Unlock with passkeys / FIDO2

Could you elaborate? I was under the impression that it simply hasn’t been implemented yet, not that it’s impossible. It would be awfully disappointing if it isn’t possible. Is this related to why the browser extension opens a browser tab to prompt for WebAuthn when using WebAuthn as a second factor?

I was referring to this:

 

Nonetheless, apparently, some of the technical roadblocks were removed a few months ago, so there progress on implementation of passkey login for the browser extensions may be coming in 2025:

3 Likes

another one of those +1 posts “just writing a comment to support the addition of this feature”.

this feature would allow more convenience to having the vault to have a very short lock time.

is this hard to inplement? i would like to understand the reluctance to add such a feature.

Chiming in to say that I would very much like this feature. And 1Password is also currently trialling this in their beta >> Unlock 1Password with a passkey (beta) | 1Password Support

1 Like

Note: The title of this Feature Request (FR) was updated from Unlock Bitwarden with 2FA, e.g. security key / YubiKey (instead of, not in addition to password) to Unlock with FIDO2/“passkeys”.
 
Further info / explanations to that:

This FR proposes the use of FIDO2/“passkeys” (this includes hardware security keys, e.g. YubiKeys) as a new option for unlocking a locked vault – i.e., an alternative to the current unlocking methods (unlocking with master password, PIN, or biometrics).

Though “2FA” was previously mentioned in the title of this FR, to date, the majority of posts in the thread have proposed the use of YubiKeys or similar hardware security keys for unlocking the vault. Furthermore, in the time since this feature request was opened, it has become possible to store FIDO2 credentials not only on hardware security keys but also in TPMs (Trusted Platform Modules), mobile phones, and in “(software) authenticators” (e.g., in the form of syncable passkeys). The scope of the feature request has therefore been broadened to include vault unlocking using any form of “FIDO2” (hardware security keys, passkeys, etc.).

1 Like

I’d like to add that talking with my buddy who is a lawyer he has pointed out to me that at least in the United States biometrics such as a fingerprint can be something you’re compelled to provide by police if they have a warrant or while in custody. While something you “know” such as a FIDO2 passkey and an associated PIN unlocking the FIDO2 authenticator is protected under both the 4th and 5th amendments and you wouldn’t be compelled to provide access to law enforcement under the law.

I know someone could use the old “wrench authentication method” xkcd: Security to unlock your vault but a simple FIDO2 based PIN + FIDO2 device provide significantly more legal and real-world protection than a biometric read on a phone or a short say 4 digit pin that could be brute forced extremely quickly.

I’m not advocating for anyone to break the law but privacy is important. I know the masterpassword is required to decrypt the vault but at least android phones already offer the ability to use your biometrics to unlock the vault which many users may not understand leaves them vulnerable to losing all their passwords if they are asleep, or say sleeping off an innocent night of partying in the police station.

I just had a casual look into GitHub… and (but probably very early!) there is some interesting news :confetti_ball: – at least for the web vault and the browser extensions for now:

 

Dependent on (server) PR:

2 Likes

Glad to see PRF unlock coming down the pipeline.

PRF login for extension works well, but I need to keep the local cache active for when I go offline and access internal LAN sites while not connected to the internet.

1 Like

So I love that login with passkey was added to some Browser extensions in 2025.11.0! But why is there not an option to unlock the browser extension with a passkey?

I’d consider just logging out every time, but I can’t tell what settings get deleted on logout, and which ones stay.

I did minimal testing, and saw that the Account Security > “Unlock with PIN” option was removed (unchecked) after logout and login with passkey. However a change to Autofill >“Copy TOTP Automatically” persisted after logout and login with passkey. Is there any documentation on what settings persist or clear upon logout?

Would it be better to add an option to unlock with passkey or just set the vault to logout every time?

1 Like

@sclark I have moved your comment into the relevant feature request thread.

1 Like

Hi everyone, you can now unlock your Bitwarden account with a passkey through the web app (available now), or a Chromium-based browser (rolling out this week), more information here: You can now unlock your vault with a passkey

You can now for example, use a passkey on a Yubikey protected by pin to both login and unlock.

3 Likes

Bitwarden could further strengthen local security by offering optional support for hardware-backed key protection using platform features such as TPM (Windows/Linux), Secure Enclave / Secure Element (iOS, macOS, Android) and FIDO2 hardware tokens.

These mechanisms allow encryption keys (or key-wrapping keys) to be generated, stored, and used inside secure hardware, making them inaccessible to malware, memory dumps, or disk extraction attacks. Even if a device is compromised at the OS level, the vault key would remain protected.

So I guess the main use case for yubikey unlock would be if you’re offline and can’t login and download your vault again? Since passkey login handles 2FA and decrypt, is there another advantage to passkey unlock?

Not besides the obvious: Not having to enter your master password every time you unlock the vault (or reduce your vault data security by unlocking with a simple PIN). Biometric unlock is not an option for everybody.

Edited to Add: And unlock with passkey provides a secure method for avoiding master password entry on browser restart!

1 Like

Absolutely! I love this feature, it’s 90% of why I choose bitwarden :slight_smile: Only downside is it’s harder to remember my master password now!
I was trying to differentiae between the login with passkey and unlock with passkey, so I was using each method optimally :nerd_face:

A general advantage of locking/unlocking is, that it retains some settings, like generator settings (including API keys)…

1 Like

You shouldn’t really need login with passkey, unless you are setting up your account on a new device (or new browser, etc.), or you are forcibly logged out (e.g., due to making changes to account security settings in the Web Vault). Just set your Vault Timeout action to “Lock”, and use unlock with passkey to get back in.

Write it down on your Emergency Sheet.

And if you have set your Timeout Action to “Lock”, then you could develop a habit of manually logging out of your most commonly used Bitwarden client on a regular basis (e.g., at the end of each day, or once a week, etc.), and then refraining from using the passkey option when logging back in.

1 Like

Thank you! This feature is very much appreciated and the main reason I went with Bitwarden. Looking forward, is there any ongoing or planned work for passkey unlock in the Android app?

If the Yubico Developers Guide to PRF (mentioned by Nail1684 in the related thread about passkey login) is still up to date and I understand it correctly, iOS is problematic, while the latest Android versions supports roaming FIDO 2 hardware tokens. It also looks like there is some kind of reference implementation for PRF in Android. So adding passkey unlock to the Android app would hopefully be easier than other platforms while at the same time giving at least one “full set” of password-less unlock for both desktop (by browser extension) and mobile.