The goal of this document is to highlight the operating system and browser ecosystems support for FIDO. The information provided is based on general availability (GA) product releases and YubiKeys that support the FIDO standards. The YubiKey 5 and Security Key Series support the FIDO2 standard that covers all the scenarios listed below. Previous generations of YubiKeys support the FIDO U2F standard. FIDO2 is backwards compatible with FIDO U2F but YubiKey + PIN scenarios are not supported on U2F only devices. Vendors are actively developing to improve support of YubiKeys and open standards. These tables will be updated as new information becomes available.
Passkeys are an industry standard, secure replacement for passwords, built on top of FIDO2. All YubiKey models that support FIDO2 support passkeys, and the tables below will show which browsers and platforms can be used to securely create and use passkeys stored on the YubiKey. For more information on passkeys, see What is a passkey?
The tables focus on base functionality provided by browsers and platforms. There can be slight differences in the implementations across systems. Vendors may choose to implement different user authentication experiences. Depending on the implementation, users may or may not need to enter in the user name as part of the authentication process. Additionally, these tables do not cover specific implementations by online services and applications. Review the Works With YubiKey Catalog for additional partner information or contact us if you have questions about specific implementations.
Applicable to all tables below, YubiKey + PIN and Passkey on YubiKey scenarios (*) are not supported on U2F only devices.
Windows 10+
Browser |
Username with YubiKey |
Username/Password + YubiKey |
YubiKey + PIN*
|
Passkey on YubiKey* |
Internet Explorer |
No |
No |
No |
No |
Edge (Chromium) |
Yes |
Yes |
Yes |
Yes |
Chrome |
Yes |
Yes |
Yes |
Yes |
Firefox |
Yes |
Yes |
Yes |
Yes |
Last updated July 30th 2023 |
|
*YubiKey + PIN and Passkey on YubiKey scenarios(*) are not supported on U2F only devices.
MacOS
Browser |
Username with YubiKey |
Username/Password + YubiKey |
YubiKey + PIN*
|
Passkey on YubiKey* |
Safari |
Yes |
Yes |
Yes** |
Yes** |
Chrome |
Yes |
Yes |
Yes |
Yes |
Edge for MacOS |
Yes |
Yes |
Yes |
Yes |
Firefox |
Yes |
Yes |
Yes** |
Yes** |
Last updated July 30th 2023 |
|
*YubiKey + PIN and Passkey on YubiKey scenarios(*) are not supported on U2F only devices.
**PIN requests will fail if no PIN has been set on the YubiKey
Linux
*YubiKey + PIN and Passkey on YubiKey scenarios(*) are not supported on U2F only devices.
**PIN requests will fail if no PIN has been set on the YubiKey
ChromeOS
*YubiKey + PIN and Passkey on YubiKey scenarios(*) are not supported on U2F only devices.
Mobile Platforms
iOS
Client |
Username with YubiKey |
Username/Password + YubiKey |
YubiKey + PIN*
|
Passkey on YubiKey* |
Safari |
Yes |
Yes |
Yes** |
Yes** |
Chrome |
Yes |
Yes |
Yes** |
Yes** |
Firefox |
Yes |
Yes |
Yes** |
Yes** |
Brave |
Yes |
Yes |
Yes** |
Yes** |
App with Yubico SDK |
Yes |
Yes |
Yes |
Yes |
Last updated July 30th 2023 |
|
*YubiKey + PIN and Passkey on YubiKey scenarios(*) are not supported on U2F only devices.
**PIN requests will fail if no PIN has been set on the YubiKey
- Mobile apps that incorporate the Yubico iOS SDK will be able to take advantage of the YubiKey as a FIDO or other authenticator. Each service provider will decide on which protocols/capabilities to implement.
iPadOS
Client |
Username with YubiKey |
Username/Password + YubiKey |
YubiKey + PIN*
|
Passkey on YubiKey* |
Safari |
Yes |
Yes |
Yes** |
Yes** |
Chrome |
Yes |
Yes |
Yes** |
Yes** |
Firefox |
Yes |
Yes |
Yes** |
Yes** |
Brave |
Yes |
Yes |
Yes** |
Yes** |
App with Yubico SDK✱ |
Yes |
Yes |
Yes |
Yes |
Last updated July 30th 2023 |
|
Android
Client |
Username with YubiKey |
Username/Password + YubiKey |
YubiKey + PIN*
|
Passkey on YubiKey* |
Chrome |
Yes |
Yes |
Yes** |
Yes** |
Firefox |
No |
No |
No |
No |
App with Yubico SDK |
Yes |
Yes |
No |
No |
Last updated May 17th 2024 |
|
- In order to use FIDO2 features on security keys, the Android device you’re using must be:
- Google Play Protect Certified
- Android 9 or higher
- Running a current version of Google Play Services (at least version 24)
- Configured with a screen lock
- Mobile apps that incorporate the Yubico Android SDK will be able to take advantage of additional capabilities with the YubiKey. Each service provider will decide on which capabilities to implement.
**PIN entry and Passkeys on the YubiKey require the YubiKey to be attached via USB.
For a deeper dive, visit the WebAuthn section on developers.yubico.com.