Discover how the UK / Great Britain is advancing passkey adoption across banking, retail and digital IDs driven by regulation, security needs and user-friendly technology.
Alex
Created: February 25, 2026
Updated: February 25, 2026

In this article, we provide a concise overview of the current state of passkey implementation in the United Kingdom. Passkeys represent the next generation of secure and user-friendly authentication, moving beyond the well-known weaknesses of traditional passwords and many legacy MFA methods.
The UK is a particularly interesting market because adoption is being shaped by a rare mix of factors:
The UK also stands out because passkeys are not only appearing through global consumer platforms but are increasingly relevant for regulated and public-facing journeys. National guidance from the National Cyber Security Centre (NCSC) has helped set expectations around phishing-resistant authentication, while government and healthcare services have begun incorporating passkey support into their sign-in experiences, accelerating public familiarity with the concept.
Economic incentives are hard to ignore. Fraud and account takeover remain persistent, and organisations are under constant pressure to reduce friction and support costs without weakening security. In that environment, passkeys are increasingly viewed as one of the few approaches that can improve security and UX at the same time.
In this article, we will address these five key questions:
Before looking at regulation, industry rollouts, and public-sector programs, it helps to align on what passkeys are and why they matter in the UK context. Passkeys are not just a “new login feature”. They are a shift in how online accounts are protected: away from shared secrets that can be stolen or replayed, toward cryptographic credentials that are designed to resist phishing and many common forms of account takeover.
Passkeys replace passwords with a secure, cryptographic way to sign in using your device. Instead of typing a password, users authenticate with a fingerprint, face recognition, or device PIN, and the device then uses a private key to complete the login.
Key features of passkeys include:
The UK has plenty of the same problems that are also driving passkeys globally, like phishing, password reuse, and the ongoing usability pain of logins. But what makes the UK distinct is how these pressures show up in everyday, high-trust journeys:
The country’s digital infrastructure, and weaknesses in authentication translate directly into fraud, operational cost, and loss of trust in these sectors.
The most visible driver is the scale and persistence of financial crime. UK Finance reported total losses of £1.17 billion in 2024, and the volume of unauthorised fraud incidents remains extremely high, with 3.13 million confirmed cases reported in 2024. In practice, that means organisations are not only managing large losses, but also dealing with high-frequency credential abuse, customer remediation, and the support burden that comes with fragile authentication.
Passkeys address a core part of this problem by removing reusable secrets from the login flow. When implemented well, they reduce the attack surface for phishing and credential reuse, two mechanisms that continue to underpin many common account takeover patterns.
Passkeys also matter in the UK because sign-in modernisation is happening at citizen scale. As government and healthcare services upgrade their authentication journeys, millions of people are becoming familiar with modern, passkey-style sign-in that relies on built-in platform security rather than passwords. This growing exposure is shifting expectations toward simpler, faster, and more phishing-resistant access across other sectors.
More broadly, UK-wide identity modernization efforts, including the digital identity trust framework, make passkeys a natural building block. In the UK context, passkeys are not just a nicer login.
UK organisations are steadily adopting passkeys to improve account security, reduce fraud, and reduce reliance on passwords and SMS-based authentication. Below is a snapshot of the current UK landscape as of late 2025.
The NHS is one of the earliest large-scale government adopters of passkeys in the UK, integrating them into the NHS login service.
Key characteristics:
The UK government has begun introducing passkeys across selected GOV.UK services as part of a broader identity modernisation programme.
Key characteristics:
National Cyber Security Centre Announcement
Revolut was among the earliest UK fintechs to deploy passkeys at scale.
Key characteristics:
Virgin Media has introduced passkeys for customer account management.
Key characteristics:
EE (BT Group) supports passkeys for managing customer accounts online.
Key characteristics:
British Airways supports FIDO-certified authentication methods as part of its multi-factor authentication strategy.
Key characteristics:
British Airways Account Security
The London-founded crypto exchange supports passkeys for both login and authentication hardening.
Key characteristics:
Dext (formerly Receipt Bank) has deployed passkeys for its business users.
Key characteristics:
123-Reg supports passkeys as a secure authentication factor for domain and hosting management.
Key characteristics:
ASOS has been testing biometric and passkey-adjacent authentication flows, primarily on mobile.
Key characteristics:
CPOMS uses passkeys to protect access to highly sensitive safeguarding and child-protection data.
Key characteristics:
ePayslips has integrated passkeys to protect employee payroll and HR data.
Key characteristics:
The UK does not currently mandate Passkeys outright. However, several regulatory and policy forces create a strong baseline expectation for modern authentication and, they increasingly reward phishing-resistant approaches. In practice, this means many UK organisations are being pushed to rethink logins and step-up authentication with multi factor authentication, especially where fraud risk is high (payments, account access, sensitive changes) and where user experience cannot afford constant friction.
Two drivers stand out in particular:
For most UK organisations, the NCSC functions as the reference point for what “good” security looks like in the real world. This is especially true for authentication, where the NCSC is explicit that not all MFA methods provide the same protection. In its guidance on recommended MFA types, the NCSC highlights FIDO2 MFA aka Passkeys as offering guessing resistance, phishing resistance, and theft resistance.
That distinction matters because many widely used MFA options primarily defend against password guessing, while remaining vulnerable to modern social engineering. The NCSC’s broader MFA guidance explains why organisations should choose controls based on real attacker behaviour, rather than treating “any MFA” as automatically sufficient.
The UK’s passkey conversation is also shaped by the NCSC’s public position that passkeys are a clear step forward, while still having practical adoption challenges to solve across usability, deployment patterns, and recovery.
Strong Customer Authentication (SCA) is one of the most consequential regulatory levers for authentication in the UK, because it directly affects how customers access accounts and approve many electronic payments. In the UK, SCA sits within the Payment Services Regulations framework (which implemented PSD2) and is overseen by the FCA. Although described in a UK regulatory context, these SCA requirements are substantively the same as the PSD2 SCA rules applied across all EU member states.
At a high level, SCA requires authentication based on two or more independent factors drawn from three categories:
This definition, including the requirement that the factors are independent (so that compromising one does not compromise the other), is captured in UK industry guidance and FAQs used by payment and banking stakeholders.
While SCA-related rules have applied in the UK since 14 September 2019, one of the most important moments for consumers and merchants was the move to full compliance for e-commerce card transactions. The FCA extended the deadline for e-commerce SCA implementation to 14 March 2022.
This timeline matters because it explains why authentication UX has become a commercial issue in the UK. SCA improves payment security, but it also introduces friction if implemented with clunky or failure-prone step-up methods. The result is that UK organisations have been actively searching for approaches that can satisfy strong authentication requirements without turning checkout and sign-in into conversion bottlenecks.
Beyond regulated finance, one of the most practical factors for stronger authentication in the UK is Cyber Essentials, a widely used baseline for organisational cyber hygiene. For many companies (and especially SMEs), it’s a requirement for doing business, winning tenders, or meeting supplier due diligence expectations.
What matters for passkeys is that the Cyber Essentials requirements are explicit about where MFA should be used and how organisations should think about MFA quality. In the current requirements for IT infrastructure v3.2, MFA is positioned as a key control for protecting accounts, particularly where access is possible from the internet or where cloud services are involved. The document also notes that SMS is not the most secure MFA method and recommends using stronger alternatives where feasible.
In parallel to One Login (UK government's unified digital identity and single sign-on system), the UK has been building the broader rulebook for digital identity ecosystems: the UK Digital Identity and Attributes Trust Framework (DIATF). This matters because passkeys become much more powerful when they can sit inside trustworthy, interoperable identity journeys, for example where services rely on verified attributes (age, right to work) and consistent assurance expectations.
A key UK-specific milestone is that the DIATF gamma version came into force on 1 December 2025 and is described as the first statutory trust framework for Digital Verification Services under the Data (Use and Access) Act 2025. This is an important “institutional signal”: the UK is formalising the governance model around it.
At a practical level, DIATF sets expectations for how different actors in the ecosystem operate, for example:
This framework is one reason the UK discussion about passkeys quickly moves beyond “login convenience” and into questions of assurance, recovery, and how cryptographic credentials fit into a wider digital trust architecture.
The UK financial sector is one of the most natural early adopters of passkeys. Few industries combine such a high fraud incentive with such strict expectations around authentication quality and user protection. At the same time, UK consumers are already used to increase security in banking, which makes the sector a practical proving ground for authentication methods that can be both stronger and simpler.
UK Finance’s latest figures highlight fraud at national scale, and the attack volume remains extremely high. That makes authentication quality a front-line control for UK financial services, not a back-office detail.
A few UK-specific patterns make authentication quality especially important:
Against this backdrop, passkeys are compelling because they make classic phishing and credential replay materially harder. That is directly aligned with the fraud mechanisms the UK is seeing at scale.
UK digital-first banks and fintechs tend to move earlier because they can iterate quickly and because their customers often live in mobile-first flows already. Revolut is a well-known example: it has rolled out passkeys for Personal and Business accounts, positioning passkeys as a practical alternative to passwords in day-to-day sign-in.
This is also happening in a broader context of Revolut’s UK expansion. Revolut announced it received a UK banking licence with restrictions on 25 July 2024 and entered the PRA “mobilisation” stage. That matters because passkeys fit naturally into the direction of travel for a challenger bank that wants to scale digital trust while keeping sign-in friction low.
A second UK-relevant example is Wise. Wise documents how users can set up and manage passkeys and states that once set up, passkeys become the default 2-step verification method for the account. This is a strong pattern for finance: passkeys are not only a “login convenience feature”, but they can also become the default step-up method for sensitive actions.
For large incumbent banks, the opportunity is enormous, but so is the complexity. Most high street banks already operate mature device-based security models, including security codes and dedicated “secure key” style approaches in digital banking. HSBC, for example, documents its use of a Digital Secure Key and security codes as an extra layer for online banking transactions.
That existing posture shapes how passkeys enter the picture. In practice, incumbents tend to evaluate passkeys through questions like:
This is why, in the UK, financial passkey adoption is best understood as a multi-stage transition. Neobanks can move fast, while incumbents are usually optimising for a safe migration at national scale.
Payment providers play an outsized role in making passkeys real for consumers, because they cover login, checkout, and account security. A particularly clear UK milestone was PayPal’s expansion of passkeys to users in the UK on 27 June 2023.
This matters for the UK market for two reasons:
Alongside these brands, fintech platforms like Wise contribute to normalizing passkeys as part of a modern security baseline, especially when passkeys become the default method for step-up verification.
In the UK, public services are doing something uniquely powerful for passkey adoption: they are teaching passkeys at scale. When millions of people encounter passkeys in government and healthcare journeys, passkeys stop feeling like a “tech feature” and start feeling like a normal way to sign in. The result is a flywheel: familiarity increases, expectations rise, and private-sector rollouts face less user friction.
GOV.UK One Login is designed to be the single way for people to sign in and prove their identity when using government services online. As of January 2026, GDS stated that over 13 million people have used it to access more than 120 services.
What makes this especially relevant for passkeys is that One Login has publicly put Passkeys on its roadmap as a sign-in capability, describing the goal as letting users sign in with a biometric fingerprint or face scan instead of entering a password. This is a strong signal that passkeys are being treated as a first-class authentication method for citizen-scale services, not just an optional add-on.
A major milestone for national adoption is the integration of high-volume services. On 9 February 2026, HMRC announced that new customers registering for HMRC digital services can sign up using GOV.UK One Login, creating an account with an email address and password rather than a 10–12 digit Government Gateway ID. HMRC also frames One Login as the future single way to access government services online, from tax to passports to voter registration.
GDS also emphasizes that trust and privacy are foundational, including that only minimum necessary data is collected and that there is no central database linking user information across government. This is part of why passkeys are such a natural fit for public services: the authentication method can improve phishing resistance without requiring citizens to manage more secrets or security codes.
Healthcare access is one of the clearest examples of why the UK’s passkey story is not just about convenience. NHS Login explicitly positions passkeys as a secure alternative to passwords and states that passkeys provide the strongest protection against phishing and hacking attempts.
From a rollout perspective, the NHS Login help centre is also a good example for what passkey support at scale looks like in practice:
This combination (clear user guidance, multi-device support, and explicit recovery information) is exactly what makes public-sector passkey deployments so influential. They teach users what passkeys are and what to expect, and they set a usability baseline other services need to match.
Government and healthcare authentication must work for everyone, including people with older devices, limited digital confidence, or accessibility needs. That requirement shapes how passkeys are introduced in the UK: typically as an upgrade path, not as an immediate hard requirement.
You can see this in the focus on support and fallback mechanisms:
The practical takeaway is that UK public services are building passkeys into systems that must remain resilient under real-world constraints: device churn, lost phones, shared devices, accessibility needs, and a wide range of user capabilities. That forces careful design around recovery, support, and safe fallbacks, which is often where weaker passkey implementations in other sectors struggle.
In the UK, passkey adoption is being pulled forward by institutions that each apply pressure from a different angle: security doctrine, fraud economics, payments compliance, and trust requirements. Together, they are converging on the same practical outcome: phishing-resistant authentication is becoming the default expectation for high-trust journeys.
NCSC sets the quality bar for authentication: The NCSC has made one point especially clear: not all MFA is equal, and phishing resistance is the differentiator that matters in real attacks. That framing gives security teams a strong basis to prioritise FIDO2-style approaches and to treat recovery and rollout design as part of the security model, not an afterthought.
UK Finance makes the business case impossible to ignore: Fraud is described as a societal-scale problem, not a niche security issue. That makes authentication improvements a board-level topic in many financial institutions, and it’s why solutions that reduce phishing and account takeover without adding friction keep gaining momentum.
FCA turned authentication UX into a compliance constraint: SCA pushed strong authentication deeper into everyday customer journeys, especially in payments and checkout. The implication is simple: if security controls create drop-off or failure loops, they become commercially painful. That naturally increases appetite for approaches that are both strong and low-friction.
Ofcom raises the bar for trustworthy user journeys: As online safety and age assurance requirements grow, services need signals that are robust and usable for real people. This doesn’t mandate passkeys directly, but it reinforces the broader direction: higher-trust digital interactions need better primitives, and phishing-resistant authentication is one of them.
Taken together, the UK’s direction of travel is clear. The remaining differentiator will be execution: consistent UX, inclusive support, and recovery paths that do not quietly reintroduce the same old weaknesses.
The UK’s transition toward passkeys is no longer hypothetical: persistent fraud pressure, increasingly explicit expectations for phishing-resistant authentication, and government-scale sign-in modernization are combining to make passkeys a mainstream priority across sectors.
Related Articles
Table of Contents