The goal of this document is to highlight the operating system and browser ecosystems support for FIDO. The information provided is based on general availability (GA) product releases and YubiKeys that support the FIDO standards. The YubiKey 5 and Security Key Series support the FIDO2 standard that covers all the scenarios listed below. Previous generations of YubiKeys support the FIDO U2F standard. FIDO2 is backwards compatible with FIDO U2F but YubiKey + PIN scenarios are not supported on U2F only devices. Vendors are actively developing to improve support of YubiKeys and open standards. These tables will be updated as new information becomes available.
The tables focus on base functionality provided by browsers and platforms. There can be slight differences in the implementations across systems. Vendors may choose to implement different user authentication experiences. Depending on the implementation, users may or may not need to enter in the user name as part of the authentication process. Additionally, these tables do not cover specific implementations by online services and applications. Review the Works With YubiKey Catalog for additional partner information or contact us if you have questions about specific implementations.
Applicable to all tables below, YubiKey + PIN scenarios (**) are not supported on U2F only devices.
Windows 10+
Browser |
Username with YubiKey |
Username/Password + YubiKey |
YubiKey + PIN**
|
Internet Explorer |
No |
No |
No |
Edge (Chromium) |
Yes |
Yes |
Yes |
Chrome |
Yes |
Yes |
Yes |
Firefox |
Yes |
Yes |
Yes |
Last updated May 18th 2022 |
MacOS
Browser |
Username with YubiKey |
Username/Password + YubiKey |
YubiKey + PIN**
|
Safari |
Yes |
Yes |
Yes* |
Chrome |
Yes |
Yes |
Yes |
Edge for MacOS |
Yes |
Yes |
Yes |
Firefox |
Yes |
Yes |
No |
Last updated May 18th 2022 |
*PIN requests will fail if no PIN has been set on the YubiKey
Linux
ChromeOS
Mobile Platforms
iOS
Client |
Username with YubiKey |
Username/Password + YubiKey |
YubiKey + PIN**
|
Safari Browser |
Yes |
Yes |
Yes* |
Chrome Browser |
Yes |
Yes |
Yes* |
Firefox |
Yes |
Yes |
Yes* |
Brave Browser |
Yes |
Yes |
Yes* |
App with Yubico SDK |
Yes |
Yes |
Yes |
Last updated Nov 1st 2022 |
*PIN requests will fail if no PIN has been set on the YubiKey
- Mobile apps that incorporate the Yubico iOS SDK will be able to take advantage of the YubiKey as a FIDO or other authenticator. Each service provider will decide on which protocols/capabilities to implement.
iPadOS
Client |
Username with YubiKey |
Username/Password + YubiKey |
YubiKey + PIN**
|
Safari Browser |
Yes |
Yes |
Yes* |
Chrome Browser |
Yes |
Yes |
Yes* |
Firefox |
Yes |
Yes |
Yes* |
Brave Browser |
Yes |
Yes |
Yes* |
App with Yubico SDK |
Yes |
Yes |
Yes |
Last updated Nov 1st 2022 |
Android
Client |
Username with YubiKey |
Username/Password + YubiKey |
YubiKey + PIN**
|
Android Browser |
Yes |
Yes |
No |
Chrome |
Yes |
Yes |
No |
Firefox |
Yes |
Yes |
No |
Brave |
Yes |
Yes |
No |
App with Yubico SDK |
Yes |
Yes |
No |
Last updated Nov 1st 2022 |
- FIDO PIN for user verification is not supported for external authenticators at this time.
- Mobile apps that incorporate the Yubico Android SDK will be able to take advantage of additional capabilities with the YubiKey. Each service provider will decide on which capabilities to implement.
For a deeper dive, visit the WebAuthn section on developers.yubico.com.