Cryptnox SA

Cryptnox FIDO2 White PVC — Customizable Hardware Security Key for 2FA, MFA & Passwordless

The Cryptnox FIDO2 White PVC card is the customizable variant of our basic FIDO2 security card — a single-application FIDO2 NFC smart card on a blank PVC face ready for in-house printing. FIDO Alliance Certified (FIDO2 v2.1 + CTAP Level 1) for hardware 2FA / MFA on compatible FIDO2 / WebAuthn services, subject to each service’s security-key policy. FIDO2-only SKU — no MIFARE, no DESFire, no physical-access-control applet. For corporate IT, MSPs, and resellers needing branded employee credentials.

ORDERS TO THE EU SHIP DIRECTLY FROM THE EU – NO IMPORT DUTIES

 39.00

Tax included. Shipping calculated at checkout.

Description

Customer rating: ★★★★☆ 4.2 / 5 — based on 250 Amazon customer reviews. Read on Amazon.

The Cryptnox FIDO2 White PVC card is the customizable variant of our basic FIDO2 security card — a single-application FIDO2 NFC smart card on a blank PVC face ready for in-house printing. FIDO Alliance Certified (FIDO2 v2.1 and CTAP Level 1), it’s used as a hardware 2FA / MFA second factor on compatible FIDO2 / WebAuthn services (subject to each service’s security-key policy). Passwordless sign-in is supported on the subset of services that have explicitly enabled FIDO2-only login (Microsoft Entra ID, Google Workspace, login.gov, AGOV, etc.).

Designed for branded enterprise rollouts

The blank White PVC face accepts standard ID card printers (dye-sublimation or thermal transfer) — Zebra, Evolis, Fargo, Magicard, Matica. Print employee photo, name, department, company logo, or any combination on each card. Inside, every card carries the same Swiss-engineered FIDO2 chip as our Cryptnox-branded variant. Typical buyers:

  • Corporate IT rolling out 2FA / MFA company-wide with branded employee credentials
  • MSPs and resellers applying client branding for white-label deployments — print client logo, visible asset IDs, QR codes, or inventory numbers on each card to simplify handover, help-desk support, and audit tracking across customer deployments
  • Compliance projects requiring documented FIDO2 hardware with visible card identifiers

Tap to authenticate — on phone or computer

The card supports both NFC and contact (ISO 7816) interfaces. On iPhone 7+ running iOS 13.3+, tap supports FIDO2 over NFC; on Android, external NFC keys are supported mainly as CTAP1 / U2F second-factor authenticators, not for full FIDO2 / passwordless sign-in. On a desktop or laptop, use a contactless smart-card reader or a contact reader. For Windows desktop users on the contact interface, the Cryptnox dual-slot Smartcard Reader features a dedicated “tap” button that electronically simulates card extraction and reinsertion (Windows only). See the click-to-tap tutorial for the full workflow.

How this card differs from the rest of our FIDO2 lineup

  • This card (FIDO2 White PVC): single card, blank printable face, FIDO2 only.
  • FIDO2 (Cryptnox-branded): same FIDO2 capabilities with our standard Cryptnox branding (no in-house printing).
  • FIDO2 White PVC 25-pack: bulk pack of these same cards for enterprise IT rollouts.
  • FIDO2 + MIFARE White PVC: the same printable PVC face but with an additional MIFARE DESFire EV2 applet for physical access control on the same chip — choose this if you want one credential for both web auth and building doors.

What does FIDO2 mean?

FIDO2 is the modern open authentication standard (WebAuthn + CTAP2) for phishing-resistant strong authentication. Most services use FIDO2 cards as a hardware second factor — sign in with your password, then tap the card. A growing set of services (Microsoft Entra ID, Google Workspace, login.gov, AGOV) also support FIDO2-based passwordless sign-in. Backed by the FIDO Alliance — a consortium including Google, Microsoft, Apple, Amazon, and major banks — FIDO2 is the foundation of modern hardware-backed authentication on the web.

New to FIDO2 cards? See our FIDO2 Smart Card guide on cryptnox.com for background, certifications context, and platform compatibility.

Features

Customize the card face for branded employee credentials

The blank White PVC surface is dimensioned to standard CR80 ID card printer specs. You can print:

  • Employee photo, name, department
  • Company logo and color branding
  • QR codes, NFC redirection tags, visible serial numbers
  • Optional laminate overlay for added durability

Most local ID badge services or corporate print departments can run a small batch if you don’t have an in-house printer.

Compatible services

  • Personal accounts: Google, Microsoft, Apple ID, Facebook, X, Dropbox, Bitwarden, 1Password
  • Developer & cloud: GitHub, GitLab, AWS, Cloudflare, Vercel, Fastly
  • Enterprise SSO: Okta, Auth0, Microsoft Entra ID, Google Workspace, Duo, Ping Identity
  • Government identity: login.gov (US), AGOV (Switzerland), SwissID
  • Compliance use cases: helps organizations implement phishing-resistant MFA aligned with OMB M-22-09, NIST SP 800-63B AAL3, PCI DSS v4, NIS2, and DORA — final suitability depends on your identity-provider configuration, authenticator policy, and audit requirements

Why hardware authentication matters

Software passkeys are convenient and may sync through cloud ecosystems (iCloud Keychain, Google Password Manager, Microsoft accounts). They are protected by platform security, but some organizations prefer non-synced hardware authenticators for privileged accounts because the private key remains inside a separate secure element and is not replicated through a consumer cloud account. The Cryptnox FIDO2 White PVC card keeps credentials hardware-bound inside the card’s secure element — not cloud-synced, not remotely exportable.

Easy to use, easy to deploy

  • Tap to authenticate on any NFC-capable phone (iOS for full FIDO2; Android for CTAP1 / U2F second-factor)
  • Contact mode for desktop: insert into any USB CCID-class smart card reader; for Windows, the Cryptnox dual-slot Smartcard Reader tap button streamlines the flow
  • Driverless CCID — works on Windows, macOS, and Linux as a standard USB CCID smart card reader with no extra drivers (FIDO2 sign-in on Linux additionally requires the Cryptnox FIDO2 HID bridge)
  • No charging — passive NFC, no battery
  • No app required for daily use — register once on each service through the standard browser flow. The Cryptnox FIDO2 app is for advanced management only (PIN changes, factory reset, resident-key credentials).

Scaling beyond a single card

For deployments across an organization, see the FIDO2 White PVC 25-pack. For 500+ or pre-printed batches, get in touch via our contact form.

For setup walkthroughs, integration guides, and service-specific tutorials (Google, Microsoft, Apple, GitHub, Bank of America, login.gov, AGOV, SwissID), browse our FIDO2 tutorials hub.

Specifications

Technical specifications

  • Form factor: ISO/IEC 7810 ID-1 (CR80, credit-card size)
  • Card face: blank White PVC, ready for ID card printers
  • Interface: NFC (ISO/IEC 14443 Type A) + contact (ISO 7816)
  • Certification: FIDO Alliance Certified — FIDO2 v2.1 and CTAP Level 1
  • Standards supported: WebAuthn, CTAP2, FIDO U2F (legacy)
  • Secure element: NXP JCOP 4.5 on P71D600 — Common Criteria EAL 5+ augmented with AVA_VAN.5; FIPS 140-3 Overall Level 3 with Physical Security Level 4
  • Power: passive — no battery, energy harvested from the NFC reader’s RF field
  • Operating systems: Windows 10/11 — full FIDO2; iPhone 7+ / iOS 13.3+ — FIDO2 over NFC; Android — external NFC keys mainly via CTAP1 / U2F second-factor (not full FIDO2 / passwordless); macOS — FIDO2 over NFC varies by version and browser; Linux — FIDO2 sign-in requires the Cryptnox FIDO2 HID bridge

Compliance

  • FIDO Alliance Certified (FIDO2 v2.1 + CTAP Level 1)
  • ISO/IEC 7810 (card form factor)
  • ISO/IEC 7816 (contact interface)
  • ISO/IEC 14443 (NFC interface)

Certifications

Chip platform certifications (NXP JCOP 4.5 on P71D600):

  • Common Criteria EAL 5+ augmented with AVA_VAN.5 (highest vulnerability-analysis tier) — NSCIB-CC-0313985
  • FIPS 140-3 Overall Level 3 with Physical Security at Level 4 — NIST CMVP certificate #4679 (validated 2025)
  • AIS-31 compliant True Random Number Generator (chip-level)

Applet certification:

  • Cryptnox FIDO2 / U2F applet: FIDO Alliance Certified — FIDO2 v2.1 + CTAP Level 1

Supported elliptic curve (FIDO2 applet):

  • NIST P-256 (P-256 r1) only — the chip platform supports additional curves, but the FIDO2 applet exposes only NIST P-256

Frequently Asked Questions

Who is the FIDO2 White PVC security key designed for?

This is a blank-surface version of our FIDO2 smart card, intended for organizations that want to customize or brand their hardware:

  • Corporate IT rolling out 2FA company-wide — print each employee’s photo and name before handing the card over
  • Resellers and MSPs — apply your own branding on a FIDO Certified FIDO2 key for white-label deployment
  • Industry events — produce conference-branded FIDO2 keys as functional giveaways
  • Compliance-driven projects — tie a visible card identifier to a documented FIDO2 hardware inventory for audit

The white face is PVC, compatible with standard ID card printers that handle dye-sublimation or thermal transfer printing. The FIDO2 chip and antenna sit inside fixed zones, so printing in the designated card face area doesn’t affect electrical performance.

How do I customize or print the white PVC face?

The card is standard CR80 credit-card dimensions and works with any PVC ID card printer supporting dye-sublimation or direct-to-card thermal transfer. You can design in any card-printing software (CardFive, CardExchange, Badge Designer, or your printer’s native tool), then print text, logo, or employee photo on the printable area — keep clear of the chip module and antenna zones (visible as a raised square near one corner of the card). A thin laminate overlay is optional but extends card life. Before bulk production, run a test card through your printer pipeline and avoid embossing, hole-punching, aggressive heat lamination, or any printing process not approved for ISO 7816 contact smart cards.

For small volumes, a single-card-input desktop ID printer is sufficient. For larger batches, dual-side auto-feed printers save time. If your organization doesn’t own card-printing equipment, most local ID badge services or promotional-merchandise vendors can run a batch for a per-unit fee.

Can I pre-enroll these FIDO2 cards for employees before distribution?

Yes — IT can register each card to the target user’s accounts before handing it over. Typical onboarding-at-scale workflow:

  1. Admin opens the target identity provider (Google Workspace, Microsoft Entra ID, Okta, Duo, etc.) in delegated-admin mode
  2. Sets a temporary PIN on the card and registers it to the user’s account by tapping it on an NFC reader
  3. Labels the card with the user’s name on the printable white face or a removable sleeve
  4. Hands the card to the employee along with the temporary PIN

The employee changes the PIN to their own on first use — either from Windows (Settings → Accounts → Sign-in options → Security Key → Manage) or via the Cryptnox FIDO2 app on a mobile device. The Cryptnox FIDO2 app is for advanced management only (PIN changes, factory reset, resident-key credentials) and is not required for day-to-day sign-in. After PIN setup, only the employee can use the card. Each card stores its FIDO2 keys on-chip, so enrollment is a one-time cryptographic binding and the employee doesn’t need to be present during the initial registration step. Depending on the identity provider, IT may be able to use delegated admin workflows, Temporary Access Pass, or supervised onboarding to assist with registration. Requirements vary by service, and many deployments still require user presence or a user-authenticated session — test the exact IdP workflow before bulk rollout.

OS and browser compatibility: iOS supports FIDO2 over NFC on iPhone 7 and later running iOS 13.3 or newer. Android currently supports only CTAP1 / U2F (FIDO1) for external NFC keys — not FIDO2 / CTAP2. Most major services maintain CTAP1 backward compatibility, so the card works as a U2F second-factor authenticator on Android, but the feature set is reduced and CTAP1 implementations vary. macOS FIDO2-over-NFC support varies by version and browser. Linux browsers expect FIDO2 authenticators on a HID interface — use the Cryptnox FIDO2 HID bridge to present the card to the browser as an HID-FIDO device. Windows 10/11 has full FIDO2 support across all major browsers. Always test with your specific OS + browser + service before rolling out to employees.

FIDO2 hardware security key vs passkey — which do we actually need?

Passkeys and FIDO2 hardware security keys use the same underlying cryptographic protocol (WebAuthn), but they differ in where the private key lives:

  • Passkeys (software) sync through a cloud account — Apple iCloud Keychain, Google Password Manager, Microsoft account. Convenient, but if that cloud account is compromised, every passkey it holds is exposed.
  • FIDO2 hardware security key (this card) stores the private key inside a tamper-resistant secure-element chip that never touches any cloud. A phished attacker cannot clone it remotely — they’d need physical possession of the card and your PIN.

For consumer use (shopping, social media), passkeys are fine. For accounts that absolutely cannot be compromised — admin accounts, crypto exchanges, banking, government portals (login.gov, AGOV, SwissID), NIS2- and DORA-regulated logins — a hardware key is the industry-recommended approach. Many organizations deploy both: passkeys for low-risk logins, this FIDO2 card for privileged accounts.

Does this work for Windows Hello for Business workforce deployments?

Yes — the card is supported by Windows Hello for Business as a passwordless FIDO2 security key since Windows 10 version 1903 (fully in Windows 11), via Microsoft Entra ID (formerly Azure AD).

Standard enterprise deployment:

  1. IT enables the FIDO2 security key policy in Entra ID (Admin center → Protection → Authentication methods → FIDO2 security key)
  2. Optionally allow-lists the card’s AAGUID, or permits all FIDO2 keys
  3. Employees register the card via the Microsoft My Account portal, or IT pre-enrolls on their behalf
  4. At the Windows login screen, employees pick “Sign-in options → Security Key” and tap the card on an NFC reader (or place it on a contactless reader)

This delivers passwordless sign-in for Windows desktops, Microsoft 365, and every Entra ID-federated application. For shift-based and shared-workstation environments (call centers, healthcare, retail), passwordless FIDO2 cuts sign-in to a few seconds per shift change.

Is the Cryptnox FIDO2 card FIPS 140-3 certified?

The Cryptnox FIDO2 applet itself is FIDO Alliance Certified (FIDO2 v2.1 + CTAP Level 1). The underlying secure-element platform on this single-application FIDO2 product (NXP JCOP 4.5 on P71D600) is FIPS 140-3 Overall Level 3 validated with Physical Security at Level 4 — NIST CMVP certificate #4679, validated in 2025. FIPS 140-3 is the latest NIST cryptographic-module standard (it superseded FIPS 140-2 in 2026). The FIDO2 applet does not carry a separate FIPS certification.

What Common Criteria certification does this card carry?

The underlying NXP secure-element platform (JCOP 4.5 on P71D600) is Common Criteria EAL 5+ augmented certified, with AVA_VAN.5 (the highest vulnerability-analysis tier in CC) — Netherlands scheme NSCIB-CC-0313985. AVA_VAN.5 is the same vulnerability-analysis level required for EAL 6+ certifications. The Cryptnox FIDO2 applet runs on top of this certified platform.

Which elliptic curve does the Cryptnox FIDO2 applet use?

The Cryptnox FIDO2 applet performs all cryptographic signing on NIST P-256 (P-256 r1), the curve mandated by the FIDO2 / WebAuthn specification. The underlying chip platform supports additional curves (Brainpool 224/256/320/384/512, NIST P-224 / P-384 / P-521, and Secp256k1) on its ECC coprocessor, but the FIDO2 applet exposes only NIST P-256 to remain spec-compliant.

Select your currency
0
    0
    Shopping cart
    Your cart is emptyReturn to Shop