Introducing Soft U2F, a software U2F authenticator for macOS
In an effort to increase the adoption of FIDO U2F second factor authentication, we’re releasing Soft U2F—a software-based U2F authenticator for macOS. Soft U2F currently works with Google Chrome and…
In an effort to increase the adoption of FIDO U2F second factor authentication, we’re releasing Soft U2F—a software-based U2F authenticator for macOS.
Soft U2F currently works with Google Chrome and Opera’s built-in U2F implementations, as well as with the U2F extensions for Safari and Firefox.
When a site loaded in a U2F-compatible browser attempts to register or authenticate with the software token, you’ll see a notification asking you to accept or reject the request. You can experiment on Yubico’s U2F demo site:

And as of today, you can download the Soft U2F installer and configure it for use with your GitHub account.
Interested in learning more? Head over to our Engineering Blog and read more about the motivations for the project plus the security considerations of hardware vs. software key storage.
Written by
Related posts
Changes to GitHub Copilot Individual plans
We’re making these changes to ensure a reliable and predictable experience for existing customers.
Bringing more transparency to GitHub’s status page
Changes to the status page will provide more specific data, so you’ll have better insight into the overall health of the platform.
Developer policy update: Intermediary liability, copyright, and transparency
We’re sharing recent policy updates that developers should know about, updating our Transparency Center with the full year of 2025 data, and looking to what’s ahead.