Enterprise Passkey Guide: Part 3 – Product, Design & Strategy Development
Read the enterprise guide on large-scale passkey integration approaches, design of user flows and interfaces, and technical implementation considerations.
1. Introduction
Implementing passkeys into your large-scale consumer deployment is a significant endeavor that requires careful planning and strategic design. After securing preliminary approval and aligning key stakeholders, the next crucial step is to develop a comprehensive design and development strategy for integrating passkeys into your authentication system.
In this article, we will:
By carefully designing your passkey integration strategy, you can enhance security, improve user experience, and maximize the benefits of passkeys for both your organization and your users.
2. Choosing the Right Passkey Integration Approach
Selecting the appropriate integration approach is a critical decision that impacts both the technical implementation and the user experience. There are four major options to consider:
Each option offers different benefits and challenges. Let's examine each approach in detail to help you decide which one aligns best with your organization's goals and your users' needs.
2.1 Option 1: Passkey Button (No Identifier-First)
This approach adds a separate "Continue with Passkey" button on the login screen, alongside existing authentication methods. Users can choose to log in directly with their passkey without first entering their identifier (e.g., email or username).
User Experience:
Benefits:
Challenges:
Example: Australia's myGov?portal employs this approach, offering a separate button for passkey login.
2.2 Option 2: Identifier-First Approach (Automatic Login)
This method asks users to enter their identifier (e.g., email or username) first. The system then determines whether a passkey is registered for that identifier, is accessible on this device via platform or cross-platform authentication and, if so, prompts the user to authenticate with their passkey.
User Experience:
Benefits:
Challenges:
Google?utilizes this approach, offering an automatic login experience when users enter their email and triggers a passkey authentication only on client environments where accessibility is very probable.
2.3 Option 3: Password + Passkey (Second Factor)
In this approach, users first enter their password. After successful password entry, they are prompted to authenticate with a passkey as a second factor, replacing SMS OTPs or other MFA methods.
User Experience:
Benefits:
Challenges:
An example for this kind of set-up is the implementation of Amazon who requires another authentication step in addition to passkeys.
2.4 Option 4: Cross-Device Authentication First (CDA First)
This approach focuses on supporting cross-device authentication (CDA) and security keys. It enables users to create and use passkeys on mobile devices or external hardware security keys (e.g., YubiKeys), even when accessing services on devices that do not support passkeys directly making sure no device-bound passkeys are created.
User Experience:
Benefits:
Challenges:
Finom is a great example that promotes the CDA first approach to register a passkey on a mobile device or on a security key.
领英推荐
2.5 Comparison of Integration Options
When comparing integration methods, it's essential to consider the specific needs and objectives of your organization, as well as the context in which passkeys will be deployed. The most suitable approach will depend on a variety of factors, including the scale of deployment, security requirements, and technical feasibility. Additionally, the method you choose should align with the desired user experience and balance ease of use with robust security measures. The following table provides a comparative overview of each integration option, highlighting key characteristics and potential trade-offs.
Factors to Consider When Choosing an Integration Approach
When deciding on the best integration method, consider the following factors:
There are even more ways to integrate passkeys, often using combinations or different approaches depending on the device. Therefore, it is a unique decision for every organization, and there is no single right solution.
2.6 How Corbado Can Help You
Corbado brings extensive expertise in implementing all four integration approaches, ensuring that your passkey deployment aligns perfectly with your organization's objectives and technical environment. Corbado Connect can be adopted to suite your needs and all passkeys that have been created will be usable in all scenarios even if your deployment changes in the future.
Our Support Includes:
By partnering with Corbado, you leverage our deep understanding of passkey technologies and large-scale deployments, ensuring a successful integration that delivers on your strategic objectives.
3. Designing User Flows and Interfaces
A critical aspect of passkey integration is designing intuitive user flows and interfaces that guide users through the authentication process effortlessly. This requires careful consideration of the user experience across all platforms. The flows heavily depend on the integration support, but some basic considerations relate to all of them.
3.1 Cross-Platform and Browser Considerations
It's essential to gain a comprehensive understanding of all target platforms, including the most relevant browsers, as they each handle onboarding and passkey creation differently. This includes evaluating web and mobile platforms, as well as different mobile operating systems (iOS and Android). Familiarizing yourself with these variations will help you anticipate how layouts and flows will appear across devices. Reviewing existing prototypes, such as those in Corbado blog reviews of existing implementations?or FIDO Alliance materials, can provide valuable insights into user interactions and help inform design decisions.
3.2 Creating Visual Flows
When creating user flows, build real-world visuals that reflect actual operating system interactions. This includes designing for specific OS input methods and device prompts. Use design tools like Figma or Adobe XD to craft screens that capture key steps in the passkey process, such as login screens, passkey creation flows, and cross-device authentication prompts. The goal is to create high-fidelity mockups that enable a clear understanding of the user journey and interface interactions.
3.3 Manual Testing and Iteration
Manual testing is crucial to ensure that the implemented functionality works as expected. This includes testing fallback mechanisms, key passkey features, and cross-device functionality based on your system landscape. Create a thorough test scenario that outlines the scenarios to be tested, such as passkey creation, login, and fallback options like password or SMS OTP. Through this process, you'll identify any usability issues and refine the flows to enhance the overall experience.? We are working on a separate article on this topic and will link it here once it is complete.
3.4 Extending Testing with Virtual Authenticators
To automate tests and enhance coverage, you can use virtual authenticators with tools like Selenium 4?and Playwright. These tools allow you to simulate passkey interactions and test cross-device functionalities across various environments. This approach helps ensure the robustness of your authentication system by validating it against a wide range of potential use cases and device setups.
3.5 How Corbado Can Assist You
Corbado offers comprehensive support in designing and optimizing user experiences for passkey integration, ensuring that your implementation is intuitive, accessible, and effective across all platforms.
Our Support Includes:
By partnering with Corbado, you ensure that your passkey integration is not only technically sound but also delivers a user experience that fosters adoption and satisfaction.
4. Technical Implementation Considerations
The design decisions you make will have significant implications for the technical implementation of passkeys. It's important to collaborate closely with your development team to address these considerations, but next to those design specific things, there a are a lof of technical considerations that we can’t list here completely.
4.1 Components of Technical Implementation Consideration
There are a lof of technical considerations and a lof of resources?on the web that adress those issues, we have listed the most important ones. We have written blog about most developer areas.
It is beyond this article to describe all parts of the technical implementation, also be sure to address most passkey misconceptions?early on.
4.2 How Corbado Supports Technical Implementation
Corbado provides comprehensive support for your technical teams, ensuring a smooth and secure integration of passkeys into your authentication system.
It Includes:
By leveraging Corbado's technical resources and expertise, your development team can implement passkeys efficiently and confidently, focusing on delivering a secure and high-performing authentication experience to your users.
5. Conclusion
Integrating passkeys requires a strategic approach across design, user experience, and technical execution. This guide covered three key areas:
In sum, selecting the right approach, prioritizing UX, and addressing technical requirements will ensure a successful passkey integration, with Corbado as a partner to streamline this process and maximize benefits.