Passwordless Authentication: Technologies and Trade-offs
Passwordless authentication eliminates the shared-secret password from the login sequence, substituting cryptographic credentials, biometric factors, or hardware-bound tokens that cannot be phished or replayed in the same way static passwords can. This page maps the major technology categories, the standards frameworks that govern them, the deployment contexts where each approach is most applicable, and the trade-offs that shape selection decisions for enterprise and public-sector environments. The identity security providers on this site catalog practitioners and frameworks relevant to implementation.
Definition and scope
Passwordless authentication is a credential mechanism in which the authenticating party proves identity without transmitting or storing a memorized secret. The scope of the term covers at least 4 distinct technical categories: possession-based hardware tokens, biometric verification, magic links delivered to a verified channel, and cryptographic passkeys derived from public-key infrastructure.
The authoritative classification framework is NIST Special Publication 800-63B (Digital Identity Guidelines: Authentication and Lifecycle Management), which establishes three Authenticator Assurance Levels (AAL1, AAL2, AAL3). Passwordless mechanisms span this range: a magic link sent to a registered email address satisfies AAL1, while a hardware security key bound to a verified identity satisfies AAL3 under NIST's framework. The FIDO Alliance, a consortium of over 250 member organizations whose specifications underpin the majority of deployed passwordless systems, publishes the FIDO2 standard (comprising the WebAuthn API and the CTAP2 protocol) as the dominant open specification for device-bound, public-key authentication.
CISA's Phishing-Resistant MFA guidance explicitly recommends FIDO/WebAuthn and PKI-based smart cards as the two approved phishing-resistant authenticator classes for federal systems, distinguishing them from OTP-based and push-notification methods that remain vulnerable to real-time phishing attacks.
How it works
Passwordless authentication replaces the password exchange with a challenge-response protocol anchored to a cryptographic key pair. The general sequence for FIDO2/WebAuthn — the most widely deployed open standard — proceeds in 5 discrete steps:
- Key pair generation — During enrollment, the authenticator (hardware key, platform TPM, or mobile secure enclave) generates a unique asymmetric key pair. The private key never leaves the device.
- Public key registration — The relying party (the service) stores only the public key, mapped to the user account. No password hash or secret is stored server-side.
- Authentication challenge — At login, the relying party sends a cryptographic challenge (a random nonce) to the client.
- Signature creation — The authenticator signs the challenge with the private key. For biometric-gated keys, the biometric verification occurs on-device before the signing operation proceeds; no biometric data is transmitted.
- Signature verification — The relying party verifies the signature using the stored public key. A valid signature proves possession of the bound private key without any secret being exchanged.
This architecture eliminates the server-side credential database that is the target in credential-stuffing and password-spray attacks. Magic-link systems follow a different model: a time-limited, single-use token is delivered to a verified channel (email or SMS), and the act of clicking the link proves channel access rather than key possession. Magic links satisfy AAL1 but not AAL2 under NIST SP 800-63B because channel compromise (e.g., email account takeover) breaks the security model.
Common scenarios
The page describes the broader access-control landscape; passwordless authentication appears across the following specific deployment contexts:
Consumer-facing web applications — Passkeys (the FIDO Alliance's end-user branding for synced FIDO2 credentials) are now natively supported in iOS 16+, Android 9+, Windows 11, and all major browsers as of 2023 (FIDO Alliance Passkey Overview). Synced passkeys are backed up to a platform credential store (iCloud Keychain, Google Password Manager) and can roam across devices, making them suitable for consumer authentication where device loss is a high-friction event.
Federal and regulated enterprise environments — PIV (Personal Identity Verification) smart cards, defined under FIPS 201-3 and administered through the GSA USAccess program, constitute the primary phishing-resistant authenticator for federal civilian employees. PIV satisfies AAL3. FIDO2 hardware security keys (e.g., FIPS 140-2 validated keys) are accepted as an alternative in OMB Memorandum M-22-09, which mandated phishing-resistant MFA for federal agencies by the end of fiscal year 2024.
Healthcare — HIPAA's Technical Safeguard requirements under 45 C.F.R. § 164.312 require covered entities to implement authentication controls for ePHI systems. Passwordless hardware tokens and biometric authentication are recognized implementation options under the addressable authentication standard.
Decision boundaries
Selecting a passwordless approach requires evaluating 4 primary variables: assurance level required, recovery path complexity, device heterogeneity, and regulatory mandate.
Synced passkeys vs. device-bound hardware keys — Synced passkeys offer cross-device availability and lower friction but store the private key in a cloud-synchronized credential store, which introduces trust in the platform vendor's key custody. Device-bound keys (hardware security keys with no extractable private key) meet AAL3 but require physical possession at every authentication event, creating recovery complexity when a device is lost.
Biometric authenticators — Platform biometrics (Touch ID, Windows Hello) do not transmit biometric data; the biometric gate is local to the device. This distinguishes them from centralized biometric databases, which carry different regulatory exposure under state biometric privacy statutes such as the Illinois Biometric Information Privacy Act (740 ILCS 14).
Magic links — Appropriate for low-assurance consumer contexts where password friction drives abandonment, but not suitable for environments subject to NIST AAL2 or higher requirements. The dependency on email channel security is a structural constraint, not a configuration problem.
Regulatory floor — Federal contractors subject to CMMC 2.0 Level 2 requirements must meet the MFA practices in NIST SP 800-171, which maps to AAL2. Level 3 requirements align with AAL3. Passwordless methods that do not satisfy phishing-resistance (OTP apps, push notifications) do not satisfy these floors under CISA's published definition. Additional context on how this interacts with practitioner credentialing is available through the how to use this identity security resource page.