. The changes will be written to the YubiKey.
Note
Slot 2 may show as being configured. It is safe to overwrite.
Skip ahead to step 10.
Note
These set of instructions are for Linux users only
4-Linux: Open a terminal window.
5-Linux: Type (or copy and paste) the following ykman command
ykman otp yubiotp 2 --serial-public-id --generate-private-id --generate-key
Example:
ykman otp yubiotp 1 --serial-public-id --generate-private-id --generate-key
Using YubiKey serial as public ID: vvcccbn*****
Using a randomly generated private ID: a36ad3d*****
Using a randomly generated secret key: 4de7b4a69faa75e779a8b0869b0*****
Program a YubiOTP credential in slot 2? [y/N]: y
Record the Public ID and Secret Key in your favorite plain text editor. You will not be able to retrieve this information again after completion. We will use this information to complete the YubiKey enrollment process.
Type y and press <ENTER> to confirm the changes on the YubiKey. The changes will be written to the YubiKey.
Note
Slot 2 may show as being configured. It is safe to overwrite.
Continue onwards to the next step, step 10.
In a web browser, navigate to the AIM MFA page

Enter the Secret Key from Step 9 or 5-Linux.
Enter a 6 to 8 digit PIN. You may choose to re-use the PIN you use for your RSA token to make it easier to remember.
Confirm the PIN.
Click on Submit Changes to complete the registration.