Option to force multiple login verification steps (force “multiple" 2FA / MFA)

Sorry for that long delay… one reason for that (and the “confused” smiley) was, I had the impression we are going in circles here now, at least in some regards… I’ll try to comment on some things (not all), and probably only where I don’t agree. :wink:

Yeah, well, though passkeys are not very easy/convenient in some (!) aspects, they have at least some potential to be both convenient and secure (at least in a happy place in the future).

Well, I think I literally wrote also that “a chain is only as secure as it’s weakest link”. So no argument to that and I agree to that. But nonetheless, some change has to be introduced somewhere first. – And I think I wrote before, that account recovery is something on the “radar” of e.g. the FIDO Alliance, and they think of how that can be made also more secure.

And, even if account recovery may be the weakest link - you still don’t choose “passsword123” as your password. But why, when you still have So you try to make your passwords “strong” - even if there is a weaker link. So, if passkeys make one part of the chain stronger, there is nothing wrong with that. (or put in other words: because one link is weak, it also makes no sense, to make all other links also more weak)

As written before: change naturally comes bit by bit. – Of course, it would be nicer, if the whole chain could be made stronger at once. Unfortunately, doesn’t happen. :melting_face:

I don’t really understand your answer here, or rather I would say your concerns here can be remedied with an emergency sheet for your Bitwarden account/vault – and with having some “login-with-passkeys”-passkeys for Bitwarden, that can log you in to the web vault (but unfortunately, those can’t replace the Bitwarden master password for now – see e.g. this feature request: Options to allow PRF Passkeys to authorize actions and account/security changes protected by Master Password).

Unlock (!) with passkeys is not available at the moment - see this feature request: Unlock with FIDO2/“passkeys”

Well, but you can store passkeys in Bitwarden… I personally also trust my Bitwarden account more than my Google account. And with passkeys in the Bitwarden vault, e.g. changing phones becomes less of a problem - you can access the passkeys as soon as you login to your BW mobile app again…

And regarding “login-with-passkeys”-passkeys for Bitwarden, I wouldn’t store them in my Google account either (but on security keys and maybe via Windows Hello in my case…).

Well, in principle any password - that you enter somewhere - remains phishable. So there are not few who regard a phishing-resistant passkey on e.g. a YubiKey far more secure than a “strong password”.

But I would like to conclude with: I’m not really against this feature request! I think our discussion just began with my opinion/suggestion “this request would probably be implemented, if we could use “login-with-passkeys”-passkeys in all BW apps to login”. And I still think, that “login-with-passkeys”-passkeys would be as secure as master password + 2FA + another 2FA (= “multiple 2FA”), or probably even more secure.

(to the last sentence: e.g. master password + TOTP + email verification would IMHO be not as secure as a “login-with-passkeys”-passkey – it depends on how you define 2FA/MFA, or rather as a real second factor, or if you view it as “only” 2SV = two step verification, and not necessarily making use of all three factors know / have / be

PS: And to this feature request here: it remains the question if using the same factor (e.g. the knowledge factor) “twice” would even be more secure – and on the other hand, using a 2FA-“passkey” for Bitwarden is already the strongest form of 2FA for Bitwarden, and it remains questionable whether adding “another 2FA” to that would make the BW login stronger at all)