Learn how to delete passkeys / discoverable credentials from a YubiKey using ykman CLI or Yubico Authenticator on macOS / Windows. Fix "no storage" errors.
Vincent
Created: February 17, 2026
Updated: February 18, 2026


Looking for a dev-focused passkey reference? Download our Passkeys Cheat Sheet. Trusted by dev teams at Ally, Stanford CS & more.
Executive summary: If your browser says your YubiKey has "not enough space for any more account" while adding a new passkey, you have likely filled the key's FIDO2 discoverable credential storage (resident credentials). Hardware passkeys are stored on the key and therefore capacity-limited. You can free space by listing and deleting resident credentials with ykman (CLI) or via Yubico Authenticator (GUI) - with FIDO2 reset as an irreversible last resort.
The failure mode typically looks like this: you try to create a new passkey on a YubiKey, the browser asks for your FIDO2 PIN and a touch and then you get an error along the lines of "not enough space" / "security key is full" / "no storage anymore." This is almost always the YubiKey telling the browser it cannot store another discoverable credential (resident key).
Why it happens:
The practical consequence is simple: if you are out of discoverable-credential slots, you must delete at least one stored passkey (or perform a reset) before you can add another.
Want to experiment with passkey flows? Try our Passkeys Debugger.
To better understand the distinction between discoverable credentials (resident keys) and non-discoverable credentials (non-resident keys), we recommend to read our dedicated article on WebAuthn resident keys.
This is the shortest path to free up YubiKey passkey storage using the CLI. The steps work on macOS, Windows and Linux.
A quick prerequisite that matters in practice: managing resident keys / discoverable credentials requires a FIDO2 PIN. If you never set one, you will need to set it first (either at registration time or via tooling).
macOS (Homebrew):
brew install ykman
Windows (winget or MSI):
winget install Yubico.YubikeyManager
Alternatively, download the
YubiKey Manager installer from
Yubico's website. On Windows the ykman CLI is bundled with YubiKey Manager and available
from the install directory or via PATH after installation.
Linux (pip or package manager):
pip install yubikey-manager
Verify that ykman runs and can see your key:
ykman --version ykman list
ykman list is the standard "is my key visible?" check (it can also list serials with
--serials).
List the discoverable credentials (passkeys) stored on the key:
ykman fido credentials list
This command is specifically for discoverable credentials stored on the YubiKey. Credential management requires a PIN set on the key.
If you suspect the output is truncated or you want full fields in a machine-friendly format, use the CSV option:
ykman fido credentials list --csv
The --csv flag returns more complete information in CSV format.
Once you identify a credential you no longer need, delete it by providing its credential ID (or a unique substring/prefix):
ykman fido credentials delete <CREDENTIAL_ID_OR_UNIQUE_PREFIX>
Two implementation details matter:
ykman fido credentials delete expects a unique substring match of the
credential ID (so you typically do not need to
paste the full value). The characters before ... are fine--force flag skips confirmation prompts (useful in scripts but riskier
interactively).If you prefer a GUI (or want a safer "click what you mean" flow), Yubico Authenticator can list and delete passkeys stored on the YubiKey:
Igor Gjorgjioski
Head of Digital Channels & Platform Enablement, VicRoads
Corbado proved to be a trusted partner. Their hands-on, 24/7 support and on-site assistance enabled a seamless integration into VicRoads' complex systems, offering passkeys to 5 million users.
Passkeys that millions adopt, fast. Start with Corbado's Passkey Observability & Adoption Layer.
Start Free TrialIf you cannot manage credentials (e.g. you have forgotten the PIN and have no recovery path) or you deliberately want to wipe the key's FIDO registrations, the last resort is a FIDO2 reset.
With ykman, the command is:
ykman fido reset
This wipes all FIDO credentials including FIDO U2F credentials and removes the PIN code. The reset is triggered after reinsertion and requires a touch. There is no way to recover those credentials afterward.
| Method | Pros | Cons | Commands / Steps |
|---|---|---|---|
| ykman (CLI) | Fastest for power users; scriptable; full details via --csv; delete by unique prefix | Requires terminal comfort; easy to delete the wrong credential if not careful; requires PIN | brew install ykman (macOS) or winget install Yubico.YubikeyManager (Windows) then ykman fido credentials list [--csv] then ykman fido credentials delete <id> |
| Yubico Authenticator (GUI) | Safest for most users; shows passkey details (RP ID, user, credential ID); guided deletion | Passkey management only on Desktop/Android; still requires FIDO2 PIN; deletion is permanent for that login | Open app then Passkeys then Unlock (PIN) then select passkey then Delete |
Subscribe to our Passkeys Substack for the latest news.
Why does ykman say "command not found" after installation? On macOS this is
typically a PATH issue. Homebrew installs to /opt/homebrew (Apple Silicon) or
/usr/local (Intel) by default. Add the appropriate brew shellenv line to your
shell configuration and restart the terminal. On Windows make sure the YubiKey Manager
install directory is in your PATH or launch ykman from its install location.
Why does ykman fido credentials list fail or complain about PIN requirements?
Credential management requires that a FIDO2 PIN is set on the key. Set or change the
PIN using ykman ("access" commands) or Yubico Authenticator
then retry listing/deleting.
Why do I not see anything in the Passkeys list even though I am sure the key is "full"? Make sure you are distinguishing passkeys (discoverable credentials) from other FIDO2 credentials. Non-discoverable credentials (non-resident keys) cannot be listed or managed on the Passkeys page even though they still exist as registrations for specific services. If your issue is specifically "storage full" it should correlate to discoverable credentials (the ones you can list and delete).
Can I do this on Windows or Linux? Yes. The ykman CLI and Yubico
Authenticator work on macOS, Windows and Linux. On Windows
install via winget install Yubico.YubikeyManager or download the
MSI installer from Yubico. On
Linux install via pip install yubikey-manager or your distribution's package manager.
Running out of
discoverable credential
slots on a YubiKey is a common issue, especially for users who
register passkeys across many services. The fix is straightforward: use
ykman fido credentials list to see what is stored and ykman fido credentials delete to
remove credentials you no longer need. For a GUI approach,
Yubico Authenticator offers the
same functionality with less risk of accidental deletion. If all else fails,
ykman fido reset wipes everything - but treat it as the nuclear option. For more context
on troubleshooting common passkey errors or
understanding
how hardware security keys compare, check out
our related guides.
Related Articles
Table of Contents