Explore the passkey updates from Apple's WWDC25 for OS 26. Learn about automatic upgrades, management endpoints, and secure credential exchange.
Vincent
Created: June 11, 2025
Updated: June 13, 2025
Our mission is to make the Internet a safer place and passkeys provide a superior solution to achieve that. That's why we want to keep you updated with the latest industry insights here.
The long-promised passwordless future is no longer a distant vision. It's taking shape. Apple's Worldwide Developers Conference (WWDC25) announcements deliver a substantial arsenal of passkey enhancements for its upcoming OS 26 suite:
These developments signal an even deeper commitment from Apple to dismantle the vestiges of password-based authentication and usher in an era of more secure, user-friendly digital experiences.
During the WWDC25 presentation, Andrew Abosh from Apple's Authentication Experience team detailed five important updates designed to accelerate passkey adoption and usability. These include:
This article examines three of these transformative updates — automatic passkey upgrades, passkey management endpoints, and importing/exporting passkeys — and explores the role of keeping passkeys synchronized and accurate. (The new Account Creation API is an important part of this strategy, but its breadth warrants a dedicated discussion in a future analysis.)
Recent Articles
Apple's strategy appears holistic, addressing every facet of the passkey lifecycle. A suite of interconnected enhancements — rather than isolated features — spans the initial creation of an account with a passkey, migration of existing accounts, discoverability of passkey options, data accuracy over time and user control over credential storage. Tackling multiple friction points simultaneously signals a deep, long-term commitment from Apple and makes a compelling case for developers and services to invest confidently in passkey adoption.
The following table provides a concise overview of the key passkey enhancements announced at WWDC25 for OS 26:
Feature | Brief Description | Primary Benefit for Users/Developers |
---|---|---|
Account Creation API | Fastest, easiest way to create a new account with a passkey from the start | Streamlined, secure onboarding. |
Keeping Passkeys Up-to-Date | Sync account changes (e.g., username, revoked passkeys) with credential managers | Accurate credential info, smoother sign-ins. |
Automatic Passkey Upgrades | Seamlessly adds passkeys to existing password-based accounts post-login | Frictionless security upgrade for users. |
Passkey Management Endpoints | Showcase a service's passkey adoption directly within credential managers | Improved discoverability, easier upgrades. |
Importing & Exporting Passkeys | Securely transfer passkeys between participating credential managers | User control, flexibility, ecosystem openness. |
A major hurdle in passkey adoption is migrating the existing user base from passwords. Apple's automatic passkey upgrade feature removes this friction by allowing a passkey to be created automatically in the background when a user signs in with their password. This provides a seamless path for adding passkeys without requiring extra user interaction.
We've covered the technical details of this feature in-depth in our previous blog post. If you'd like to see it in action, you can try it out on our demo page.
Apple recommends attempting the upgrade on every password sign-in if the user doesn't already have a passkey. The same capability exists for web apps, ensuring a consistent upgrade path across platforms.
Even when a service supports passkeys, users may be unaware. Passkey management endpoints solve this by letting credential managers surface links to a service's passkey pages:
Well-known URI: host a JSON file at /.well-known/passkey-endpoints
.
Strict server rules: serve the file directly (no redirects), return 200 OK
, and set Content-Type: application/json
.
JSON keys:
enroll
: URL where a user can add a new passkey.manage
: URL where a user can view, revoke or add passkeys.JSON Key | Description | Example Value | Required? |
---|---|---|---|
enroll | URL to add a new passkey to an existing account | https://example.com/settings/security/passkeys/enroll | Optional (recommended) |
manage | URL to manage existing passkeys | https://example.com/settings/security/passkeys/manage | Optional (recommended) |
Credential managers can probe this endpoint, display an "add passkey" button inside their UI, and deep-link users directly to the relevant page on the service's site. This expands the surface area for passkey adoption prompts and reaches users right where they manage their credentials.
True user ownership of credentials requires portability. Apple addresses this with secure passkey transfer:
This standardization work is part of a broader industry effort to define the Credential Exchange Protocol (CXP) and Credential Exchange Format (CXF). For a deeper dive into these emerging FIDO standards, you can read our detailed overview of CXP and CXF.
Websites and apps need not change anything; the transfer happens solely between credential managers, and existing passkeys remain valid. Credential-manager developers can adopt ASCredentialExportManager
and ASCredentialImportManager
to participate.
By facilitating secure export even from iCloud Keychain to third-party managers, Apple balances ecosystem strength and user freedom, building trust and setting a high security bar for credential portability.
Why Are Passkeys Important For Enterprises?
Enterprises worldwide face severe risks due to weak passwords and phishing. Passkeys are the only MFA method that meets enterprise security and UX needs. Our whitepaper shows how to implement passkeys efficiently and what the business impact is.
Accurate, synchronized credentials are essential for a smooth passkey experience. Stale information, like an old username or a revoked passkey that still appears, leads to failed sign-ins and user frustration.
The WebAuthn Signal API provides a standardized way for services to notify credential managers about account changes. It helps keep passkey metadata current and removes stale credentials. For a comprehensive overview of this W3C standard, please see our dedicated article: WebAuthn Signal API: Update & Delete Passkeys on Client-Side.
Apple announced support for this standard in OS 26. Developers can now use signals to notify credential managers about:
reportPublicKeyCredentialUpdate
, web: PublicKeyCredential.signalCurrentUserDetails()
)reportAllAcceptedPublicKeyCredentials
, web: signalAllAcceptedCredentials()
)reportUnusedPasswordCredential
)This ensures a seamless and reliable authentication experience, a core part of the "delightful" passkey promise.
Although this analysis focuses on upgrades, management, and portability, the new Account Creation API is critical. It streamlines sign-up, often pre-filling user details and creating a passkey in one step with biometric confirmation. By making passkeys the default from the very first interaction, it normalizes passwordless onboarding and cements the foundation for a future in which passwords never appear.
The passkey enhancements unveiled at WWDC25 for OS 26 accelerate the journey toward a truly passwordless digital environment. Automatic Passkey Upgrades, Passkey Management Endpoints, secure import/export and the WebAuthn Signal API — alongside the forthcoming Account Creation API — form a cohesive strategy that dismantles remaining friction points and drives adoption.
For developers and businesses, these updates offer:
At Corbado, we're ready to help businesses navigate these changes and integrate robust passkey solutions, whether they're just starting the journey or enhancing existing deployments.
Enjoyed this read?
🤝 Join our Passkeys Community
Share passkeys implementation tips and get support to free the world from passwords.
🚀 Subscribe to Substack
Get the latest news, strategies, and insights about passkeys sent straight to your inbox.
Related Articles
Table of Contents