Citadel Web

Make web logins phishing proof with passwordless authentication

Put a hard stop on the biggest source of account breaches: phishing and credential theft. Give employees a passwordless MFA login to your single sign on apps, using FIDO2 to resist any remote attack. Only a wrench can stop you now.

Talk With Us

The power of passwordless

Why switch

to security keys for computer logins

Regardless of an organization’s best efforts, there will always be someone to fall for the lookalike website, and become the entry point for a breach. MFA using FIDO2 standards and device biometrics or security keys completely removes the risks of phishing, password theft, and replay attacks.

When stakes are high, you cannot rely on the hope that one employee will not make a mistake.

Why 0pass for passwordless web logins

The most flexible system for phishing resistant authentication

Use a touch or a look

To access any website behind single sign-on, employees simply enter a username and use Face ID, Touch ID, Windows Hello, or a YubiKey to authenticate.

Plugs into your identity provider

Plug 0pass neatly into any identity provider, keeping all your identity management in place. Citadel does the authentication. They handle the access.

All authentication under one roof

Employees only enroll a key once to access all systems. When you are already managing your credentials for work computer accounts and SSH with 0pass, a quick integration brings the same, strong credentials to your single sign on experience.

No agent, no app, no hassle

Users can easily enroll their authenticators directly in the 0pass web app. After that, they can use biometrics or a YubiKey. No additional software on devices to maintain.

 Integrate with major identity providers

Why we only use the FIDO2 standard

The FIDO2 standard has the backing of companies like Apple, Google, and Microsoft alongside hundreds of other organizations. With FIDO2, your cryptographic login credentials are unique to the exact domain, they never leave your device, and are never stored on a server. Using this model removes any potential breach due to phishing, password theft, or replay attacks.

How you can get started

Let's talk about your use case

Chat with a security engineer and see whether we can help secure your environment. You can also set up a demo and access a free 30-day trial.

Access a free trial

Advice from security engineers

See a demo

How you can get started

Let's talk about your use case

Chat with a security engineer and see whether we can help secure your environment. You can also set up a demo and access a free 30-day trial.

Access a free trial

Advice from security engineers

See a demo

How you can get started

Let's talk about your use case

Chat with a security engineer and see whether we can help secure your environment. You can also set up a demo and access a free 30-day trial.

Access a free trial

Advice from security engineers

See a demo

Your questions, answered.

How does 0pass integrate with identity providers?

How does this differ from YubiKey MFA offered by identity providers?

Does 0pass provide audit logging capabilities?

Is this cloud hosted or self-hosted?

Do any FIDO2 authentication methods need a PIN?

How does a YubiKey’s PIN and a password differ?

What happens if a user loses their security key?

How does Citadel integrate with identity providers?

How does this differ from YubiKey MFA offered by identity providers?

Does Citadel provide audit logging capabilities?

Is this cloud hosted or on premises?

Do any FIDO2 authentication methods need a PIN?

How does a YubiKey’s PIN and a password differ?

What happens if a user loses their security key?