How to Use Google’s Titan Security Keys With Passkey Support

We Keep you Connected

How to Use Google’s Titan Security Keys With Passkey Support

How to Use Google’s Titan Security Keys With Passkey Support
Your email has been sent
Google’s updated Titan Security Keys can serve as a multifactor authenticator and store passkeys to replace passwords.
Google announced the availability of Titan Security Keys with passkey support in mid-November 2023; the initial Titan Security Keys edition was used solely for multifactor authentication. Security keys offer a tangible token in the form of a device you may attach to a keyring and place in a pocket. For many people, a security key can be easier to keep track of and use than passwords and authenticator apps.
Jump to:
Google’s Titan Security Keys may be used in two ways.
First, as with earlier editions of the keys, you may use them as an additional security factor. In this case, an account sign-in requires your username, password and security key confirmation. For example, you could use the keys to enroll your Google account in Google’s Advanced Protection Program, which relies on the keys to authenticate access. (The Advanced Protection Program requires two security keys, with one intended for daily use and the other stored as a backup. Where possible, you may want to secure Google Workspace administrator accounts in this manner.)
Alternatively, Titan Security Keys can serve as a passkey to replace password entry. In this scenario, the site relies on a securely stored token created and then saved to your security key. Once configured, you enter your username and confirm access with your key — no password is needed. According to Google, each Titan Security Key can “store more than 250 unique passkeys.” Adobe, Amazon, Apple, Google, Microsoft and many others already support passkeys, with more companies planning passkey support soon.
Google’s Titan Security Keys come in two versions:
Figure A
Each Titan Security Key comes with a brief bit of documentation (Figure B). The following steps walk you through how to set up a new Titan Security Key to provide two-step verification for your Google account.
Figure B
Figure C
Figure D
Figure E
Figure F
Figure G
Figure H
Figure I
Figure J
Figure K
Your security key is now all set up and ready to use for two-step verification with your Google account.
You can add your Titan Security Key to more than one account and even to more than one account with the same vendor. For example, you may use it as two-step verification both for a Google Workspace account and a personal Gmail account.
You may also use your Titan Security Key with a wide range of other accounts that support the use of security keys for MFA. While the specific setup steps may vary, the general process will be similar: Sign in to an account, navigate to password or sign-in settings and then choose to add a security key. Each site will prompt you to insert the key, touch or press the button and approve access.
If you prefer, you may use a Titan Security Key as a passkey for your Google or Google Workspace account. To do this, go to https://g.co/passkeys, click the Get Passkeys button, sign in if prompted, select + Create A Passkey and follow the steps as prompted. Once configured, this allows you to use the security combined with a fingerprint, facial recognition or PIN code to sign in to your account.
Your Titan Security Key can serve as a passkey for the growing number of sites that support passkeys. For example, here’s how to add the Titan Security Key as a passkey for a standard Amazon.com account in the U.S.
Figure L
Figure M
Figure N
Figure O
Figure P
The security key will now be added and may be used when prompted to authenticate instead of a password to sign in to your Amazon.com account.
The steps to configure the Titan Security Key as a passkey for other sites and apps will be similar.
Do you use the latest Titan Security Keys, or do you prefer other alternatives, such as Yubico keys? Mention or message me on X (@awolber) to let me know how you use security keys as passkeys or for multi-factor authentication on your accounts.
Strengthen your organization’s IT security defenses by keeping abreast of the latest cybersecurity news, solutions, and best practices. Delivered Tuesdays and Thursdays
Strengthen your organization’s IT security defenses by keeping abreast of the latest cybersecurity news, solutions, and best practices. Delivered Tuesdays and Thursdays
How to Use Google’s Titan Security Keys With Passkey Support
Your email has been sent
TechRepublic Premium content helps you solve your toughest IT issues and jump-start your career or next project.
This is a comprehensive list of the best AI art generators. Explore the advanced technology that transforms imagination into stunning artworks.
Find the perfect payroll service for your business without breaking the bank. Discover the top cheap payroll services, features, pricing and pros and cons.
Is NordVPN worth it? How much does it cost and is it safe to use? Read our NordVPN review to learn about pricing, features, security, and more.
Free project management software provides flexibility for managing projects without paying a cent. Check out our list of the top free project management tools.
Australian and New Zealand enterprises in the public cloud are facing pressure to optimize cloud strategies due to a growth in usage and expected future demand, including for artificial intelligence use cases.
Every organization relies on data that must be protected and backed up in a reliable and secure way by authorized personnel. While the content or criticality of the data may vary, the processes behind a successful backup strategy are universal. This checklist from TechRepublic Premium will help you establish a standard framework for backing up …
Artificial intelligence comes in many varieties, from tools that respond to customers via chat to complicated machine learning algorithms that predict the trajectory of an entire organization. Despite years of activity and the imaginative ideas found in science fiction, AI doesn’t yet comprise sentient machines that reason like humans. Rather, AI encompasses more narrowly focused …
Data governance is no longer a ‘nice-to-have’ measure in organizations as there is a growing concern around the globe that unregulated use of data can result in serious privacy violations, among other issues. That’s why data governance has topped the agenda in many continents as more efforts are being put in place to provide standards …
Today’s data-driven business landscape requires the efficient management and utilization of databases for organizations to thrive. SQL Developers are at the forefront of this effort. They are responsible for designing, implementing and maintaining database systems that store, retrieve and manipulate data crucial to the business. This hiring kit from TechRepublic Premium provides a workable framework …
Get the web’s best business technology news, tutorials, reviews, trends, and analysis—in your inbox. Let’s start with the basics.
* – indicates required fields
Lost your password? Request a new password
Please enter your email adress. You will receive an email message with instructions on how to reset your password.
Check your email for a password reset link. If you didn’t receive an email don’t forgot to check your spam folder, otherwise contact support.
This will help us provide you with customized content.
Thanks for signing up! Keep an eye out for a confirmation email from our team. To ensure any newsletters you subscribed to hit your inbox, make sure to add newsletters@nl.technologyadvice.com to your contacts list.

source

GET THE LATEST UPDATES, OFFERS, INFORMATION & MORE