Passkeys
Passkeys are a modern and passwordless authentication method that allow you to authenticate your end-users within a browser.
They are perfect for web flows, as they provide a phishing-resistant, cross-platform login experience using device biometrics.
You can reduce fraud, improve the user experience, reduce drop-off and boost conversions.
We recommend that you use this authentication method if you interact primarily with your end-users in a browser and are looking to replace traditional passwords.
About passkeys
- They offer a phishing-resistant way to authenticate your end-users, using built-in biometrics such as fingerprint or facial recognition.
- They offer a seamless login experience without the need for usernames, passwords or one-time codes.
- They can improve security and usability when your end-users access your services in a browser.
- They can simplify login flows and eliminate password-related risks.
- They work across devices and platforms.
- They work the same way across all countries, making them ideal for businesses operating in multiple markets.
How are passkeys created?
A passkey is made up of two keys:
- Private key: This is securely stored with the end-user.
- Public key: This shared and stored server side (Signicat).
The key pair is created by the end-user's key provider used in their browser. Some examples of key providers are:
- Apple
- Microsoft
- A password manager, for example 1Password
- FIDO2 hardware tokens, for example YubiKeys
Once the passkey key pair has been created by the key provider, the private key is safely stored in the end-user's key provider ecosystem.
As it is managed by the key provider ecosystem, the passkey syncs securely across all of the end-user's devices. This means that your end-users can log in from their phone, tablet, or laptop with ease.
A key provider ecosystem for passkeys refers to entities responsible for creating, managing, storing and synchronising passkeys across devices.
Examples of these entities include Apple iCloud Keychain and Google Password Manager.
What makes passkeys secure?
The Signicat passkeys service is built on three powerful technologies:
- FIDO2: An open security standard supported by Google, Apple, Microsoft, and others.
- WebAuthn: A W3C standard that lets browsers use secure keys instead of passwords.
- Signicat: A European leader in digital identity services; offering reusable digital identities and combining authentication with identity proofing.
Technical flow
Passkey authentication is based on the WebAuthn standard, which is part of the FIDO2 protocol suite.
It uses public key cryptography with a challenge-response mechanism, where the end-user signs a one-time challenge (a nonce) using their private key after biometric verification.
For a high-level explanation of how a passkey authentication works, see the steps below:
- The end-user navigates to a website in their browser, then clicks Log in with passkey.
- They are redirected to the Signicat login page. Here, they click Authenticate.
- Signicat sends a challenge (a nonce) to the end-user's browser. The end-user does not see the challenge.
- The end-user authenticates with biometrics on their device, to unlock the private key that signs the challenge.
- The browser sends the signed challenge to Signicat.
- Signicat verifies the signed challenge with the public key, then redirects the end-user back to the website with the result of the login.
End-user flow
For an example of what the user interface can look like, see the image slider below:
Click to view steps
- The end-user navigates to a website in their browser, then clicks Log in with passkey.
- They are redirected to the Signicat login page. Here, they click Authenticate.
- Automatically, an overlay is shown from their key provider which asks the end-user if they want to log in.
- The end-user authenticates with biometrics on their device.
- Once authenticated successfully, the end-user is logged in.
Try it out
In our quick start guide, you can learn how to use a tool of your choice to make API requests and test out ReuseID with Passkeys authentication:




