My Account > Two-step Login > Setup Guides
My Account > Two-step Login > Setup Guides

Two-step Login via FIDO2 WebAuthn

Two-step login using FIDO2 WebAuthn authenticators is available for premium users, including members of paid organizations (families, teams, or enterprise).

Any FIDO2 WebAuthn Certified authenticator can be used, including security keys such as YubiKeys, SoloKeys, and Nitrokeys, as well as native biometrics options like Windows Hello and Touch ID.


Existing FIDO U2F security keys will still be usable and will be marked (Migrated from FIDO) on the Two-step Login Manage FIDO2 WebAuthn dialog.

FIDO2 WebAuthn cannot be used on all Bitwarden applications. Enable another two-step login method in order to access your vault on unsupported applications. Supported applications include:

Setup FIDO2 WebAuthn

To enable two-step login using FIDO2 WebAuthn:


Wenn Sie den Zugriff auf Ihr Gerät für die zweistufige Anmeldung verlieren, können Sie dauerhaft aus Ihrem Tresor ausgesperrt werden, es sei denn, Sie notieren sich Ihren Wiederherstellungscode für die zweistufige Anmeldung und bewahren ihn an einem sicheren Ort auf oder haben eine alternative Methode für die zweistufige Anmeldung aktiviert und verfügbar.

Rufen Sie Ihren Wiederherstellungscode sofort nach der Aktivierung einer beliebigen Methode auf dem Bildschirm für die zweistufige Anmeldung ab.

  1. Log in to your web vault.

  2. Select the profile icon and choose Account Settings from the dropdown:

    Kontoeinstellungen |

  3. Select the Security page and the Two-step Login tab:

    Two-step Login |
    Two-step Login

  4. Locate the FIDO2 WebAuthn option and select the Manage button.

    Select the Manage button  |
    Select the Manage button

    You will be prompted to enter your master password to continue.

  5. Give your security key a friendly Name.

  6. Plug the security key into your device's USB port and select Read Key. If your security key has a button, touch it.


    Windows Hello is natively a FIDO2 authenticator. If you are using Windows Hello but want to register a key or other device, you may need to dismiss the native Windows Hello prompt by selecting Cancel.

  7. Select Save. A green Enabled message will indicate that two-step login using FIDO2 WebAuthn has been successfully enabled and your key will appear with a green checkbox ( ).

  8. Select the Close button and confirm that the FIDO2 WebAuthn option is now enabled, as indicated by a green checkbox ( ).

Repeat this process to add up to 5 FIDO2 WebAuthn security keys to your account.


Wir empfehlen Ihnen, die aktive Registerkarte des Web-Tresors geöffnet zu lassen, bevor Sie mit dem Testen der zweistufigen Anmeldung fortfahren, falls etwas falsch konfiguriert wurde. Sobald Sie sich vergewissert haben, dass es funktioniert, loggen Sie sich von all Ihren Bitwarden-Anwendungen aus, um jeweils die zweistufige Anmeldung zu verlangen. Sie werden dann automatisch ausgeloggt.

Use FIDO2 WebAuthn

The following assumes that FIDO2 WebAuthn is your highest-priority enabled method. To access your vault using a FIDO2 WebAuthn device:

  1. Log in to your Bitwarden vault and enter your email address and master password.

    You will be prompted to insert your security key into your device's USB port. If it has a button, touch it.

    FIDO2 Prompt |
    FIDO2 Prompt

Aktivieren Sie das Kontrollkästchen Angemeldet bleiben, um Ihr Gerät für 30 Tage zu speichern. Wenn Ihr Gerät angemeldet bleibt, müssen Sie den zweistufigen Anmeldeschritt 30 Tage lang nicht mehr durchführen.

You will not be required to complete your secondary two-step login setup to unlock your vault once logged in. For help configuring log out vs. lock behavior, see vault timeout options.

NFC troubleshooting

If you are using a FIDO2 authenticator with NFC functionality like a YubiKey or other hardware security key, you may need to practice finding the NFC reader in your device as different devices have NFC readers in different physical locations (for example, top of phone vs. bottom of phone, or front vs. back).


Hardware security keys typically have a physical plug, which will work more reliably in cases where NFC is difficult.

Troubleshooting YubiKey NFC

On mobile devices, you may encounter a scenario where your YubiKey is read twice consecutively. You will know this has occurred when your device's browser opens the YubiKey OTP website (https://demo/ and if your device vibrates multiple times to signal multiple NFC reads.

To solve this, use the YubiKey Manager application to disable the NFCOTP interface for your key:

YubiKey Manager  |
YubiKey Manager

Disabling NFCOTP will prevent you from being able to use two-step login via YubiKey (OTP) over NFC with this key. In this scenario, OTP via USB will still function as expected.

© 2023 Bitwarden, Inc.