{"id":29999,"date":"2023-05-09T20:27:12","date_gmt":"2023-05-09T20:27:12","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=29999"},"modified":"2023-06-09T17:55:24","modified_gmt":"2023-06-09T17:55:24","slug":"what-is-a-passkey","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/applications\/what-is-a-passkey\/","title":{"rendered":"What Is a Passkey? The Future of Passwordless Authentication"},"content":{"rendered":"\n<p>Passkeys have the potential to replace passwords for logging in to websites and applications. Instead of using \u201cPassword123!\u201d you could be using your fingerprint, face recognition key, screen lock pin, or even an iris recognition to access your accounts passwordless.<\/p>\n\n\n\n<p>Passkeys are a lot easier to manage and are resistant to <a href=\"https:\/\/www.esecurityplanet.com\/threats\/phishing-attacks\/\">phishing<\/a>, harvesting and other credential attacks, which is why it&#8217;s making its way into the mainstream as a more secure and convenient authentication method. Just last week, Google <a href=\"https:\/\/www.esecurityplanet.com\/applications\/google-passkeys\/\">announced<\/a> that it will support passkeys for Google accounts.<\/p>\n\n\n\n<p>With passkeys, there is no need to remember complex passwords that are difficult to type and can be easily forgotten. They are also more secure than passwords because they require physical presence or knowledge of the user\u2019s device, making them much harder to hack. There are a number of authentication scenarios where passkeys can be used, including mobile devices, computers, and online accounts.<\/p>\n\n\n\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_68_1 ez-toc-wrap-left counter-flat ez-toc-counter ez-toc-custom ez-toc-container-direction\">\n<p class=\"ez-toc-title\">Table of Contents<\/p>\n<label for=\"ez-toc-cssicon-toggle-item-66d6d7fae939f\" class=\"ez-toc-cssicon-toggle-label\"><span class=\"ez-toc-cssicon\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #ffffff;color:#ffffff\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #ffffff;color:#ffffff\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/label><input type=\"checkbox\"  id=\"ez-toc-cssicon-toggle-item-66d6d7fae939f\"  aria-label=\"Toggle\" \/><nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.esecurityplanet.com\/applications\/what-is-a-passkey\/#How-Passkeys-Work\" title=\"How Passkeys Work\">How Passkeys Work<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.esecurityplanet.com\/applications\/what-is-a-passkey\/#6-Benefits-of-Passkeys\" title=\"6 Benefits of Passkeys\">6 Benefits of Passkeys<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.esecurityplanet.com\/applications\/what-is-a-passkey\/#How-to-Create-a-Passkey\" title=\"How to Create a Passkey\">How to Create a Passkey<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.esecurityplanet.com\/applications\/what-is-a-passkey\/#Logging-In-to-Websites-Applications-Using-Passkeys\" title=\"Logging In to Websites &amp; Applications Using Passkeys\">Logging In to Websites &amp; Applications Using Passkeys<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.esecurityplanet.com\/applications\/what-is-a-passkey\/#Passkeys-vs-Passwords\" title=\"Passkeys vs Passwords\">Passkeys vs Passwords<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/www.esecurityplanet.com\/applications\/what-is-a-passkey\/#Passkeys-vs-Passwordless\" title=\"Passkeys vs Passwordless\">Passkeys vs Passwordless<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/www.esecurityplanet.com\/applications\/what-is-a-passkey\/#Top-Passkey-Solutions\" title=\"Top Passkey Solutions\">Top Passkey Solutions<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/www.esecurityplanet.com\/applications\/what-is-a-passkey\/#Are-Passkeys-Here-to-Stay\" title=\"Are Passkeys Here to Stay?\">Are Passkeys Here to Stay?<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/www.esecurityplanet.com\/applications\/what-is-a-passkey\/#Bottom-Line-Passkeys\" title=\"Bottom Line: Passkeys\">Bottom Line: Passkeys<\/a><\/li><\/ul><\/nav><\/div>\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"How-Passkeys-Work\"><\/span>How Passkeys Work<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Passkeys work by using biometric authentication or a unique code to authenticate a user\u2019s identity. There are different types of passkeys, including fingerprint recognition, face recognition, iris recognition, voice recognition, and screen lock pins.<\/p>\n\n\n\n<p>Here\u2019s a brief overview of how each of these passkey approaches works.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">1. Fingerprint Recognition<\/h3>\n\n\n\n<p>Fingerprint recognition uses a device\u2019s biometric sensor to capture the unique patterns of a person\u2019s fingerprints. When a user places their finger on the sensor, the device compares the captured image with the stored image on the sensor, comparing the captured image with the stored fingerprint data to verify the user\u2019s identity. This passkey is a popular and reliable method because fingerprints are unique to each individual and it is difficult to fake or imitate.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">2. Face Recognition<\/h3>\n\n\n\n<p>Facial recognition uses the device\u2019s front-facing camera to capture a person\u2019s face and match it against the stored facial data. This type of passkey uses algorithms to identify specific features of the face such as distance between the eyes and the shape of the jawline. It is is convenient and easy to use but it may not be as accurate as other methods especially in a low light or with changes in appearance such as facial hair or makeup.<\/p>\n\n\n\n<p><strong>See the <a href=\"https:\/\/www.esecurityplanet.com\/products\/facial-recognition-software\/\">Best Facial Recognition Software for Enterprises<\/a><\/strong><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">3. Iris Recognition<\/h3>\n\n\n\n<p>This kind of passkey uses the device\u2019s camera to capture the unique patterns of a person&#8217;s iris, the colored part of the eye surrounding the pupil. Iris recognition technology is very accurate and difficult to spoof because the patterns of the iris are complex and distinctive. Although this method is highly secure and effective, it requires a high-quality camera and may not be as convenient as other methods.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">4. Voice Recognition<\/h3>\n\n\n\n<p>Voice recognition uses the device\u2019s microphone to capture a person\u2019s voice and match it against stored voice data. This passkey method analyzes different vocal factors such as pitch, tone, and accent to identify the user\u2019s voice. It is convenient and can be used in situations where other methods may not work, such as when the user\u2019s hands are occupied. Even though this passkey is convenient, it may not be as secure as other methods because voices can be spoofed by using recordings, impersonations, and vocal sound manipulation technologies \u2014 particularly as AI capabilities continue to improve.<\/p>\n\n\n\n<p><strong>Also read: <a href=\"https:\/\/www.esecurityplanet.com\/threats\/gpt4-security\/\">ChatGPT Security and Privacy Issues Remain in GPT-4<\/a><\/strong><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">5. Screen Lock Pin<\/h3>\n\n\n\n<p>Screen lock pins use a unique code such as a PIN, pattern or mobile password to authenticate the user\u2019s identity. The user must enter the correct code or pattern to unlock the device or website. Screen lock pins are easy to use and can be very secure if the user chooses a strong code. While screen lock pins are convenient and easy to use, they may be vulnerable to attacks such as keylogging, where hackers capture the user\u2019s keystrokes to learn the code.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"6-Benefits-of-Passkeys\"><\/span>6 Benefits of Passkeys<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>As a passwordless authentication solution, passkeys offer a range of benefits that traditional passwords cannot match. From improved security to reduced password fatigue, passkeys could eliminate many of the problems with passwords and transform the way users log in into their accounts and interact with websites and applications. Here are six benefits of passkeys.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">1. Increased security<\/h3>\n\n\n\n<p>Phishing attacks are a common type of cyber attack where hackers use fake emails or websites to trick users into giving away their login credentials. With passwords, users may be more vulnerable to these attacks because they are required to enter their password on a website or in an email, which can be easily intercepted or stolen. Passkeys provide an effective solution to this problem by eliminating the need for users to enter their passwords.<\/p>\n\n\n\n<p><strong>Learn more about <a href=\"https:\/\/www.esecurityplanet.com\/threats\/social-engineering-attacks\/\">Social Engineering Attacks<\/a><\/strong><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">2. Convenience<\/h3>\n\n\n\n<p>Passkeys are a lot easier to manage and faster to use compared to passwords. Users don\u2019t need to remember complicated passwords and they can access their accounts quickly and easily with a single touch or look. This can save time and frustration, especially when users regularly change passwords and access multiple accounts.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">3. Reduced password fatigue<\/h3>\n\n\n\n<p>Password fatigue is the feeling of frustration that comes from having to remember multiple complex passwords (or having to reset them when they&#8217;ve been forgotten). Passkeys can reduce password fatigue since users only need to remember one passkey method to access all their accounts. And the seamless approach of passkeys can improve employee productivity too, with no need for multiple passwords across accounts.<\/p>\n\n\n\n<p><strong>Also see the <a href=\"https:\/\/www.esecurityplanet.com\/products\/single-sign-on-solutions\/\">Top Single Sign-On (SSO) Solutions<\/a><\/strong><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">4. Lower risk of data breaches<\/h3>\n\n\n\n<p>Passkeys can help decrease the risk of data breaches because they eliminate the need for passwords, often the weakest link in a security system. Passwords can be easily guessed or stolen and even found on the Dark Web, but passkeys are much harder to crack. By using passkeys in business, companies can protect their users\u2019 personal information and prevent sensitive data from falling into the wrong hands.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">5. Better user experience<\/h3>\n\n\n\n<p>Aside from enhancing the security of user accounts, passkeys also offer a superior user experience compared to traditional passwords. The seamless user experience can greatly improve customer satisfaction and help businesses retain customers. The simplicity of passkeys can even increase brand loyalty among users. By providing hassle-free login processes, any business can increase brand loyalty and establish a more positive and memorable user experience.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">6. Reduced costs<\/h3>\n\n\n\n<p>Traditional passwords may require businesses to spend considerable resources on password resets, account lockouts and support calls. These issues can be time-consuming and frustrating for users and help desk staff and costly for businesses. Passkeys require less maintenance and support since they utilize biometric data or unique codes. This means that businesses can reduce the amount of time and resources spent on password related issues and put those efforts to better strategic use.<\/p>\n\n\n\n<p><strong>Also Read: <a href=\"https:\/\/www.esecurityplanet.com\/mobile\/multi-factor-authentication\/\">Multi-Factor Authentication (MFA) Best Practices &amp; Solutions<\/a><\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"How-to-Create-a-Passkey\"><\/span>How to Create a Passkey<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Creating a passkey is a straightforward process that involves determining the passkey type, setting it up on your device, testing the passkey, and using it to access your accounts. Here are four simple steps for creating a passkey for a more secure and convenient way to authenticate identity and protect sensitive information:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">1. Determine the type of passkey you want to use<\/h3>\n\n\n\n<p>The first step in creating a passkey is to determine the type of passkey you want to use. There are several types available, including fingerprint recognition, face recognition, iris recognition, voice recognition, screen lock pin, or even smartcards. Choose the one that offers the best combination of security and convenience for the information you are trying to protect.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">2. Set up the passkey on your device<\/h3>\n\n\n\n<p>Once you have determined the type of passkey you want to use, the next step is to set it up on your device. Depending on the passkey type, you may need to enroll your biometric data or set up a unique code. If you are using fingerprint recognition, for example, you will need to enroll your fingerprints on your device. And if you are using a screen lock pin, you will need to create a unique code that only you know.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">3. Test the passkey<\/h3>\n\n\n\n<p>After you have set up your passkey, it&#8217;s important to test it and ensure that it is working correctly. You should try accessing your device or account using your passkey and verify that you are granted access.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">4. Use the passkey to access your accounts<\/h3>\n\n\n\n<p>Once you have set up and tested your passkey, you can use it to access your accounts. Simply follow the prompts on your device, or the website or application you are trying to access to authenticate your identity using your passkey.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Logging-In-to-Websites-Applications-Using-Passkeys\"><\/span>Logging In to Websites &amp; Applications Using Passkeys<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Logging into your online accounts can be a hassle, especially if you have to remember multiple login user credentials with multiple complex passwords \u2014 or repeatedly sign into a <a href=\"https:\/\/www.esecurityplanet.com\/products\/best-password-managers\/\">password manager<\/a> that contains all your passwords. Passkeys will provide you a more convenient and secure alternative. You can use different methods to authenticate your identity that are faster, easier and more repeatable than typing a password. This not only saves time, but also enhances user experience.<\/p>\n\n\n\n<p><strong>See the <a href=\"https:\/\/www.esecurityplanet.com\/products\/best-password-managers\/\">Best Password Managers for Business &amp; Enterprises<\/a><\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Passkeys-vs-Passwords\"><\/span>Passkeys vs Passwords<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Passkeys and passwords are significantly different methods of authentication for accessing websites and applications.<\/p>\n\n\n\n<p>Passwords are a string of characters, typically a combination of letters, numbers and symbols, that are used to authenticate a user\u2019s identity. Passkeys, on the other hand, use unique biometric data or a unique code to authenticate a user\u2019s identity. Passkeys are more secure than passwords because they are more difficult to replicate, making it harder for hackers to gain access to user accounts.<\/p>\n\n\n\n<p>Passkeys are generally considered more convenient than passwords because they do not require users to remember a complex string of characters. They offer increased security and convenience compared to passwords.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Passkeys-vs-Passwordless\"><\/span>Passkeys vs Passwordless<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Passkeys and <a href=\"https:\/\/www.esecurityplanet.com\/trends\/passwordless-authentication-101\/\">passwordless<\/a> essentially mean the same thing &#8211; they provide a convenient and secure way to access digital platforms and services without needing to manage cumbersome passwords. Unlike traditional password-based logins, passkeys eliminate the need for users to remember complex passwords or go through the process of entering them each time they want access to their accounts. Passkeys utilize advanced authentication methods, such as biometrics or hardware-based security tokens, to verify the user\u2019s identity. One of the primary advantages of passkeys is their convenience, as users no longer need to create and remember multiple passwords for different accounts. Passwordless approaches also offer improved security, as traditional passwords are susceptible to various attacks.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Top-Passkey-Solutions\"><\/span>Top Passkey Solutions<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Passkeys are typically based on authentication standards and protocols developed by the FIDO Alliance and the World Wide Web Consortium (W3C), including an API called Web Authentication, or WebAuthn, jointly developed by W3C and FIDO. The FIDO Alliance boasts some of the biggest names in security, authentication, IT, cloud and finance as its <a href=\"https:\/\/fidoalliance.org\/members\/\" target=\"_blank\" rel=\"noreferrer noopener\">members<\/a>.<\/p>\n\n\n\n<p>Many cloud services providers offer support for passkeys, and organizations looking for a solution for their own security needs could turn to a passwordless authentication or identity and access management vendor that supports a passkey approach.<\/p>\n\n\n\n<p>FIDO has certified <a href=\"https:\/\/fidoalliance.org\/certification\/fido-certified-products\/\" target=\"_blank\" rel=\"noreferrer noopener\">hundreds of products<\/a> as part of the FIDO Certified program. Some of the vendor names include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>authID<\/li>\n\n\n\n<li>Aware Inc.<\/li>\n\n\n\n<li>Beyond Identity<\/li>\n\n\n\n<li>HYPR<\/li>\n\n\n\n<li>LoginID<\/li>\n\n\n\n<li>Ping Identity<\/li>\n\n\n\n<li>Thales<\/li>\n\n\n\n<li>Yubico<\/li>\n<\/ul>\n\n\n\n<p><strong>See the <a href=\"https:\/\/www.esecurityplanet.com\/products\/best-iam-software\/\">Best Identity and Access Management (IAM) Solutions<\/a><\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Are-Passkeys-Here-to-Stay\"><\/span>Are Passkeys Here to Stay?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>It is highly likely that passwordless and passkey authentication are the future, as they offer several advantages over traditional password-based authentication. Passkeys have already gained widespread adoption in the form of biometric authentication on smartphones, and many companies are beginning to explore passkey-based authentication solutions for their websites and applications.<\/p>\n\n\n\n<p>Passkeys have the potential to revolutionize the way we authenticate our identities. By eliminating the need for insecure and difficult-to-manage passwords, passkeys can reduce the risk of data breaches and other cyber attacks. They also provide a more convenient and streamlined authentication for users, which can improve customer satisfaction and retention, not to mention employee compliance with security policies.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Bottom-Line-Passkeys\"><\/span>Bottom Line: Passkeys<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>As the world becomes increasingly digitized, the need for secure and reliable authentication grows with it. Passkeys offer a solution that not only improves <a href=\"https:\/\/www.esecurityplanet.com\/networks\/network-security\/\">security<\/a>, but also provides convenience and simplicity for users. If security isn&#8217;t convenient, many users will find ways around it that increase security risks, and that&#8217;s a main reason why there&#8217;s a strong future for passkeys.<\/p>\n\n\n\n<p>With the ability to authenticate using unique biometric data or codes, passkeys are becoming more prevalent in our daily lives. The adoption of passkeys by major tech companies such as Apple, Microsoft, and Google further validates the importance and potential of this authentication method. It is clear that passkeys are here to stay and have the potential to revolutionize the future of authentication.<\/p>\n\n\n\n<p><strong>Read next: <a href=\"https:\/\/www.esecurityplanet.com\/applications\/mfa-advantages-and-weaknesses\/\">MFA Advantages and Weaknesses<\/a><\/strong><\/p>\n\n\n<div id=\"ta-campaign-widget-66d6d7fae67f6-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6d7fae67f6\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6d7fae67f6\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6d7fae67f6\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6d7fae67f6\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6d7fae67f6\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6d7fae67f6\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Passkeys are revolutionizing the way we log in to apps and websites. Learn how they work and their benefits now.<\/p>\n","protected":false},"author":318,"featured_media":30001,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[22],"tags":[5735,2369,3790,7253,32006,26748,31961,2736,730,5277],"b2b_audience":[33],"b2b_industry":[],"b2b_product":[382,31787,394,383,378,404,384,31781,381,31789,31775,392,396],"class_list":["post-29999","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-applications","tag-application-security-2","tag-cloud-security","tag-cybersecurity","tag-multi-factor-authentication","tag-passkeys","tag-password-managers","tag-passwordless","tag-phishing","tag-security","tag-web-security","b2b_audience-awareness-and-consideration","b2b_product-application-security-vulnerability-management","b2b_product-data-breach","b2b_product-email-security","b2b_product-encryption-data-loss-prevention","b2b_product-endpoint-security","b2b_product-hackers","b2b_product-identity-management-privacy","b2b_product-multi-factor-access-management","b2b_product-network-access-control-nac","b2b_product-phishing-and-spear-phishing","b2b_product-web-applications-security","b2b_product-web-security","b2b_product-wireless-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What Is a Passkey? The Future of Passwordless Authentication<\/title>\n<meta name=\"description\" content=\"Passkeys are revolutionizing the way we log in to apps and websites. Learn how they work and their benefits now.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/applications\/what-is-a-passkey\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What Is a Passkey? The Future of Passwordless Authentication\" \/>\n<meta property=\"og:description\" content=\"Passkeys are revolutionizing the way we log in to apps and websites. Learn how they work and their benefits now.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/applications\/what-is-a-passkey\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2023-05-09T20:27:12+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-06-09T17:55:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/05\/esp-what-is-a-passkey.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1400\" \/>\n\t<meta property=\"og:image:height\" content=\"1104\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Kaye Timonera\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kaye Timonera\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/applications\/what-is-a-passkey\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/applications\/what-is-a-passkey\/\"},\"author\":{\"name\":\"Kaye Timonera\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/fe08088ba462401e4aea214869e2fc2f\"},\"headline\":\"What Is a Passkey? The Future of Passwordless Authentication\",\"datePublished\":\"2023-05-09T20:27:12+00:00\",\"dateModified\":\"2023-06-09T17:55:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/applications\/what-is-a-passkey\/\"},\"wordCount\":2153,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/applications\/what-is-a-passkey\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/05\/esp-what-is-a-passkey.png\",\"keywords\":[\"application security\",\"cloud security\",\"cybersecurity\",\"multi-factor authentication\",\"passkeys\",\"password managers\",\"passwordless\",\"phishing\",\"security\",\"Web security\"],\"articleSection\":[\"Applications\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/applications\/what-is-a-passkey\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/applications\/what-is-a-passkey\/\",\"name\":\"What Is a Passkey? The Future of Passwordless Authentication\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/applications\/what-is-a-passkey\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/applications\/what-is-a-passkey\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/05\/esp-what-is-a-passkey.png\",\"datePublished\":\"2023-05-09T20:27:12+00:00\",\"dateModified\":\"2023-06-09T17:55:24+00:00\",\"description\":\"Passkeys are revolutionizing the way we log in to apps and websites. Learn how they work and their benefits now.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/applications\/what-is-a-passkey\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/applications\/what-is-a-passkey\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/applications\/what-is-a-passkey\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/05\/esp-what-is-a-passkey.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/05\/esp-what-is-a-passkey.png\",\"width\":1400,\"height\":1104,\"caption\":\"Silhouette of a key on a futuristic digital circuit background.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/applications\/what-is-a-passkey\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What Is a Passkey? The Future of Passwordless Authentication\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/fe08088ba462401e4aea214869e2fc2f\",\"name\":\"Kaye Timonera\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/kathryn-timonera-150x150.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/kathryn-timonera-150x150.png\",\"caption\":\"Kaye Timonera\"},\"description\":\"eSecurity Planet and Datamation writer Kathryn Pearl Timonera has covered a wide range of industries in her career, including technology, cybersecurity, e-commerce, programming, aviation, finance, insurance, and business, and she managed the marketing team of a full stack development online school. After starting her career as a teacher, Kathryn now applies her talent for presenting information to technology and cybersecurity professionals.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/ktimonera\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What Is a Passkey? The Future of Passwordless Authentication","description":"Passkeys are revolutionizing the way we log in to apps and websites. Learn how they work and their benefits now.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/applications\/what-is-a-passkey\/","og_locale":"en_US","og_type":"article","og_title":"What Is a Passkey? The Future of Passwordless Authentication","og_description":"Passkeys are revolutionizing the way we log in to apps and websites. Learn how they work and their benefits now.","og_url":"https:\/\/www.esecurityplanet.com\/applications\/what-is-a-passkey\/","og_site_name":"eSecurity Planet","article_published_time":"2023-05-09T20:27:12+00:00","article_modified_time":"2023-06-09T17:55:24+00:00","og_image":[{"width":1400,"height":1104,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/05\/esp-what-is-a-passkey.png","type":"image\/png"}],"author":"Kaye Timonera","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Kaye Timonera","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/applications\/what-is-a-passkey\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/applications\/what-is-a-passkey\/"},"author":{"name":"Kaye Timonera","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/fe08088ba462401e4aea214869e2fc2f"},"headline":"What Is a Passkey? The Future of Passwordless Authentication","datePublished":"2023-05-09T20:27:12+00:00","dateModified":"2023-06-09T17:55:24+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/applications\/what-is-a-passkey\/"},"wordCount":2153,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/applications\/what-is-a-passkey\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/05\/esp-what-is-a-passkey.png","keywords":["application security","cloud security","cybersecurity","multi-factor authentication","passkeys","password managers","passwordless","phishing","security","Web security"],"articleSection":["Applications"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/applications\/what-is-a-passkey\/","url":"https:\/\/www.esecurityplanet.com\/applications\/what-is-a-passkey\/","name":"What Is a Passkey? The Future of Passwordless Authentication","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/applications\/what-is-a-passkey\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/applications\/what-is-a-passkey\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/05\/esp-what-is-a-passkey.png","datePublished":"2023-05-09T20:27:12+00:00","dateModified":"2023-06-09T17:55:24+00:00","description":"Passkeys are revolutionizing the way we log in to apps and websites. Learn how they work and their benefits now.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/applications\/what-is-a-passkey\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/applications\/what-is-a-passkey\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/applications\/what-is-a-passkey\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/05\/esp-what-is-a-passkey.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/05\/esp-what-is-a-passkey.png","width":1400,"height":1104,"caption":"Silhouette of a key on a futuristic digital circuit background."},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/applications\/what-is-a-passkey\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"What Is a Passkey? The Future of Passwordless Authentication"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/fe08088ba462401e4aea214869e2fc2f","name":"Kaye Timonera","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/kathryn-timonera-150x150.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/kathryn-timonera-150x150.png","caption":"Kaye Timonera"},"description":"eSecurity Planet and Datamation writer Kathryn Pearl Timonera has covered a wide range of industries in her career, including technology, cybersecurity, e-commerce, programming, aviation, finance, insurance, and business, and she managed the marketing team of a full stack development online school. After starting her career as a teacher, Kathryn now applies her talent for presenting information to technology and cybersecurity professionals.","url":"https:\/\/www.esecurityplanet.com\/author\/ktimonera\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/29999"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/318"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=29999"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/29999\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/30001"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=29999"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=29999"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=29999"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=29999"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=29999"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=29999"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}