Products
Buy options
4.21 GBPPlease check product and platform compatibility before placing an order
All pictures shown are for illustration purpose only. Actual product may slightly vary due to product enhancement or other reasons.
USB-A to Lightning adapter
4.21 GBP
Looking to use your FIDO2 USB-A key with your iPhone or iPad ? You'll need our FIDO2 USB-A to Lightning adapter to make it happen! This adapter is specifically designed to connect your FIDO2 USB-A key to your iPhone or iPad's Lightning port, enabling secure and convenient authentication for your iOS device. With its durable construction and easy-to-use design, our adapter ensures a seamless experience every time you need to authenticate with your FIDO2 key.
Additionally, there is another aspect that appears to be more of an iOS GUI glitch. When an iPhone prompts the user to choose the passkey type, users should start using the FIDO2 key without following the on-screen instructions.
We understand that security is a top priority for our customers, and we want to ensure that you have all the information you need to make an informed purchase. If you have any questions or concerns about our adapter or your FIDO2 key, please don't hesitate to contact us.
Blog
21-11-2024
New iOS 18.1 Update Breaks Support for FIDO2.1 Final Keys
The latest iOS 18.1 release has introduced an unexpected issue affecting FIDO2.1 Final keys, rendering them incompatible with the new update. This issue is not limited to Token2's security keys but impacts devices from all manufacturers adhering to the FIDO2.1 final specification.
10-09-2024
Independent Public Security Review of Token2 PIN+ FIDO2 Security Keys
Compass Security Schweiz AG (Compass), a leading Swiss IT security firm, has conducted a comprehensive and independent public security review of the Token2 PIN+ FIDO2 Security Keys firmware.
04-09-2024
Update on EUCLEAK Vulnerability and Chip Security
We want to assure you that we do not use Infineon chips, which are affected by the EUCLEAK side-channel attack recently identified by NinjaLabs. This attack exploits a vulnerability related to the extended Euclidean algorithm (EEA) used in modular inversion.