Register now for better personalized quote!

HOT NEWS

How to use Security Keys to protect your Apple ID on your iPhone

Jan, 25, 2023 Hi-network.com
Josh Slate/

See also

  • How to record a phone call on an iPhone
  • How to clear the cache on your iPhone (and why you should)
  • How to take a scrolling screenshot on Android and iPhone
  • How to add your transit card to Apple Wallet

Apple has added a new feature to iPhones running iOS 16 called Security Keys for Apple ID.

This feature allows you to usehardware security keys to add an additional layer of protection to your Apple ID. Think of it as a password that you plug in. This way, even if your password were to fall into the wrong hands, it would be useless without access to the right security keys.

Also: The best security keys

This is a game-changer and the best way to protect your Apple ID from hackers. I'll show you how to get it set up.

How to use Security Keys to protect your Apple ID on your iPhone

1. Gather your security keys

You'll need a minimum of two security keys (up to a maximum of six). You need to have two in case you lose or misplace one.

The security keys need to be Fido-certified keys. I recommend you take a look at:

  • Yubico Fido Security Key NFC
  • YubiKey 5 NFC
  • YubiKey 5C NFC
  • Yubico Fido Security Key C NFC
  • Feitan MultiPass K16 USB Security Key  

2. Go to your Settings

Start by tapping on Settings and then your name and photo at the top. Next, tap on Password & Security.

Adrian Kingsley-Hughes/

3. Add Security Keys

Scroll down to Add Security Keys.

Adrian Kingsley-Hughes/

4. Enroll the first Security Key

Remember that before you start, you need a minimum of two security keys.

Also: This is the ultimate security key. Here's why you need one

My first security key is aYubiKey 5 NFC , so I tap this one to enroll.

Your iPhone will prompt you to enter a passcode, confirm that you want to add a security key, plug in the security key or bring it nearby, and name the security key. See the following screenshots for what that'll look like. 

View the Yubico YubiKey 5

$50 at Amazon Adrian Kingsley-Hughes/ Adrian Kingsley-Hughes/ Adrian Kingsley-Hughes/ Adrian Kingsley-Hughes/

You can give your security key a memorable name.

Adrian Kingsley-Hughes/

5. Enroll your other security keys

My second security key is the YubiKey 5Ci , which has a Lightning connector on one end I can plug into the iPhone, and a USB-C connector on the other for other devices such as Macs, MacBooks, Windows PCs, iPads, and Android devices. Follow the prompts to enroll your second security key.

View the Yubico YubiKey 5Ci

$89 at Walmart Adrian Kingsley-Hughes/

Again, you can give your security key a memorable name.

Adrian Kingsley-Hughes/

6. Check that there are no rogue devices logged in with your Apple ID

Next, you're presented with a list of devices currently signed in with your Apple ID. 

Also: Did an SOS satellite icon just appear on your iPhone? Here's why

All devices should be ones you recognize. If not, remove that device from the listing.

Adrian Kingsley-Hughes/

7. Keep the security keys separate

The process shouldn't take more than a couple of minutes.

Now that you're done, make sure to store your keys in separate places (I have one in use and another as backup, but you might want one for home and another for the office, or whatever works for you).

Don't keep both in the same place -- such as on the same keyring. That way if you lose one, you'll lose both.

Adrian Kingsley-Hughes/

Security

8 habits of highly secure remote workersHow to find and remove spyware from your phoneThe best VPN services: How do the top 5 compare?How to find out if you are involved in a data breach -- and what to do next
  • 8 habits of highly secure remote workers
  • How to find and remove spyware from your phone
  • The best VPN services: How do the top 5 compare?
  • How to find out if you are involved in a data breach -- and what to do next

tag-icon Hot Tags : Security

Copyright © 2014-2024 Hi-Network.com | HAILIAN TECHNOLOGY CO., LIMITED | All Rights Reserved.
Our company's operations and information are independent of the manufacturers' positions, nor a part of any listed trademarks company.