15B+
Accounts now supporting passkey authentication across Google, Apple, Microsoft, and major SaaS platforms as of 2026
0%
Phishing success rate against passkeys: the WebAuthn protocol cryptographically binds authentication to the origin domain, making credential theft impossible even on fake login pages
CISA
Classifies FIDO2/WebAuthn as the only phishing-resistant MFA tier in its MFA implementation guidance, explicitly above SMS OTP and TOTP
2x
Faster authentication time for passkeys versus password plus MFA in user studies, improving both security and user experience

Passkeys are FIDO2-based cryptographic credentials that replace passwords and traditional MFA with a phishing-resistant authentication mechanism. When a user authenticates with a passkey, their device performs a public-key cryptographic challenge-response that is cryptographically bound to the exact origin domain. A credential entered on a phishing site that mimics your login page provides zero value to the attacker because the passkey protocol refuses to authenticate to any domain other than the one the credential was created for.

This is a qualitative change from every preceding authentication method. Passwords can be phished. SMS OTP codes can be phished or SIM-swapped. TOTP codes can be phished in real-time by adversary-in-the-middle proxies. Passkeys cannot be phished by design, at the cryptographic protocol level.

Google, Apple, and Microsoft have all made passkeys the default authentication method on their platforms. Major enterprise SaaS vendors including Salesforce, GitHub, Okta, and Cloudflare support passkeys. CISA classifies FIDO2/WebAuthn as the only phishing-resistant MFA tier. The question for enterprise security teams is not whether to adopt passkeys but how to deploy them at scale in an environment with legacy systems, diverse device types, and existing MFA infrastructure.

How Passkeys Work: The Technical Foundation

Passkeys are built on the WebAuthn API and CTAP2 protocol, which together constitute the FIDO2 standard. Understanding the technical foundation clarifies both why they are phishing-resistant and what the enterprise deployment requirements are.

During registration, the authenticator (a device with a secure enclave or hardware security key) generates a public-private key pair for the specific relying party (the website or application). The private key never leaves the authenticator's secure hardware. The public key is registered with the relying party. The key pair is cryptographically bound to the relying party's origin (the exact protocol, hostname, and port), which is the mechanism that prevents phishing: the authenticator will only sign authentication challenges for the exact origin to which the credential was registered.

During authentication, the relying party sends a cryptographic challenge. The authenticator signs the challenge with the private key and returns the signature. The relying party verifies the signature against the registered public key. No credential is transmitted: the authentication is a zero-knowledge proof that the authenticator holds the correct private key for that specific origin.

Passkeys exist in two forms. Device-bound passkeys (also called hardware-bound passkeys) live in the device's secure enclave or on a hardware security key (YubiKey, Google Titan). They cannot be exported and are lost if the device is lost. Synced passkeys (also called multi-device passkeys) are backed up through platform sync mechanisms (Apple iCloud Keychain, Google Password Manager, Windows credential storage). Synced passkeys are more convenient but carry different security assumptions because they depend on the security of the sync provider's cloud backup.

Phishing resistance by design

WebAuthn binds credentials to the exact origin domain at the cryptographic level. A passkey created for accounts.google.com cannot authenticate to accounts.google.com.phishingsite.com. No code can be intercepted and replayed.

No shared secret

Unlike passwords and OTP codes, no secret travels across the network. Authentication is a cryptographic proof that the private key exists on the authenticator. Intercepting network traffic yields nothing useful.

Biometric convenience

Users authenticate by unlocking their device with fingerprint, face, or PIN. The biometric unlocks the secure enclave; it does not leave the device and is not transmitted.

Sync vs. device-bound

Synced passkeys balance convenience and security for most users. Hardware-bound passkeys (YubiKey) meet the highest assurance requirements for privileged access but require physical key management.

Enterprise Deployment Architecture

Enterprise passkey deployment requires decisions across three dimensions: authenticator types, identity provider integration, and account recovery procedures.

Authenticator types available in enterprise environments include: platform authenticators (the secure enclave on corporate laptops, iPhones, and Android devices managed through MDM); roaming authenticators (FIDO2 hardware security keys like YubiKey, which can be registered to multiple relying parties and carried between devices); and passkey managers (enterprise password managers like 1Password and Bitwarden that store and sync passkeys independently of the platform sync mechanism).

For most enterprise deployments, the recommended architecture is platform authenticators for enrolled corporate devices with hardware security keys as the backup and privileged access method. Employees with corporate iPhones or MacBooks can use Face ID or Touch ID to authenticate through the iOS/macOS secure enclave. Employees who need to authenticate from shared workstations or who lack a corporate device with a secure enclave use YubiKeys.

Identity provider integration is the architectural centerpiece. Passkey authentication typically flows through the enterprise identity provider (Okta, Azure AD/Entra ID, Ping Identity) rather than directly to each relying party. The IDP handles passkey registration and authentication, then issues an OIDC or SAML assertion to downstream applications through SSO. This centralizes passkey management, allows corporate policy enforcement (which authenticator types are permitted, which users are required to use passkeys), and provides a single enrollment and recovery workflow rather than per-application credential management.

Okta Fastpass, Microsoft Entra ID passwordless (FIDO2 security key and Windows Hello for Business), and Ping Identity's passkey implementation all support this centralized deployment model. Google Workspace supports passkeys for Google accounts with Workspace management controls. Evaluate your existing IDP's passkey support before considering platform changes.

Free daily briefing

Briefings like this, every morning before 9am.

Threat intel, active CVEs, and campaign alerts, distilled for practitioners. 50,000+ subscribers. No noise.

Migration from Legacy MFA

Most enterprises have existing MFA deployments using SMS OTP, TOTP authenticator apps, or push notification-based MFA. The migration to passkeys should be phased rather than cutover, with legacy MFA maintained as a fallback during the transition period.

The migration sequence should start with highest-risk accounts rather than the full user population. IT administrators, finance staff, and executives are the accounts most targeted by phishing and most likely to benefit from phishing-resistant MFA immediately. Rolling passkeys to these groups first reduces the highest-risk population early while allowing enrollment workflows and support procedures to be refined before broad deployment.

Enrollment experience design significantly affects adoption. Self-service enrollment through a guided workflow, with clear explanation of what passkeys are and why the organization is adopting them, produces higher adoption rates than IT-pushed enrollment without user education. Provide employees with a clear answer to 'what happens if I lose my device?' before they begin enrollment, because account recovery anxiety is the most common objection to passkey adoption.

Account recovery procedures must be defined and tested before broad deployment. Passkey account recovery options include: backup hardware security keys registered at enrollment time; IT-administered recovery codes that can be used to reset passkey registration; identity verification procedures that allow IT to re-enroll an employee after device loss; and temporary access provisions for contractors and visitors who lack enrolled devices. The worst outcome of a passkey deployment is accounts locked out due to device loss with no recovery path.

Legacy application compatibility requires attention. Not every application in the enterprise environment will support WebAuthn in the near term. Internal applications built on older authentication frameworks, vendor-supplied applications without FIDO2 support, and legacy SSO implementations may require continued password or OTP authentication during the migration period. Inventory all applications and their WebAuthn support status before committing to a passkey-only policy.

Passkeys for Privileged Access

Privileged accounts, those with administrative access to production infrastructure, cloud consoles, and sensitive data systems, deserve the highest-assurance passkey implementation: hardware-bound FIDO2 security keys rather than synced platform passkeys.

FIDO2 hardware security keys (YubiKey 5 series, Google Titan, Feitian) store the private key on dedicated secure hardware that cannot be exported under any circumstances. Even if the user's computer is fully compromised, the private key cannot be extracted. The key requires physical presence (touching the button on the key) to authorize each authentication, providing a presence attestation that platform passkeys do not require.

For privileged access specifically, CISA's phishing-resistant MFA guidance recommends hardware-bound FIDO2 as the highest-assurance option. Several federal mandates now require phishing-resistant MFA for privileged access to federal systems. Many enterprises are adopting hardware security keys for IT administrators, security engineers, and finance approvers as a privileged access control independent of whether they adopt passkeys broadly for all employees.

Key management logistics require planning at scale. Issue two hardware keys per privileged user: a primary key and a backup. Register both keys to the same accounts before the primary key is the only enrolled credential. Store backup keys in a secure physical location (individual safe or locked cabinet). Define a process for key loss, damage, or compromise that does not create a lockout scenario. For very large teams, consider a key management service that tracks key inventory, assignment, and lifecycle.

Measuring Passkey Deployment Success

A passkey deployment should be evaluated on security metrics, not just enrollment counts. Enrollment percentage alone tells you how many users have passkeys registered, not whether the deployment is actually reducing phishing risk.

Security metrics for passkey deployment include: percentage of authentications using passkeys versus legacy MFA versus passwords (the target is passkey share growing to near 100% for enrolled users over time); phishing simulation click rate for users on passkeys versus users on legacy MFA (a controlled comparison that demonstrates risk reduction); helpdesk ticket volume for account recovery and MFA issues (passkeys should reduce password reset and MFA lockout tickets for enrolled users); and account takeover incidents (the ultimate metric: passkey-enrolled accounts should have near-zero credential-phishing-based compromises).

User experience metrics are also important because poor user experience undermines adoption. Track: enrollment completion rate (what percentage of users who started enrollment completed it?); authentication success rate (passkey authentication should be faster and have higher success rates than OTP entry); helpdesk tickets specifically about passkey issues; and user satisfaction surveys about the authentication experience.

Report these metrics quarterly to demonstrate program value and identify adoption bottlenecks. The security case for passkeys is strong, but sustained organizational support requires evidence of risk reduction that justifies the deployment investment and change management effort.

The bottom line

Passkeys are the first authentication technology in decades that genuinely eliminates phishing as a credential theft vector, not just makes it harder. The enterprise deployment path is well-defined: platform authenticators on managed devices, hardware security keys for privileged accounts, identity provider centralization of passkey management, and phased migration that preserves legacy MFA as a fallback during the transition. The organizations that complete this migration will eliminate an entire class of initial access technique. Those that stay on passwords and SMS OTP will continue to see credential phishing as their top breach vector.

Frequently asked questions

What is the difference between passkeys and FIDO2 security keys?

FIDO2 security keys (like YubiKey) are physical hardware authenticators that store credentials on dedicated secure hardware. Passkeys are FIDO2 credentials that can live either on a hardware security key (device-bound passkeys) or in platform secure enclaves synced through cloud backup (synced passkeys). Both use the same underlying WebAuthn protocol and both are phishing-resistant. The distinction is where the private key lives: hardware security keys require the physical device for every authentication; synced passkeys are accessible from any device signed into the same account (Google, Apple, Microsoft).

Can passkeys be phished?

No. The WebAuthn protocol cryptographically binds each passkey to the exact origin (domain) it was created for. When a user attempts to authenticate on a phishing page that mimics a legitimate login, the authenticator refuses to sign the challenge because the domain does not match. Unlike passwords and OTP codes, there is no credential for the attacker to intercept, replay, or steal from the authentication exchange. This phishing resistance is guaranteed by the protocol, not by user vigilance.

What happens if an employee loses their device with a passkey?

For synced passkeys, the credential is backed up to the platform (Apple iCloud Keychain, Google Password Manager, Microsoft account) and is accessible from any new device signed into the same account after device-level authentication. For hardware-bound passkeys, the credential is lost with the device. Enterprise deployments should require employees to register a backup authenticator (a second YubiKey or a platform passkey) at enrollment time, and define an IT-administered re-enrollment procedure for cases where both authenticators are unavailable.

Are synced passkeys safe for enterprise use?

Synced passkeys are safe for most enterprise applications. They maintain phishing resistance (the protocol binding is device-enforced regardless of sync) and are significantly more secure than passwords or TOTP. The security model depends on the sync provider's account security (a compromised Apple ID, Google account, or Microsoft account could allow an attacker to access synced passkeys from a new device). For privileged access, the additional assurance of hardware-bound security keys is worth the management overhead.

Do all our applications need to support WebAuthn for passkey deployment?

No. The enterprise deployment model uses an identity provider (Okta, Azure Entra ID, Ping) as the central passkey authenticator. Employees authenticate to the IDP using a passkey, and the IDP issues OIDC or SAML tokens to downstream applications through SSO. Applications that support SSO do not need to implement WebAuthn themselves. Legacy applications that do not support SSO will still require their own authentication method during the migration period.

What is CISA's guidance on passkeys and phishing-resistant MFA?

CISA's phishing-resistant MFA guidance classifies authentication methods into two tiers. Phishing-resistant MFA, which CISA strongly recommends, includes FIDO2/WebAuthn (passkeys and hardware security keys) and PKI-based authentication (smart cards). Non-phishing-resistant MFA, which CISA recommends against for high-value accounts, includes SMS OTP, voice OTP, TOTP authenticator apps, and push notifications, all of which can be compromised through phishing or real-time interception attacks. CISA mandates phishing-resistant MFA for federal agencies and strongly recommends it for critical infrastructure operators.

How long does enterprise passkey deployment take?

A phased enterprise passkey deployment typically takes 6 to 12 months from IDP integration through broad user enrollment. The timeline breaks down as: IDP configuration and testing (4 to 8 weeks); privileged user enrollment (2 to 4 weeks); pilot group deployment and support procedure refinement (4 to 8 weeks); broad user enrollment with self-service workflow (ongoing over 3 to 6 months). Organizations with Okta or Azure Entra ID already deployed and a managed device fleet have shorter timelines than those requiring IDP changes or unmanaged device support.

Sources & references

  1. FIDO Alliance: Passkeys Overview
  2. NIST SP 800-63B: Digital Identity Guidelines Authentication
  3. CISA: More Than a Password: Phishing-Resistant MFA
  4. Google: Passkeys in Google Workspace
  5. Microsoft: Passwordless Authentication in Azure AD

Free resources

25
Free download

Critical CVE Reference Card 2025–2026

25 actively exploited vulnerabilities with CVSS scores, exploit status, and patch availability. Print it, pin it, share it with your SOC team.

No spam. Unsubscribe anytime.

Free download

Ransomware Incident Response Playbook

Step-by-step 24-hour IR checklist covering detection, containment, eradication, and recovery. Built for SOC teams, IR leads, and CISOs.

No spam. Unsubscribe anytime.

Free newsletter

Get threat intel before your inbox does.

50,000+ security professionals read Decryption Digest for early warnings on zero-days, ransomware, and nation-state campaigns. Free, weekly, no spam.

Unsubscribe anytime. We never sell your data.

Eric Bang
Author

Founder & Cybersecurity Evangelist, Decryption Digest

Cybersecurity professional with expertise in threat intelligence, vulnerability research, and enterprise security. Covers zero-days, ransomware, and nation-state operations for 50,000+ security professionals weekly.

Free Brief

The Mythos Brief is free.

AI that finds 27-year-old zero-days. What it means for your security program.

Joins Decryption Digest. Unsubscribe anytime.

Daily Briefing

Get briefings like this every morning

Actionable threat intelligence for working practitioners. Free. No spam. Trusted by 50,000+ SOC analysts, CISOs, and security engineers.

Unsubscribe anytime.

Mythos Brief

Anthropic's AI finds zero-days your scanners miss.