Yubikey FIDO2 / Passkey Configuration¶
FIDO U2F and FIDO2 are both authentication protocols developed by the FIDO Alliance to enhance security and eliminate weak passwords. The main difference between them is that U2F is a second-factor protocol only, while FIDO2 can be used for passwordless (single-factor) or second-factor.
U2F is still useful in the sense that it is phishing-resistant, but FIDO2 has quickly become more prominent with the rise of Passkeys.
What They Are¶
Passkeys use public-key cryptography, which sounds intimidating but doesn't need to be:
-
When you create a passkey for a website, your device generates two keys:
- A private key, which stays securely stored on your device.
- A public key, which gets registered with the website.
-
When you try to log in:
- The website checks your public key.
- Your device confirms your identity (i.e., fingerprint, Face ID, or PIN).
- If everything matches, you're logged in -- no password required.
Resident vs Non-Resident¶
FIDO2 uses a concept of discoverable (resident) and non-discoverable (non-resident) credentials. The primary difference between them is also the functional determiner as to whether or not it supports single-factor authentication: storage of the credential on-device.
Resident credentials require storage space - non-resident credentials are computationally determined.
Feature | Resident (Discoverable) |
Non-Resident (Non-Discoverable) |
---|---|---|
Stored on Authenticator | Yes | No |
Username Required | No | Yes |
Works for Passwordless | Yes | No (requires username first) |
Supported by Passkeys | Yes | No |
Storage Limitation | Yes (limited slots on hardware keys) | No (server stores user records) |
FIDO2 (WebAuthn + CTAP) vs Passkeys¶
FIDO2 predates Passkeys, but the two are very closely related. They both utilize the same underlying technology -- WebAuthn (web authentication standard), and CTAP (a protocol for talking to security keys) -- but operate in different ways.
Passkeys can be thought of more as an extension of FIDO2. Where FIDO2 was intended to be device-bound, Passkeys were intended to have multi-device support and synchronize across cloud services.
Feature | FIDO2 (Traditional) |
Passkeys |
---|---|---|
Storage | Tied to a hardware device (like Yubikey) | Synced across devices via cloud (Apple, Google, Microsoft) |
Portability | Needs the same hardware key each time | Works across devices via cloud sync |
Backup & Recovery | If you lose the key, you need a backup key | Cloud-based, so you can recover from another device |
Usability | Requires inserting and tapping a Yubikey or using built-in auth | Works across devices without needing a separate security key |
Adoption | Mostly used in enterprise / high-security setups | Designed for mainstream users to replace passwords easily |
Bottom Line¶
The definition of Passkey versus FIDO2 has been loosely defined, and most websites or services don't actually differentiate between the two - even if their service supports one over the other.
Most websites that state they support Passkeys actually support FIDO2 -- and because Passkeys are an extension of FIDO2, both are supported. On these sites, you can register one or more Yubikeys for authentication, or create a passkey via your mobile device or password manager.
Other websites claim to support "passwordless authentication," but in reality only support Passkeys. FIDO2 can be "passwordless" ... but if a site only supports a mobile-first implemenation (iCloud, Google, password managers, etc.), what the user experiences is the ability to enable passwordless only from an iPhone or Android device.
Further still, some sites that claim to support Passkeys actually only support them as a second-factor. This can get even more muddied when they only support using them as a second factor on mobile devices. In practice, these sites only support FIDO U2F -- which could easily be opened up to significantly more device types. They are being artificially limited by a lack of understanding about which technology they're actually using and supporting.
Yubikeys¶
Yubikeys do not support Passkeys in the strictest definition of the technology -- however, because most sites that support Passkeys actually support FIDO2, Yubikeys can be used quite easily.
Key Takeaway: If you're going to use Yubikey for FIDO2 authentication:
- Purchase multiple devices and configure them at the same time.
- Keep a log of which sites and services you've registered your device with. Your password manager makes an excellent location to store this information.
- Note which apps / services are RESIDENT vs NON-RESIDENT.
Preparing Yubikey for Passkeys¶
If you choose to use Yubikey to store your Passkeys, you need to setup your FIDO2 PIN ahead of time. Unlike with PIV and OpenPGP where Yubikey comes with default PINs set from the factory, FIDO2 does not.
ykman fido access change-pin -n XXXXXXXXXX
While we're here, we should touch on "user presence" (UP) vs "user verification" (UV). The concept is very simple -- presence requires that you touch the Yubikey, and verification will authenticate you somehow (i.e., password, PIN, fingerprint, Face ID, etc.). If you want to enable User Verification, you can do that with the following command (substituting your PIN for the X's):
ykman fido config toggle-always-uv -P XXXXXXXXXX
And with that, your Yubikey is ready to register Passkeys.
Website Support¶
Passkeys are still relatively new, and not everyone supports it yet. But there are a few resources you can check out to identify sites you regularly use that do support Passkeys.
- Passkeys.directory is a community-driven index of websites, apps, and services that offer signing up with passkeys.
- Passkeys.io maintains a list of sites and apps that have implemented Passkeys as a full password replacement - meaning the passkey option is visibly prominent on the login screen. Services that require you to enter a username before being prompted (or that use WebAuthn as a second-factor method) are not listed.
- Passkeys.com is another list of Passkey-supported sites.
- Keeper Security also maintains a list of websites that support Passkey authentication.
Keep Track of Credentials¶
Remember to keep a record of which sites and services you've registered your Yubikeys with, and whether or not that site has a resident
or non-resident
credential. Because resident credentials are discoverable (stored on Yubikey itself), you can retrieve a list of those credentials at any time:
ykman fido credentials list --pin 654321
Credential ID RP ID Username Display name
ba8f5853... login.microsoft.com jdoe@example.com John Doe
b5ce1806... adobe.com jdoe@example.com jdoe@example.com
04692f9f... amazon.com john.d@gmail.com John D
a771def9... github.com johndoe John Doe
ac8bb687... google.com myother@email.com John Doe
0e4a9165... www.linkedin.com jdoe@example.com jdoe@example.com
5c077083... account.microcenter.com jdoe@example.com jdoe@example.com
4278543d... uber.com jdoe@example.com jdoe@example.com
Non-resident credentials can only be identified from your memory. If you know you registered a key with a particular website or service but the credential is not listed when you run the "list" command, that credential is non-resident.