Web Authentication
-
- UpdatedJan 30, 2025
- 1 minute read
- Yokohama
- Platform Security
Your users can use hardware keys or their device's biometric readers (FIDO2) to authenticate to an instance.
Hardware keys
![]() |
Hardware keys are physical hardware that you can use to authenticate. Hardware keys are inserted into a port on your device to provide authentication. For details on registering hardware keys, see Register a hardware security key. |
Biometrics
![]() |
Biometric authenticators use fingerprint or facial recognition to identify users. Your users can use these authenticators on their devices as part of the multi-factor login process. For details on registering biometric authenticators, see Register a biometric authenticator. |
Choose the second factor that you wish to authentication and authenticate to your instance.
