Passwordless for B2C at scale is no longer a strategic option - it is an important requirement for CIAM teams. At 500k monthly active users (MAU) on a 2M total base, every percentage point of passkey adoption translates into measurable SMS OTP cost reduction, fewer account takeovers and higher checkout conversion. Yet most large-scale B2C deployments that "enabled passkeys" still see 90% of daily logins flowing through passwords or SMS OTP.
Get free passkey whitepaper for enterprises.
This guide explains why generic CIAM passwordless rollouts stall at scale, the four-layer reference architecture that consistently lifts passkey login rate above 60% and the total cost of ownership (TCO) a Fortune 500 buyer should plan for at 500k MAU.
The procurement narrative around passwordless has converged: every CIAM in 2026 exposes a WebAuthn API, every vendor sells "passwordless" in their tier matrix and every analyst report includes passkeys as a baseline requirement. The outcome, measured at 500k MAU, is consistent. Passkey login rate hovers around 5%, SMS OTP volume barely moves and the projected savings do not materialize. The reason is often structural.
The Corbado Passkey Benchmark 2026 measures four rollout regimes on the same 89% web readiness ceiling. Settings-only availability produces a passkey login rate below 1%. A simple post-login nudge lifts it to roughly 4-5%. An optimized enrollment with device-aware prompting climbs to 23%. A passkey-first return flow with automatic creation and identifier-first recovery exceeds 60%. The CIAM underneath does not move these numbers. The prompt logic, device classification and login-entry design sitting on top of it does.
The same enterprise running the same Auth0 or Cognito tenant can land on either end of this ladder depending on whether its team ships the orchestration patterns the benchmark documents in the custom frontend. That is the adoption fallacy: "the platform supports passkeys" is not equivalent to "the platform achieves passkey adoption at scale."
At 500k MAU on a traditional B2C consumer base, the device population is anything but flat. The Corbado Passkey Benchmark 2026 measures first-try web enrollment at 49-83% on iOS, 41-67% on Android, 41-65% on macOS and only 25-39% on Windows.
The gap is not only user preference. It tracks the ecosystem stack. iOS bundles browser, authenticator and credential provider tightly. Windows Hello is not yet a Conditional Create path and Edge passkey saving only landed in late 2025. A realisic calculation has to fold in those aspects, including smart prompting an cross-device-usage between mobile and desktop.
See how many people actually use passkeys.
In consumer authentication, the user is anonymous until they type an email or username. If a passwordless prompt confuses them or a password manager overlay blocks autofill before they reach that point, the backend records nothing. Standard CIAM logs were not built for client-side telemetry, so the failures that hinder adoption at scale sit outside the IDP's reporting frame including backend loggin.
For a B2C deployment at 500k MAU on a 2M user base, the operational target is to climb the adoption ladder rather than re-platform the CIAM. Each level corresponds to a specific rollout shape, not a different vendor.
Passkey Adoption Ladder (Corbado Passkey Benchmark 2026)
| Rollout Shape | Enrollment | Usage | Passkey Login Rate |
|---|---|---|---|
| Settings-only availability (Passive) | ~4% | ~5% | <1% |
| Simple post-login nudge (Baseline) | ~25% | ~20% | ~4-5% |
| Optimized enrollment (Managed) | ~65% | ~40% | ~23% |
| Passkey-first return flow (Advanced) | ~80% | ~95% | >60% |
The non-linear jump becomes obvious when the same readiness ceiling is plotted against the four rollout shapes:
Most CIAM-native rollouts terminate at the Baseline levels because that is what out-of-the-box passwordless UIs deliver: a single post-login toggle, no device-aware prompting, no identifier-first recovery for new devices and no automatic creation after saved-password sign-in. Climbing to the Managed and Advanced levels requires segmented enrollment nudges, Conditional Create where the ecosystem supports it (currently strongest on iOS), viable on macOS, fragmented on Android, constrained on Windows) and one-tap recognition of returning devices to boost assisted logins.
Passwordless at scale is a four-tier construction with the CIAM as its foundation. Each tier depends architecturally on the one below it - the diagram below shows the pyramid and what each component contributes:
Each layer plays a distinct role. The CIAM remains the system of record. A passkey orchestration overlay handles the intelligent prompting. An observability layer captures the client-side ceremony. A fallback layer absorbs environments that cannot complete passkey flows today. The sections below break each layer down in turn.
Enterprise Passkey Whitepaper (+70 pages). How leaders get +80% adoption. Trusted by Rakuten, Klarna & Oracle.
The CIAM holds the user record, session, OAuth/OIDC tokens, social login, MFA policy and consent. For 500k MAU B2C deployments, the dominant choices remain Auth0, Amazon Cognito, Ping Identity, Ory, FusionAuth and self-built IDPs on top of Keycloak. The choice here is consequential for licensing and ecosystem integration, but not for passkey adoption itself. See the full 2026 CIAM vendor evaluation for pricing tiers, AI agent identity support and TCO at 500k MAU.
The orchestration layer is where passwordless at scale is won or lost. It intercepts the authentication event before the WebAuthn prompt fires, classifies the device's hardware, OS, browser and credential-provider stack and routes the user into a journey shaped to that environment.
In practice, the orchestration layer at 500k MAU is almost always a custom frontend implementation that sits in front of the CIAM and renders a bespoke login UI. The underlying CIAM continues to handle credential storage, session and OAuth/OIDC, but the team owns the login entry point, the device-aware prompt logic and the recovery flow. The reason is structural: enterprise B2C teams need full control over branding, conversion-critical copy, A/B testing and the device-segmentation rules that determine which user sees which prompt. A vendor-rendered login page rarely tolerates that level of customization at scale.
Concrete patterns the custom orchestration layer must implement:
Building this layer in-house is the dominant pattern at 500k MAU because most large B2C deployments already operate a sophisticated frontend stack and an in-house design system the login flow must inherit. The trade-off is the ongoing engineering cost of keeping pace with browser, OS and credential-provider updates. For teams that prefer to buy this layer rather than build it, Corbado Connect productizes the same orchestration patterns as an overlay on top of any CIAM without user-database migration. Either path lifts passkey enrollment toward the Advanced-scenario ceiling of 80%+ and unlocks the 60-90% SMS OTP cost reductions that compound at scale.
At 500k MAU, the question every CISO, CTO and product owner running passwordless gets asked is straightforward: "What is our sign-in success rate end-to-end? Why are users dropping off in enrollment? Should we scale from 10% to 50%? Can you show leadership the impact?" The honest answer in most large B2C deployments today is "we don't know" - not because the data does not exist, but because it lives in five separate systems that were never designed to be joined around a passkey ceremony.
The typical enterprise stack covers each piece individually:
The diagram below maps the silos against the unanswered questions and the surface where passkey sign-in actually happens:
Each of these tools is best-in-class in its own category, yet none answers the questions above on its own. The questions sit in the gap between them. The three Conditional UI measurement points illustrate the scale of that gap: server-side passkey success looks near-perfect at 97-99%, the user-facing login completion rate is 90-95% and the first-suggestion-interaction rate where users actually drop out sits at only 55-90%. Standard backend tools cannot see the 35-point spread between the first and last measurement point.
Corbado Observe is the only product that combines what each of the categories above can see individually. It captures the full client-side ceremony with the device context the frontend platform owns, joins it to the credential outcome the FIDO server records, classifies the failure mode the APM stack cannot interpret and delivers it through a single funnel and per-user timeline. The layer is delivered as a lightweight SDK that sits on top of any WebAuthn server, regardless of CIAM, with no IDP migration required:
Corbado Observe ships with a UUID-only, zero-PII architecture (GDPR compliant) and is the layer that turns the four boardroom questions above into measurable KPIs.
Igor Gjorgjioski
Head of Digital Channels & Platform Enablement, VicRoads
We hit 80% mobile passkey activation across 5M+ users without replacing our IDP.
Passkeys that millions adopt, fast. Start with Corbado's Adoption Platform.
Start Free TrialEven at the Advanced rung, roughly 11% of attempts will not complete a passkey flow on the first try. The fallback layer must accept that reality without falling back to a password by default. Patterns that work at 500k MAU:
Procurement evaluations focused on licensing fees underestimate the true cost of passwordless at scale by roughly an order of magnitude. The three drivers at 500k MAU are platform fees, implementation effort and ongoing maintenance.
Platform fees vary widely. Auth0 sits at USD 15k-30k/month at 500k MAU on industry-reported enterprise contracts. Cognito's passkey-capable Essentials tier comes in around USD 7.3k/month but hides engineering overhead. Stytch's B2C Essentials and Clerk land around USD 4.9k and USD 9k respectively.
Implementation effort is the overlooked cost. Building passkeys natively on a CIAM platform at 500k MAU takes roughly 25-30 FTE-months: about 5.5 FTE-months in product, 14 FTE-months in development and 8 FTE-months in QA. Platforms with pre-built passkey UI compress this to 5-10 FTE-months but still demand adoption optimization work. API-first platforms like Ory require all UX to be built from scratch.
Ongoing maintenance is the hidden TCO multiplier. Passkey ceremonies need continuous re-testing against new OS releases, browser updates and OEM-specific bugs. Budget about 1.5 FTE/year for post-launch operations: rollout management, cross-platform retesting, metadata updates and support training. On platforms requiring custom UI, add 1-2 additional FTEs for frontend maintenance alone.
Subscribe to our Passkeys Substack for the latest news.
For organizations at 500k MAU and above, the choice is rarely "buy a new CIAM." The existing CIAM is already integrated with billing, fraud, marketing and analytics. The real choice sits one layer up: build the orchestration and observability internally or adopt a specialized overlay.
The buy-vs-build economics for the orchestration layer at 500k MAU consistently favour adoption. The internal build path absorbs 25-30 FTE-months, then 1.5-3 FTEs per year in operations, with passkey login rate typically capped around the Baseline or Managed rung because the team cannot keep pace with the browser and OS release cadence. The overlay path absorbs an integration project measured in weeks, then continuously inherits the platform improvements as the ecosystem evolves.
The buy-vs-build math changes again for organizations that already shipped passkeys natively and are stuck at the Baseline rung. There, the higher-leverage move is to add the observability layer alone, surface the drop-off points and decide whether the remaining gap is closed in-house or with an orchestration overlay.
The deployment pattern that consistently lands on the Advanced rung at 500k MAU follows a four-phase shape:
Try passkeys in a live demo.
Passwordless for B2C at scale is an orchestration problem, not a CIAM-selection problem. The 2026 vendor landscape has closed the gaps for WebAuthn support, but the variance between a 5% and a 60%+ passkey login rate sits in the orchestration and observability layers that ship on top of the IDP. At 500k MAU, this is the difference between a stalled pilot and a passwordless transformation that books USD 50k-100k or more in annual SMS savings, lifts checkout conversion and removes the largest remaining account takeover vector.
For Fortune 500 buyers already running a CIAM, the highest-ROI move is to instrument, segment and orchestrate - not migrate. Corbado Observe makes the current rung visible. Corbado Connect closes the gap to the Advanced rung on top of the existing CIAM. Together they turn passwordless at scale from a procurement promise into a deployed KPI.
Corbado is the Passkey Intelligence Platform for CIAM teams running consumer authentication at scale. We help you see what IDP logs and generic analytics tools can't: which devices, OS versions, browsers and credential managers support passkeys, why enrollments don't turn into logins, where the WebAuthn flow fails and when an OS / browser update silently breaks login, all without replacing Okta, Auth0, Ping, Cognito or your in-house IDP. Two products: Corbado Observe layers observability for passkeys and any other login method. Corbado Connect adds managed passkeys with analytics built in (alongside your IDP). VicRoads runs passkeys for 5M+ users with Corbado (+80% passkey activation). Talk to a Passkey Expert →
Passwordless for B2C at scale requires four stacked layers: a CIAM as the system of record, a passkey orchestration layer that classifies device, OS, browser and credential provider before prompting WebAuthn, an observability layer that captures the client-side ceremony and a fallback layer for users on environments that cannot complete passkey flows. Most CIAM platforms ship only the first layer, which is why native rollouts stall at 5 to 10 percent adoption.
Generic CIAM passwordless UIs prompt all users identically, but first-try web passkey enrollment ranges from 49-83% on iOS down to 25-39% on Windows according to the Corbado Passkey Benchmark 2026. Without device-stack segmentation, intelligent prompting and identifier-first recovery, deployments average around 5 to 10 percent passkey login rate, even when the platform technically supports WebAuthn.
Building passkeys natively on a CIAM platform at 500k MAU typically requires 25-30 FTE-months across product, development and QA, plus 1.5 FTE per year for ongoing maintenance. Platform fees at this scale range from roughly USD 4.9k per month for Stytch B2C Essentials up to USD 15k-30k per month for Auth0 enterprise contracts, with Cognito's passkey-capable Essentials around USD 7.3k and Clerk around USD 9k. The hidden cost is cross-platform retesting as iOS, Android, Windows and macOS release updates.
At 1M+ users the dominant pattern is a CIAM plus passkey orchestration overlay, with the CIAM remaining the system of record and the orchestration layer handling device classification, conditional create, identifier-first recovery and adoption analytics. This avoids user-database migration, preserves existing SIEM and APM investments and unlocks the 60-90 percent SMS cost reduction that compounds at scale.
Related Articles
Table of Contents