Operating system and web browser support for FIDO2 and U2F


The goal of this document is to highlight the operating system and browser ecosystems support for FIDO. The information provided is based on general availability (GA) product releases and YubiKeys that support the FIDO standards. The YubiKey 5 and Security Key Series support the FIDO2 standard that covers all the scenarios listed below. Previous generations of YubiKeys support the FIDO U2F standard. FIDO2 is backwards compatible with FIDO U2F but YubiKey + PIN scenarios are not supported on U2F only devices. Vendors are actively developing to improve support of YubiKeys and open standards. These tables will be updated as new information becomes available.

Passkeys are an industry standard, secure replacement for passwords, built on top of FIDO2. All YubiKey models that support FIDO2 support passkeys, and the tables below will show which browsers and platforms can be used to securely create and use passkeys stored on the YubiKey. For more information on passkeys, see What is a passkey

The tables focus on base functionality provided by browsers and platforms.  There can be slight differences in the implementations across systems. Vendors may choose to implement different user authentication experiences. Depending on the implementation, users may or may not need to enter in the user name as part of the authentication process. Additionally, these tables do not cover specific implementations by online services and applications. Review the Works With YubiKey Catalog for additional partner information or contact us if you have questions about specific implementations.

Applicable to all tables below, YubiKey + PIN and Passkey on YubiKey scenarios (*) are not supported on U2F only devices.

Windows 10+

Browser

Username with 

YubiKey

Username/Password + YubiKey

YubiKey + PIN*

 

Passkey on YubiKey*

Internet Explorer

No

No

No

No

Edge (Chromium)

Yes

Yes

Yes

Yes

Chrome

Yes

Yes

Yes

Yes

Firefox

Yes

Yes

Yes

Yes

Last updated July 30th 2023

 

*YubiKey + PIN and Passkey on YubiKey scenarios(*) are not supported on U2F only devices.

MacOS

Browser

Username with 

YubiKey

Username/Password + YubiKey

YubiKey + PIN*

 

Passkey on YubiKey*

Safari

Yes

Yes

Yes**

Yes**

Chrome

Yes

Yes

Yes

Yes

Edge for MacOS

Yes

Yes

Yes

Yes

Firefox

Yes

Yes

Yes**

Yes**

Last updated July 30th 2023

 

*YubiKey + PIN and Passkey on YubiKey scenarios(*) are not supported on U2F only devices.
**PIN requests will fail if no PIN has been set on the YubiKey

Linux

Browser

Username with 

YubiKey

Username/Password + YubiKey

YubiKey + PIN*

 

Passkey on YubiKey*

Chrome

Yes

Yes

Yes

Yes

Firefox

Yes

Yes

Yes**

Yes**

Last updated July 30th 2023

 

*YubiKey + PIN and Passkey on YubiKey scenarios(*) are not supported on U2F only devices.
**PIN requests will fail if no PIN has been set on the YubiKey

ChromeOS

Browser

Username with 

YubiKey

Username/Password + YubiKey

YubiKey + PIN*

 

Passkey on YubiKey*

Chrome

Yes

Yes

Yes

Yes

Last updated July 30th 2023

 

*YubiKey + PIN and Passkey on YubiKey scenarios(*) are not supported on U2F only devices.

Mobile Platforms

iOS

Client

Username with 

YubiKey

Username/Password + YubiKey

YubiKey + PIN*

 

Passkey on YubiKey*

Safari

Yes

Yes

Yes**

Yes**

Chrome 

Yes

Yes

Yes**

Yes**

Firefox

Yes

Yes

Yes**

Yes**

Brave

Yes

Yes

Yes**

Yes**

App with Yubico SDK

Yes

Yes

Yes

Yes

Last updated July 30th 2023

 

*YubiKey + PIN and Passkey on YubiKey scenarios(*) are not supported on U2F only devices.
**PIN requests will fail if no PIN has been set on the YubiKey

  • Mobile apps that incorporate the Yubico iOS SDK will be able to take advantage of the YubiKey as a FIDO or other authenticator. Each service provider will decide on which protocols/capabilities to implement.

iPadOS

Client

Username with 

YubiKey

Username/Password + YubiKey

YubiKey + PIN*

 

Passkey on YubiKey*

Safari

Yes

Yes

Yes**

Yes**

Chrome 

Yes

Yes

Yes**

Yes**

Firefox

Yes

Yes

Yes**

Yes**

Brave 

Yes

Yes

Yes**

Yes**

App with Yubico SDK✱

Yes

Yes

Yes

Yes

Last updated July 30th 2023

 

*YubiKey + PIN and Passkey on YubiKey scenarios(*) are not supported on U2F only devices.
**PIN requests will fail if no PIN has been set on the YubiKey
✱ Apps with Yubico SDK support iPads with Lightning connectors only.


Android

Client

Username with 

YubiKey

Username/Password + YubiKey

YubiKey + PIN*

 

Passkey on YubiKey*

Chrome

Yes

Yes

Yes**

Yes**

Firefox

No

No

No

No

App with Yubico SDK

Yes

Yes

No

No

Last updated May 17th 2024



*YubiKey + PIN and Passkey on YubiKey scenarios(*) are not supported on U2F only devices.
  • In order to use FIDO2 features on security keys, the Android device you’re using must be:
    • Google Play Protect Certified
    • Android 9 or higher
    • Running a current version of Google Play Services (at least version 24)
    • Configured with a screen lock
  • Mobile apps that incorporate the Yubico Android SDK will be able to take advantage of additional capabilities with the YubiKey.  Each service provider will decide on which capabilities to implement.

    **PIN entry and Passkeys on the YubiKey require the YubiKey to be attached via USB.

For a deeper dive, visit the WebAuthn section on developers.yubico.com.