MARKETPLACE
PLUGINS
BIOPASS (PRO)
BioPass (Pro) logo

BioPass (Pro)

Published January 2026
   β€’    Updated March 2026

Plugin details

BioPass: The Future of Login is Keyless. πŸ”’
Stop forcing your users to remember complex passwords. BioPass brings native WebAuthn support to Bubble, allowing users to log in using FaceID, TouchID, or Windows Hello.

Unlike other solutions that rely on expensive external services (like Magic.link or Auth0), BioPass runs natively in your app. No monthly fees. No API limits.

🟒 BioPass Free (Perfect for Indie Hackers)

Native Biometrics: Register and Login using device hardware.

Client-Side Validation: Fast and easy implementation.

Cross-Platform: Works on iOS, Android, macOS, and Windows.

Smart Error Handling: User-friendly messages (e.g., "User cancelled" instead of error codes).

πŸ”΄ BioPass Pro (For SaaS & Enterprise) Includes everything in Free, plus:

πŸ›‘οΈ Server-Side Verification: Cryptographically validates keys on the Backend (Node.js). Prevents spoofing attacks. Essential for Fintech/Health apps.

✨ Conditional UI (Autofill): The "Magic" login. Users click the email input, and the browser automatically suggests "Sign in with FaceID". No buttons needed.

πŸ“± Multi-Device Support: Users can register multiple devices (e.g., iPhone + MacBook) to the same account.

πŸ”‘ Credential Management: Parse raw JSON to display a "Manage My Keys" list, allowing users to delete specific devices.

⚠️ Requirements:

Your app must be served over HTTPS (WebAuthn security requirement).

Conditional UI requires exposing ID attributes in Bubble settings.


Welcome to BioPass V2: The Enterprise-Grade Passkey Experience! πŸ›‘οΈπŸš€

BioPass has been completely rebuilt from the ground up to bring bank-level biometric authentication (WebAuthn/FIDO2) to your Bubble app. Say goodbye to passwords and hello to a seamless, hyper-secure login experience using FaceID, TouchID, Windows Hello, and Hardware Keys (YubiKey).

🌟 What makes V2 a game-changer?

Enterprise Security Architecture: We've introduced true Server-Side validation. Challenges are now generated, signed, and verified securely on the backend, completely eliminating Replay Attacks.

Device Recognition (AAGUID): BioPass V2 now recognizes exactly what device your user is on! Easily extract and save "Friendly Names" to your database (e.g., Apple iCloud Keychain, Google Password Manager, Windows Hello, 1Password, etc.).

Nameless Login (Discoverable Credentials): Users can now log in with a single click without even typing their email! The browser automatically prompts the user to select their saved passkey.

Sync & Clone Protection: Built-in hardware clone protection (Counters) and detection for Cloud-Synced passkeys vs. Single-Device biometrics.

Bulletproof Compatibility: Fully updated engine compatible with the latest FIDO2 standards and WebAuthn updates.


Demo Test: https://demo-app-56978.bubbleapps.io/version-test/biopass_pro/1768490148813x159970839689172800

Editor: https://bubble.io/page?id=demo-app-56978&test_plugin=1768472728520x796596726430433300_current&tab=Design&name=biopass_free

$15

One time  β€’  Or  $5/mo

stars   β€’   0 ratings
6 installs  
This plugin does not collect or track your personal data.

Platform

Web & Native mobile

Contributor details

NoCoddo logo
NoCoddo
Joined 2025   β€’   68 Plugins
View contributor profile

Instructions

(Step-by-Step Setup)
SETUP (General)

Go to Settings > General and check "Expose the option to add an ID attribute to HTML elements".

Place the BioPass element on your page.

PART A: Registration (Hyrbid Flow)

  - Create a button "Setup Passkey".

  - Run Action: BioPass - Register Passkey.

  - On Event Registration Success:

  - Pro: Run Plugin Action BioPass - Verify Registration (Server). If valid, save the Credential ID and Public Key to your Database (create a new Data Type Passkey).


PART B: Conditional UI (Autofill Login - Pro Only)

  - Give your Email Input the ID Attribute: input_passkey_login (Exact spelling).

  - Create a Workflow: Do when condition is true -> BioPass Registration JSON is not empty (or whenever the input becomes visible).

  - Run Action: BioPass - Start Conditional UI.

  - Result: When the user clicks the email field, the biometric prompt appears automatically.

  - Requirement: The target Input element must have the ID Attribute input_passkey_login.

PART C: Login

On Event Login Success:

Pro: Run Plugin Action BioPass - Verify Login (Server). Verify against the saved Public Key in your DB. If valid -> Log the user in.



πŸ›‘οΈ The Golden Rule of V2 Security:
In BioPass V2, Server-Side Challenges are MANDATORY for backend verification (Verify Registration and Verify Login). While the frontend elements can auto-generate challenges if left blank, your Backend API Workflows must receive the exact challenge used by the frontend to validate the biometric signature.

πŸ› οΈ Step-by-Step: The Perfect V2 Architecture
Step 1: Generate the Challenge (Frontend & UI)

On Page Load (or when the Login/Register popup opens), run the BioPass Client Action to generate/refresh a challenge.

Store this challenge in a Custom State (e.g., Current_Challenge).

When the user clicks "Register" or "Login", run the BioPass - Register/Login action and pass the Current_Challenge state into the Challenge input.

Step 2: Sending Data to the Backend
When the registration_success or login_success event triggers, schedule your API Workflow. You must send:

The JSON output from the BioPass element.

The exact Challenge used (from your Custom State).

The Origin URL (e.g., Website home URL :find and replace /$).

Step 3: 🧩 The Regex Trick (Finding the Right Key during Login)
During login, you need to find the user's Public Key in your database before you can verify it. To do this, you must extract the Credential_id from the Login JSON sent by the frontend:

In your Schedule API Workflow action, pass a text parameter called cred_id.

Set its value to: BioPass's login_json :extract with Regex

Use this exact Regex pattern: (?<="id":")[^"]+

Select :first item.

Step 4: Backend Verification (Verify Login / Verify Registration)
Inside your API Workflow, place the Server-Side verification action:

Expected Challenge: The challenge parameter you passed from the frontend.

Expected Origin: The URL parameter you passed from the frontend.

Stored Credential ID: The cred_id you extracted using Regex!

Stored Public Key: Do a search for Credentials (ID = cred_id) :first item's Public_key.

If Verified = yes, log the user in and update the database counter!

Types

This plugin can be found under the following types:
Element   β€’   Event   β€’   Action

Categories

This plugin can be found under the following categories:
Email   β€’   Mobile   β€’   Technical   β€’   Compliance   β€’   Visual Elements

Resources

Support contact
Tutorial

Rating and reviews

No reviews yet

This plugin has not received any reviews.
Bubble