Security keys vs device biometrics as authenticators
0pass authentication works with security keys and device biometrics. Learn about the benefits and limitations of each, along with ways to implement passwordless authentication with these methods.
Security Keys
Security keys, like the YubiKey, are sleek tools that introduced a new paradigm for authenticating. When you log in to corporate services or devices, enter a PIN and tap your key—this confirms your presence with a physical touch. The private keys on a secure processor are cut off from all access and only solve the cryptographic challenge to authenticate after being unlocked by a PIN and touch. They have adjustable security settings and can be tied to a corporate chain of trust. They are ideal for the strongest authentication with enterprise governance.






Device Biometrics
Device Biometrics
Biometric authentication, like Windows Hello or Apple Touch ID, uses the unique biological characteristics of an individual to unlock a hardware security module (HSM) built into the device. The HSM houses private keys used for authenticating into services. Not only is this PKI-backed authentication a step level improvement over passwords, but storing the private key in a secure module instead of a browser or other cloud-based password vaults makes it nearly impossible to phish.
Biometric authentication, like Windows Hello or Apple Touch ID, uses the unique biological characteristics of an individual to unlock a hardware security module (HSM) built into the device. The HSM houses private keys used for authenticating into services. Not only is this PKI-backed authentication a step level improvement over passwords, but storing the private key in a secure module instead of a browser or other cloud-based password vaults makes it nearly impossible to phish.
Compare authenticators
The right authenticator to adopt depends on your use case and the environments you want to protect.
Security Keys
YubiKeys, or other models of security keys with feature parity.
Device Biometrics
Built in methods like Touch ID, Face ID, Windows Hello, Android Thumbprint
Supported protocols
FIDO2
PIV/Smart Card
SSH
Security
Verify Attestation
Phishing Resistant
Credential Theft Resistant
Tied to Certificate Authority (CA)
MFA
Can log into
SSO Web Apps
SSH
Windows
Mac
Linux
Windows RDP
Supports FIDO2 for web logins when implemented correctly.
Supports FIDO2 for web logins.
Works with smart card subsystems on all popular OSes.
Not compatible with PIV/Smart card authentication.
Works with smart card subsystems on all popular OSes.
Works with smart card subsystems on all popular OSes.
Certificates prove authentication came from an authorized YubiKey.
Passkeys lets users share and use creds on unauthorized devices.
Meets the highest standard of phishing resistance: FIDO2.
Meets the highest standard of phishing resistance: FIDO2.
Keys locked in secure processor of a security key.
Keys locked in dedicated hardware module on the device.
0pass enrolls a security key into a certificate authority.
Keypairs in biometric authentication are self signed.
Proof of knowledge (PIN), and proof of possession (touch).
Proof of self (fingerprint or face) and proof of possession (device).
Yes, via SAML or OIDC using FIDO2.
Yes, via SAML or OIDC.
Via native SSH.
No native SSH integrations with Biometrics.
Via native Smart Card subsystem, tied to certificate authority.
Windows Hello unlocks computer, credential is unmanaged (local).
Via Mac native Smart Card subsystem.
Touch ID cannot log in to Mac or unlock FileVault.
Via the pluggable authentication module.
No native biometric login functions in Linux.
Uses the same methods as Windows computer.
Only via specific implementations of Windows Hello for Business.
Compare authenticators
The right authenticator to adopt depends on your use case and the environments you want to protect.
Security Keys
YubiKeys, or other models of security keys with feature parity.
Device Biometrics
Built in methods like Touch ID, Face ID, Windows Hello, Android Thumbprint
Supported protocols
FIDO2
PIV/Smart Card
SSH
Security
Verify Attestation
Phishing Resistant
Credential Theft Resistant
Tied to Certificate Authority (CA)
MFA
Can log into
SSO Web Apps
SSH
Windows
Mac
Linux
Windows RDP
Supports FIDO2 for web logins when implemented correctly.
Supports FIDO2 for web logins.
Works with smart card subsystems on all popular OSes.
Not compatible with PIV/Smart card authentication.
Works with smart card subsystems on all popular OSes.
Works with smart card subsystems on all popular OSes.
Certificates prove authentication came from an authorized YubiKey.
Passkeys lets users share and use creds on unauthorized devices.
Meets the highest standard of phishing resistance: FIDO2.
Meets the highest standard of phishing resistance: FIDO2.
Keys locked in secure processor of a security key.
Keys locked in dedicated hardware module on the device.
0pass enrolls a security key into a certificate authority.
Keypairs in biometric authentication are self signed.
Proof of knowledge (PIN), and proof of possession (touch).
Proof of self (fingerprint or face) and proof of possession (device).
Yes, via SAML or OIDC using FIDO2.
Yes, via SAML or OIDC.
Via native SSH.
No native SSH integrations with Biometrics.
Via native Smart Card subsystem, tied to certificate authority.
Windows Hello unlocks computer, credential is unmanaged (local).
Via Mac native Smart Card subsystem.
Touch ID cannot log in to Mac or unlock FileVault.
Via the pluggable authentication module.
No native biometric login functions in Linux.
Uses the same methods as Windows computer.
Only via specific implementations of Windows Hello for Business.
Compare authenticators
The right authenticator to adopt depends on your use case and the environments you want to protect.
Security Keys
YubiKeys, or other models of security keys with feature parity.
Device Biometrics
Built in methods like Touch ID, Face ID, Windows Hello, Android Thumbprint
Supported protocols
FIDO2
PIV/Smart Card
SSH
Security
Verify Attestation
Phishing Resistant
Credential Theft Resistant
Tied to Certificate Authority (CA)
MFA
Can log into
SSO Web Apps
SSH
Windows
Mac
Linux
Windows RDP
Supports FIDO2 for web logins when implemented correctly.
Supports FIDO2 for web logins.
Works with smart card subsystems on all popular OSes.
Not compatible with PIV/Smart card authentication.
Works with smart card subsystems on all popular OSes.
Works with smart card subsystems on all popular OSes.
Certificates prove authentication came from an authorized YubiKey.
Passkeys lets users share and use creds on unauthorized devices.
Meets the highest standard of phishing resistance: FIDO2.
Meets the highest standard of phishing resistance: FIDO2.
Keys locked in secure processor of a security key.
Keys locked in dedicated hardware module on the device.
0pass enrolls a security key into a certificate authority.
Keypairs in biometric authentication are self signed.
Proof of knowledge (PIN), and proof of possession (touch).
Proof of self (fingerprint or face) and proof of possession (device).
Yes, via SAML or OIDC using FIDO2.
Yes, via SAML or OIDC.
Via native SSH.
No native SSH integrations with Biometrics.
Via native Smart Card subsystem, tied to certificate authority.
Windows Hello unlocks computer, credential is unmanaged (local).
Via Mac native Smart Card subsystem.
Touch ID cannot log in to Mac or unlock FileVault.
Via the pluggable authentication module.
No native biometric login functions in Linux.
Uses the same methods as Windows computer.
Only via specific implementations of Windows Hello for Business.
Stop the att&ck
Deploying passwordless logins with security keys or device biometrics using 0pass helps you defend against the most frequently used adversarial techniques .



Let's talk about your use case
Chat with a security engineer and see whether we can help secure your environment. You can also set up a demo and access a free 30-day trial.
Access a free trial
Advice from security engineers
See a demo
Let's talk about your use case
Chat with a security engineer and see whether we can help secure your environment. You can also set up a demo and access a free 30-day trial.
Access a free trial
Advice from security engineers
See a demo
Let's talk about your use case
Chat with a security engineer and see whether we can help secure your environment. You can also set up a demo and access a free 30-day trial.