EN

United States (EN)

Australia (EN)

Canada (EN)

Canada (FR)

France (FR)

Germany (DE)

Ireland (EN)

United Kingdom (EN)

EN

United States (EN)

Australia (EN)

Canada (EN)

Canada (FR)

France (FR)

Germany (DE)

Ireland (EN)

United Kingdom (EN)

Blog

How Rippling runs IT: Strengthening MFA with Yubikeys

Author

Published

February 27, 2024

Updated

June 23, 2025

Read time

5 MIN

seo_image_ee43ec96_aBAMAKUq0

For any company that relies on cloud-based systems, multifactor authentication is a critical part of maintaining a strong security posture. As a security team supporting over 2,500+ employees, we believe not all MFA methods are created equal. 

Some of the most common methods, like SMS tokens or security questions, just don’t cut it for the amount of sensitive data we have to safeguard. These methods are especially prone to phishing, and they put the onus on employees to be vigilant. Rippling’s employees undergo extensive phishing-prevention training, but as much as we can, we want to free our employees from judging which sites are trustworthy. 

At Rippling, we employ various MFA methods; the method an employee uses depends on the risk associated with their function. Some employees are authorized to use platform authenticators, but in many cases, we require them to use hardware-based security keys. 

Our preferred hardware security key is the YubiKey. Yubikey allows employees to authenticate into their systems via USB, lightning, or NFC with a simple tap. Hardware keys like YubiKey are proven to be the most effective and trusted authentication methods for safeguarding data and mitigating phishing attacks. 

Why YubiKey? 

The YubiKey fits a standard USB, USB Type-C, or Apple Lightning port, as well as NFC functionality for use on mobile devices. It uses modern, WebAuthn standards to create a unique key pair between the service or app being signed into and the physical device. 

A YubiKey must be origin-bound to the domain for which it’s registered. That means it can only authenticate into the services and apps where you’ve already configured it, like Salesforce or AWS. If YubiKey doesn’t recognize the service, it won’t authenticate it, no matter how convincing it seems. This makes YubiKey especially secure against phishing and other sophisticated man-in-the-middle attacks. 

On top of being more secure, YubiKey is easier for employees to use. They won’t have to cross-reference and then type in a six-digit code to authenticate. Instead, they simply tap the YubiKey that’s plugged into their device. Then, YubiKey authenticates with a much more sophisticated code.  

How to implement YubiKey orders with Rippling

We’ve partnered with Yubico, creator of YubiKey, to make security management to enable customers using Rippling App Management to automate the purchase and shipment of security keys. We’ve built a robust integration with Yubico, so our customers get direct access to YubiKeys without having to manage a Yubico account or custom integrations.

2-15

Admins can create their own account using the YubiKey Ordering app, choose which employees automatically get a YubiKey, the type of YubiKey they will get, and manage billing—directly in Rippling. 

You can use Supergroups to set up ordering policies. A Supergroup is a dynamic group of employees built using any attribute you want—like department, location, tenure, and more—instead of individual user IDs.

Not only are Supergroups granular, the policies you can build using them are very configurable, too. It only takes a few minutes to define hyper-custom security policies and assign them to Supergroups. Then you’ll never have to worry about shipping keys to the right people again.

1-16

Let’s say you want a specific subset of employees to receive the YubiKey 5 NFC. You can start by building a Supergroup—employees whose work location is Remote, department is Engineering, and subteam is Infra. After that you can build a policy that says any employee in this Supergroup should automatically receive a YubiKey at their home address. 

At Rippling, we’ve found that using policies and Supergroups allows us to maintain a strong security posture without reinventing the wheel with every new hire. Plus, your team, the employee, and their manager can track the YubiKey’s shipping status in Rippling’s YubiKey Ordering app for extra visibility. 

Automating YubiKey management with Rippling

Because of YubiKey’s deep integration with Rippling, we can build powerful functionality that monitors and controls the YubiKey usage across our team. 

For example, our team has a workflow that monitors YubiKey activity for any Rippling employee who’s required to use one. If the YubiKey was delivered to the employees more than 3 days ago and they’re not using it as their MFA method, Rippling automatically sends a notification to that employee and their manager. 

We’ve built this using Workflow Studio. In Workflow Studio, we go to the YubiKey category, select “Order details,” and then choose “Delivered at” as the field. By selecting “is exactly 4 days ago,” we’ve created a trigger that will fire when a YubiKey has been delivered more than 3 days ago.

4-12

But since we don’t want the trigger to fire any time one of our employees had had their YubiKey for more than three days, we need to add another trigger to the workflow’s condition. 

For the second trigger, we go to the Employee category, search for “MFA method” as our field, and then specify the trigger should fire when this field is “anything except a security key.” Now, the workflow will only happen if both triggers of the condition are met.

3-18

This way everyone is aware of what has happened—and we can address the security gap. 

For your convenience, we’ve set up this workflow for you to install here. But you can build any number of workflows using the data associated with your YubiKey and apply them to any group that you want. Generally, workflows are a great way to proactively monitor all of your security risks, especially as you scale.

5-13

This is just one example of how we use YubiKeys to maintain a stronger security posture—and Rippling to create an additional layer of protocol. The Rippling App Shop has hundreds of integrations with third-party apps, many of which can help your company foster a stronger culture of security.

Run your IT on Rippling

Disclaimer

Rippling and its affiliates do not provide tax, accounting, or legal advice. This material has been prepared for informational purposes only, and is not intended to provide or be relied on for tax, accounting, or legal advice. You should consult your own tax, accounting, and legal advisors before engaging in any related activities or transactions.

Author

avatar_image_bd7dae87_aBAMAKeA0

Duncan Godfrey

Chief Information Security Officer

As Rippling’s CISO, Duncan ensures we're protected against today's digital threat landscape. He is a Cyber Security, Engineering, and Information technology leader with nearly 20 years of experience. And he passionately runs Rippling on Rippling.

Explore more

Graphic illustration of ripples formed with converging lines
Aug 21, 2025
|
15 MIN

Top 10 multi-factor authentication (MFA) providers and software

Secure your business with multi-factor authentication (MFA) rroviders providers Rippling, Okta Adaptive MFA, and Cisco Duo for advanced authentication.

seo_image_e200e991_aBAMAKUq0
Aug 21, 2025
|
16 MIN

7 multi-factor authentication (MFA) methods & types

Explore various multi-factor authentication (MFA) methods, their different types, and recommended best practices to strengthen your security.

A laptop symbolically connected to different apps.
Sep 26, 2025
|
13 MIN

Must-have MFA providers RFP template in 2025

Learn how to evaluate top MFA providers like Rippling and which criteria to include in your RFP.

seo_image_d04177e2_aBAMAKUq0
Aug 21, 2025
|
6 MIN

How Rippling runs IT: Managing Google licenses and user groups

Learn how to automate licenses for Google Workspace and manage Google Groups using Rippling.

seo_image_d2938edd_aBAMAKUq0
Aug 21, 2025
|
11 MIN

How Rippling runs IT: Ensuring new hires have the perfect first day

Learn how to create a seamless onboarding experience for every person at your company with Rippling.

seo_image_d4547628_aBAMAKUq0
Aug 21, 2025
|
8 MIN

You asked, we answered: Top 10 questions for our IT experts

We collected ten of our most asked Rippling IT questions and explained how our MDM, IAM, IVM, and endpoint security solutions automate manual tasks and boost security.

seo_image_043c9847_aBAMAKUq0
Aug 21, 2025
|
4 MIN

How Rippling runs IT: Managing Slack channels and user groups

Maintaining Slack groups and channels is time-consuming. With Rippling, you can automate group management to update as employees join, change roles, or leave.

seo_image_658827bd_aBAMAKUq0
Aug 21, 2025
|
1 MIN

Introducing Rippling + YubiKey: Better security, less busywork

Introducing Rippling YubiKey Ordering: Simplify security with easy, integrated YubiKey procurement directly through Rippling.

See Rippling in action

Increase savings, automate busy work, and make better decisions by managing HR, IT, and Finance in one place.