All
FAQ
Announcements
Product documents
How do I use a physical security key to protect my account?
Here's how to set it up: Go to okx.com, open the menu, and select Profile & Settings Navigate to Security Center > Passkey > Add Passkey > Use other equipment or external key Follow the prompts to confirm your PIN and complete the binding process Once set up, your hardware key can be used for secure logins, withdrawals, and other sensitive operations.2.Published on Jan 10, 2025Updated on Feb 12, 202617,934CeDeFi Trading FAQ
You approve actions (like sending a transaction) with your device biometric or PIN; your biometric data never leaves the device.How do I create passkey wallet for CeDeFi trading?Published on Jan 29, 2026Updated on Jan 29, 20265Pay passkey setup FAQ
Yes, passkeys require a screen lock method, which you can set up as below: Settings > Security > Screen Lock Add PIN/pattern/password Then enable Fingerprint or Face Unlock (depending on your device)How do I troubleshoot my Pay passkey on iOS and Android systems?Published on Dec 18, 2025Updated on Jan 2, 2026How do I create passkeys? (web)
Select one of the available options to create your passkey: Create with this device Use another device or physical keyCreate with this device Select This Device and complete the biometric authentication/PIN code on your deviceUse another device or physical key Select USB security key Insert your security key and follow the instructions to create your passkey Select A different device Scan the QR code using your mobile device or tablet's native QR code scanner and complete the authentication on yourPublished on Aug 16, 2023Updated on Jan 29, 20264,259How do I create passkeys? (app)
If you want to create your passkey with your current device, select Continue and complete the biometric authentication/PIN code on your device Select Continue to create a passkey with your current device 7.Published on Aug 16, 2023Updated on Apr 6, 202612,936How do I protect my account from Trojan horse takeovers?
Protect devices with strong PINs, biometrics, or secure locks. Refrain from visiting untrustworthy websites or installing unknown software. Use devices and software from reputable sources only. Note: If your email, authenticator, and passkey accounts share the same login, a hacker could compromise all of them at once. Use separate accounts where possible for critical services. Your awareness is your first line of defense.Published on May 30, 2025Updated on Feb 5, 202611
Showing 1-6 of 6 articles