Supported Tokens
YubiKey
AuthLite uses the YubiKey from Yubico Inc. as an inexpensive, robust one-time-code generating device. YubiKeys have no display or battery, no moving parts, and are waterproof and virtually indestructible even in rugged environments. They draw power from the USB port and are treated as an HID keyboard device so they work without special drivers on all platforms.
The YubiKey platform also contains extra cryptographic security features that allows AuthLite to securely authenticate users to offline (disconnected) domain workstations.
YubiKey types
AuthLite supports any YubiKey with firmware v2.2 or higher, including the "Nano", and NEO. AuthLite cannot use the blue “U2F Security Key” because it does not support OTP or challenge/response modes.
If you need NFC support, be sure to select YubiKey v5 tokens from the store. These are also called "YubiKey 5 NFC".
Soft Tokens (MS/Google Authenticator etc.)
AuthLite is also compatible with OATH Time-based One-time passcodes (TOTP) generated by smart-phone soft-token apps such as the free cross-platform Google Authenticator app or Microsoft Authenticator. This is useful for cases where carrying a hardware token is undesirable or plugging in a USB device is impossible (such as authenticating to a 2-factor system from a smart phone).
Soft tokens cannot normally be used for logging into laptops that are offline from the LAN. Please use YubiKeys for this use case. There is a feature to create separate "Offline" OATH tokens, but the usability is challenging because the user must always know to choose the online or offline token by whether their computer can see the LAN.
OnlyKey
AuthLite version 2.4.2 and newer contain support for the OnlyKey token running firmware 2.1,1 or newer.
OnlyKeys are programmed with a separate application.
Hardware OATH Tokens
Since AuthLite supports the OATH protocol for Time-based One-time passcodes (TOTP), it is also possible to use any hardware token that supports this protocol. These tokens may only be used for "Online" logons, i.e. authentication to resources that can reach the LAN and the DCs.