Understand how passkeys and digital credentials complement each other, creating trusted, phishing-resistant digital identities.
Vincent
Created: May 25, 2025
Updated: May 27, 2025
Passkeys | Digital Credentials | |
---|---|---|
Action | π€ Logging into sites/apps | π Showing verified info (ID, skills) |
Phishing | β Strong (Site-specific keys) | β οΈ Varies (Presentation is key) |
Status | π Widely Adopted & Standardized | π‘ Emerging & Evolving |
The digital landscape is changing fast. This change is happening not only because traditional passwords and shared secrets keep failing, but also because attacks like phishing and AI-driven deepfakes are getting much better and harder to spot. These advanced threats can fool even careful users and make old ways of checking identity unreliable. This clearly shows that digital cryptographic proof is the only truly safe way to confirm who someone is. In this tough situation, we urgently need more secure, user-friendly, and cryptographically verifiable ways to interact online. This need has made two key technologies important: passkeys, which are already widely used, and digital credentials, which are just starting out. These technologies don't rely on claims that humans check β which are increasingly easy to fake β but instead use machine-verifiable cryptographic proof to build real trust.
Passkeys saw a big jump in use during 2023-2025, thanks to strong support from major companies like Apple, Google, and Microsoft, plus the FIDO Alliance. Based on the solid W3C WebAuthn standard, passkeys are a basic change from weak, shared secrets. Instead of passwords, they use public-key cryptography. Here, a private key, stored safely on the user's device, signs challenges from the relying party (RP). This proves the user has the key without showing the key itself.
This cryptography makes passkeys very hard to phishβa big plus, as phishing attacks get trickier, sometimes using deepfakes to look more real. Because a passkey is tied to the specific website or app it was made for, users can't accidentally use it on fake sites. This is a common problem with older login methods that are open to such advanced tricks. Passkeys also stop password reuse and the dangers of credential stuffing after data breaches. More than just security, passkeys make logging in much better: it's faster, often just needing a biometric scan (like Face ID or fingerprint), so users don't have to remember or type long passwords. This mix of better security and ease of use has made them popular quickly.
At the same time, digital credentials, often kept in digital identity wallets, have become much more talked about. The EU Digital Identity Wallet (EUDI Wallet) is a good example of this trend.
Unlike passkeys, which are mainly for authentication (proving who you are by showing you control a private key), digital credentials (based on standards like W3C Verifiable Credentials (VCs) or ISO mdocs) are about cryptographically verifiable attestation (proving what is true about you with digitally signed claims). Being able to strongly verify these claims is important, especially now that deepfakes can create convincing fakes of traditional evidence. Without cryptographic checks, even experts can find it hard to tell what's real. They let people digitally carry and show verified info β like their name, birth date, driver's license, education, or job certificates β in a way that's cryptographically secure, respects privacy (by letting users share only what's needed), and can be checked by machines.
The rise of both these technologies isn't a coincidence. It shows a wider move in the industry away from centralized, password-based identity systems to a more decentralized, user-focused model built on cryptographic trust. Passwords are a known weak spot in online security. Old ways of sharing identity details are often clunky, unsafe, or share too much data, harming user privacy. Passkeys fix the authentication weakness directly. Digital credentials deal with sharing attributes securely and with user control. Both use similar cryptography and increasingly depend on platform integration and secure hardware, showing a joint effort to make our digital identity systems much better.
While passkeys handle the "login" and digital credentials handle "proving attributes," they use similar cryptographic basics and play complementary parts in setting up trusted digital interactions. This is something we really need, as current threats like tricky phishing and deepfakes make older, non-cryptographic ways of checking identity unsafe. This brings us to the main question: How do passkeys and digital credentials connect, and how can they work together in everyday user situations?
This article explores this synergy. We will examine their differences and similarities, the protocols that enable them, their shared reliance on secure hardware, and how they can interlock in scenarios like user onboarding, login with step-up authentication, and device migration. We will also touch upon how emerging browser standards like the Digital Credentials API aim to bridge these worlds. This piece focuses specifically on the interplay between these technologies, complementing the more in-depth technical exploration of the Digital Credentials API already available.
To understand how passkeys and digital credentials can work together, it's essential first to grasp their distinct characteristics and the technological layers that underpin them.
The following table provides a high-level comparison:
Feature | Passkeys | Digital Credentials |
---|---|---|
Primary Purpose | Authentication (Proving who you are by demonstrating control of a private key) | Attestation/Authorization (Proving what is true about you via signed claims; can also be used for authentication) |
Core Technology | FIDO2 Standards | W3C Verifiable Credentials, ISO mdocs (e.g., 18013-5, 18013-7), OpenID4VC (OID4VP/OID4VCI) |
Data Conveyed | Cryptographic proof of key possession (Assertion) | Signed Claims/Attributes (e.g., Name, Date of Birth, Address, Qualification, Age over 18) |
Typical Interaction | Login / Sign-in / Authentication | Presenting Proof / Sharing Data (e.g., Age verification, KYC check, showing a license, proving a qualification) |
Key Cryptography | π Asymmetric Key Pair: Private key signs authentication challenges. | π Asymmetric Key Pairs: Issuer private key signs VCs; Holder private key signs presentations. |
User Experience Goal | β Fast, frequent, low-friction login | β Secure, selective, consent-based data sharing |
Device Binding | β mostly synced (in progress) | β Issuer controlled (sensitive keys device-bound) |
Phishing Resistance | β High (Origin-bound credentials prevent use on fake sites) | β Variable (Presentation flow matters; VC data itself is verifiable but presentation context can be phished if not careful. Protocol design (e.g., origin binding in APIs) aims to mitigate this). |
Trust Anchor / Source of Truth | β RP's binding of identity to public key during registration; Authenticator security. | β Issuer's authority & cryptographic signature; Issuer's public key infrastructure. |
Standardization Maturity / Interoperability | β High (WebAuthn/CTAP2 well-adopted) | β Mixed (VC data model stable; Presentation/Issuance/API protocols evolving, fragmentation exists) |
Offline Capability | β None | β Yes (Designed for offline presentation, e.g., mDL via NFC/BLE) |
Revocation Mechanism | β RP deletes public key record; User removes from authenticator. | β Issuer publishes status (e.g., status lists); Verifier checks status; Holder deletes VC. |
Enrollment Friction | β Low (Often integrated into login/signup) | β High (Separate wallet setup) |
Adoption Rate (May 2025) | β 95 %+ | β < 1 % |
This comparison highlights that while both leverage cryptography for trust, their primary functions and typical usage patterns differ significantly. Passkeys are optimized for frequent, secure authentication, while digital credentials excel at providing verifiable attributes with user consent.
Passkeys are brought to life through the interaction of several key standards:
devicePubKey
and
supplementalPubKeys
extensions, tried to solve this but were later dropped. The
FIDO Alliance's trust signal working group is now developing
replacements. The main idea here is that an authenticator with a
synced passkey could also create and use a
second key pair that's tied to the device. During authentication, the authenticator
could then provide signatures from both the main synced key and this second device-bound
key. This would let RPs recognize a specific trusted device. This could mean less
friction (e.g., skipping extra challenges) even if the main passkey is synced across
many devices, all without losing the main benefit of synced passkeys: usability across
devices. While there's no final standard for this yet, such a feature would meet a key
need for RPs requiring high assurance, letting them better spot new device use or meet
internal
Strong Customer Authentication (SCA)
rules.Similarly, the digital credential ecosystem relies on a set of protocols and emerging APIs to function:
Despite their different purposes and protocols, passkeys and digital credentials share fundamental building blocks:
The use of the same secure hardware elements (TPM, Secure Enclave, Android's hardware-backed Keystore) for both passkey operations and potentially for securing the private keys within digital wallets creates significant synergy. Platforms don't need separate secure chips for each function. Instead, they can use a single, strong hardware base and related operating system APIs (like those for the Android Keystore or Apple's Secure Enclave) to strongly protect both authentication credentials (passkeys) and attestation credentials (VCs). This makes development easier, improves security consistency, and uses existing platform investments well.
Furthermore, the browser's Credential Management API (navigator.credentials) is a key organizing layer. First extended by WebAuthn for passkeys, it's now being further extended by the Digital Credentials API for VCs. This points to a clear plan: give RPs one main way to ask for different credentials, and give users a familiar way to pick them (like through Android's credential manager or built-in browser password managers). This would hide the complex technical details of protocols like CTAP, OID4VP, and ISO, making things easier for developers and users.
From a Relying Party (RP) perspective, understanding how to integrate and leverage passkeys and digital credentials effectively is crucial for enhancing security, improving user experience, and meeting regulatory requirements. This section analyzes how RPs can deploy these technologies across different common scenarios and ecosystems.
The optimal integration strategy for passkeys and digital credentials varies significantly based on the specific use case and its associated risk profile and requirements. The following table provides a high-level comparison across common scenarios:
Ecosystem Scenario Comparison
Scenario | Goal | Passkey Role | VC Role | Friction Tolerated | Device Binding? |
---|---|---|---|---|---|
E-Comm / General | Speed & Base Security | β Primary Login (2FA) | none | π’ Low | β No |
High Assurance / MFA | Strong Auth & ID Proofing | β Primary Login (2FA) | π KYC / Onboard / Recovery | π‘ Medium | β No |
Payment Auth | Fast & Secure Payment Conf. | β Primary Login (2FA) | π KYC / Onboard / Recovery | π’ Very Low | β No |
Banking (Non-SCA) | High Security / Fraud Reduction | β Primary Login (2FA) | π KYC / Onboard / Recovery | π‘ Medium | β Optional |
EU SCA Compliance | Regulatory Compliance | β Core SCA Factor | π KYC / Onboard / Recovery | π΄ Higher (Mandated) | β Yes |
EU EUDI Wallet mandate* | Regulatory Compliance & Privacy | β Pseudonym Key (WebAuthn) | π PID (Person ID Data) / Qualified Attributes (On Demand) | π‘ Medium | β Yes (WSCD Attested) |
Legend:
This comparison provides a quick overview; the following sections delve into the specifics of each scenario from the RP's integration perspective.
Navigating this evolving landscape requires strategic planning. Here are key considerations for Relying Parties (RPs)
For RPs, the main action today should be to enable and encourage passkey use for authentication. Passkeys are standardized, widely supported by platforms, and offer immediate, big benefits in security (phishing resistance) and user experience (faster, easier logins). This means less reliance on passwords and insecure MFA methods like SMS OTPs. It can also lower support costs from password resets and account recovery. Aiming for wide passkey use sets up a modern, secure base for user authentication. While adoption might be slow at first, teaching users about the benefits beforehand and making signup easy can help get them started.
While passkeys themselves offer a significant step towards robust authentication and can meet Strong Customer Authentication (SCA) requirements, some organizations may have internal compliance frameworks with even stricter interpretations or specific concerns, particularly regarding synced passkeys. For Relying Parties (RPs) facing such scenarios where compliance departments seek further assurances, it's useful to know that additional measures can complement passkey deployments. These can help address perceived SCA gaps or satisfy those heightened internal requirements. One common strategy is to leverage device trust signals, an approach taken by services like PayPal.
PayPal, for instance, allows users to mark a device as "remembered" as described on their help page:
"A remembered device is a personal web or mobile browser, or mobile device used to get into your PayPal account that we remember after we successfully confirm your identity. This makes it easier to log in, pay, and take other actions with your PayPal account because the device works as one of the two factors needed for SCA."
This means that if a user logs in with their password (something they know) from a remembered device (something they have), PayPal may consider this sufficient for SCA in many cases. However, they also state, "There might be instances where we still ask you for another verification to ensure your account is secure." This could involve sending a one-time passcode via SMS or prompting for confirmation via the PayPal app.
This approach allows for a smoother user experience on trusted devices while still providing mechanisms for step-up authentication when risks are higher or regulations demand it. RPs can consider similar models, where a combination of primary authentication (like a passkey) and device trust (potentially managed outside of WebAuthn's direct mechanisms if needed) can help bridge SCA compliance gaps. However, for a more integrated and standardized approach to device-specific trust signals within the WebAuthn framework itself, attention turns to ongoing developments in that space.
Regarding such WebAuthn-integrated approaches for stronger device trust, RPs in
high-security environments should understand the history and future direction. Past
WebAuthn extension proposals, like devicePubKey
and supplementalPubKeys
, aimed to
provide these device-specific trust signals. These were attempts to address the security
considerations of synced passkeys, which, while offering crucial usability for mass
adoption, introduce different risk profiles (e.g., reliance on cloud account recovery)
compared to device-bound keys. The idea behind such extensions was to let RPs get an extra
layer of assurance by checking a signature from a key specifically bound to the physical
device being used, even when the main passkey itself is synced.
Although these specific extensions (devicePubKey
and supplementalPubKeys
) have been
discontinued, the challenge of obtaining stronger device-binding signals for synced
passkeys persists. RPs should therefore monitor the development and standardization of
follow-up solutions in this space. Such solutions could help RPs better judge risk
(e.g., telling a login from a known, trusted device from a newly synced one) without
forcing all users to use less convenient device-bound passkeys. This context presents RPs
with a more complex choice than just "synced vs. device-bound." Synced passkeys (usually
AAL2-compliant) offer the most convenience and best chance for
adoption, vital for consumer apps. Device-bound passkeys (possibly
AAL3) give the highest assurance but can be harder to use. The goal
of the discontinued extensions was to find a middle wayβimproving security for synced keys
by adding back a device-specific trust signal. This could help reduce some risks if the
cloud sync is compromised, without losing all the convenience of syncing. RPs should
therefore look for follow-up solutions that aim to do this. The best strategy will
depend on an RP's specific risk tolerance, user base, and how mature any new standards
become.
Beyond the specific mechanisms within WebAuthn for device trust, some Relying Parties (RPs)βparticularly those in sectors like banking, insurance, and payment servicesβare beginning to evaluate digital credentials (Verifiable Credentials, or VCs) as a complementary, or even next-step, component in their identity and security strategies.
A significant factor driving this interest is the robust device binding often associated with digital credentials, especially when managed within secure digital identity wallets. These wallets can leverage hardware-backed security (like Secure Enclaves or TPMs) to protect the credentials and the private keys used to present them. Issuers and wallet providers can also enforce policies that make certain high-value credentials inherently device-bound, offering a level of control that is attractive for high-assurance scenarios.
It's crucial to recognize that while this enhanced device-binding capability is a compelling feature for these RPs, the primary purpose of digital credentials (attestation of attributes and claims) is distinct from that of passkeys (user authentication). Passkeys confirm who the user is, while digital credentials confirm what is true about the user. Despite this fundamental difference in purpose, the strong security characteristics of wallet-held VCs make them an area of active consideration for RPs seeking to layer additional assurances. This naturally leads the discussion towards the providers of these digital identity wallets and the ecosystem that enables the issuance, storage, and presentation of such credentials.
While passkeys offer direct authentication, digital credentials (VCs) are managed and presented to Relying Parties through digital identity wallets. These wallets, whether native platform solutions (like Apple Wallet, Google Wallet) or third-party applications (such as the EUDI Wallet), are evolving to use emerging browser standards like the Digital Credentials API for smoother online identity verification (e.g., age checks, sharing digital ID attributes).
The detailed mechanics of different wallet types, specific platform strategies for VC integration (including Apple's mDoc focus for browser interactions versus Android's broader OpenID4VP support via its Credential Manager), how these wallets facilitate attribute attestation, and the entirely separate considerations for any payment functionalities are complex topics. These are explored in-depth in our upcoming complementary article: Digital Credentials and Payments.
This current article maintains its focus on the foundational interplay between passkeys for authentication and the general role of digital credentials for attesting attributes.
Passkeys and digital credentials, while different in their main purpose, represent two pillars of a modern, more secure, and user-focused digital identity future. Understanding how they relate and can support each other is key for building the next wave of online services.
Based on the current state and trajectory of these technologies, two key actions stand out for Relying Parties:
Looking ahead, we can expect more convergence and improvements:
Getting to this integrated future will need more work on standards, how platforms support them, and how apps use them. By using passkeys now and thoughtfully adding digital credentials, organizations can be ready for this shift to a digital world that's passwordless and gives users more control over their data.
Enjoyed this read?
π€ Join our Passkeys Community
Share passkeys implementation tips and get support to free the world from passwords.
π Subscribe to Substack
Get the latest news, strategies, and insights about passkeys sent straight to your inbox.
Table of Contents