Explore the 4 core models for payment passkeys. Compare issuer, merchant, network, and PSP-centric architectures to find the best integration strategy.
Vincent
Created: June 23, 2025
Updated: June 23, 2025
60-page Enterprise Passkey Whitepaper:
Learn how leaders get +80% passkey adoption. Trusted by Rakuten, Klarna & Oracle
The global payments landscape is at a critical inflection point. For decades, the industry has grappled with the inherent tension between security and user convenience, a challenge most acutely felt in the digital, Card-Not-Present (CNP) environment. The rise of sophisticated fraud has necessitated stronger authentication measures, while consumer expectations demand increasingly frictionless checkout experiences. This report provides a comprehensive analysis of this evolving ecosystem, with a specific focus on identifying the strategic integration points for passkey technology. It is designed to serve as a definitive guide for technology providers, payment service providers, financial institutions, and merchants seeking to navigate the transition to a passwordless future.
The payments landscape is undergoing a fundamental shift, driven by the need for stronger security like Strong Customer Authentication (SCA) and the commercial demand for frictionless user experiences. Phishing-resistant passkeys have emerged as the key technology to resolve this tension. Our analysis shows that the industry is converging around four distinct architectural models for passkey integration, each representing a competing vision for the future of payment authentication:
Each model presents a different answer to the core strategic question: "Who will become the primary Relying Party for payments?". This report dissects these competing architectures, mapping them to the ecosystem's players to provide a clear roadmap for navigating the future of payment authentication.
To understand where and how passkeys can be integrated, it is first essential to establish a clear and detailed map of the payment ecosystem's players and their distinct roles. The flow of a single online transaction involves a complex interplay between multiple entities, each performing a specific function in the movement of data and funds.
At the heart of every transaction are five fundamental participants who form the foundation of the payment value chain.
Customer / Cardholder:
Merchant:
Issuing Bank (Issuer):
Acquiring Bank (Acquirer):
Card Networks (Schemes):
Between the core participants lies a complex and often overlapping ecosystem of technology and service providers. Understanding the distinctions between these intermediaries is crucial, as they are often the primary integration points for new technologies like passkeys. The lines between these roles have blurred significantly in recent years, as modern providers seek to offer more comprehensive, "all-in-one" solutions.
Payment Gateway:
Payment Processor:
Payment Service Provider (PSP):
This consolidation of roles has profound implications. While academically distinct, in practice, a merchant's single point of contact is often a PSP that abstracts away the complexity of the underlying gateway, processor, and acquirer relationships. However, the capabilities of these PSPs can vary dramatically. A PSP that is merely a reseller of another company's gateway services has vastly different technical capabilities and strategic interests than a full-stack PSP with its own processing infrastructure and acquiring licenses. This distinction is important when evaluating integration opportunities for advanced authentication methods.
Furthermore, a deeper analysis of the payment flow reveals a foundational concept that clarifies the strategic motivations behind new authentication technologies: the role of the Relying Party (RP). In the context of FIDO authentication and passkeys, the Relying Party is the entity that is ultimately responsible for verifying a user's identity. In a standard payment transaction, the issuer bears the financial risk of fraud and is therefore the default Relying Party; it is their decision to approve or decline the payment.
The emerging architectural models for passkey integration can be best understood as a strategic negotiation over who acts as the Relying Party. In the Secure Payment Confirmation (SPC) model, the issuer remains the RP but allows the merchant to invoke the authentication ceremony. In Delegated Authentication (DA), the issuer explicitly delegates the RP function to the merchant or their PSP. And in the network-centric model, Visa and Mastercard position themselves as a federated Relying Party for guest checkout transactions. Therefore, the central question for any payment provider considering passkey integration becomes:
"Who is, or wants to be, the Relying Party in this flow?"
The answer points directly to the integration opportunity, the key decision-maker, and the underlying strategic objective.
Deep Dive: For a detailed introduction into Relying Parties in the context of WebAuthn & passkeys, read our complete guide: WebAuthn Relying Party ID (rpID) & Passkeys: Domains & Native Apps.
To provide a clear visual representation of these relationships, a flowchart illustrating the payment lifecycle is essential. Such a diagram would depict two distinct but interconnected paths:
The Data Flow (Authorization): This path traces the journey of the authorization request. It begins with the customer submitting payment details on the merchant's site, flowing through the payment gateway to the processor/acquirer, then across the card network to the issuer for a risk decision, and finally, the approval or decline response travels all the way back to the merchant and customer. This entire process occurs in a matter of seconds.
The Value Flow (Settlement): This path illustrates the movement of money, which occurs after authorization. It shows the batched transactions being cleared, with funds flowing from the issuer, through the network, to the acquirer (minus interchange fees), and finally being deposited into the merchant's account, a process that typically takes a few business days.(Payment processing: How payment processing works | Stripe)
This visualization allows any participant in the ecosystem to immediately locate their position and understand their direct and indirect relationships with all other parties, setting the stage for a detailed analysis of where authentication interventions can occur.
Player | Core Function | Key Responsibilities | Typical Examples |
---|---|---|---|
Customer / Cardholder | Initiates payment for goods or services. | Provides payment credentials; repays charges to the issuer. | An individual shopping online. |
Merchant | Sells goods or services and accepts electronic payments. | Integrates payment acceptance technology; manages checkout experience. | An e-commerce website or retail store. |
Issuing Bank (Issuer) | Issues payment cards to customers and underwrites the risk. | Authorizes or declines transactions; manages cardholder accounts; bills the cardholder. | Bank of America, Chase, Barclays. |
Acquiring Bank (Acquirer) | Provides merchants with the ability to accept card payments. | Establishes and maintains merchant accounts; settles funds to the merchant. | Wells Fargo Merchant Services, Worldpay (from FIS). |
Card Networks (Schemes): | Operates the networks that connect all parties. | Sets interchange rates and rules; routes authorization and settlement messages. | Visa, Mastercard, American Express. |
Payment Gateway | Securely transmits payment data from the merchant to the processor. | Encrypts sensitive card data; acts as the secure "front door" for the transaction. | Authorize.net (a Visa solution), Stripe Payment Gateway. |
Payment Processor | Manages the technical communication for the transaction. | Facilitates the exchange of information between the acquirer, issuer, and card network. | First Data (now Fiserv), TSYS. |
Payment Service Provider (PSP) | Offers a comprehensive, all-in-one payment solution to merchants. | Bundles gateway, processing, and merchant account services; simplifies payment acceptance. | Stripe, Adyen, PayPal, Mollie. |
While the payment ecosystem contains players of all sizes, the market for processing and acquiring is concentrated around several large players who vary by region. Global giants often compete with strong national and regional champions. The following table provides a snapshot of key players across different geographies.
Region | Entity | Type |
---|---|---|
North America | PayPal, Stripe, Block (Square), Adyen | PSP |
North America | Fiserv (Clover), Global Payments, JPMorgan Chase Merchant Services | Acquirer/Processor |
Europe | Adyen, Stripe, PayPal, Checkout.com, Worldline, Nexi, Klarna | PSP |
Europe | Worldpay (from FIS), Barclaycard | Acquirer/Processor |
Europe | Trustly, Mollie, Brite Payments, Fintecture, Ivy | A2A/Open Banking |
Asia-Pacific | Alipay & WeChat Pay (China), GrabPay & GoTo (SEA), Razorpay, PayU | PSP |
Asia-Pacific | - | - |
Asia-Pacific | UPI (India) enabling PhonePe, Google Pay, Paytm; Juspay (India); AP+ in Australia operating eftpos, NPP & BPAY | Domestic Scheme/A2A |
Latin America | Mercado Pago, PagSeguro, StoneCo | PSP |
Latin America | Cielo, Rede, Getnet (Brazil), Transbank (Chile), Prisma (Argentina) | Acquirer/Processor |
Latin America | Pix (Brazil), EBANX (cross-border) | Domestic Scheme/A2A |
Every online purchase triggers a complex, high-speed sequence of events that can be broken down into two main phases: authorization and settlement. Layered on top of this process is a critical security protocol known as 3-D Secure, which is central to understanding the modern challenges of online payment authentication.
The lifecycle of a single CNP transaction involves a near-instantaneous data exchange followed by a slower transfer of funds.
Authorization is the process of verifying that the cardholder has sufficient funds or credit to complete the purchase and that the transaction is legitimate. This phase occurs in seconds and follows a precise, multi-step path (Payment processing: How payment processing works | Stripe):
Transaction Initiation: The customer selects their items, proceeds to checkout, and enters their payment card details (card number, expiration date, CVV) into the merchant's online payment form.
Secure Transmission: The merchant's website securely passes this information to its payment gateway. The gateway encrypts the data to protect it during transit.
Routing to Processor/Acquirer: The gateway forwards the encrypted transaction details to the payment processor and/or the merchant's acquiring bank.
Network Communication: The acquirer sends the authorization request to the appropriate card network (e.g., Visa, Mastercard).
Issuer Verification: The card network routes the request to the cardholder's issuing bank. The issuer's systems perform a series of checks: verifying the card's validity, checking the available balance or credit limit, and running the transaction through its fraud detection engines.
Authorization Response: Based on these checks, the issuer approves or declines the transaction. This decision, in the form of a response code, is sent back along the same path: from the issuer to the card network, to the acquirer, to the processor/gateway, and finally to the merchant's website.
Completion: If approved, the merchant completes the sale and informs the customer. If declined, the merchant asks the customer for an alternative payment method.
Settlement is the process of actually moving the money from the issuer to the merchant. Unlike authorization, this is not instantaneous and typically occurs in batches.(Payment processing: How payment processing works | Stripe)
Layered on top of every CNP transaction is a critical security protocol known as 3-D Secure (3DS). Managed by EMVCo, its purpose is to let the issuer authenticate the cardholder, reducing fraud and shifting liability for chargebacks from the merchant to the issuer.
Modern 3DS (also called 3DS2) works by exchanging a rich set of data between the merchant and the issuer's Access Control Server (ACS). This data allows the ACS to perform a risk assessment, leading to two outcomes:
This "challenge" is a major point of friction and a key battleground for conversion rates. The industry's goal is to maximize frictionless flows while making challenges as seamless as possible. It is this high-friction challenge that passkeys are perfectly positioned to solve, turning a potential point of failure into a secure and seamless step.
Deep Dive: For a detailed analysis of the 3DS protocol, the role of the ACS, and how vendors are integrating FIDO data, read our complete guide: EMV 3DS Access Control Server: Passkeys, FIDO and SPC.
The advent of passkeys, based on the FIDO Alliance's phishing-resistant WebAuthn standard, is catalyzing a fundamental redesign of payment authentication. This is happening alongside a powerful industry trend: merchants are already adopting passkeys for standard user authentication (sign-up and login) to combat account takeover fraud and improve the user experience. This existing investment creates a natural foundation upon which payment-specific passkey models can be built.
In this model, the issuing bank remains in control of the authentication, and the passkey is cryptographically bound to the issuer's domain (e.g., bank.com
). While a simple redirect to the bank's website is possible, it creates a poor user experience.
Who owns the passkey? In the Issuer-Centric model, the Issuer is the Relying Party (RP).
Adoption Flywheel & Network Effects: The reusability of an issuer's passkey creates a powerful flywheel. Once a user creates a passkey for their bank, that single passkey can be used to seamlessly approve challenged transactions at any merchant that uses the 3DS protocol. This enhances the value of the issuer's card for both consumers (better UX) and merchants (higher conversion).
The industry-designed solution for this is Secure Payment Confirmation (SPC), a web standard that allows a merchant to call the bank's passkey directly on the checkout page, avoiding a redirect. This process also uses dynamic linking to bind the authentication to the transaction details, which is crucial for SCA.
The Strategic Flaw: Despite its technical elegance, SPC is not a viable strategy today. It requires browser support that does not exist in Apple's Safari. Without Safari, SPC cannot be a universal solution, making it impractical for any large-scale implementation.
Deep Dive: For a full technical breakdown of SPC, how it enables dynamic linking, and why browser support is a critical flaw, read our in-depth analysis: Dynamic Linking with Passkeys: Secure Payment Confirmation (SPC).
Delegated Authentication represents a more radical departure from the traditional model. Enabled by 3DS version 2.2 and supported by specific card scheme programs, DA is a framework where an issuer can formally delegate the responsibility of performing SCA to a trusted third party, most commonly a large merchant, PSP, or digital wallet provider.
For more insights into Delegated Authentication and passkeys, please read our blog post: Delegated Authentication & Passkeys under PSD3 / PSR - Corbado
Who owns the passkey?
In this model, the Merchant or their PSP is the Relying Party (RP). The passkey is created for the merchant's domain (e.g., amazon.com
) and is used for account login.
To qualify for DA, the initial authentication performed by the merchant must be fully compliant with SCA requirements. According to the European Banking Authority's guidelines on Strong Customer Authentication, this is not just a simple login; it must have the same strength as an authentication the issuer would perform itself. Passkeys, with their strong cryptographic properties, are an ideal technology to meet this high bar. However, a crucial point of regulatory uncertainty remains regarding synced passkeys. While device-bound passkeys clearly meet the "possession" element of SCA, regulators like the EBA have not yet issued a definitive opinion on whether synced passkeys, which are portable across a user's cloud account, meet the stringent requirement of being uniquely linked to a single device. This is a key consideration for any DA strategy in Europe.
In this model, the authentication event moves upstream in the customer journey. Instead of occurring at the end of the checkout process as a 3DS challenge, it happens at the beginning, when the customer logs into their account on the merchant's website or app. If the merchant uses a passkey for login, they can pass evidence of this successful, SCA-compliant authentication to the issuer within the 3DS data exchange. The issuer, having pre-established a trusted relationship with that merchant, can then use this information to grant an exemption and bypass its own challenge flow entirely. This can result in a truly seamless, one-click biometric checkout for logged-in users.
Adoption Flywheel & Network Effects: The flywheel here is driven by the merchant's direct customer relationship. As merchants adopt passkeys for login to reduce account takeover fraud and improve UX, they build a base of passkey-enabled users. This creates a natural pathway to leveraging these passkeys for DA in payments, unlocking a superior checkout experience. The network effect is strongest for PSPs who can act as the RP for multiple merchants, potentially allowing a single passkey to be used across a network of stores, creating a powerful incentive for other merchants to join that PSP's ecosystem.
Card networks are actively fostering this model through dedicated programs. Visa's Guide Authentication framework, for example, is designed to be used with DA to empower merchants to perform SCA on behalf of the issuer. Similarly, Mastercard's Identity Check Express program enables merchants to authenticate the consumer within the merchant's own flow. This model reflects the strategic vision of large merchants and PSPs:
"We own the primary customer relationship and have already invested in a secure, low-friction login experience. Let us handle the authentication to create the best possible user journey."
However, this power comes with responsibility. Under European regulations, DA is treated as "outsourcing," meaning the merchant or PSP assumes the liability for fraudulent transactions and must adhere to stringent compliance and risk management requirements.
This model is a major strategic initiative driven by the card networks (Visa, Mastercard) to own and standardize the guest checkout experience. They have built their own FIDO-based passkey services, such as the Visa Payment Passkey Service, on top of the Click to Pay framework.
Who owns the passkey?
In the Network-Centric model, the Card Network is the Relying Party. The passkey is created for the network's domain (e.g., visa.com
).
Adoption Flywheel & Network Effects: This model possesses the most powerful network effect. A single passkey created for a card network is instantly reusable across every merchant that supports Click to Pay, creating immense value for the consumer and driving a classic two-sided market flywheel.
Deep Dive: Both Visa and Mastercard are pursuing this strategy aggressively. Explore the specifics of their implementations in our dedicated articles on Visa Passkeys and Mastercard Passkeys.
This model is centered around large Payment Service Providers (PSPs) that operate their own consumer-facing wallets, such as PayPal or Stripe (with Link). In this approach, the PSP is the Relying Party, and they own the entire authentication and payment flow.
Who owns the passkey?
In the PSP-Centric model, the PSP is the Relying Party (RP). The passkey is created for the PSP's domain (e.g., paypal.com
) and secures the user's account within that PSP's ecosystem.
Adoption Flywheel & Network Effects: This model also has an extremely strong network effect. A passkey created for a major PSP's wallet is reusable at every merchant that accepts that PSP, creating a powerful incentive for users and merchants to join the PSP's ecosystem.
Deep Dive: PayPal is a pioneer in this space. For a detailed case study on how they use passkeys to secure their ecosystem, read our analysis: PayPal Passkeys: Implement Passkeys like PayPal.
A common and critical question is whether a passkey created for one model can be reused in another. For example, can a passkey a user creates for their bank to use with SPC be used to log in to a merchant's website in a DA flow? The answer is no, and it highlights the central role of the Relying Party (RP).
A passkey is fundamentally a cryptographic credential linking a user to a specific RP. The public key is registered on the RP's servers, and the private key remains on the user's device. Authentication is the act of proving possession of that private key to that specific RP.
chase.com
). The passkey is registered with the bank.amazon.com
or stripe.com
). The passkey is registered with the merchant for login.visa.com
). The passkey is registered with the network for Click to Pay.paypal.com
). The passkey is registered with the PSP's wallet or service.Because the passkey is cryptographically bound to the RP's domain, a passkey registered with chase.com
cannot be validated by amazon.com
. They are distinct digital identities from a technical standpoint. A user will need to create a separate passkey for each Relying Party they interact with.
The "reusability" and "portability" that make passkeys powerful come from two areas:
chase.com
on a phone is automatically available on the user's laptop, but it is still only for chase.com
.Therefore, the four models are not just different technical paths but competing identity strategies. Each one proposes a different entity to be the primary Relying Party for payment authentication, and users will likely end up with passkeys for their issuers, favorite merchants, PSP wallets, and card networks.
While these models offer powerful new ways to authenticate, they also introduce a critical operational challenge that is often overlooked: passkey restoration and account recovery. Synced passkeys, managed by platforms like iCloud Keychain and Google Password Manager, mitigate the issue of a single lost device. However, they do not solve the problem of a user losing all their devices or switching between ecosystems (e.g., from iOS to Android). In these scenarios, a secure and user-friendly process for the user to prove their identity through other means and register a passkey on a new device is a non-negotiable prerequisite for any large-scale deployment. As Mastercard's own documentation notes, a user switching devices will need to create a new passkey, a process that may require identity validation by their bank.(Mastercard® payment passkeys – Frequently asked questions) This highlights that a complete passkey solution must encompass not only the authentication ceremony itself but also the entire lifecycle of passkey management, including robust recovery flows.
The four architectural models - Issuer-Centric (SPC), Merchant-Centric (DA), Network-Centric (Click to Pay), and PSP-Centric - translate into distinct integration opportunities for different players in the payment ecosystem. Each approach presents a unique set of trade-offs between user experience, implementation complexity, liability, and control. This section provides a pragmatic analysis of these integration points to guide strategic decision-making.
Integration Model | Key Technology | Target Player | User Experience (Friction) | Implementation Complexity | Liability Shift | Ecosystem Readiness |
---|---|---|---|---|---|---|
Issuer / ACS | Secure Payment Confirmation (SPC) | ACS Providers, Issuing Banks | Low (Improves challenge, but is still a challenge) | Medium (Requires ACS integration, 3DS 2.3+) | Yes (Standard 3DS liability shift) | Very Low (Blocked by lack of Apple support) |
Merchant / PSP (DA) | Delegated Authentication (DA) | Large Merchants, PSPs, Wallets | Very Low (Eliminates challenge for logged-in users) | High (Requires bilateral agreements, assumes liability) | Yes (Liability shifts to the delegating party) | Limited (Requires specific issuer-merchant trust) |
Network / Click to Pay | Federated Passkey Services | PSPs, Payment Gateways | Low (Standardized, low-friction guest checkout) | Medium (Requires integration with network APIs) | Yes (Network/Issuer assumes liability) | High (Strong network push for adoption) |
PSP / Wallet | Wallet-based Authentication | PayPal, Stripe Link, etc. | Very Low (Seamless flow within PSP's ecosystem) | Medium (Requires wallet & passkey infrastructure) | Yes (PSP assumes liability) | High (Mature for established wallet providers) |
The transition to passkey-based payment authentication is not a theoretical exercise; it is being actively driven by the industry's largest players. Their strategies, pilot programs, and public statements provide a clear view of the competitive dynamics and the likely trajectory of adoption.
PayPal: As a founding member of the FIDO Alliance and a digital-native payment provider, PayPal has been one of the most aggressive early adopters of passkeys. They began a phased global rollout in late 2022, starting in the U.S. and expanding to Europe and other regions. Their implementation is a case study in best practices, leveraging features like Conditional UI to create a one-tap login experience that automatically prompts for a passkey when the user interacts with the login field. PayPal has reported significant early success, including increased login success rates and a substantial reduction in account takeover (ATO) fraud. Their strategy also includes actively advocating for regulatory evolution in Europe, pushing for an outcome-based approach to SCA that recognizes the inherent security of synced passkeys.
Visa: Visa's strategy is centered on its Visa Payment Passkey Service, a comprehensive platform built on its own FIDO server infrastructure. This service is designed as a federated model, where Visa handles the complexity of authentication on behalf of its issuing partners. The primary vehicle for this service is Click to Pay, positioning Visa to own the guest checkout experience. Visa's messaging extends beyond simple payments, framing their passkey service as a foundational element of a broader digital identity solution that can be used across the commerce ecosystem. They are actively piloting the technology, including SPC, and report that biometric authentication can cut fraud rates by 50% compared to SMS OTPs.
Mastercard: Mastercard has mirrored Visa's strategic focus on a network-level service, launching its own Payment Passkey Service built upon its existing Token Authentication Service (TAS). Their go-to-market strategy has been characterized by a series of high-profile global pilots. In August 2024, they announced a major pilot in India, partnering with the country's largest payment aggregators (Juspay, Razorpay, PayU), a major online merchant (bigbasket), and a leading bank (Axis Bank). This was followed by launches in other key markets, including Latin America with partners Sympla and Yuno and the UAE with Tap Payments. This approach reveals a clear strategy: partner with ecosystem aggregators (PSPs, gateways) to achieve scale quickly. Mastercard has made a bold public commitment to phase out manual card entry in Europe by 2030, moving entirely to tokenized, passkey-authenticated transactions.
The strategies of these pioneers reveal a critical dynamic. The guest checkout experience, historically a fragmented and high-friction area, has become the strategic beachhead for the card networks. By creating a superior, passkey-enabled solution for guest users via Click to Pay, the networks can establish a direct identity relationship with consumers. Once a consumer creates a network-level passkey during one guest checkout, that identity becomes portable to every other merchant supporting Click to Pay. This allows the networks to effectively "acquire" user identities and offer a seamless experience across the web, a powerful move to capture the central role of identity provider for digital commerce.
The concerted efforts of these major players, combined with broader technological and regulatory trends, point toward an accelerated and inevitable shift in payment authentication.
The Inevitable Demise of OTPs: The industry-wide push for passkeys signals the beginning of the end for SMS-based one-time passcodes as a primary authentication method. OTPs are increasingly viewed as a liability due to both their high-friction user experience and their growing vulnerability to attacks like SIM swapping and sophisticated phishing campaigns. As passkeys become more widespread, the reliance on OTPs will be relegated to a fallback or recovery mechanism, rather than a primary challenge method.
Regulatory Tailwinds: While current regulations like PSD2 created the initial mandate for SCA, their rigid, category-based definitions have created some uncertainty around new technologies like synced passkeys. Upcoming regulatory updates, such as PSD3 in Europe, are expected to adopt a more technology-neutral, outcome-focused approach. This will likely favor authentication methods that are demonstrably phishing-resistant, providing a clearer regulatory pathway for the broad adoption of passkeys as a compliant SCA method.
The Rise of Federated Payment Identity: The strategic moves by Visa and Mastercard are about more than just securing payments; they are about establishing a new paradigm for digital identity. By building federated passkey services, they are positioning themselves as the central, trusted identity providers for the entire digital commerce ecosystem. This can be seen as a direct strategic response to the powerful identity platforms controlled by Big Tech (e.g., Apple ID, Google Account). The future of online payments is inextricably linked to this larger battle over who will own and manage consumer identity on the web.
While the core payment transaction is the primary focus, passkey technology is poised to eliminate friction and enhance security across a wide range of adjacent financial services. Many processes that still rely on passwords or clumsy OTPs are ideal candidates for a passkey upgrade.
The rise of stablecoins (like USDC or EURC) presents a new, blockchain-based payment rail. However, a major barrier to mainstream adoption has been the poor user experience and security of crypto wallets. Traditionally, these wallets are secured by a "seed phrase" (a list of 12-24 words) that the user must write down and protect. This is incredibly user-unfriendly and makes account recovery a nightmare.
Passkeys are set to completely transform this experience. The industry is moving toward a model where the private key that controls the on-chain assets is secured by the device's passkey.
This evolution could significantly reduce the friction and risk associated with using stablecoins for payments, potentially making them a more viable and mainstream alternative to traditional payment rails.
The analysis of the payment landscape and the emerging passkey integration models reveals several distinct and actionable opportunities. For a passkey-first authentication company like Corbado, the goal is to empower every player in the ecosystem to achieve their strategic goals by providing the foundational technology needed to navigate this transition.
This analysis highlights a critical success factor for any passkey-based strategy: user adoption. A solution that can demonstrably increase passkey creation and usage from a baseline of ~10% to over 50% addresses the primary challenge facing the rollout of these new authentication models. Based on the ecosystem and the strategic goals of its players, the following organizations and sectors are prime candidates for such a solution.
paypal.com
, etc.) is a core strategic goal. It reduces fraud, improves the user experience, and strengthens the network effect, making the wallet more attractive to both consumers and merchants.The large technology companies operate sophisticated digital wallets that play a unique and powerful role in the payments ecosystem. They sit at the intersection of the user's device, their platform identity, and the traditional payment rails, giving them a distinct position and strategy regarding passkey adoption.
Apple Pay and Google Pay are best understood as a technology and authentication layer that sits on top of the existing payment card infrastructure. They do not issue cards or process transactions themselves but instead securely store and transmit tokenized versions of a user's existing payment cards.
Amazon Pay and Meta Pay operate more like a traditional merchant with a very large Card-on-File (CoF) wallet that can be used on third-party sites and within their own ecosystems (e.g., for social commerce on Instagram).
Amazon.com
). By moving their vast user bases from passwords to passkeys for account login, they dramatically reduce the risk of account takeover fraud and protect the valuable stored payment credentials.The payment industry is at the dawn of a new era of authentication. The long-standing compromise between security and convenience is finally being resolved by the maturation and adoption of passkey technology. The analysis presented in this report demonstrates that this is not a monolithic shift but a complex transition with multiple competing visions for the future. Issuers seek to enhance the existing 3DS framework with SPC; large merchants and PSPs aim to seize control of the experience through Delegated Authentication or by building their own wallet ecosystems; and the card networks are creating a new, federated identity layer with Click to Pay. Each model is vying to become the new standard for user trust and convenience.
Enjoyed this read?
🤝 Join our Passkeys Community
Share passkeys implementation tips and get support to free the world from passwords.
🚀 Subscribe to Substack
Get the latest news, strategies, and insights about passkeys sent straight to your inbox.
Related Articles
Table of Contents