โ† Back|Passkey

What happens under the hood

  1. 01User enters email (or is recognized from an existing session)
  2. 02Browser prompts for device authentication
  3. 03Device signs a challenge with the private key. It never leaves the device
  4. 04Signature is verified against the stored public key
  5. 05Session established. No secret was ever transmitted

Key tradeoffs

โœ“ Phishing-proof by design. Private key never leaves the device

โœ— Device-bound: user locked out if they lose their only enrolled device

โœ“ No shared secret. Even a Descope breach can't leak user credentials

โœ— Requires user education; 'passkey' is still unfamiliar to many users

โœ“ Biometric auth feels native and fast on mobile

โœ— Older browsers / devices may not support WebAuthn. Need a fallback

Try it live

โ†’ Enter your email and click Continue. If you've registered a passkey on this device, your browser will prompt for Touch ID or Face ID. First time? You'll be asked to create one.

Auth Decision Kit