A practitioner guide for bank CISOs: the 10 most common passkey deployment mistakes in banking - from wrong rpID to lockouts - with concrete fixes.
Vincent
Created: February 19, 2026
Updated: February 19, 2026

The banking sector is at a critical juncture, transitioning from legacy passwords and OTPs to phishing-resistant passkeys. For CISOs and Product Owners this is an existential necessity driven by phishing and rising infrastructure costs. However, banking deployments face unique hurdles: strict regulations (e.g. PSD2/SCA), legacy infrastructure and extreme device diversity.

Want to learn how top banks deploy passkeys? Get our +90-page Banking Passkeys Report (incl. ROI insights). Trusted by JPMC, UBS & QNB.
This guide synthesizes insights from global deployments. It argues that success depends on mastering the "last mile" of user adoption. While infrastructure-focused rollouts often stall at <1% adoption, product-led approaches can achieve >50% quickly.
Strategic imperatives:
Banks don't have the luxury of "moving fast and breaking things." You operate with zero tolerance for fraud and strict oversight. Deploying passkeys in this environment introduces specific friction points that other industries don't face.
In the password world, your server logs told you everything. You knew exactly why a login failed (wrong character, expired credentials). With passkeys, the authentication happens on the user's device. If a face scan fails, a user cancels the prompt or the Bluetooth handshake drops, your server sees nothing but a generic error.
Banking reality: Fraud and Risk teams suddenly lose their "eyes" on the authentication attempt. Without new, purpose-built telemetry on the client side, you are flying blind during a rollout, unable to tell if a spike in failures is a technical bug or an attack.
Regulators (PSD2/SCA) require two distinct factors: something you know/are and something you have (possession).
Banking reality: Passkeys synced to the cloud (i.e. iCloud Keychain or Google Password Manager) blur this line. If a key is synced to an iPad, a MacBook and an iPhone, does the user physically "possess" a specific device? Legal and Compliance teams often block rollouts because they can't verify "possession" in the traditional hardware sense, forcing teams to build complex "device binding" workarounds that hurt UX.
A SaaS company can drop support for older browsers. A bank cannot. Your customers range from digital-native 18-year-olds to 80-year-olds using budget Android devices that haven't been updated in years.
Banking reality: The Android ecosystem is a minefield. Samsung devices often default to "Samsung Pass" which blocks smooth passkey creation on Android. Corporate customers work behind firewalls that could block the WebSocket connections required for cross-device (QR code) logins. A "standard" implementation that works on a QA iPhone will fail for thousands of real-world customers, leading to immediate support queue overflows.
If a Spotify user loses their account, it's annoying. If a banking customer loses access, they can't buy groceries.
Banking reality: Passkeys rely on the ecosystem (Apple/Google). If a user gets locked out of their Apple ID, they lose their passkeys. If you have removed passwords without building a robust recovery path (like ID verification), you risk permanently locking customers out of their accounts. The fear of this scenario paralyzes decision-making in banking rollouts.

Want to learn how top banks deploy passkeys? Get our +90-page Banking Passkeys Report (incl. ROI insights). Trusted by JPMC, UBS & QNB.
Here is an overview of the 10 most common mistakes we see banks making when deploying passkeys:
The mistake: Teams upgrade their Identity Provider (IdP) to support FIDO2, enable the feature flag and consider the project complete. They treat passkeys as a backend commodity rather than a frontend product journey.
The impact: Adoption stagnates at <1% as users fail to discover or understand the feature. Banks see zero ROI on SMS cost reduction or fraud prevention because the vast majority of logins remain on legacy methods.
The fix:
The mistake: Different business units (e.g. Retail, Wealth, Corporate) deploy passkeys on disparate subdomains (e.g. retail.bank.com, wealth.bank.com) without a unified anchor.
The impact: Passkeys are origin-bound to prevent phishing. A passkey created for Retail will not work for Wealth, forcing users to register multiple credentials for the same bank. This fractures the UX and dilutes the "phishing-resistant" promise.
The following diagram shows the different Relying Party ID (rpID) possibilities a bank typically faces:
The fix:
bankgroup.com) early.The mistake: Launching without granular visibility into client-side WebAuthn events. Teams rely on server-side logs (HTTP 200/400), which cannot see what happens on the device (e.g. user cancellation, biometric failure, OS errors).
The impact: Undiagnosable failure spikes. When users report errors like "Operation Interrupted" (seen in Japanese rollouts), the bank cannot distinguish between a Samsung firmware bug, a user error or a network block, leading to support overload.
A production-grade passkey deployment should track at minimum the following client-side telemetry events:
Authentication funnel events:
| Event | Description |
|---|---|
auth_viewed | User lands on the authentication interface |
auth_method_selected | User chooses authentication method (passkey, password, OTP) |
auth_attempt | WebAuthn ceremony initiated |
auth_challenge_served | Server responds with challenge |
auth_challenge_completed | User completes biometric / PIN verification |
auth_success | Token issued, session established |
auth_failure | Access denied with specific error code |
Error classification signals:
| Error type | Meaning | Action |
|---|---|---|
NotAllowedError | User dismissed prompt or timeout | Expected - monitor rate |
AbortError | Navigation / re-render during ceremony | Bug - investigate frontend |
SecurityError | Context or policy mismatch | Config issue - check rpID / origins |
InvalidStateError | Duplicate registration or state mismatch | UX issue - check enrollment flow |
UnknownError | Platform / authenticator failure | Platform bug - segment by OS version |
Device and authenticator context (captured per event):
For a complete guide on passkey analytics and authentication analytics, see our dedicated articles.
The fix:
Igor Gjorgjioski
Head of Digital Channels & Platform Enablement, VicRoads
Corbado proved to be a trusted partner. Their hands-on, 24/7 support and on-site assistance enabled a seamless integration into VicRoads' complex systems, offering passkeys to 5 million users.
Passkeys that millions adopt, fast. Start with Corbado's Adoption Platform.
Start Free TrialThe mistake: Designing for the "Happy Path" on modern iPhones/Pixels while ignoring the fragmented reality of enterprise Windows fleets, corporate proxies and diverse Android OEMs (Sony, Sharp, Samsung).
The impact: Corporate proxies often block the WebSocket traffic required for "Hybrid" (QR code) flows, blocking users at work. Android fragmentation causes features like "Conditional Create" to fail on non-Pixel devices due to conflicting credential managers (e.g. Samsung Pass).
The fix:
The mistake: Burying the enrollment option deep in "Settings > Security > MFA," fearing user confusion during the main login flow.
The impact: The "1% Trap." Data confirms that users rarely change security settings voluntarily. Adoption stays negligible and the bank continues paying for SMS OTPs for 99% of logins.
The fix:
The mistake: Using an "Identifier-First" login flow that immediately prompts for a passkey if the user exists but asks for a password if they don't.
The impact: This behavior allows attackers to script checks against thousands of emails to build lists of valid bank customers (Account Enumeration), violating strict privacy regulations (FFIEC/Nacha).
The fix:
The mistake: Allowing passkey creation after a weak login (e.g. just password) or on untrusted devices.
The impact: Attackers who have harvested passwords via phishing can register their own passkey on the victim's account, permanently locking the legitimate user out.
The fix:

Want to learn how top banks deploy passkeys? Get our +90-page Banking Passkeys Report (incl. ROI insights). Trusted by JPMC, UBS & QNB.
The mistake: Treating a passkey login as definitive proof of identity without accounting for shared devices (spouses, children) or weak device PINs ("1234").
The impact: A child knowing a parent's iPad PIN can authorize transactions. Privacy-preserving WebAuthn does not reveal to the bank whether a face scan or a PIN was used.
The fix:
The mistake: Realizing too late that Legal/Compliance does not view a synced passkey as meeting "Possession + Inherence" (2FA) requirements because the key is copied to the cloud.
The impact: Last-minute project blockers or forced UX friction (e.g. adding a "device binding" step like PayPal) that degrades the passwordless experience.
The core question is whether a passkey counts as one factor or two:
| Passkey = 2FA | Passkey = 1FA | |
|---|---|---|
| Factors | Inherence/Knowledge (PIN/biometric) + Possession (private key protected by HSM) | Inherence/Knowledge (PIN/biometric) only - no possession guarantee |
| Reasoning | Private key is a possession factor as only trusted devices are allowed. 2FA-protected cloud account can be provided | No possession factor because no guarantee of device-binding as private key is synced. No guarantee user owns device during login. Additional factor required (e.g. selfie liveness, SMS OTP, app push, credit card digits) |
| Industries | Common outside EU | Stricter assessment (e.g. EU banks under PSD2) |
Current market data: ~80% synced passkeys vs ~20% device-bound passkeys in 2025. Among authenticators, ~85% use iCloud Keychain or Google Password Manager, ~10% use Windows Hello and ~5% use third-party password managers. This share will shift toward more synced passkeys once Windows supports synced passkeys.
If passkeys are classified as 1FA - adding a fallback factor:
If you treat passkeys as a single factor, implement a policy to use an additional factor when necessary. This is mainly relevant for web apps, as native apps stay signed in longer and can use local biometrics (only first native app login requires the additional factor).
This approach preserves the passwordless experience in daily use (users on regular devices see no change - just the quick passkey login) while satisfying 2FA requirements for new scenarios. It's a user-friendly compromise that meets strict security standards without burdening users every time.
The fix:
The mistake: Removing password fallbacks without a robust, automated recovery strategy for users who lose their device ecosystem (e.g. Apple ID lockout).
The impact: a permanent lockout where a user loses access to their funds entirely. This drives expensive, high-stress support calls and creates a security backdoor if the recovery fallback is weak (e.g. email reset).
The fix:
To navigate the minefield described above, you need a structured framework. The following 8-step blueprint is designed for PSD2-compliant banking deployments and high-scale resilience.
| Step | Area | What to do |
|---|---|---|
| I. | WebAuthn Relying Party Server and ID (rpID) | Set up a WebAuthn server and establish a single domain (rpID) for passkeys across your bank's sites |
| II. | Channel and Application Strategy | Pick your initial platform/app and decide on a central SSO vs in-app integration approach |
| III. | Deployment Strategy: Web-first vs Native-first | Determine whether to launch on web first or native app first, based on your user base and risk appetite |
| IV. | Use Cases: Login, Transaction Authorization or 3DS | Start with login, then extend passkeys to transaction approvals and 3DS flows (payment verification) |
| V. | Trust Signals: Passkey Creation and Usage | Implement device trust checks when creating/using passkeys (ensure only trusted environments) |
| VI. | Multi-Factor Strategy: Classification of Passkeys | Decide if a passkey counts as "one factor" or "two" under regulations and plan your MFA strategy accordingly |
| VII. | Passwordless and Recovery Plan | After adoption, have a path to retire passwords and offer secure account recovery methods |
| VIII. | Future Outlook (CMTG Keys) | Prepare for upcoming passkey enhancements (like cross-device trust via CMTG keys) to further strengthen security |
Subscribe to our Passkeys Substack for the latest news.
If you have read the mistakes above, you realize that "supporting passkeys" is 5% WebAuthn implementation (IdP) work and 95% ongoing, non-trivial (adoption) work. Most banks struggle because their existing Identity Providers (Ping, Okta, ForgeRock) handle the backend perfectly but offer zero tooling for the "Last Mile" - the device fragmentation, the UX nudges and the client-side telemetry.
Corbado is the adoption layer for your IdP. We don't replace your existing stack. We sit in front of it to handle the messiness of the real world.
The transition to passkeys represents a fundamental shift in banking security, moving beyond simple credential upgrades to a complete rethinking of identity assurance. While technical implementation is the first step, success is ultimately defined by user adoption and operational resilience.
By anticipating these ten pitfalls - specifically around enrollment security, device visibility and recovery logic - banks can move beyond "pilot stagnation" to deliver a secure, frictionless customer experience that sets the standard for the next decade of digital finance.
Related Articles
Table of Contents