Universal 2nd Factor (U2F) is an
open standard
An open standard is a standard that is openly accessible and usable by anyone. It is also a prerequisite to use open license, non-discrimination and extensibility. Typically, anybody can participate in the development. There is no single definitio ...
that strengthens and simplifies
two-factor authentication (2FA) using specialized
Universal Serial Bus
Universal Serial Bus (USB) is an industry standard that establishes specifications for cables, connectors and protocols for connection, communication and power supply ( interfacing) between computers, peripherals and other computers. A broa ...
(USB) or
near-field communication
Near-field communication (NFC) is a set of communication protocols that enables communication between two electronic devices over a distance of 4 cm (1 in) or less. NFC offers a low-speed connection through a simple setup that can be u ...
(NFC) devices based on similar security technology found in
smart card
A smart card, chip card, or integrated circuit card (ICC or IC card) is a physical electronic authentication device, used to control access to a resource. It is typically a plastic credit card-sized card with an embedded integrated circuit (IC) c ...
s.
It is succeeded by the
FIDO2 Project, which includes the
W3C Web Authentication (
WebAuthn) standard and the
FIDO Alliance
The FIDO ("Fast IDentity Online") Alliance is an open industry association launched in February 2013 whose stated mission is to develop and promote authentication standards that "help reduce the world’s over-reliance on passwords". FIDO addres ...
's
Client to Authenticator Protocol
The Client to Authenticator Protocol (CTAP) or X.1278 enables a roaming, user-controlled cryptographic authenticator (such as a smartphone or a hardware security key) to interoperate with a client platform such as a laptop.
Standard
CTAP is comp ...
2 (CTAP2).
While initially developed by
Google
Google LLC () is an American Multinational corporation, multinational technology company focusing on Search Engine, search engine technology, online advertising, cloud computing, software, computer software, quantum computing, e-commerce, ar ...
and
Yubico, with contribution from
NXP Semiconductors
NXP Semiconductors N.V. (NXP) is a Dutch semiconductor designer and manufacturer with headquarters in Eindhoven, Netherlands. The company employs approximately 31,000 people in more than 30 countries. NXP reported revenue of $11.06 billion in 2 ...
, the standard is now hosted by the FIDO Alliance.
Advantages (and disadvantages)
While
Time-based one-time passwords (e.g. 6-digit codes generated on Google Authenticator) were a significant improvement over SMS-based security codes, a number of security vulnerabilities were still possible to exploit, which U2F sought to improve. Specifically:
In terms of disadvantages, one significant difference and potential drawback to be considered regarding hardware-based U2F solutions is that unlike with TOTP shared secret methods, there is no possibility of "backing up" of recovery codes or shared secrets. If a hardware duplicate or alternate hardware key is not kept and the original U2F hardware key is lost, no recovery of the key is possible (because the private key exists only in hardware). Therefore, for services that do not provide any alternate account recovery method, the use of U2F should be carefully considered.
Design
The USB devices communicate with the host computer using the
human interface device (HID) protocol, essentially mimicking a keyboard.
This avoids the need for the user to install special hardware driver software in the host computer, and permits application software (such as a browser) to directly access the security features of the device without user effort other than possessing and inserting the device. Once communication is established, the application exercises a
challenge–response authentication with the device using
public-key cryptography
Public-key cryptography, or asymmetric cryptography, is the field of cryptographic systems that use pairs of related keys. Each key pair consists of a public key and a corresponding private key. Key pairs are generated with cryptographic a ...
methods and a secret unique device key manufactured into the device.
Vulnerabilities
The device key is vulnerable to
malicious manufacturer duplication.
In 2020, independent security researchers found a method to extract private keys from Google Titan Key, a popular U2F hardware security token.
The method required physical access to the key for several hours, several thousand euros-worth of equipment, and was destructive to the plastic case of the key.
The attackers concluded that the difficulty of the attack meant that people were still safer to use the keys than not.
The attack was possible due to a vulnerability in the A700X microchip made by
NXP Semiconductors
NXP Semiconductors N.V. (NXP) is a Dutch semiconductor designer and manufacturer with headquarters in Eindhoven, Netherlands. The company employs approximately 31,000 people in more than 30 countries. NXP reported revenue of $11.06 billion in 2 ...
, which is also used in security tokens made by
Feitian and
Yubico, meaning that those tokens are also vulnerable.
The vulnerability was
responsibly disclosed to the affected manufacturers so that it might be fixed in future products.
Support and use
U2F security keys are supported by
Google Chrome
Google Chrome is a cross-platform web browser developed by Google. It was first released in 2008 for Microsoft Windows, built with free software components from Apple WebKit and Mozilla Firefox. Versions were later released for Linux, macO ...
since version 38,
Firefox
Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation. It uses the Gecko rendering engine to display web pages, which implements current and ...
since version 57
and
Opera
Opera is a form of theatre in which music is a fundamental component and dramatic roles are taken by singers. Such a "work" (the literal translation of the Italian word "opera") is typically a collaboration between a composer and a libre ...
since version 40. U2F security keys can be used as an additional method of two-step verification on online services that support the U2F protocol, including Google,
Azure
Azure may refer to:
Colour
* Azure (color), a hue of blue
** Azure (heraldry)
** Shades of azure, shades and variations
Arts and media
* ''Azure'' (Art Farmer and Fritz Pauer album), 1987
* Azure (Gary Peacock and Marilyn Crispell album), 2013
...
,
Dropbox
Dropbox is a file hosting service operated by the American company Dropbox, Inc., headquartered in San Francisco, California, U.S. that offers cloud storage, file synchronization, personal cloud, and client software. Dropbox was founded in 2 ...
,
GitHub
GitHub, Inc. () is an Internet hosting service for software development and version control using Git. It provides the distributed version control of Git plus access control, bug tracking, software feature requests, task management, co ...
,
GitLab
GitLab Inc. is an open-core company that operates GitLab, a DevOps software package which can develop, secure, and operate software. The open source software project was created by Ukrainian developer Dmitriy Zaporozhets and Dutch developer ...
,
Bitbucket,
Nextcloud
Nextcloud is a suite of client-server software for creating and using file hosting services. Nextcloud provides functionally similar to Dropbox, Office 365 or Google Drive when used with integrated office suite solutions Collabora Online or ...
,
Facebook
Facebook is an online social media and social networking service owned by American company Meta Platforms. Founded in 2004 by Mark Zuckerberg with fellow Harvard College students and roommates Eduardo Saverin, Andrew McCollum, Dustin ...
,
and others.
Chrome,
Firefox
Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation. It uses the Gecko rendering engine to display web pages, which implements current and ...
, and Opera were, , the only browsers supporting U2F natively.
Microsoft
Microsoft Corporation is an American multinational corporation, multinational technology company, technology corporation producing Software, computer software, consumer electronics, personal computers, and related services headquartered at th ...
has enabled FIDO 2.0 support for
Windows 10
Windows 10 is a major release of Microsoft's Windows NT operating system. It is the direct successor to Windows 8.1, which was released nearly two years earlier. It was released to manufacturing on July 15, 2015, and later to retail on ...
's
Windows Hello login platform.
Microsoft
Edge browser gained support for U2F in the October 2018 Windows Update.
Microsoft account
A Microsoft account or MSA (previously known as Microsoft Passport, .NET Passport, and Windows Live ID) is a single sign-on Microsoft user account for Microsoft customers to log in to Microsoft services (like Outlook.com), devices running on ...
s, including
Office 365
Microsoft 365 is a product family of productivity software, collaboration and cloud-based services owned by Microsoft. It encompasses online services such as Outlook.com, OneDrive, Microsoft Teams, programs formerly marketed under the name ...
,
OneDrive
Microsoft OneDrive (formerly SkyDrive) is a file hosting service operated by Microsoft. First launched in August 2007, it enables registered users to share and synchronize their files. OneDrive also works as the storage backend of the web ver ...
, and other Microsoft services, do not yet have U2F support.
Mozilla
Mozilla (stylized as moz://a) is a free software community founded in 1998 by members of Netscape. The Mozilla community uses, develops, spreads and supports Mozilla products, thereby promoting exclusively free software and open standards, w ...
has integrated it into Firefox 57, and enabled it by default in Firefox 60
and
Thunderbird 60.
Microsoft Edge starting from build 17723 support FIDO2.
As of iOS and iPadOS 13.3 Apple now supports U2F in the Safari browser on those platforms.
Specifications

The U2F standard has undergone two major revisions:
* U2F 1.0 Proposed Standard (October 9, 2014)
* U2F 1.2 Proposed Standard (April 11, 2017)
Additional specification documents may be obtained from the FIDO web site.
The U2F 1.0 Proposed Standard (October 9, 2014) was the starting point for a short-lived specification known as the FIDO 2.0 Proposed Standard (September 4, 2015). The latter was formally submitted to the
World Wide Web Consortium
The World Wide Web Consortium (W3C) is the main international standards organization for the World Wide Web. Founded in 1994 and led by Tim Berners-Lee, the consortium is made up of member organizations that maintain full-time staff working t ...
(W3C) on November 12, 2015.
Subsequently, the first Working Draft of the W3C Web Authentication (
WebAuthn) standard was published on May 31, 2016. The WebAuthn standard has been revised numerous times since then, becoming a W3C Recommendation on March 4, 2019.
Meanwhile the U2F 1.2 Proposed Standard (April 11, 2017) became the starting point for the
Client to Authenticator Protocol
The Client to Authenticator Protocol (CTAP) or X.1278 enables a roaming, user-controlled cryptographic authenticator (such as a smartphone or a hardware security key) to interoperate with a client platform such as a laptop.
Standard
CTAP is comp ...
(CTAP) Proposed Standard, which was published on September 27, 2017. FIDO CTAP complements W3C WebAuthn, both of which are in scope for the
FIDO2 Project.
WebAuthn and CTAP provide a complete replacement for U2F, which has been renamed "CTAP1" in the latest version of the FIDO2 standard.
The WebAuthn protocol is backward-compatible (via the AppID extension) with U2F-only
security key
A security token is a peripheral device used to gain access to an electronically restricted resource. The token is used in addition to or in place of a password. It acts like an electronic key to access something. Examples of security tokens incl ...
s
but the U2F protocol is not compatible with a WebAuthn-only
authenticator.
Some authenticators support both U2F and WebAuthn while some WebAuthn clients support keys created via the legacy U2F API.
References
{{authority control
Internet protocols
Internet Standards
Computer access control protocols
Authentication protocols