Join our upcoming Webinar on Passkeys for Australian Enterprises

What are the main integration options for passkeys?

Vincent Delitz

Vincent

Created: January 8, 2025

Updated: May 1, 2025

passkeys product design strategy

Read the full article

Read the enterprise guide on large-scale passkey integration approaches, design of user flows and interfaces, and technical implementation considerations.

Read the full article

Read by 5,000+ security leaders.


Main Passkey Integration Options#

We recently published about passkey integration options for enterprises that provides more insights about the pros, cons and adoption impact of the passkey integration. You can download the passkey integration whitepaper for free.

Passkeys can be integrated into enterprise authentication systems using four primary methods, each with distinct benefits and challenges:

main integration options passkeys

1. Passkey Button Approach#

Adds a "Continue with Passkey" button to the login screen.

  • Benefits: Simple implementation, maintains existing login flow.
  • Challenges: May result in lower passkey usage as it requires user action.
  • Example: Australia's myGov portal.

2. Identifier-First Approach#

Users enter their email/username first. The system checks for a registered passkey and prompts for biometric authentication if available.

Enterprise Icon

Get free passkey whitepaper for enterprises.

Get for free

3. Password + Passkey Method#

Combines passkeys as a second authentication factor after password entry.

  • Benefits: Enhanced security and gradual user transition.
  • Challenges: Additional steps may increase friction.

4. Cross-Device Authentication (CDA) First#

Supports passkey usage via mobile devices or security keys for cross-device authentication.

  • Benefits: Enables passkey usage on non-supportive devices.
  • Challenges: Increased technical complexity and user education requirements.

Choose the method that best aligns with your enterprise’s security and user experience objectives.

Read the full article#

passkeys product design strategy

Read the full article

Read the enterprise guide on large-scale passkey integration approaches, design of user flows and interfaces, and technical implementation considerations.

Read the full article

Read by 5,000+ security leaders.

Schedule a call to get your free enterprise passkey assessment.

Talk to a Passkey Expert

Enjoyed this read?

🤝 Join our Passkeys Community

Share passkeys implementation tips and get support to free the world from passwords.

🚀 Subscribe to Substack

Get the latest news, strategies, and insights about passkeys sent straight to your inbox.

Share this article


LinkedInTwitterFacebook