Japan’s April 16, 2026 FSA page matters because it publicly shifts the target from generic MFA to phishing-resistant authentication. The page names passkeys and PKI as preferred examples, rejects email and SMS OTP as sufficient protection against modern phishing and turns an industry-only compliance discussion into a consumer-facing market signal.

Want to learn how top banks deploy passkeys? Get our +90-page Banking Passkeys Report (incl. ROI insights). Trusted by JPMC, UBS & QNB.
Japan’s April 16, 2026 FSA announcement looks modest at first glance. It is not a new law. It is not a direct enforcement action. It does not publish a fresh compliance deadline. Instead, it introduces a public campaign with downloadable leaflets and posters.
What the Financial Services Agency (FSA) did here is move the conversation from an industry/regulatory channel into the public domain. The regulator is no longer only telling banks, brokers and trade associations to strengthen authentication. It is now telling ordinary users that:
That is a major change in tone. And in highly regulated industries like banking, tone often becomes implementation pressure long before the next formal rule text appears.
This public campaign also did not emerge out of nowhere. In its own June 2025 English briefing PDF, the FSA had already warned that ID/password-only authentication is vulnerable and that one-time passwords sent by email or SMS are not effective enough against phishing. Meanwhile, industry coverage in late 2025 described Japan’s market at 64 FIDO Japan Working Group organizations and 50+ passkey providers live or planned, indicating that deployment momentum was already real before the April 2026 public campaign (CNET Japan coverage). For a broader view of how Japanese banks, platforms and regulators have been moving on passwordless, see our passkeys in Japan overview.
The April 16 page is a coordinated public campaign package, not a single press note. It bundles 9 reusable assets (5 PDF leaflets and 4 promotional videos), aligns banks, securities groups and police around the same message and tells consumers that phishing-resistant MFA should replace reliance on passwords plus OTP for high-risk financial journeys.
The official page links 5 PDF leaflets, organized as an overview plus detailed versions of two themes (phishing-resistant MFA and phishing-email awareness):
Alongside the PDFs, the page promotes 4 promotional videos on the same two themes, produced in both drama and manga formats so the campaign can reach different age groups and reading contexts, not only policy readers.
The campaign is positioned as a joint effort by the FSA with:
That breadth matters. This is not a niche securities-only warning. It is a coordinated message across Japan’s retail financial ecosystem.
The key term used in the campaign is
フィッシングに耐性のある多要素認証, meaning
phishing-resistant multi-factor authentication.
The leaflets explain that legacy authentication has fallen behind the current threat model:
The campaign then presents two primary examples of stronger authentication:
That second part is important. Japan is not framing this purely as “everyone must use passkeys.” The regulator is framing the desired outcome as phishing-resistant authentication, and passkeys are one of the clearest consumer-grade ways to get there.
To make that distinction concrete, the FSA’s framing implicitly separates authentication methods like this:
| Method | Phishing-resistant? | User must manually transmit a secret? | Strategic fit in Japan |
|---|---|---|---|
| Password only | No | Yes | No longer defensible for high-risk flows |
| Email OTP / SMS OTP | No | Yes | Transitional only, weak against relay attacks |
| Proprietary app soft token | Partial | Often yes or approval-based | Better than OTP, but still not equivalent to passkeys |
| Passkeys | Yes | No | Best mass-market consumer path |
| PKI / certificate auth | Yes | No | Strong option for higher-assurance or identity-bound use cases |
The materials do not only focus on authentication technology. They also tell users to:
In other words, the FSA is not pretending authentication technology alone solves the entire problem. It is pairing technical countermeasures with behavioral hygiene.
Subscribe to our Passkeys Substack for the latest news.
The April 16 page is new because it changes the public framing, not because it creates a new standalone law. The real development is that Japan’s regulator now publicly explains why passkeys and PKI are better than password-plus-OTP flows, giving financial institutions stronger cover to redesign authentication around phishing resistance.
The April 16 page is new in at least four ways:
Many regulators talk about MFA in abstract terms. Japan’s FSA is doing something more concrete: it is telling the public that passkeys are a stronger defense against phishing and impersonation than older login patterns.
That matters because public naming changes product decisions. Once the regulator names passkeys publicly, financial institutions can justify investment more easily internally:
This is not a subtle implication. The materials state that OTP delivered by email or SMS can still be defeated by:
That is stronger than a generic best-practice note saying OTP is “less secure.” It is the regulator telling the public that OTP-based MFA does not provide meaningful phishing resistance.
Japan is not limiting this to one vertical. Banks, brokers and other financial actors are all part of the same public signal. That increases the odds of broader ecosystem normalization:
This is the most important point.
There is a huge difference between:
The second move reduces the political and UX risk of rollout. A bank or broker can now say: “This is not just our idea; this is the direction the regulator itself is promoting.”
The page does not itself create:
This distinction matters because many readers will overstate the announcement as “Japan just mandated passkeys.” That is not precise enough.
The better reading is:
Japan’s regulator has now publicly aligned with a phishing-resistant authentication model, and passkeys are one of the regulator-endorsed consumer-facing examples.
That is strategically important even if it is not a new rule by itself.
The FSA is right because generic MFA still leaves the main fraud path intact. Password plus OTP adds one more reusable secret, while phishing-resistant MFA changes the protocol so the fake site cannot complete authentication even when the user is tricked into trying.
SMS and email OTP were designed to make credential replay harder. They work against some older attack patterns, but modern attackers do not need to replay a code hours later. They steal it in real time. This matters even more in a market where password reuse in Japan is still extremely high, meaning the first factor is frequently compromised before the OTP step even begins.
That is the central issue with real-time phishing:
In that workflow, the OTP does not stop the attacker. It simply becomes another secret the victim can be tricked into revealing.
Passkeys work differently because they are origin-bound. The credential can only be used on the legitimate site associated with the passkey’s relying party. The technical basis for this behavior sits in the W3C WebAuthn specification and the FIDO Alliance’s passkey documentation, both of which describe the site-bound challenge-response model that prevents a fake domain from reusing a credential created for the real one.
That means a fake domain cannot simply ask the user to “type the passkey” the way it asks for a password or OTP. There is nothing reusable to type, and the browser / operating system checks the site context before the authentication can proceed.
This is why passkeys are central to phishing-resistant authentication:
This is also why the April 16 campaign matters. The FSA is not only saying “use better MFA.” It is pointing toward authentication methods where the phishing site fails at the protocol layer instead of asking the user to detect the fraud manually.
Japan’s campaign also highlights PKI and explicitly mentions that My Number card credentials can be used in authentication contexts.
That is not accidental. Japan has a deeper institutional history with certificate-oriented identity models than many Western consumer markets. So the likely Japanese end-state is not “passkeys only.” It is closer to:
For product teams, that means the right strategic comparison is not “passkeys vs passwords.” It is more like:
April 16 matters because it converts a supervisory trend into a public norm. After the FSA spent 2025 warning that password-only and OTP-heavy authentication were too weak, the April 2026 campaign tells consumers directly what the replacement should look like: phishing-resistant MFA using passkeys, PKI or both.
By 2025 and early 2026, Japan’s financial sector was already moving toward stronger controls after phishing-related account compromise incidents in securities and other online financial services. The backdrop is a string of high-profile data breaches in Japan that have kept account takeover and credential theft on the regulatory agenda. In related FSA materials and later commentary around guideline changes, the regulator made a sharper distinction between:
That difference is everything.
Generic MFA can still leave users vulnerable to:
By contrast, phishing-resistant MFA explicitly tries to block the core fraud path rather than merely add one more hurdle. The April 16 campaign is therefore best seen as a public operationalization of a larger direction already forming in Japan:
At a glance, the progression runs across four milestones in under a year:
With sources, the same progression reads:
In that sense, the page is less “awareness marketing” than it looks. It is the public face of a deeper regulatory and ecosystem shift.
Become part of our Passkeys Community for updates & support.
Japanese financial institutions should treat the April 16 campaign as a raised minimum expectation for login, recovery and high-risk account actions. Once the regulator publicly says email and SMS OTP are not effective enough, weak fallback-heavy MFA becomes harder to defend from a fraud, product and supervisory perspective.
Offering SMS OTP as a fallback while marketing the experience as “secure MFA” is becoming harder to defend. The regulator’s public message now makes a more demanding distinction: phishing-resistant MFA should be the destination. Broader industry work on mandating MFA with passkeys points the same way.
That means organizations should evaluate:
The most sensitive journeys are not only login. In practice, institutions should review each phishable surface:
Many institutions still protect the login page more strongly than the account recovery path. That is backwards. Attackers will use the weakest route available.
Once phishing-resistant authentication becomes the benchmark, recovery becomes the hardest part of the design.
A passkey rollout can still fail operationally if recovery falls back to weak email flows, social engineering or support procedures that reintroduce phishable steps. Japan’s FSA campaign does not solve that design challenge, but it makes it impossible to ignore.
One underappreciated detail from the leaflets is the push toward bookmarks and official apps. That suggests a broader product lesson:
For financial institutions, that means:
Some institutions will respond by strengthening app-based approval and calling the problem solved. That can improve security, but it is not equivalent to passkeys.
Why?
Passkeys matter because they reduce both phishing exposure and user effort.
Once the FSA starts educating consumers directly, laggards become more visible. A firm still relying on password + OTP may soon look outdated relative to peers that offer:
That changes the competitive landscape, not only the compliance landscape.
Most of this is not new territory. The Enterprise Passkeys Guide walks step by step through assessment, stakeholder alignment, integration and testing for large-scale consumer deployments, and 10 Passkey Deployment Mistakes Banks Make compiles the recurring failure modes that rushed banking rollouts keep repeating. What the FSA campaign adds is urgency and public backing, not a new playbook.
Japan’s April 16 campaign helps passkeys in three concrete ways: it frames passkeys as fraud controls rather than convenience features, it broadens the internal stakeholder case for deployment and it teaches consumers that passkeys are part of the secure financial login model the regulator now prefers.
Many consumer passkey rollouts are marketed as:
The FSA’s framing is much sharper:
That is exactly the frame banks and brokers need internally. Security budgets are more easily approved for fraud reduction than for convenience alone.
An authentication project usually has to win support from:
The FSA page gives each of those groups a reason to care:
This may be the most durable effect.
When a national regulator, financial associations and police all present passkeys as a recommended defense, user perception changes. The product team no longer has to introduce passkeys as a strange new feature. They can introduce them as the security method the ecosystem is converging on.
That matters because rollout success often depends less on cryptography than on whether users trust the new flow enough to adopt it.
The FSA campaign does not only land in banking apps used by tech-forward consumers. It covers securities accounts, labor banks, shinkin banks and credit cooperatives, the parts of Japan’s financial system that older and less tech-forward customers rely on day to day. That is strategically important for passkeys. Once those customers encounter passkeys through their broker, labor bank or local cooperative, passkey familiarity spreads well beyond the early-adopter segment and starts to normalize across the full customer base. For consumer passkey adoption in Japan, that is the kind of tailwind no pure marketing budget can buy.
But it cuts both ways. A wider demographic base also means a much wider variety of devices, OS versions, in-app browsers and credential manager behaviors than a tech-forward rollout would touch. That is exactly where native app passkey errors become a production-grade concern, not an edge case. Banks and brokers responding to the FSA signal should plan for device and app-environment diversity from day one, not discover it during post-mandate support surges.
Japan is becoming a useful case study because it combines supervision, public education and ecosystem deployment in sequence. Other markets often revise guidance without explaining the new security model to users, which slows adoption and makes stronger authentication look like isolated product friction instead of a system-wide upgrade.
Many regulators revise guidance but stop short of public education. Japan is showing a different pattern:
That sequence can reduce rollout friction in a way pure policy text often cannot.
Some countries focus too narrowly on “replace SMS OTP.” That helps, but it is incomplete.
Japan’s campaign is better framed because it asks the more fundamental question:
Can this method still be abused when the user is looking at a fake site or a compromised session?
That is the right test.
Japan’s simultaneous emphasis on passkeys and PKI suggests a broader truth many markets will rediscover:
That is especially relevant in regulated sectors with national digital identity programs.
The right response to the April 16 signal is staged migration, not a rushed replacement program. Teams should first map phishable journeys, then decide where passkeys fit immediately, where PKI or stronger identity binding is still required and how recovery can be redesigned without recreating weak phishing-friendly exceptions.
Start with:
Passkeys are often the clearest win for:
Some flows may need:
Do not launch strong authentication without designing strong recovery. Otherwise the organization will just recreate phishable workarounds through support and exceptions.
The FSA’s “use bookmarks / use official apps” message should become part of onboarding and support:
April 16, 2026 was not the day Japan legally mandated passkeys. It was the day the FSA made phishing-resistant authentication a public expectation, publicly downgraded OTP-based security and gave banks, brokers and fintechs a much clearer signal that the long-term destination is passkeys, PKI and other non-phishable login models.
Japan’s April 16, 2026 FSA page should not be misread as “Japan legally mandated passkeys today.” That is not what happened.
But it would be equally wrong to dismiss it as a lightweight awareness page.
What happened is more strategically important:
That is exactly the kind of signal that changes roadmap priorities in financial services.
For Japan, this strengthens the case for wider passkey deployment across banks, brokers and fintechs. For the rest of the world, it is a clear example of how a regulator can do more than set rules: it can reshape the authentication narrative itself.
If there is one takeaway, it is this:
The future state is not “more MFA.” The future state is phishing-resistant authentication. Japan’s FSA is now saying that out loud.
Japan’s FSA has publicly downgraded password-plus-OTP, but regulators naming passkeys is only half the work. Banks and brokers still have to retire phishable fallbacks on fragmented device fleets without locking users out.
Corbado is the passkey analytics platform for enterprise CIAM teams. It adds passkey analytics and rollout controls on top of your existing IDP, so institutions meeting the FSA’s phishing-resistant MFA bar can phase out SMS and email OTP with audit-grade visibility and device-level kill switches, not blind mandates.
See how Japanese financial institutions can roll out phishing-resistant MFA without terminal lockouts. → Talk to a passkey expert
No. The April 16, 2026 page is a public awareness campaign, not a standalone rule text. What makes it important is that the Financial Services Agency publicly and explicitly promoted phishing-resistant multi-factor authentication, highlighted passkeys and PKI as examples, and aligned that message with banks, securities firms and the National Police Agency.
The campaign materials explain that OTPs sent by email or SMS can still be bypassed through real-time phishing, man-in-the-middle attacks and malware. In other words, adding a code is not enough if the attacker can trick the user into entering it on a fake site or steal it from the endpoint.
No. The FSA campaign materials present passkeys and PKI-based authentication as the two main examples of phishing-resistant MFA. That means passkeys are strongly favored, but the broader regulatory direction is toward phishing-resistant authentication outcomes, not a single mandatory consumer technology.
Because it marks a shift from regulator-to-industry signaling to regulator-to-public signaling. Once the FSA starts telling consumers directly that passkeys and PKI protect them better than password plus OTP, Japanese banks and brokers gain stronger cover to redesign customer authentication around phishing-resistant methods.
Next Step: Ready to implement passkeys at your bank? Our +90-page Banking Passkeys Report is available.
Get the Report
Related Articles
Table of Contents