| Developers: | Active Soft (rutoken) |
| Date of the premiere of the system: | 2019/04/03 |
| Branches: | Internet services, Information technologies |
| Technology: | Cybersecurity - Authentication, Means of enciphering are cybersecurity |
Content |
Rutoken U2F — the U2F standard token (Universal 2nd Factor) acting as a reliable second factor for protection of accounts against foreign access on the Internet.
2019
Start of serial production of hardware authenticators Rutoken U2F
On April 3, 2019 the Aktiv company announced the beginning of serial production of hardware authenticators of the U2F standard (Universal 2nd to Factor) - Rutoken U2F.
Rutoken U2F is safe means for an input in personal accounts and accounts of the websites and portals. Specialists of the Ministry of Telecom and Mass Communications and foreign experts from National Institute of standards and technologies of the USA (NIST) confirm it, pointing to unreliability of the SMS, and recommend not to use passwords and SMS for an input on resources. In comparison with program generators of one-time passwords, hardware authenticators work even if in phone the accumulator sat down, at bad quality mobile communications when the sim card is taken, there was a breakdown or phone is forgotten or stolen.
Rutoken U2F works according to the open standard of universal two-factor authentication developed by FIDO Alliance where the first factor – the password from the account, and the second – possession of a hardware token with a key. The key from a hardware token cannot be taken therefore it cannot flow away on the Internet. One token can be used for access to the different websites.
Characteristics
For April, 2019 Rutoken U2F has the following characteristics:
- Google Chrome (version 38+)
- Firefox (version 57+)
- Opera(40+)
Platforms
Interface of connection
Type of cryptographic key
- ECCP256
Dimensions
- 58kh16kh8mm
Weight
- 6.3 g
When using Rutoken U2F security of an input on the website is based not only on the login and the password, but also confirmation of ownership of the second authentication factor. Possession of the second factor is confirmed of physical existence of the device and clicking of the touch button on its body.
The U2F standard is developed by developers of the leading Internet services and platforms among which there is Google (Gmail, Drive, Cloud, etc.), Youtube, Facebook, LastPass, Dropbox, Evernote, WordPress, Github.
One token can be used for access to the different websites. Use of the second factor can be configured in the corporate public and closed services using:
- Plug-ins for CMS such as WordPress and Django, Joomla!;
- The PAM module for authentications on U2F technology in GNU/Linux and macOS;
- Own server of authentication;
- Components for implementation of the U2F servers in programming languages C Java PHP, Python.

