!!! Overview [{$pagename}] is an [Authenticator], specifically, a [FIDO Authenticator] that supports the [Universal Second Factor] [FIDO protocol][{$pagename}], technically, is only supported for [Multi-Factor Authentication] ([MFA]) and not [Passwordless Authentication] as in [CTAP2] and [WebAuthN] !! [{$pagename}] interface types At the moment (2017-04-02) three interface types are specified in [FIDO] [U2F]. * [Universal Serial Bus] ([USB]) * [Near Field Communication] ([NFC]) * [Bluetooth] (Classic and Smart aka Low Energy ([BLE])). Unlocking is a test of [user] physical [presence] and requires a token-specific [Authorization Gesture], such as pushing a button on a [USB] device, tapping a [U2F] device to an [NFC]-enabled device such as a mobile phone or tablet, or pressing a button on a [BLE]-enabled token or fob. The user can use the same FIDO [{$pagename}] on all online services that support the [{$pagename}] [protocol].!! [{$pagename}] and [WebAuthn Authenticator] Existing [FIDO] [U2F] Security Keys are largely compatible with the [Web Authentication API] standard, though [Web Authentication API] added the ability to reference a unique per-account "user handle" identifier, which older hardware tokens are unable to store. [Authenticators] that only support the ยง8.6 [FIDO] [U2F] Attestation Statement Format __have no mechanism__ to store a user handle, so the returned userHandle will always be null.!! More Information There might be more information for this subject on one of the following: [{ReferringPagesPlugin before='*' after='\n' }]