FIDO2 Key vs PIV Card
Card vs CardFIDO2 represents modern passwordless authentication, while PIV is legacy PKI-based federal identity. Some FIDO2 keys also support PIV applets.
FIDO2 Security Key vs PIV Card
FIDO2 security keys and PIV cards are both hardware authentication credentials designed to resist phishing and credential theft. PIVPIVIdentityUS federal identity card standard.Click to view → (Personal Identity Verification, FIPS 201FIPS 201ComplianceUS federal standard defining PIV smart card specifications.Click to view →) is the US federal government's PKI smart card standard. FIDO2FIDO2StandardPasswordless authentication standard.Click to view → is an open standard from the FIDO Alliance for hardware-backed passwordless authentication. They are increasingly deployed together in hybrid environments.
Overview
FIDO2 security keys implement the W3C WebAuthn specification and FIDO CTAP2 protocol. They generate origin-bound key pairs, preventing reuse of credentials across different sites. Authentication requires physical presence (touch) and optionally a PIN. The relying party verifies the FIDO2 attestation and stores the public key. No certificate authority, CRL, or OCSP infrastructure is needed.
PIV cards (FIPS 201-3, SP 800-73-5) are contact smart cards carrying an authentication certificate, digital signature certificate, and optionally a key management certificate, all issued by a federal agency PKI. PIV authentication uses mutual TLS or SAML with the card's X.509 certificate. PIV cards also carry a CHUID (Card Holder Unique Identifier), fingerprint biometrics (two fingers), and a facial image. Physical access uses the contactless interface (via OPACITY or PACS middleware).
Key Differences
- Protocol: FIDO2/WebAuthn (FIDO2 key) vs. mutual TLS / PKCS#11 / CHUID (PIV)
- PKI requirement: None (FIDO2) vs. agency PKI with CA hierarchy, CRL/OCSP, and card management system (PIV)
- Identity assurance: FIDO2 key proves hardware possession (no identity binding by default); PIV binds to a federally verified identity (IAL3 in NIST 800-63A terms)
- Standards: FIDO2 Alliance, W3C WebAuthn (FIDO2); FIPS 201-3, SP 800-73-5, SP 800-76-2 (PIV)
- Interface: USB/NFC/BLE dongle (FIDO2); contact + optional contactless smart card (PIV)
- Physical form: Portable dongle (FIDO2); credit card sized smart card with photo ID (PIV)
- HSPD-12 compliance: FIDO2 — not currently a compliant credential; PIV — explicitly required by HSPD-12 for federal employees
- Revocation: FIDO2 — server-side deregistration; PIV — certificate revocation (CRL/OCSP) + card management system
Use Cases
FIDO2 security keys are used for: - Cloud and SaaS authentication (Microsoft Entra, Okta, Google Workspace) as phishing-resistant MFA - Privileged access workstations where PIV infrastructure is not deployed - Developer and IT admin account protection
PIV is used for: - US federal employee and contractor authentication — HSPD-12 mandated - Federal building physical access (PACS gates using PIV contactless) - Federal network logical access (Windows smart card login) - Inter-agency identity federation (PIV credentials federated across federal domains)
Verdict
NIST SP 800-63B AAL3 now accepts both FIDO2 (with hardware authenticator attestation) and PIV. For federal deployments subject to HSPD-12, PIV remains mandatory. For everything outside the US federal context — and increasingly for cloud-first zero-trust architectures even within federal contexts — FIDO2 keys are preferred for their simpler deployment, no PKI overhead, and strong phishing resistance. Many agencies now deploy both: PIV for the legacy PACS and Windows domain authentication, FIDO2 for cloud SSO.
推荐
FIDO2 for modern web authentication; PIV for government compliance requirements.
常见问题
FIDO2 (WebAuthn + CTAP2) hardware keys provide phishing-resistant authentication to web services using origin-bound public-key credentials — the key generates a site-specific key pair and proves possession without passwords. PIV cards implement a NIST FIPS 201 identity framework with X.509 certificates for smart card logon, S/MIME email encryption, and PKI-based digital signatures in enterprise Windows and government environments. FIDO2 is web-native; PIV is enterprise and government PKI-native.
Yes — YubiKey 5 and similar multi-protocol security keys support FIDO2/WebAuthn, PIV (FIPS 201 smart card), OpenPGP, OATH TOTP/HOTP, and PKCS#11 on a single device. The PIV applet on the key can be used for Windows smart card logon and certificate-based VPN, while the FIDO2 applet protects web application and cloud service access on the same physical key, making it the most practical hardware token for mixed enterprise environments.
FIDO2 deployment requires no public key infrastructure — relying parties store per-user public keys in their own database without a CA. PIV deployment requires a PKI (certificate authority, certificate lifecycle management, CRL/OCSP infrastructure), card management systems, and middleware on user workstations. For web-first organizations, FIDO2 is far simpler. For government and regulated enterprises with existing PKI and Active Directory, PIV integrates more naturally into existing identity management workflows.
FIDO2 credentials are origin-bound: the key will only respond to authentication challenges from the exact origin (domain) for which the credential was registered, making credential phishing to a fake site impossible. PIV certificates are not origin-bound at the protocol level — a malicious VPN or login page can request a valid PIV signature without the user detecting the site is fraudulent. FIDO2's phishing resistance is a genuine security advantage for web authentication.
Each comparison provides a side-by-side analysis covering interface type, chip architecture, security certification, communication protocol, application domains, and cost. Card-vs-card comparisons focus on specific products, while cross-technology comparisons evaluate broader categories like Contact vs Contactless or EMV vs MIFARE.