Passkeys

Passkeys, built on FIDO2 standards, replace traditional passwords with cryptographic key pairs, offering a secure, passwordless login experience while providing robust protection against phishing, credential theft, and other cyber attacks. They rely on two primary components of the FIDO2 framework: WebAuthn and CTAP. WebAuthn allows for passwordless authentication on websites and applications by using public-private key pairs, while CTAP (Client to Authenticator Protocol) enables communication between authenticators—such as USB keys or biometric devices like Touch ID—and web applications.

Passkeys (FIDO2) deliver phishing-resistant, passwordless authentication that meets NIST Authentication Assurance Level 3 (AAL3), ensuring a high level of security. These passkeys can be stored on a variety of devices or hardware security tokens, including smart cards, USB keys, or NFC-enabled devices, granting users seamless access to federal services and other secure applications. By eliminating the risks associated with password reuse and phishing, passkeys represent a significant advancement in digital security. They are an essential part of the evolving landscape of online authentication, enhancing both user convenience and overall cybersecurity.

The Unifyia platform enables the issuance of passkeys (FIDO2) across various form factors, catering to different devices, user preferences, and security requirements. When choosing a form factor, organizations should consider factors such as usability, portability, security, and recovery options. The supported form factors typically include three main categories: platform authenticators (device bound), cross-platform (roaming) authenticators, and digital wallets.

How do Passkeys (FIDO2) Work?

  • Public-private key cryptography: When a user registers for a service using passkeys (FIDO2), the device generates a key pair - a private key that remains securely on the user’s device and a public key that is shared with the service. The private key is never exposed or transmitted, significantly enhancing security.
  • Authentication: To log in, the user verifies their identity using biometrics (e.g., fingerprint, facial recognition), a PIN, a pattern, or a hardware token like a security key. The private key then signs an authentication challenge from the service, proving the user’s identity without sharing sensitive information. The service verifies the signed challenge using the stored public key, confirming the user's identity.