What Are Passkeys?
Passkeys enable users to authenticate using just their device and built-in features like biometric recognition, removing the need to remember complex passwords or perform extra steps such as entering a second authentication factor. Passkeys use public-private key cryptography. A public key is stored with the website or app (the relying party). A private key stays securely on your device and is unlocked using your biometrics (like Face ID or fingerprint) or device PIN. When logging in, your device proves you own the private key, without ever sending it over the internet.Origin of Passkeys
Passkeys were developed as part of a broader effort to eliminate passwords and create a safer, simpler way for users to authenticate online. The concept stems from the work of the FIDO (Fast Identity Online) Alliance, a group formed in 2012 by tech leaders like PayPal, Lenovo, and Nok Nok Labs. Their goal was to create open standards that solve the vulnerabilities of traditional passwords, such as phishing, reuse, and data breaches, by using public-key cryptography instead. Over time, the FIDO Alliance introduced FIDO2, a set of protocols that included WebAuthn (a browser API developed with the W3C) and CTAP (Client to Authenticator Protocol). These technologies enabled secure, passwordless logins using devices and biometrics. Passkeys emerged from this foundation, designed as a user-friendly implementation of FIDO2. In 2022, companies like Apple, Google, and Microsoft announced coordinated support for passkeys, allowing them to sync securely across devices via services like iCloud Keychain and Google Password Manager. This collaboration made passkeys a practical and scalable alternative to passwords, moving the world closer to a passwordless future.How Passkeys Work in Practice
- Account Registration: The user registers a passkey with a service. Their device generates a public-private key pair. The public key goes to the server; the private key stays on the device.
- Authentication: When logging in, the service sends a challenge to the user’s device.
- Verification: The device signs the challenge with the private key after biometric or PIN confirmation.
- Access Granted: The server verifies the signature with the public key, proving the user’s identity.



