FIDO (Fast Identity Online) is a set of standard and specification developed by FIDO Alliance to provide a solution to replace the traditional password authentication scheme. FIDO Security Keys are hardware based security keys support FIDO Specification to secure web service accounts.
Traditional Password authentication scheme have some security and usability issues. Using simple passwords across multiple sites will create security risks such as phishing and MITM attacks. Using complex passwords can also bring usability issue and frequent password reset.

FIDO Security Keys utilized public key cryptography to provide a secure authentication scheme to online accounts. The security key will create a new set of key pair to enhance the security.
The passwordless authentication is by Microsoft based on FIDO2 standard to allow users achieve passwordless authentication with the combination of Azure Active Directory (or Office 365 Accounts) and FEITIAN biometric enabled security keys to authentication to PC and Web services without typing anything. More detail can be seen at:

In FIDO2, server can choose whether to store the credential inside the key or inside the server. If server choose store the credential inside the key, we can store 128 credentials. Currently, most of web application choose to store credentials on server side.
Usually, user need to login to their accounts as normal. Then go to account settings/security and choose multi-factor authentication and then choose set up security keys.

Note: Different web applications may have different account settings structure.
There are growing number of web services can support FIDO security keys, please reference the following article for more details.

If someone get the security key, don’t worry. They cannot access your account without your user name, password or Biometric. The dedicated users can still logon to the account by using back-up security key or other method. Then user can disable the lost security key and provision a new key.
Based on server side implementation, the credentials can either be stored on the server or store inside the key. Most of the web service choose to store credentials on server side. The security key itself have storage for 128 credentials.


Pair security key with your with following steps:

1.Open the Bluetooth settings to add new device.

2.Press and hold the power button for 5 Seconds.

3.Pair the device with 6 capital letters or “FT_” followed by 6 capital letters as the device name.

4.For MultiPass FIDO Security Keys, users are also required to type in the 6 digit pin for pairing.
For windows 10 user, users can use the manage security key using the system built-in management tools. Go to “Sign-in options” and choose “Security Key”.

For Mac OS users, download the “BioPass FIDO2 Manager” from App store to provision fingerprints. User can also use the chrome built-in management tools in the following step:

1.Type in chrome://settings/

2.Click advanced and find “Manage Security Keys” in Privacy and security section. For Linux users, download the “BioPass FIDO2 Manager” from https://ftsafe.com/Support/Resources.

User can also use the chrome built-in management tools in the following step:

3.Type in chrome://settings/

4.Click advanced and find “Manage Security Keys” in Privacy and security section.


FEITIAN Security Keys can be used in latest Google Chrome, Firefox, Microsoft Edge, Safari and Opera browsers.
Using security key on Mac OS doesn’t require additional steps, users can use the security key with any supported browsers.
Linux user are required to download a udev rules named “70-u2f.rules” and put it under “/etc/udev/rules.d/” directory, the rules file contains FEITIAN Security Keys can be download at:

Currently, only google service support using security key in mobile devices. Please reference the following link for more detail:



Some FIDO Security Keys support OATH HOTP function, please download the OTP tool from the following link to use the optional HOTP function. For other functions, please contact us.