@@ -30,40 +30,45 @@ You can become a Microsoft-compatible FIDO2 security key vendor through the foll
30
30
31
31
The following table lists partners who are Microsoft-compatible FIDO2 security key vendors.
32
32
33
- | Provider | Biometric | USB | NFC | BLE | FIPS Certified | Contact |
34
- | ---------------------------| :-----------------:| :---:| :---:| :---:| :--------------:| -----------------------------------------------------------------------------------------------------|
35
- | AuthenTrend | ![ y] | ![ y] | ![ y] | ![ y] | ![ n] | https://authentrend.com/about-us/#pg-35-3 |
36
- | Ciright | ![ n] | ![ n] | ![ y] | ![ n] | ![ n] | https://www.cyberonecard.com/ |
37
- | Crayonic | ![ y] | ![ n] | ![ y] | ![ y] | ![ n] | https://www.crayonic.com/keyvault |
38
- | Ensurity | ![ y] | ![ y] | ![ n] | ![ n] | ![ n] | https://www.ensurity.com/contact |
39
- | Excelsecu | ![ y] | ![ y] | ![ y] | ![ y] | ![ n] | https://www.excelsecu.com/productdetail/esecufido2secu.html |
40
- | Feitian | ![ y] | ![ y] | ![ y] | ![ y] | ![ y] | https://shop.ftsafe.us/pages/microsoft |
41
- | Fortinet | ![ n] | ![ y] | ![ n] | ![ n] | ![ n] | https://www.fortinet.com/ |
42
- | Giesecke + Devrient (G+D) | ![ y] | ![ y] | ![ y] | ![ y] | ![ n] | https://www.gi-de.com/en/identities/enterprise-security/hardware-based-authentication |
43
- | GoTrustID Inc. | ![ n] | ![ y] | ![ y] | ![ y] | ![ n] | https://www.gotrustid.com/idem-key |
44
- | HID | ![ n] | ![ y] | ![ y] | ![ n] | ![ n] | https://www.hidglobal.com/products/crescendo-key |
45
- | Hypersecu | ![ n] | ![ y] | ![ n] | ![ n] | ![ n] | https://www.hypersecu.com/hyperfido |
46
- | Hypr | ![ y] | ![ y] | ![ n] | ![ y] | ![ n] | https://www.hypr.com/true-passwordless-mfa |
47
- | Identiv | ![ n] | ![ y] | ![ y] | ![ n] | ![ n] | https://www.identiv.com/products/logical-access-control/utrust-fido2-security-keys/nfc |
48
- | IDmelon Technologies Inc. | ![ y] | ![ y] | ![ y] | ![ y] | ![ n] | https://www.idmelon.com/#idmelon |
49
- | Kensington | ![ y] | ![ y] | ![ n] | ![ n] | ![ n] | https://www.kensington.com/solutions/product-category/why-biometrics/ |
50
- | KONA I | ![ y] | ![ n] | ![ y] | ![ y] | ![ n] | https://konai.com/business/security/fido |
51
- | Movenda | ![ y] | ![ n] | ![ y] | ![ y] | ![ n] | https://www.movenda.com/en/authentication/fido2/overview |
52
- | NeoWave | ![ n] | ![ y] | ![ y] | ![ n] | ![ n] | https://neowave.fr/en/products/fido-range/ |
53
- | Nymi | ![ y] | ![ n] | ![ y] | ![ n] | ![ n] | https://www.nymi.com/nymi-band |
54
- | Octatco | ![ y] | ![ y] | ![ n] | ![ n] | ![ n] | https://octatco.com/ |
55
- | OneSpan Inc. | ![ n] | ![ y] | ![ n] | ![ y] | ![ n] | https://www.onespan.com/products/fido |
56
- | Swissbit | ![ n] | ![ y] | ![ y] | ![ n] | ![ n] | https://www.swissbit.com/en/products/ishield-key/ |
57
- | Thales Group | ![ n] | ![ y] | ![ y] | ![ n] | ![ y] | https://cpl.thalesgroup.com/access-management/authenticators/fido-devices |
58
- | Thetis | ![ y] | ![ y] | ![ y] | ![ y] | ![ n] | https://thetis.io/collections/fido2 |
59
- | Token2 Switzerland | ![ y] | ![ y] | ![ y] | ![ n] | ![ n] | https://www.token2.swiss/shop/product/token2-t2f2-alu-fido2-u2f-and-totp-security-key |
60
- | Token Ring | ![ y] | ![ n] | ![ y] | ![ n] | ![ n] | https://www.tokenring.com/ |
61
- | TrustKey Solutions | ![ y] | ![ y] | ![ n] | ![ n] | ![ n] | https://www.trustkeysolutions.com/security-keys/ |
62
- | VinCSS | ![ n] | ![ y] | ![ n] | ![ n] | ![ n] | https://passwordless.vincss.net |
63
- | WiSECURE Technologies | ![ n] | ![ y] | ![ n] | ![ n] | ![ n] | https://wisecure-tech.com/en-us/zero-trust/fido/authtron |
64
- | Yubico | ![ y] | ![ y] | ![ y] | ![ n] | ![ y] | https://www.yubico.com/solutions/passwordless/ |
65
-
66
-
33
+ | Provider | Biometric | USB | NFC | BLE | FIPS Certified |
34
+ | :-| :-:| :-:| :-:| :-:| :-:|
35
+ | [ AuthenTrend] ( https://authentrend.com/about-us/#pg-35-3 ) | ![ y] | ![ y] | ![ y] | ![ y] | ![ n] |
36
+ | [ ACS] ( https://www.acs.com.hk/en/products/553/pocketkey-fido%C2%AE-certified-usb-security-key/ ) | ![ n] | ![ y] | ![ n] | ![ n] | ![ n] |
37
+ | [ ATOS] ( https://atos.net/en/solutions/cyber-security/iot-and-ot-security/smart-card-solution-cardos-for-iot ) | ![ n] | ![ y] | ![ y] | ![ n] | ![ n] |
38
+ | [ Ciright] ( https://www.cyberonecard.com/ ) | ![ n] | ![ n] | ![ y] | ![ n] | ![ n] |
39
+ | [ Crayonic] ( https://www.crayonic.com/keyvault ) | ![ y] | ![ n] | ![ y] | ![ y] | ![ n] |
40
+ | [ Cryptnox] ( https://cryptnox.com/ ) | ![ n] | ![ y] | ![ y] | ![ n] | ![ n] |
41
+ | [ Ensurity] ( https://www.ensurity.com/contact ) | ![ y] | ![ y] | ![ n] | ![ n] | ![ n] |
42
+ | [ Excelsecu] ( https://www.excelsecu.com/productdetail/esecufido2secu.html ) | ![ y] | ![ y] | ![ y] | ![ y] | ![ n] |
43
+ | [ Feitian] ( https://shop.ftsafe.us/pages/microsoft ) | ![ y] | ![ y] | ![ y] | ![ y] | ![ y] |
44
+ | [ Fortinet] ( https://www.fortinet.com/ ) | ![ n] | ![ y] | ![ n] | ![ n] | ![ n] |
45
+ | [ Giesecke + Devrient (G+D)] ( https://www.gi-de.com/en/identities/enterprise-security/hardware-based-authentication ) | ![ y] | ![ y] | ![ y] | ![ y] | ![ n] |
46
+ | [ GoTrustID Inc.] ( https://www.gotrustid.com/idem-key ) | ![ n] | ![ y] | ![ y] | ![ y] | ![ n] |
47
+ | [ HID] ( https://www.hidglobal.com/products/crescendo-key ) | ![ n] | ![ y] | ![ y] | ![ n] | ![ n] |
48
+ | [ HIDEEZ] ( https://hideez.com/products/hideez-key-4 ) | ![ n] | ![ y] | ![ y] | ![ y] | ![ n] |
49
+ | [ Hypersecu] ( https://www.hypersecu.com/hyperfido ) | ![ n] | ![ y] | ![ n] | ![ n] | ![ n] |
50
+ | [ Hypr] ( https://www.hypr.com/true-passwordless-mfa ) | ![ y] | ![ y] | ![ n] | ![ y] | ![ n] |
51
+ | [ Identiv] ( https://www.identiv.com/products/logical-access-control/utrust-fido2-security-keys/nfc ) | ![ n] | ![ y] | ![ y] | ![ n] | ![ n] |
52
+ | [ IDmelon Technologies Inc.] ( https://www.idmelon.com/#idmelon ) | ![ y] | ![ y] | ![ y] | ![ y] | ![ n] |
53
+ | [ Kensington] ( https://www.kensington.com/solutions/product-category/why-biometrics/ ) | ![ y] | ![ y] | ![ n] | ![ n] | ![ n] |
54
+ | [ KONA I] ( https://konai.com/business/security/fido ) | ![ y] | ![ n] | ![ y] | ![ y] | ![ n] |
55
+ | [ Movenda] ( https://www.movenda.com/en/authentication/fido2/overview ) | ![ y] | ![ n] | ![ y] | ![ y] | ![ n] |
56
+ | [ NeoWave] ( https://neowave.fr/en/products/fido-range/ ) | ![ n] | ![ y] | ![ y] | ![ n] | ![ n] |
57
+ | [ Nymi] ( https://www.nymi.com/nymi-band ) | ![ y] | ![ n] | ![ y] | ![ n] | ![ n] |
58
+ | [ Octatco] ( https://octatco.com/ ) | ![ y] | ![ y] | ![ n] | ![ n] | ![ n] |
59
+ | [ OneSpan Inc.] ( https://www.onespan.com/products/fido ) | ![ n] | ![ y] | ![ n] | ![ y] | ![ n] |
60
+ | [ Precision Biometric] ( https://www.innait.com/product/fido/ ) | ![ n] | ![ y] | ![ n] | ![ n] | ![ n] |
61
+ | [ RSA] ( https://www.rsa.com/products/securid/ ) | ![ n] | ![ y] | ![ n] | ![ n] | ![ n] |
62
+ | [ Sentry] ( https://sentryenterprises.com/ ) | ![ n] | ![ n] | ![ y] | ![ n] | ![ n] |
63
+ | [ Swissbit] ( https://www.swissbit.com/en/products/ishield-key/ ) | ![ n] | ![ y] | ![ y] | ![ n] | ![ n] |
64
+ | [ Thales Group] ( https://cpl.thalesgroup.com/access-management/authenticators/fido-devices ) | ![ n] | ![ y] | ![ y] | ![ n] | ![ y] |
65
+ | [ Thetis] ( https://thetis.io/collections/fido2 ) | ![ y] | ![ y] | ![ y] | ![ y] | ![ n] |
66
+ | [ Token2 Switzerland] ( https://www.token2.swiss/shop/product/token2-t2f2-alu-fido2-u2f-and-totp-security-key ) | ![ y] | ![ y] | ![ y] | ![ n] | ![ n] |
67
+ | [ Token Ring] ( https://www.tokenring.com/ ) | ![ y] | ![ n] | ![ y] | ![ n] | ![ n] |
68
+ | [ TrustKey Solutions] ( https://www.trustkeysolutions.com/en/sub/product.form ) | ![ y] | ![ y] | ![ n] | ![ n] | ![ n] |
69
+ | [ VinCSS] ( https://passwordless.vincss.net ) | ![ n] | ![ y] | ![ n] | ![ n] | ![ n] |
70
+ | [ WiSECURE Technologies] ( https://wisecure-tech.com/en-us/zero-trust/fido/authtron ) | ![ n] | ![ y] | ![ n] | ![ n] | ![ n] |
71
+ | [ Yubico] ( https://www.yubico.com/solutions/passwordless/ ) | ![ y] | ![ y] | ![ y] | ![ n] | ![ y] |
67
72
68
73
<!-- Image references-->
69
74
[ y ] : ./media/fido2-compatibility/yes.png
0 commit comments