By: Reinier Aerdts, Hemang Davé and Chris Kirkpatrick
When multi-factor authentication (MFA) was introduced, it revolutionized end-user security, significantly reducing the risk of breaches, account takeovers and data theft that were common with traditional password systems.
Despite the pivotal role MFA has played in advancing password technology, it has not been without drawbacks. From the onset, MFA brought about various security and accessibility challenges, signaling a clear need for further innovation.
Enter passwordless authentication.
Passwordless security leverages passkeys—digital credentials linked to user accounts and specific websites or applications—to authenticate users without usernames, passwords or additional authentication factors. This shift offers the opportunity to heighten security against threats like phishing and aims to streamline the user experience.
Transitioning to passwordless authentication has been found to save enterprises roughly USD 1.4 million in costs over conventional password-based systems.1
However, shifting to passwordless authentication is a significant undertaking. Passwords remain one of the most familiar, trusted forms of authentication and are deeply embedded in our habits and preferences. Successfully navigating this transition requires a careful planning and implementation strategy that considers the technical, organizational and user aspects.
Consider our four-step plan:
1. Implement alternative options to passwords with passkeys
The first step organizations should take to set up passwordless authentication is to implement passkeys as an alternative option to passwords, allowing users to choose their preferred authentication method. This involves setting up the technical infrastructure for passkeys, such as an identity provider, a device attestation service and a user enrollment process. As part of this first step, organizations should also consider educating users about the benefits and features of passkeys—and encouraging them to explore this tool for themselves, at their own pace. The advantages of this approach are that:
- Users can experience the convenience and security of passkeys without giving up their passwords.
- Organizations can test the functionality and performance of passkeys while gathering user feedback.
- Organizations can use internal experts to champion the pilot and drive company-wide adoption, then measure the adoption and usage of passkeys while identifying potential barriers.
2. Enable new authentication options on key applications
The second step to setting up passwordless authentication is to reduce the use of passwords by enabling passkeys on key applications, such as email, cloud services and VPNs. This involves configuring applications to support passkeys and enforcing passkeys as the default authentication method.
To smooth this transition, organizations should consider prioritizing communication with users, providing them with support and guidance about the changes entailed. Some benefits of this approach include:
- Users can access their most important and frequent applications with passkeys, without having to enter passwords.
- Organizations can reduce the exposure and reliance on passwords and improve the security and compliance of their applications.
- Organizations can monitor the impact and benefits of passkeys and adjust their strategy accordingly.