Learn how private keys of passkeys is securely synced across devices using iCloud Keychain and the Secure Enclave, ensuring high-level encryption and security.
Vincent
Created: August 30, 2024
Updated: January 6, 2026

The private key of passkeys is securely synced across devices using end-to-end encryption through iCloud Keychain (on Apple devices), ensuring that the plaintext private key is never exposed during transfer or storage. The key is wrapped (encrypted) on the original device using a combination of device-specific and iCloud Keychain data before being synced. On a new device, this encrypted key is downloaded and reconstructed within the Secure Enclave, which ensures the key material remains protected throughout the process.
Our explanation in this FAQ applies to Apple devices and iCloud Keychain. Google operates in similar ways with Google Password Manager, as do cloud-based third-party password managers that provide integrated passkey sync (e.g. 1Password, Dashlane). Note: KeePassXC stores passkeys in a local database and relies on user-managed file synchronization rather than providing integrated cloud sync.
Discuss passkeys news and questions in r/passkey.
To fully understand how the private key of passkeys is synced, it’s important to understand the roles of iCloud Keychain, the Secure Enclave, and the encryption processes involved.
Let's explain the functionality at a scenario where the user creates a passkey on their iPhone (old device) and wants to sync this passkey to their MacBook (new device) via iCloud Keychain.
Become part of our Passkeys Community for updates & support.
Subscribe to our Passkeys Substack for the latest news.
Table of Contents
Related Articles