Processes & SecuritySecurityCloud

Passkeys - The Better Passwords?

Passkeys are set to replace passwords soon. They promise more convenience and higher security, effectively banning phishing. Here is how this new technology works.

November 15, 2023
4 min read
Passkeys as a secure alternative to passwords

For Readers in a Hurry

  • Humans are the biggest vulnerabilities in any computer system—at least when it comes to usernames and passwords, and thus access to data and applications. Consequently, people are a primary target for hackers.
  • Despite two-factor authentication, security has not fundamentally changed. Resourceful cybercriminals use social engineering to find ways for users to disclose their second factor.
  • Passkeys aim to change this: Instead of a username, password, and second factor, a passkey is automatically created when registering for an application. One half is stored on the user's device, the other half in the application.
  • When the user logs in, the passkey is used in the background to authenticate them. There is no need to enter a username or password.
  • Major internet browser manufacturers have already begun implementing passkey technology. Some website operators already offer passkeys for login.

A Tip for Trying It Out

AI is playing an increasingly dominant role in security; threats have become too complex for human responsiveness alone. If you are interested in a carefully curated weekly newsletter, the Handelsblatt AI Briefing is an excellent choice.

Passwords - A Problem in the Cloud Age

For decades, passwords have been the de facto standard for user authentication. However, they are increasingly becoming a problem:

  • We forget them easily.
  • We reuse them across services.
  • They can be easily stolen.
  • They can be intercepted and misused.

Especially in times of heterogeneous system landscapes, a user must manage, use, and securely store over 100 passwords. This is a risk for every company.

While password managers offer a solution for more secure credential management, they are still subject to the inherent problem of passwords: they must be transmitted between the client and the server.

Passkeys change that. The era of passwords is coming to an end.

What Are Passkeys?

Passkeys are access credentials generated and stored on the user's device during registration for an application or website. This means the user no longer sets a username and password; instead, the device creates "keys" in the background. One of these is transmitted to the application or website to be stored there as a "counterpart."

Registration

  1. A user visits a website to register.
  2. The website has implemented the passkey standard (based on the standardized FIDO protocol "WebAuthn") and sends the user a configuration file with a request to generate a passkey.
  3. The user's device receives this configuration file and displays it to the user.
  4. The user automatically reads the configuration file using an authenticator program that supports the FIDO WebAuthn standard.
  5. The authenticator program then generates a unique key pair: one private, one public.
  6. The private key is stored on the device, protected by additional biometric security, while the public key is transmitted to the web application and stored there automatically.

Login

  1. The website sends an "Authentication Challenge" to the user's device—a dynamically generated message that the device must sign with its private key.
  2. The authenticator program recognizes this request and asks the user to authorize it using their biometric data.
  3. If authorization is successful, the authenticator program signs the challenge and sends the signed version back.
  4. The website checks the signature using the public key. If valid, the website grants the user access.

Passkeys rely on digital certificates.

Advantages of Passkeys

Security

The combination of public-key cryptography and biometric authentication eliminates the problems of password reuse, the interception of a second factor, and password theft from servers.

Convenience

The passkey process is more convenient for the user, as they no longer need to remember usernames and passwords.

Phishing Resistance

Passkeys are never stored as a secret in any application or on any website. The attack surface for "social engineering" is significantly reduced.

Platform Independence

Since passkeys are a web standard implemented by all major internet browser manufacturers, this process can be used on all devices and operating systems.

When Are Passkeys Coming?

A key prerequisite for the widespread use of passkeys is their implementation in all common browsers and as many web applications as possible.

Windows 10, macOS Ventura, ChromeOS 109, iOS 16, or Android 9 are the minimum requirements. Additionally, you need Chrome 109, Safari 16, or Edge 109. Higher versions work as well, of course.

PayPal and other major providers already offer the option to authenticate via passkey. The rollout is progressing rapidly.

The question is not whether passkeys will prevail, but how long it will take for application developers to implement this new, more secure password standard.

Passkeys make the world a little bit safer.

Interested in our solutions?

Contact us for a free initial consultation.

Get in Touch

Related articles

Pillar article
Featured image for article: Process Automation: The Pragmatic ApproachRecommended
Processes & SecurityLow-CodeERP

Process Automation: The Pragmatic Approach

Process automation doesn't have to be complicated. Learn how to achieve big results with small steps.

June 20, 2024
3 min read
Business Automatica Team
Photorealistic image of a truck scale at a recycling center. A driver in a high-visibility vest stands next to his tipper truck and scans a weatherproof QR code on a sign at the scale house with his smartphone. In the background, roll-off containers, an excavator, and piles of material are visible; above them, a clear sky and a license plate recognition camera on a mast.

Container Services: Fully Digital Weighing Processes

Paper slips, phone calls, and WhatsApp photos slow down the weighbridge. A QR-based web app connects drivers, the yard, and the ERP in a single process.

April 17, 2026
10 min read
Business Automatica Team
Laptop with accounting software and digital icons for automation and digitization
Processes & SecurityDATEVPDF

Automating Accounting

Automating accounting with AI: Save time, reduce errors, and simplify financial processes through intelligent automation.

November 23, 2025
4 min read
Business Automatica Team
Digitalization of invoicing processes and E-Government symbolic image
Processes & SecurityLow-CodeCloud

Digital Dog Tax Registration

Digital dog tax registration as a transferable model for modern, efficient municipal administrative processes.

July 19, 2025
2 min read
Business Automatica Team
Illustration of a man at a laptop with icons for PDF, AI, and spreadsheets – automated PDF processing
Processes & SecurityPDFLow-Code

Automated Extraction of Certificate Data

AI-supported extraction of technical data from PDF certificates – precise, fast, and seamlessly integrated into your ERP systems.

June 2, 2025
4 min read
Business Automatica Team
Automation solutions for increased productivity in the company
Processes & SecurityLow-CodeERP

Automation Solutions - Simple Paths to Increased Productivity

Automation is not rocket science. With the right strategy, companies can save time, avoid errors, and create space for strategic tasks.

December 17, 2024
6 min read
Business Automatica Team