Passkeys are everywhere right now, and the hype is well-deserved. They’re paswordless, phishing resistant, and deliver seamless login experiences. Major platforms from Apple to Google are racing to implement them. But if you're planning your organisation's passwordless strategy, there's a critical distinction you need to understand: passkeys authenticate devices, not people. And the moment you move beyond basic login, that difference can become expensive.
Here’s what passkeys get right:
For low-risk scenarios and consumer-facing applications, these benefits are substantial. Passkeys represent genuine progress over traditional passwords. But they only solve part of the authentication challenge.
To properly evaluate paswordless solutions, you have to distinguish between authentication and identiy verification:
Passkeys excel at authentication. They cryptographically prove that someone controls a specific device. But they don't – and can't – verify the identity behind that device. This isn't a technical limitation to be fixed in the next version but a fundamental design characteristic.
To be fair, the identity gap doesn't matter for every use case. But it surfaces quickly in scenarios that define most enterprise and regulated environments:
These aren't edge cases. They represent the majority of real-world authentication needs in organisations handling sensitive operations.
You don't need to completely abandon passkeys. You just need to know where they fit into your broader identity strategy. A comprehensive passwordless approach requires verified mobile identity at its foundation. This means: a one-time identity verification that confirms a person's legal identity through regulated processes, then securely reuses that verified identity across your entire customer journey.
This approach delivers what passkeys alone cannot:
The user experience remains frictionless, but is now backed by genuine identity assurance.
Passkeys have an important role to play. They're excellent for:
However, they're insufficient for:
The path forward isn't choosing between security and convenience. It's understanding that authentication without identity verification creates risk and friction downstream.
A complete passwordless strategy starts with these questions:
If any of these apply to your organisation, you need a verified mobile identity platform that provides cryptographic identity assurance from the start.