	{"id":97515,"date":"2023-12-23T21:21:44","date_gmt":"2023-12-24T05:21:44","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=97515"},"modified":"2024-01-11T09:24:41","modified_gmt":"2024-01-11T17:24:41","slug":"what-are-passkeys-and-how-do-they-work","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/what-are-passkeys-and-how-do-they-work\/","title":{"rendered":"What are Passkeys, and how do they work?"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-97523\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/03\/passkeys-hero.jpg\" alt=\"\" width=\"1600\" height=\"900\" \/><\/p>\n<p>When Apple released iOS 16 and macOS Ventura in late 2022, the company introduced support for passkeys. <strong>Passkeys<\/strong> are an authentication technology designed to replace passwords. There are many advantages to using passkeys instead of passwords.<\/p>\n<p>In this article, I will explain what passkeys are, how they work, and why they may be the future of secure authentication on websites and in apps.<\/p>\n<p><em>In this article:<\/em><\/p>\n<ul>\n<li><a href=\"#history\">A brief history of passwords<\/a><\/li>\n<li><a href=\"#importance\">The importance of password security<\/a><\/li>\n<li><a href=\"#passwordless\">Passwordless logins<\/a><\/li>\n<li><a href=\"#passkeys\">Passkeys: a step beyond passwordless<\/a><\/li>\n<li><a href=\"#how\">How passkeys work on Macs, iPhones, and iPads<\/a><\/li>\n<li><a href=\"#pros-cons\">Advantages and disadvantages of passkeys<\/a><\/li>\n<li><a href=\"#learnmore\">How can I learn more?<\/a><a name=\"history\"><\/a><\/li>\n<\/ul>\n<h3 id=\"thehistoryofpasswords\">A brief history of passwords<\/h3>\n<p>Passwords have been used for thousands of years as a means of authenticating people. They have been used in military contexts to separate friends from foes. Simple spoken passwords were also used to gain entry to speakeasies in the United States during prohibition; <a href=\"https:\/\/www.youtube.com\/watch?v=ySqec8WrEQQ\">this clip from the Marx Brothers\u2019 film Horse Feathers<\/a> shows some lax security in that context.<\/p>\n<p><span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe loading=\"lazy\" class=\"youtube-player\" width=\"640\" height=\"360\" src=\"https:\/\/www.youtube.com\/embed\/ySqec8WrEQQ?version=3&#038;rel=1&#038;showsearch=0&#038;showinfo=1&#038;iv_load_policy=1&#038;fs=1&#038;hl=en-US&#038;autohide=2&#038;wmode=transparent\" allowfullscreen=\"true\" style=\"border:0;\" sandbox=\"allow-scripts allow-same-origin allow-popups allow-presentation\"><\/iframe><\/span><\/p>\n<p>With computers, passwords became the only way to identify who should have access to various computer systems. The combination of a username and password is supposed to ensure that someone logging into a computer, website, or service is uniquely identified, authorized, and has access only to their own data.<a name=\"importance\"><\/a><\/p>\n<h3 id=\"theimportanceofpasswordsecurity\">The importance of password security<\/h3>\n<p>Before the Internet, password security was less important, because anyone wanting to access a computer generally needed physical access. While you needed passwords to identify yourself on computers at universities and in some businesses, individual users rarely used them.<\/p>\n<p>On the Mac in particular, basic functionality for creating separate local user accounts was added in 1999, to Mac OS 9. However, it wasn&#8217;t until the release of Mac OS X in 2001 that separate user accounts became more mainstream.<\/p>\n<p>With the advent of the Internet, authentication to online services via a username and password became essential, because of the need to log into computers remotely. Passwords were, in some cases, encrypted to ensure that nobody other than the intended user could access them\u2014though that wasn\u2019t universally true in some early systems.<\/p>\n<p>Over time, the need for more secure passwords has become indespensible. Not only because passwords protect sensitive data, such as military secrets and bank accounts, but because there are more threats to computer security as hackers attempt to access online accounts.<\/p>\n<p>For many years, it was normal for people to use the same combination of username and password on multiple websites and services, because they couldn&#8217;t remember all the passwords they used, but continuous data breaches of major companies had led to leaks of these username\/password pairs, allowing hackers to try to use them on different services, in a technique called <a href=\"https:\/\/www.intego.com\/mac-security-blog\/what-is-credential-stuffing-why-you-need-unique-passwords\/\">credential stuffing<\/a>.<\/p>\n<p>It&#8217;s important to create <a href=\"https:\/\/www.intego.com\/mac-security-blog\/4-tips-for-creating-secure-passwords\/\">unique, strong passwords<\/a> to prevent hackers from accessing accounts, either via credential stuffing, or via brute force or dictionary attacks\u2014automated methods to try millions of words, common passwords, and likely variations.<\/p>\n<p>As the stakes have risen, and as hackers have developed more techniques for breaching accounts, the need has come for more secure authentication methods. While many people use <a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-choose-the-right-password-manager-for-you\/\">password managers<\/a> that generate long pseudorandom passwords\u2014which is general\/y the best option available, along with multi-factor authentication\u2014this can still be an onerous process. The majority of computer users today still create passwords that are insecure and reuse them across multiple sites, and rarely use multifactor authentication.<\/p>\n<p>Over time, multifactor authentication or MFA \u2014 more commonly known as two-factor authentication or 2FA \u2014 was developed to thwart hackers. This involves entering something you know (your user name and password) along with something you have (a code received by SMS or generated by an app) and\/or something you are (biometrics, like Face ID or Touch ID). Even some forms of 2FA are imperfect at protecting accounts, especially in scenarios where a phishing site acts as a man-in-the-middle relay between the victim and the real site (as discussed on <a href=\"https:\/\/podcast.intego.com\/283\">episode 283<\/a> of the Intego Mac Podcast). Nevertheless, imperfect 2FA is better than not using 2FA at all.<\/p>\n<p>An improved form of two-factor authentication is <a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-use-a-security-key-to-protect-sensitive-online-accounts\/\">the use of a physical security key<\/a>; you can even <a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-protect-your-apple-id-account-with-security-keys-on-iphone-ipad-or-mac\/\">use a security key to protect your iCloud account<\/a>.<a name=\"passwordless\"><\/a><\/p>\n<h3 id=\"passwordlesslogins\">Passwordless logins<\/h3>\n<p>Some websites and services allow you to log in without a password, but this still requires a username\/password pair, and leverages an additional device to log in. For example, <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/solutions\/passwordless-authentication\" target=\"_blank\" rel=\"noopener\">Microsoft\u2019s passwordless authentication<\/a> works via the company\u2019s Authenticator app on a smartphone. After you\u2019ve set up the process, using your username and password, you can log into any Microsoft site or service by answering a challenge. The website displays a two-digit number, and instructs you to choose that number in the app. A dialog in the Microsoft Authenticator app gives you three options; tap the correct one, and the app communicates with the site or service to confirm your identity. If you aren&#8217;t the one trying to log into the site, tap Deny to prevent a hacker from accessing your account.<\/p>\n<p><img class=\"aligncenter size-full wp-image-97517\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/03\/microsoft-authenticator.jpeg\" alt=\"\" width=\"300\" \/><\/p>\n<p>This form of authentication is only passwordless at the moment you log into a site or service. It depends on an existing username and password, which you have confirmed in the app, and biometric identification on your iPhone, via Face ID or Touch ID. You still need a password, but the fact that you don\u2019t need to type it each time you log in means that it is easy to use a long, secure password. And you can still use the username and password combination to log into these sites and services.<a name=\"passkeys\"><\/a><\/p>\n<h3 id=\"passkeysastepbeyondpasswordless\">Passkeys: a step beyond passwordless<\/h3>\n<p>Passkeys take this one step further. As <a href=\"https:\/\/developers.google.com\/identity\/passkeys\" target=\"_blank\" rel=\"noopener\">Google says<\/a>, \u201cA passkey is a digital credential, tied to a user account and a website or application.\u201d Passkeys contain all the information needed to identify users: their account name and the key that authenticates them.<\/p>\n<p>As <a href=\"https:\/\/developer.apple.com\/videos\/play\/wwdc2022\/10092\/?time=630\" target=\"_blank\" rel=\"noopener\">Apple points out<\/a>, \u201cPasskeys are built on the WebAuthentication &#8211; or WebAuthn standard &#8211; and use public-key cryptography. Rather than having a typable word or string, unique cryptographic key pairs are generated for every account.\u201d These cryptographic keys are very long strings of characters, and you never need to know what they are.<\/p>\n<p>The authentication occurs via your smartphone, on which you have identified yourself, and each time you log into a site or service with a passkey, your phone\u2019s biometric authentication proves that you are you, and sends the passkey to the site or service. <strong>One way to think of passkeys is that they make your smartphone act as a physical security key.<\/strong><\/p>\n<p>Passkeys can be backed up, synced, and transferred to new devices, and they are end-to-end encrypted. When you save a passkey for a site or service, you can use it on other devices that share your passwords. With Apple devices, passkeys sync using <a href=\"https:\/\/www.intego.com\/mac-security-blog\/mac-and-ios-keychain-tutorial-how-apples-icloud-keychain-works\/\">iCloud Keychain<\/a>, and you can access them on every Apple device you own that is signed into your iCloud account.<\/p>\n<p>You can also bootstrap passkeys, using one device to log into another. Since Apple, Google, and Microsoft are all members of the <a href=\"https:\/\/fidoalliance.org\" target=\"_blank\" rel=\"noopener\">FIDO Alliance<\/a>, there is true cross-platform compatibility for passkeys. You can use your iPhone to log into a site or service on a Windows computer, or an Android phone to log in on your Mac. This uses <a href=\"https:\/\/en.wikipedia.org\/wiki\/Client_to_Authenticator_Protocol\" target=\"_blank\" rel=\"noopener\">CTAP2<\/a>, the Client to Authenticator Protocol 2, which is a way that devices can communicate with other devices, to transfer the authentication from your smartphone to the device on which you\u2019re logging in.<\/p>\n<p>This <a href=\"https:\/\/www.youtube.com\/watch?v=SWocv4BhCNg\" target=\"_blank\" rel=\"noopener\">video from the FIDO Alliance<\/a>, the group behind new passkey standards, shows how passkeys work in practice.<a name=\"how\"><\/a><\/p>\n<p><span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe loading=\"lazy\" class=\"youtube-player\" width=\"640\" height=\"360\" src=\"https:\/\/www.youtube.com\/embed\/SWocv4BhCNg?version=3&#038;rel=1&#038;showsearch=0&#038;showinfo=1&#038;iv_load_policy=1&#038;fs=1&#038;hl=en-US&#038;autohide=2&#038;wmode=transparent\" allowfullscreen=\"true\" style=\"border:0;\" sandbox=\"allow-scripts allow-same-origin allow-popups allow-presentation\"><\/iframe><\/span><\/p>\n<h3 id=\"howpasskeysworkonmacsiphonesandipads\">How passkeys work on Macs, iPhones, and iPads<\/h3>\n<p>Although it&#8217;s great that Apple\u2019s operating systems support passkeys, unfortunately there aren\u2019t very many sites or services that support them yet. A password manager company, 1Password, maintains a site called <a href=\"https:\/\/passkeys.directory\/\" target=\"_blank\" rel=\"noopener\">Passkeys.directory<\/a> that has a list of some sites that currently support passkeys as a sign-in and\/or multifactor authentication method. Some notable sites that support passkeys as of early 2024 include Google, Amazon, Best Buy, Cloudflare, eBay, Kayak, and PayPal (in the U.S.). But passkey support still isn&#8217;t widespread.<\/p>\n<p>Let&#8217;s take a look at how to set up passkeys with one of those sites supports passkeys already: eBay. If you go to your eBay account settings, then Sign-in and security, then Password, you\u2019ll see an option to set up a passkey, though they don\u2019t use that term.<\/p>\n<div id=\"attachment_97520\" style=\"width: 1166px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-97520\" loading=\"lazy\" class=\"wp-image-97520 size-full\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/03\/ebay1.png\" alt=\"Tired of passwords? Depending on your device, you can sign in with your fingerprint, face or PIN. (Maybe layer) (Turn on) or Don't ask me again\" width=\"1156\" height=\"781\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/03\/ebay1.png 1156w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/03\/ebay1-300x203.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/03\/ebay1-1024x692.png 1024w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/03\/ebay1-150x101.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/03\/ebay1-768x519.png 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/03\/ebay1-657x444.png 657w\" sizes=\"(max-width: 1156px) 100vw, 1156px\" \/><p id=\"caption-attachment-97520\" class=\"wp-caption-text\">eBay&#8217;s passkey-enabling setting doesn&#8217;t mention passkeys.<\/p><\/div>\n<p>Click Turn On, and Safari displays a dialog like this:<\/p>\n<p><img class=\"aligncenter size-full wp-image-97518\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/03\/ebay2.png\" alt=\"\" width=\"500\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/03\/ebay2.png 1156w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/03\/ebay2-300x225.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/03\/ebay2-1024x767.png 1024w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/03\/ebay2-150x112.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/03\/ebay2-768x575.png 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/03\/ebay2-657x492.png 657w\" sizes=\"(max-width: 1156px) 100vw, 1156px\" \/><\/p>\n<p>After you\u2019ve completed this process, you\u2019ll see this the next time you go to sign in on eBay:<\/p>\n<p><img class=\"aligncenter size-full wp-image-97522\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/03\/ebay3.png\" alt=\"\" width=\"460\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/03\/ebay3.png 919w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/03\/ebay3-300x240.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/03\/ebay3-150x120.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/03\/ebay3-768x615.png 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/03\/ebay3-657x526.png 657w\" sizes=\"(max-width: 919px) 100vw, 919px\" \/><\/p>\n<p>Click Sign In, and Safari displays this:<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter wp-image-97519 size-full\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/03\/ebay4.png\" alt=\"Do you want to sign in to &quot;ebay.com&quot; with your saved passkey for &quot;user's name&quot;? Continue with Touch ID or Other Sign In Options\" width=\"1156\" height=\"876\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/03\/ebay4.png 1156w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/03\/ebay4-300x227.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/03\/ebay4-1024x776.png 1024w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/03\/ebay4-150x114.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/03\/ebay4-768x582.png 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/03\/ebay4-657x498.png 657w\" sizes=\"(max-width: 1156px) 100vw, 1156px\" \/><\/p>\n<p>Authenticate on your device \u2014 in this case, I was using a Mac with Touch ID \u2014 and you log in immediately.<\/p>\n<p>In the Password tab of Safari\u2019s Settings, you can see that a passkey has been saved for eBay. But you cannot view the contents of the passkey.<\/p>\n<p><img class=\"aligncenter size-full wp-image-97521\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/03\/ebay5.png\" alt=\"\" width=\"600\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/03\/ebay5.png 1772w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/03\/ebay5-300x241.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/03\/ebay5-1024x823.png 1024w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/03\/ebay5-150x121.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/03\/ebay5-768x617.png 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/03\/ebay5-1536x1234.png 1536w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/03\/ebay5-657x528.png 657w\" sizes=\"(max-width: 1772px) 100vw, 1772px\" \/><\/p>\n<p>This passkey syncs across devices, so you can use it on any device signed into your iCloud account.<a name=\"pros-cons\"><\/a><\/p>\n<h3 id=\"advantagesanddisadvantagesofpasskeys\">Advantages and disadvantages of passkeys<\/h3>\n<p>There are many advantages to passkeys. In use, they are not very different from using a strong password and a password manager, and confirming your identity via biometrics. So users will not find the process complex or complicated, and are likely to easily adopt this technology, once they understand the value.<\/p>\n<p>Passkeys free up the need for password requirements (a minimum number of characters, capital letters, and special characters), and ensure that users don\u2019t have to remember passwords. However, you will still need to know some passwords: the one for your Apple, Google, or Microsoft accounts; the one you use to log into your computer; and the passcode for your smartphone.<\/p>\n<p>The fact that passkeys can be synced, backed up, exported, and imported, means that they are not limited to being used on one device. And the cross-platform nature of the FIDO standard, combined with the support from all major operating system makers, guarantees that there will not be a VHS vs. Betamax war going forward. It\u2019s in everyone\u2019s interest to have a common standard.<\/p>\n<p>As for security, phishing should theoretically be impossible with passkeys. Websites identify themselves via a certificate, and fake websites, which may look legitimate, cannot accept a passkey and pass it on to the real site.<\/p>\n<p>However, there are some disadvantages. For now, websites and services will allow you to log in using either a passkey or a username\/password combination, so that latter is still susceptible to hacking and phishing.<\/p>\n<p>If you get locked out of your iCloud account (or similar accounts on Android or Windows), then you may no longer have access to your passkeys. Several <a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-choose-the-right-password-manager-for-you\/\">password managers<\/a>, such as <a href=\"https:\/\/www.future.1password.com\/passkeys\/\" target=\"_blank\" rel=\"noopener\">1Password<\/a> and <a href=\"https:\/\/support.dashlane.com\/hc\/en-us\/articles\/7888558064274-Passkeys-in-Dashlane\" target=\"_blank\" rel=\"noopener\">Dashlane<\/a>, support passkeys; it seems essential that passkeys are not limited in access to only operating system providers, and should be fully portable.<\/p>\n<p>Finally, passkeys are personal, and this poses problems for businesses who need to manage access to sites and services for employees. Since corporate IT people can\u2019t get access to a user&#8217;s passkeys, and can\u2019t control their use, additional technology may be needed before some businesses will adopt this form of credential management.<\/p>\n<p>Passkeys are an excellent improvement on existing authentication methods, and at least in the future could free users from having to create and remember passwords. There are some limitations, and passkeys are only in their infancy, but over time, there&#8217;s a good chance that they may come to replace passwords.<a name=\"learnmore\"><\/a><\/p>\n<h3>How can I learn more?<\/h3>\n<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/04\/intego-podcast-artwork-400.jpg\" target=\"_blank\" rel=\"noopener noreferrer\"><img class=\"alignleft\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/04\/intego-podcast-artwork-400.jpg\" alt=\"\" width=\"80\" \/><\/a>Each week on the <a href=\"https:\/\/podcast.intego.com\/\" target=\"_blank\" rel=\"noopener\"><strong>Intego Mac Podcast<\/strong><\/a>, Intego&#8217;s Mac security experts discuss the latest Apple news, including security and privacy stories, and offer practical advice on getting the most out of your Apple devices. Be sure to <a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" rel=\"noopener\"><strong>follow the podcast<\/strong><\/a> to make sure you don\u2019t miss any episodes.<\/p>\n<p>You can also subscribe to our <a href=\"https:\/\/www.intego.com\/mac-security-blog\/mac-security-newsletter\/\"><strong>e-mail newsletter<\/strong><\/a> and keep an eye here on <a href=\"https:\/\/www.intego.com\/mac-security-blog\"><strong>The Mac Security Blog<\/strong><\/a> for the latest Apple security and privacy news. And don&#8217;t forget to follow Intego on your favorite social media channels: <a href=\"https:\/\/twitter.com\/IntegoSecurity\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Twitter\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Twitter-logo-icon-64.png\" alt=\"Follow Intego on Twitter\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.facebook.com\/Intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Facebook\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Facebook-logo-icon-64.png\" alt=\"Follow Intego on Facebook\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.youtube.com\/user\/IntegoVideo?sub_confirmation=1\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on YouTube\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/YouTube-logo-icon-64.png\" alt=\"Follow Intego on YouTube\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.pinterest.com\/intego\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on Pinterest\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Pinterest-logo-icon-64.png\" alt=\"Follow Intego on Pinterest\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.linkedin.com\/company\/intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on LinkedIn\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/LinkedIn-logo-icon-64.png\" alt=\"Follow Intego on LinkedIn\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.instagram.com\/intego_security\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Instagram\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Instagram-logo-icon-64.png\" alt=\"Follow Intego on Instagram\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow the Intego Mac Podcast on Apple Podcasts\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile.png\" alt=\"Follow the Intego Mac Podcast on Apple Podcasts\" width=\"16\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Passkeys may replace passwords in the relatively near future. Learn what passkeys are and how you can use them on your Mac, iPhone, and iPad.<\/p>\n","protected":false},"author":46,"featured_media":97547,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[10],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Passkeys may replace passwords in the relatively near future. Learn what passkeys are and how you can use them on your Mac, iPhone, and iPad.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/what-are-passkeys-and-how-do-they-work\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What are Passkeys, and how do they work? - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Passkeys may replace passwords in the relatively near future. Learn what passkeys are and how you can use them on your Mac, iPhone, and iPad.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/what-are-passkeys-and-how-do-they-work\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2023-12-24T05:21:44+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-01-11T17:24:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/03\/passkeys-hero-400x260-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kirk McElhearn\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/what-are-passkeys-and-how-do-they-work\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/03\/passkeys-hero-400x260-1.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/03\/passkeys-hero-400x260-1.jpg\",\"width\":400,\"height\":260,\"caption\":\"Apple Passkeys logo hero\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/what-are-passkeys-and-how-do-they-work\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/what-are-passkeys-and-how-do-they-work\/\",\"name\":\"What are Passkeys, and how do they work? - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/what-are-passkeys-and-how-do-they-work\/#primaryimage\"},\"datePublished\":\"2023-12-24T05:21:44+00:00\",\"dateModified\":\"2024-01-11T17:24:41+00:00\",\"description\":\"Passkeys may replace passwords in the relatively near future. Learn what passkeys are and how you can use them on your Mac, iPhone, and iPad.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/what-are-passkeys-and-how-do-they-work\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/what-are-passkeys-and-how-do-they-work\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/what-are-passkeys-and-how-do-they-work\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What are Passkeys, and how do they work?\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/what-are-passkeys-and-how-do-they-work\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/what-are-passkeys-and-how-do-they-work\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09\"},\"headline\":\"What are Passkeys, and how do they work?\",\"datePublished\":\"2023-12-24T05:21:44+00:00\",\"dateModified\":\"2024-01-11T17:24:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/what-are-passkeys-and-how-do-they-work\/#webpage\"},\"wordCount\":2047,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/what-are-passkeys-and-how-do-they-work\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/03\/passkeys-hero-400x260-1.jpg\",\"articleSection\":[\"How To\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/what-are-passkeys-and-how-do-they-work\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09\",\"name\":\"Kirk McElhearn\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g\",\"caption\":\"Kirk McElhearn\"},\"description\":\"Kirk McElhearn has been writing about Apple product and computer security for more than 25 years. His blog, Kirkville, links to his work. He is co-host of the Intego Mac Podcast, as well as several other podcasts, and is a regular contributor to The Mac Security Blog, TidBITS, and several other websites and publications. Kirk has written more than two dozen books, including Take Control books about Apple's media apps, Scrivener, and LaunchBar. Follow him on Bluesky at @kirkville.com.\",\"sameAs\":[\"http:\/\/www.kirkville.com\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/kirk-mcelhearn\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Passkeys may replace passwords in the relatively near future. Learn what passkeys are and how you can use them on your Mac, iPhone, and iPad.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/what-are-passkeys-and-how-do-they-work\/","og_locale":"en_US","og_type":"article","og_title":"What are Passkeys, and how do they work? - The Mac Security Blog","og_description":"Passkeys may replace passwords in the relatively near future. Learn what passkeys are and how you can use them on your Mac, iPhone, and iPad.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/what-are-passkeys-and-how-do-they-work\/","og_site_name":"The Mac Security Blog","article_published_time":"2023-12-24T05:21:44+00:00","article_modified_time":"2024-01-11T17:24:41+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/03\/passkeys-hero-400x260-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Kirk McElhearn","Est. reading time":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/what-are-passkeys-and-how-do-they-work\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/03\/passkeys-hero-400x260-1.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/03\/passkeys-hero-400x260-1.jpg","width":400,"height":260,"caption":"Apple Passkeys logo hero"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/what-are-passkeys-and-how-do-they-work\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/what-are-passkeys-and-how-do-they-work\/","name":"What are Passkeys, and how do they work? - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/what-are-passkeys-and-how-do-they-work\/#primaryimage"},"datePublished":"2023-12-24T05:21:44+00:00","dateModified":"2024-01-11T17:24:41+00:00","description":"Passkeys may replace passwords in the relatively near future. Learn what passkeys are and how you can use them on your Mac, iPhone, and iPad.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/what-are-passkeys-and-how-do-they-work\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/what-are-passkeys-and-how-do-they-work\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/what-are-passkeys-and-how-do-they-work\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"What are Passkeys, and how do they work?"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/what-are-passkeys-and-how-do-they-work\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/what-are-passkeys-and-how-do-they-work\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09"},"headline":"What are Passkeys, and how do they work?","datePublished":"2023-12-24T05:21:44+00:00","dateModified":"2024-01-11T17:24:41+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/what-are-passkeys-and-how-do-they-work\/#webpage"},"wordCount":2047,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/what-are-passkeys-and-how-do-they-work\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/03\/passkeys-hero-400x260-1.jpg","articleSection":["How To"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/what-are-passkeys-and-how-do-they-work\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09","name":"Kirk McElhearn","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g","caption":"Kirk McElhearn"},"description":"Kirk McElhearn has been writing about Apple product and computer security for more than 25 years. His blog, Kirkville, links to his work. He is co-host of the Intego Mac Podcast, as well as several other podcasts, and is a regular contributor to The Mac Security Blog, TidBITS, and several other websites and publications. Kirk has written more than two dozen books, including Take Control books about Apple's media apps, Scrivener, and LaunchBar. Follow him on Bluesky at @kirkville.com.","sameAs":["http:\/\/www.kirkville.com"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/kirk-mcelhearn\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/03\/passkeys-hero-400x260-1.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-pmP","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/97515"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/46"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=97515"}],"version-history":[{"count":11,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/97515\/revisions"}],"predecessor-version":[{"id":99560,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/97515\/revisions\/99560"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/97547"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=97515"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=97515"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=97515"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}