Skip to content

RSA iShield Key 2

Solutions and Benefits

  • Phishing-resistant passwordless authentication: The RSA iShield Key 2 provides strong, phishing-resistant authentication, protecting systems from credential-based attacks 

  • Compliance with global standards: The iShield is provisioned via a secure supply chain and meets the highest security standards, including FIPS 140-3 level 3 certification and FIDO2 certification, ensuring compliance with US Executive Order (EO) 14028, US Office of Management and Budget (OMB) M-22-09, M-22-14, NIS2, DORA, PCI DSS, and other global standards and cybersecurity best practices

  • Versatile and resilient: The solution supports FIDO2, OATH HOTP, PKI, and PIV smart cards, making it compatible with both legacy and modern systems 

  • Zero Trust identity protection: Integrates with the RSA® ID Plus platform to advance Zero Trust architecture, providing robust security compliance by default

  • Future-proof security: The RSA iShield Key 2 is field-upgradable, allowing firmware updates to apply new features and bug fixes without replacing the device 

  • Ruggedized design: The device features a fully molded, robust, and waterproof housing, ensuring durability in various environments 

  • Flexible usage: Available via both USB and contactless NFC, providing multiple methods of secure access. The RSA iShield Key 2 Integrates both digital and physical access, with support for MIFARE

  • Perfect for robust use: The RSA iShield Key 2 is ideal for clean rooms or air-gapped and production environments and can be used in areas where smartphones and other electronic devices are not permitted. The device can be used with users wearing latex gloves 

RSA iShield Key 2

Specifications

Supported standards / features

MIFARE DESFire EV3, FIDO2/CTAP2.1, WebAuthn, Universal 2nd Factor (U2F) CTAP1, HOTP (Event), Smartcard (PIV-compatible), OpenSC-compatible

Mechanical details

51.5mm x 18.5mm x 6mm

Form factor / device type

FIDO2 HID Device, CCID Smartcard, USB-A or USB-C, With NFC interface and multi-color LED

Certifications

FIDO Universal 2nd Factor (U2F/CTAP1), FIDO2 Level 1

Operating temperature range

Extended: -25°C to 70°C

Multi-platform support

Operating Systems: Windows 10/11, macOS, iOS, iPadOS, Linux, Chrome OS, Android

Browsers: Firefox, MS Edge, Chrome, Apple Safari

Storage

Holds up to 300 FIDO passkeys and 24 smart card certificates

Supported standards / features

MIFARE DESFire EV3, FIDO2/CTAP2.1, WebAuthn, Universal 2nd Factor (U2F) CTAP1, HOTP (Event), Smartcard (PIV-compatible), OpenSC-compatible

Mechanical details

51.5mm x 18.5mm x 6mm

Form factor / device type

FIDO2 HID Device, CCID Smartcard, USB-A or USB-C, With NFC interface and multi-color LED

Certifications

FIDO Universal 2nd Factor (U2F/CTAP1), FIDO2 Level 1

Operating temperature range

Extended: -25°C to 70°C

Multi-platform support

Operating Systems: Windows 10/11, macOS, iOS, iPadOS, Linux, Chrome OS, Android

Browsers: Firefox, MS Edge, Chrome, Apple Safari

Storage

Holds up to 300 FIDO passkeys and 24 smart card certificates

RSA iShield Key 2 versus other hardware authenticators

Feature
Capabilities
iShield Key 2
Pro FIPS
YubiKey 5
FIPS
Thales SafeNet
eToken 5300
Phishing resistant
Passkeys (FIDO)
Smart card (PIV)
FIPS 140-3

(FIPS 140-2 only)

(FIPS 140-2 only)

OTP (HOTP)
Connected (USB-A / USB-C)
Contactless (NFC)
Upgradable firmware
Storage capability

200-300 passkeys
24 smart card certs

25 passkeys
24 smart card certs

80KB memory

Identity platform
Sensor activates with
latex gloves
Extended temperature range

-25C to +70C

0C to +40C

0C to +60C

Phishing resistant
iShield Key 2
Pro FIPS
YubiKey 5
FIPS
Thales SafeNet
eToken 5300
Passkeys (FIDO)
iShield Key 2
Pro FIPS
YubiKey 5
FIPS
Thales SafeNet
eToken 5300
Smart card (PIV)
iShield Key 2
Pro FIPS
YubiKey 5
FIPS
Thales SafeNet
eToken 5300
FIPS 140-3
iShield Key 2
Pro FIPS
YubiKey 5
FIPS

(FIPS 140-2 only)

Thales SafeNet
eToken 5300

(FIPS 140-2 only)

OTP (HOTP)
iShield Key 2
Pro FIPS
YubiKey 5
FIPS
Thales SafeNet
eToken 5300
Connected (USB-A / USB-C)
iShield Key 2
Pro FIPS
YubiKey 5
FIPS
Thales SafeNet
eToken 5300
Contactless (NFC)
iShield Key 2
Pro FIPS
YubiKey 5
FIPS
Thales SafeNet
eToken 5300
Upgradable firmware
iShield Key 2
Pro FIPS
YubiKey 5
FIPS
Thales SafeNet
eToken 5300
Storage capability
iShield Key 2
Pro FIPS

200-300 passkeys
24 smart card certs

YubiKey 5
FIPS

25 passkeys
24 smart card certs

Thales SafeNet
eToken 5300

80KB memory

Identity platform
iShield Key 2
Pro FIPS
YubiKey 5
FIPS
Thales SafeNet
eToken 5300
Sensor activates with
latex gloves
iShield Key 2
Pro FIPS
YubiKey 5
FIPS
Thales SafeNet
eToken 5300
Extended temperature range
iShield Key 2
Pro FIPS

-25C to +70C

YubiKey 5
FIPS

0C to +40C

Thales SafeNet
eToken 5300

0C to +60C

Contact RSA to demo the RSA iShield Key 2

See the RSA iShield Key 2 in action: contact RSA today to demo the hardware authentication solution and accelerate passwordless at your organization.

Learn more about the RSA iShield Key 2

Move beyond phishing resistance

The Beyond Phishing Resistance: The RSA iShield Key 2 report details how the hardware authentication solution can help organizations deploy passwordless throughout their organization, evolve their Zero Trust security stance, and meet global regulations. Download the report now to learn:  

  • How the RSA iShield accelerates passwordless by accounting for the challenging and high-risk use cases that typical authenticators can’t cover
  • The global anti-phishing and multi-factor authentication (MFA) regulations that the RSA iShield meets
  • How the RSA iShield can help organizations reach “Optimal” Zero Trust maturity as defined by the Cybersecurity and Infrastructure Security Agency (CISA) Zero Trust Maturity Model
Read the report now

Watch on-demand: Phishing Resistance in Action – Hardware and Software Passwordless Solutions

Watch the on-demand webinar with RSA VP of Product Management and UX Dave Taku, RSA Client Director Colin Holowach, RSA Product Marketer Ali Adib, and Swissbit Partner Enablement Manager Chris Collier on how organizations can deploy phishing-resistant passwordless authentication for every user, and the unique use cases and user groups that the RSA iShield Key 2 addresses.  
What you’ll learn:

  • How completely removing passwords neutralizes phishing threats
  • How frictionless, always-on secure access enhances productivity and security simultaneously
  • How to provide complete passwordless coverage for critical scenarios and privileged users
Watch the webinar now

RSA iShield Key 2 users and sectors

Move beyond phishing resistance

Personnel working in highly-regulated industries—including financial services healthcare and pharmaceuticals, government agencies, defense contractors, and other critical infrastructure sectors—should learn more about how the RSA iShield helps them meet global regulations while also accelerating passwordless authentication.   
Employees with the following job titles should consider downloading it for further information:

  • Chief Information Security Officers (CISOs)
  • Director of Information Security
  • Head of Identity and Access Management (IAM)
  • Enterprise Security Architect
  • IT Director / Head of Infrastructure
  • Identity Architect
  • Systems Engineer
  • Chief Risk Officer
  • VP of Governance, Risk, and Compliance
  • Head of IT Audit
Start your order

What Our Clients Have to Say

“Mandatory authentication software for all firms”

Prasanth R.

“Most efficient way for 
secure login to VPN”

Suyash R.

“Great Security Tool to keep Data Secure”

Sweta S.

Looking for something more?

Contact us or start your free, 45-day trial of RSA ID Plus, The Complete IAM Cloud Security Platform, Now.