For IT infrastructure managers, server security is a top priority. By setting up WebAuthn (Web Authentication) in Proxmox VE, you can significantly strengthen security by logging in with FIDO2 security keys or biometric authentication instead of passwords. This guide explains the setup process in detail step by step! — ### 🧩 1. What is WebAuthn? Why is it needed? #### (1) WebAuthn core concept – Passkey-based authentication standard – Uses physical security keys (YubiKey, Google Titan) or biometric authentication (fingerprints, Face ID) – Can replace phishing prevention and two-step authentication (2FA) #### (2) Advantages of applying to Proxmox | Conventional method | After applying WebAuthn | |———–|——————| | Password exposure risk | Hardware authentication required 🔐 | | Inconvenience of entering TOTP code | Connect with a single key press ✨ | | Vulnerable to Brute Force attacks | Uses encrypted authentication requests 🛡️ | > 💡 Required checks before application: > – Proxmox VE 7.4 or later > – FIDO2-supporting security key or biometric authentication device > – Latest versions of Chrome, Edge, Firefox — ### ⚙️ 2. Preparation before setup #### (1) Hardware preparation – FIDO2 key examples: – YubiKey 5 Series (recommended) 🟢 – Google Titan Key 🔷 – Windows Hello (biometric authentication) 👆 – Android/iOS smartphones are also possible for testing purposes (Chrome browser required) #### (2) Check Proxmox system bash # Check Proxmox version pveversion -v # Example result (7.4 or later required): pve-manager/7.4-3/9002ab8a
— ### 🔧 3. Step-by-step setup guide #### (1) Register WebAuthn to the administrator account 1. Log in to Proxmox web UI → Select Data Center
2. Permission
→ User
→ Target user Edit 3. Select WebAuthn in Authentication Method
(Image: WebAuthn option location) #### (2) Register a security key
bash # Run after connecting to the Proxmox server via SSH (root permission) pveum user update <user ID>@pam --webauthn <registration name>
– Actual command example: bash pveum user update admin@pam --webauthn "My-YubiKey"
– Generate key registration QR code after execution #### (3) Bind key on the client 1. Scan QR code on smartphone/PC 2. Click “Register” button and connect key 3. Touch security key or run biometric authentication > ✅ If successful: WebAuthn credential added for user 'admin@pam'
message is printed — ### 🧪 4. Login test and practical example #### (1) Normal operation confirmation 1. Log out of Proxmox and reconnect 2. Enter username → Click “Log in with WebAuthn” button 3. Request security key connection → Touch key/biometric authentication #### (2) Example of mobile device registration (Android) 1. Access Proxmox with Chrome browser 2. Select “Phone” option when scanning QR code 3. Authentication completed on mobile phone → From then on, the mobile phone acts as the security key — ### 🚨 5. Troubleshooting tips #### (1) Frequently occurring errors | Symptoms | Solutions | |——|———–| | Unsupported protocol
| Update browser or use Chrome | | Key registration failure | Re-execute pveum user update
and try again | | Authentication window not displayed | Force refresh of Proxmox web UI cache (Ctrl+F5) | #### (2) Setting up backup authentication bash # Setting up TOTP 2-step authentication in parallel (additional security) pveum user update <user ID>@pam --enable-tfa
> ⚠️ Caution: Be sure to register TOTP or recovery code on the administrator account in case you lose your key! — ### 💎 6. Advanced setup tips #### (1) Registering multiple keys bash # Add a second key pveum user update admin@pam --webauthn "Backup-Key"
– Use as a fallback in case your key is lost/damaged #### (2) Forced removal from CLI bash # Initializing registered keys (in case of emergency) pveum user update <user ID>@pam --delete-webauthn
— ### 🏁 In conclusion Experience the “passwordless authentication” era in your Proxmox environment by applying WebAuthn! Once you complete the initial setup, subsequent logins will be extremely simplified while actually enhancing security. Especially if you register a physical key such as YubiKey and a smartphone at the same time, you can secure both flexibility and security. Set it up today and upgrade your server security! 🚀 > 📢 Checklist: > [x] Purchase FIDO2 key > [x] Verify Proxmox 7.4+ > [x] Enable WebAuthn for admin account > [x] Configure backup authentication method > [x] Complete login test D