Operating system and web browser support for FIDO2 and U2F


The goal of this document is to highlight the operating system and browser ecosystems support for FIDO. The information provided is based on general availability (GA) product releases and YubiKeys that support the FIDO standards. The YubiKey 5 and Security Key Series support the FIDO2 standard that covers all the scenarios listed below. Previous generations of YubiKeys support the FIDO U2F standard. FIDO2 is backwards compatible with FIDO U2F but YubiKey + PIN scenarios are not supported on U2F only devices. Vendors are actively developing to improve support of YubiKeys and open standards. These tables will be updated as new information becomes available.

The tables focus on base functionality provided by browsers and platforms.  There can be slight differences in the implementations across systems. Vendors may choose to implement different user authentication experiences. Depending on the implementation, users may or may not need to enter in the user name as part of the authentication process. Additionally, these tables do not cover specific implementations by online services and applications. Review the Works With YubiKey Catalog for additional partner information or contact us if you have questions about specific implementations.

Applicable to all tables below, YubiKey + PIN scenarios (**) are not supported on U2F only devices.

Windows 10+

Browser

Username with 

YubiKey

Username/Password + YubiKey

YubiKey + PIN**

 

Internet Explorer

No

No

No

Edge (Chromium)

Yes

Yes

Yes

Chrome

Yes

Yes

Yes

Firefox

Yes

Yes

Yes

Last updated May 18th 2022

MacOS

Browser

Username with 

YubiKey

Username/Password + YubiKey

YubiKey + PIN**

 

Safari

Yes

Yes

Yes*

Chrome

Yes

Yes

Yes

Edge for MacOS

Yes

Yes

Yes

Firefox

Yes

Yes

No

Last updated May 18th 2022

*PIN requests will fail if no PIN has been set on the YubiKey

Linux

Browser

Username with 

YubiKey

Username/Password + YubiKey

YubiKey + PIN**

 

Chrome

Yes

Yes

Yes

Firefox

Yes

Yes

No

Last updated May 18th 2022

ChromeOS

Browser

Username with 

YubiKey

Username/Password + YubiKey

YubiKey + PIN**

 

Chrome

Yes

Yes

Yes

Last updated May 18th 2022

 

Mobile Platforms

iOS

Client

Username with 

YubiKey

Username/Password + YubiKey

YubiKey + PIN**

 

Safari Browser

Yes

Yes

Yes*

Chrome Browser

Yes

Yes

Yes*

Firefox

Yes

Yes

Yes*

Brave Browser

Yes

Yes

Yes*

App with Yubico SDK

Yes

Yes

Yes

Last updated Nov 1st 2022

*PIN requests will fail if no PIN has been set on the YubiKey

  • Mobile apps that incorporate the Yubico iOS SDK will be able to take advantage of the YubiKey as a FIDO or other authenticator. Each service provider will decide on which protocols/capabilities to implement.

iPadOS

Client

Username with 

YubiKey

Username/Password + YubiKey

YubiKey + PIN**

 

Safari Browser

Yes

Yes

Yes*

Chrome Browser

Yes

Yes

Yes*

Firefox

Yes

Yes

Yes*

Brave Browser

Yes

Yes

Yes*

App with Yubico SDK

Yes

Yes

Yes

Last updated Nov 1st 2022

*PIN requests will fail if no PIN has been set on the YubiKey
✢ Brave Browser supports iPads with Lightning connectors only.
✱ Apps with Yubico SDK support iPads with Lightning connectors only.


Android

Client

Username with 

YubiKey

Username/Password + YubiKey

YubiKey + PIN**

 

Android Browser

Yes

Yes

No

Chrome

Yes

Yes

No

Firefox

Yes

Yes

No

Brave

Yes

Yes

No

App with Yubico SDK

Yes

Yes

No

Last updated Nov 1st 2022

  • FIDO PIN for user verification is not supported for external authenticators at this time.
  • Mobile apps that incorporate the Yubico Android SDK will be able to take advantage of additional capabilities with the YubiKey.  Each service provider will decide on which capabilities to implement.

For a deeper dive, visit the WebAuthn section on developers.yubico.com.