By community request, Passkeys can now handle both log in and unlock for Bitwarden, on the web app (available now) and Chromium-based browser extensions (rolling out this week).
Why log into Bitwarden with a passkey?
Faster than entering your master password. Plus, passkeys only work on the originating website, preventing you from entering your Bitwarden credentials into a phishing site
From what I understand Windows Hello (any version of Windows) is NOT PRF capable. I tried to setup a passkey in Windows 11 but was unable to setup encryption.
Thank you @dwbit . I am now using open with biometrics and it is working great. Fingers crossed that Microsoft adds the PRF extension to Windows Hello at some point or I get PRF capable hardware keys.
I note that currently, whenever I try logging in or unlocking with my hardware key on a Windows 11 system, it always prompts for a FIDO PIN and another touch.
Not answering the question (not knowing all the possible conditionals that would get you there), but I note that in this client’s code:
the userVerification is hardcoded to be “preferred”; as this code seems to be used for unlock, there’s a good chance what you think is good might be true, or at least some of the time.
If someone doesn’t see the new “Unlock with passkey” option on the browser extension after the update to 2026.1.0: on two browsers, I had to log out and log back in on the extension to see that new option.
I had the same experience, but I don’t believe that I logged out to fix the problem. It was either locking/unlocking a second time, or closing/re-opening the browser extension.
And to close the loop on this:
Unlock with passkey does require CTAP2 user verification when a PIN has been set, so presumably, the implementation does in fact use userVerification: "preferred" (as also suggested by the source code posted by @Neuron5569above).
Interesting. I can’t say if I locked/unlocked twice (before it worked), but I even closed/reopened the browser, restarted the PC, until it worked with a log out/log in.