Yubico’s libfido2 and python-fido2 open source libraries provide examples for how to communicate with a FIDO device over USB, and can verify attestation and assertion signatures. Both FIDO U2F (CTAP1) and FIDO2 (CTAP2) protocols are supported on Linux, MacOS, and Windows platforms.
Microsoft Edge announced Web Authentication support which enables FIDO2 devices or Windows Hello users to authenticate without any password on any Windows 10 device, using biometrics or a PIN. The Web Authentication and Windows Hello dev guide will walk through the flow. This guide highlights how to detect if Windows Hello is available on a PC. It also explains how to set the authenticatorAttachment parameter for the best user experience when registering a FIDO2 capable platform, such as Windows 10.
For developers currently supporting FIDO2 security keys using the WebAuthn standard on desktop browsers, checkout this guide Supporting U2F or FIDO2 Security Keys on iOS and iPadOS.
If you wish to interact with a YubiKey via other protocols or want a custom user experience, Yubico provides an iOS SDK for integration into native App Store apps.
Get started with the Yubico iOS SDK here.
Native support for WebAuthn and FIDO is finally here for Android. Yubico provides a comprehensive library for developers to interact with YubiKeys from their Android applications.
Get started with the Yubico Android SDK here.