100%
phishing resistance for passkey-protected accounts (no credential to steal or replay)
80%
of hacking-related breaches involve compromised credentials (Verizon DBIR 2024)
1.4B+
passkeys registered across Google, Apple, and Microsoft platforms by 2025
74%
faster authentication with passkeys vs. password+MFA (FIDO Alliance 2024)

Passkeys are the first authentication technology that is simultaneously more secure and easier to use than passwords. A passkey is a FIDO2/WebAuthn credential: a private key stored on the user's device (protected by biometric or PIN) paired with a public key stored on the server. Authentication requires physical possession of the device and biometric/PIN verification — no password to phish, no OTP to intercept, no push notification to approve-fatigue. CISA and NSA both classify FIDO2 as phishing-resistant MFA, the highest category of authentication assurance. This guide covers what enterprise deployment actually requires.

FIDO2/WebAuthn Architecture: What Passkeys Are

Understanding the cryptographic model is essential for making correct deployment decisions — particularly around device-bound vs. synced passkeys and attestation.

Credential architecture

A passkey consists of a private key stored in hardware (device TPM, secure enclave, or security key) or software (synced credential), and a corresponding public key registered with the relying party (the service or IdP). Authentication is a cryptographic challenge-response: the server sends a challenge, the device signs it with the private key, the server verifies with the stored public key. The private key never leaves the authenticator.

Device-bound passkeys

The private key is bound to a specific hardware authenticator (Windows Hello TPM, Apple Secure Enclave, FIDO2 hardware security key like YubiKey). Cannot be copied or synced. If the device is lost, the credential is lost — requires account recovery. Highest assurance; preferred for privileged and high-sensitivity enterprise use cases.

Synced passkeys

The private key is synchronized across devices via a cloud keychain (Apple iCloud Keychain, Google Password Manager, 1Password). Accessible on any device signed into the same account. More convenient; the credential survives device loss. Appropriate for general enterprise users where the trade-off of cloud keychain access is acceptable.

Platform vs. roaming authenticators

Platform authenticators (Windows Hello, Face ID, Touch ID) are built into the device and use the device's biometric. Roaming authenticators (YubiKey, Feitian keys) are external USB/NFC/Bluetooth devices that can be used across multiple systems. Enterprise deployments typically use platform authenticators for most users and roaming authenticators for privileged users or shared workstations.

Why Passkeys Eliminate Phishing

The anti-phishing property of passkeys is architectural, not behavioral — it does not depend on users recognizing phishing sites.

Origin binding

A FIDO2 credential is registered for a specific origin (e.g., company.okta.com). When authenticating, the browser sends the origin to the authenticator as part of the challenge. If a user is on a phishing site (company-fake.okta.com), the origin does not match any registered credential — authentication fails automatically, without the user needing to notice the URL difference.

No secret to steal

Phishing attacks for passwords harvest the secret (the password) from the victim. For passkeys, the authenticator never sends the private key — it only sends a cryptographic signature. Intercepting a FIDO2 authentication session gives the attacker a signature for a one-time challenge that is worthless for future authentication.

No OTP or push to intercept

Real-time phishing proxies (Evilginx2, Modlishka) can relay TOTP codes in real time from victim to attacker, making TOTP effectively phishable. Passkeys produce a signature tied to the origin of the transaction — the origin mismatch check breaks real-time relay attacks at the authenticator level.

Free daily briefing

Briefings like this, every morning before 9am.

Threat intel, active CVEs, and campaign alerts, distilled for practitioners. 50,000+ subscribers. No noise.

Enterprise IdP Integration

Passkeys are not deployed directly to every application — they are deployed to the Identity Provider, which then provides SSO access to applications. This concentrates the passkey implementation to one system.

Okta

Okta supports FIDO2 WebAuthn as an authenticator factor. Configure WebAuthn as a factor in authentication policies; set it as the required factor for privileged applications and zero-trust access policies. Okta FastPass extends this to device-trust verification alongside the FIDO2 challenge.

Microsoft Entra ID

Entra ID supports Windows Hello for Business (device-bound passkey using Windows TPM), FIDO2 security keys, and Microsoft Authenticator passkeys. Configure Conditional Access policies to require phishing-resistant MFA for privileged roles and sensitive applications. Entra ID's Temporary Access Pass supports bootstrapping passkey enrollment for new devices.

Ping Identity / ForgeRock

Ping Workforce and ForgeRock support WebAuthn authenticator as a factor in adaptive authentication policies. Suitable for heterogeneous environments with mixed IdP deployments.

Google Workspace

Google supports passkeys natively for Google account authentication, and Google Cloud supports FIDO2 for admin console access. For Workspace users, Google's passkey support means end users can enable passkeys on consumer Google accounts used for Google SSO.

Device Management Requirements

Enterprise passkey deployment requires coordination with device management to ensure FIDO2 authenticators are trusted and properly attested.

TPM requirement for Windows Hello for Business

Windows Hello for Business stores private keys in the device TPM. Devices without TPM 2.0 cannot use Windows Hello for Business as a passkey. Verify TPM availability and version across your Windows fleet before planning Windows Hello deployment. Most devices manufactured after 2017 have TPM 2.0.

Attestation verification

Enterprise IdPs can verify FIDO2 authenticator attestation — cryptographic proof of the authenticator model and manufacturer. This allows policies that only permit passkeys from attested authenticators (organization-managed devices with TPM, or approved security key models). Prevents users from registering low-assurance authenticators (unmanaged phones) for privileged access.

MDM enrollment requirement

For platform passkeys (Windows Hello, Apple Face ID), consider requiring MDM enrollment as a prerequisite for passkey registration. MDM-enrolled devices are verified to meet compliance requirements; unmanaged personal devices may not be appropriate authenticators for enterprise access depending on your security policy.

FIDO2 security key inventory

For privileged users who need hardware security keys (roaming authenticators), maintain an inventory of issued keys. FIDO2 security keys should be provisioned and attested by IT, not purchased and self-enrolled by users. Yubikey 5 Series and Feitian EPass support enterprise attestation.

User Migration Strategy: Moving Off Passwords

Passkey deployment is a migration, not a flip-the-switch event. Users need enrollment on managed devices before old credentials are deprecated.

Phase 1 — Passkey enrollment availability

Enable passkey enrollment without requiring it. Promote passkey enrollment via user communications and helpdesk prompts. Track enrollment rates by department. Target high-risk groups first: IT admins, executives, finance, legal.

Phase 2 — Passkey-preferred policies

Configure IdP policies to offer passkey authentication first, with password+MFA as fallback. Users with enrolled passkeys use them; users without continue on existing factors. Monitor which users are still relying on passwords.

Phase 3 — Passkey required for privileged access

Require passkey (phishing-resistant MFA) for Conditional Access policies protecting privileged roles, admin consoles, and high-sensitivity applications. Users without passkeys enrolled are blocked from these access paths — creating a forcing function for enrollment among high-risk populations.

Phase 4 — Password deprecation

Disable password authentication for enrolled users. This is the final step and should follow full enrollment confirmation and helpdesk readiness for account recovery scenarios. Do not rush to this phase; recovery from a large-scale lockout is operationally expensive.

Account recovery planning

What happens when a user loses their only enrolled device? Account recovery must not introduce phishable paths (SMS reset codes defeat the purpose). Options: multiple enrolled devices (phone + security key), admin-issued Temporary Access Pass (Entra ID), or in-person identity verification with helpdesk. Document and test recovery before deprecating passwords.

Legacy Application Compatibility

Not every enterprise application supports WebAuthn natively. Legacy applications using basic auth, NTLM, or Kerberos require bridging strategies.

SSO as the bridge

Applications that support SAML or OIDC federation to your IdP inherit passkey authentication through SSO — users authenticate with a passkey to the IdP, which issues an SSO token to the application. No changes required at the application level.

Application proxy with OIDC front-end

Legacy applications that cannot federate can be fronted by an application proxy (Entra Application Proxy, Okta Access Gateway) that handles OIDC/SAML authentication and passes an appropriate session to the legacy backend.

Password manager bridging for non-SSO apps

For applications that cannot be proxied and require local credential entry, an enterprise password manager (1Password Business, Bitwarden Teams) with passkey-protected vault access is the bridge: the passkey protects the vault, the vault fills passwords into legacy applications. Better than individual user password management; not as clean as true passkey authentication.

The bottom line

Passkeys are the most significant authentication security improvement available to enterprise security teams today. They eliminate phishable credentials by design, reduce authentication friction, and align with CISA and NIST guidance on phishing-resistant MFA. Deployment requires IdP integration, device management coordination, a phased user migration, and account recovery planning. The migration investment is justified by the elimination of credential phishing — consistently the most common initial access vector in enterprise breaches.

Frequently asked questions

What is a passkey?

A passkey is a FIDO2/WebAuthn credential consisting of a private key stored in the user's device (protected by biometric or PIN) and a public key registered with the service. Authentication requires physical device possession and biometric/PIN verification. No password is transmitted; no OTP can be intercepted; the credential is origin-bound so phishing sites cannot trigger successful authentication. Passkeys are the passwordless authentication standard backed by Apple, Google, Microsoft, and the FIDO Alliance.

Are passkeys truly phishing-resistant?

Yes, by architecture. FIDO2 passkeys include the website origin in the authentication challenge. If a user is on a phishing site, the origin does not match the registered credential — the authentication fails automatically without requiring the user to notice the URL. Real-time phishing relay attacks (which work against TOTP and push MFA) are also blocked because the signature is tied to the origin of the specific challenge, making intercepted signatures useless for future authentication. CISA and NSA classify FIDO2 as phishing-resistant MFA, their highest authentication assurance category.

What is the difference between device-bound and synced passkeys?

Device-bound passkeys store the private key in hardware (TPM, secure enclave, YubiKey) and cannot be copied. They provide the highest assurance but require account recovery if the device is lost. Synced passkeys synchronize the private key across devices via a cloud keychain (Apple iCloud Keychain, Google Password Manager) and survive device loss. For enterprise use: synced passkeys are appropriate for general users; device-bound passkeys (hardware security keys or Windows Hello Business with TPM) are recommended for privileged users.

Does my organization need to replace all applications to use passkeys?

No. Enterprise passkey deployment is done at the Identity Provider (IdP) level. Applications that support SAML or OIDC federation to your IdP (Okta, Entra ID, Ping) inherit passkey authentication through SSO without any application changes. Legacy applications that do not support federation can be fronted by application proxies. Only applications that cannot be federated or proxied require alternative strategies, such as enterprise password manager bridging for legacy credential entry.

What happens when a user loses their device with their passkey?

Account recovery for passkey-only users must be planned before deprecating passwords. Options include: (1) enroll multiple authenticators (phone passkey + hardware security key) so device loss does not leave the user locked out; (2) use Temporary Access Pass (Microsoft Entra ID) — an admin-issued short-lived code for re-enrollment; (3) in-person identity verification at helpdesk for re-enrollment on a new device. Recovery paths must not introduce phishable alternatives (no SMS reset codes) or they undermine the passkey's phishing resistance for targeted users.

How do passkeys compare to hardware security keys (FIDO2 keys)?

FIDO2 hardware security keys (YubiKey, Feitian) are a type of passkey — specifically, roaming authenticators with device-bound credentials stored in the key's secure hardware. Platform passkeys (Windows Hello, Face ID) are also passkeys, stored in the device's TPM or secure enclave. The difference: hardware keys are portable across multiple devices and are preferred for privileged users and shared workstations; platform passkeys are more convenient for personal device use. Both are phishing-resistant; hardware keys typically have higher assurance for privileged access scenarios.

Sources & references

  1. FIDO Alliance — Enterprise Passkey Deployment Guide
  2. NIST SP 800-63B — Digital Identity Guidelines
  3. CISA — More Than a Password
  4. Microsoft — Passkeys in Windows

Free resources

25
Free download

Critical CVE Reference Card 2025–2026

25 actively exploited vulnerabilities with CVSS scores, exploit status, and patch availability. Print it, pin it, share it with your SOC team.

No spam. Unsubscribe anytime.

Free download

Ransomware Incident Response Playbook

Step-by-step 24-hour IR checklist covering detection, containment, eradication, and recovery. Built for SOC teams, IR leads, and CISOs.

No spam. Unsubscribe anytime.

Free newsletter

Get threat intel before your inbox does.

50,000+ security professionals read Decryption Digest for early warnings on zero-days, ransomware, and nation-state campaigns. Free, weekly, no spam.

Unsubscribe anytime. We never sell your data.

Eric Bang
Author

Founder & Cybersecurity Evangelist, Decryption Digest

Cybersecurity professional with expertise in threat intelligence, vulnerability research, and enterprise security. Covers zero-days, ransomware, and nation-state operations for 50,000+ security professionals weekly.

Free Brief

The Mythos Brief is free.

AI that finds 27-year-old zero-days. What it means for your security program.

Joins Decryption Digest. Unsubscribe anytime.

Daily Briefing

Get briefings like this every morning

Actionable threat intelligence for working practitioners. Free. No spam. Trusted by 50,000+ SOC analysts, CISOs, and security engineers.

Unsubscribe anytime.

Mythos Brief

Anthropic's AI finds zero-days your scanners miss.