Many companies hit the same point with passkeys.
Support is live. Security teams are happy. You’ve got leadership bought in. On paper, it’s a win.
And then adoption… stalls.
That’s when the instinctive response kicks in: push harder.
Remove passwords. Block OTP. Force passkey creation at the next login. Make it mandatory and move on.
Sometimes that creates a short-term bump. But in a lot of real-world products, it backfires fast.
The reason is simple: passkey adoption is a behavioral challenge, not a compliance exercise.
FIDO Alliance research shows awareness is rising, but only 57 percent of consumers say they’re familiar with passkeys. That means nearly half of your users are still forming their first impression. If the first time they encounter passkeys is inside a forced flow, the emotion they associate with the “upgrade” is not convenience or security. It’s anxiety.
And once users feel anxious about account access, they don’t experiment. They resist. They avoid. They file tickets.
That reaction is amplified in financial apps, wallets, and marketplaces where account access is high-stakes. The moment users feel like their access is being constrained, they stop viewing passkeys as “easier.” They start viewing them as “dangerous.”
When passkeys are optional, an edge-case failure is annoying. When passkeys are mandatory, one failure feels catastrophic.
Users get stuck. Fallback feels like a loophole. Support volume spikes. And the blame lands on passkeys, not on the edge case.
The first time a user is forced into a passkey flow that doesn’t work for them, that’s usually the last time they trust it. And in consumer products, trust is the whole game.
The alternative: organic adoption through behavioral design
The teams that see sustained passkey usage tend to borrow from proven adoption mechanics used in payments, onboarding, and feature rollout. Not because they’re “softer,” but because they’re more effective.
Don’t prompt passkey creation at random. Create the ask inside moments where the user already wants something:
In those moments, the benefit is immediate, not abstract. Users adopt new behaviors when the payoff is clear right now, not explained in a banner.
Generic banners are easy to ignore. In-context prompts convert because they feel like part of the flow.
A strong prompt does three things:
And most importantly, it reduces fear by making it clear there are still options.
Example framing:
“This lets you sign in with Face ID on this device. You can still use another method if needed.”
That single line removes the “what if I get locked out?” hesitation without undermining adoption.
Once a passkey works successfully, the default behavior matters more than your messaging.
If users have to actively choose passkeys every time, many will revert to passwords out of habit. If passkeys become the natural default on that device, usage grows quietly and consistently.
Google’s rollout reflects this: passkeys became a primary sign-in option, not a buried setting. Repetition creates habit. Habit creates trust.
Passkey adoption is rarely a single decision. It’s a gradual shift in behavior.
The most effective products:
This is the same model used for saved cards, biometric payments, and other high-trust behavior changes. A soft reminder after the third successful login often converts better than a hard block on the first.
You need fallbacks. Every serious product does.
But how fallback is presented can either support adoption or kill it.
If fallback is too prominent, users skip passkeys entirely and habits never form.
If fallback is hidden, users feel trapped and trust erodes instantly.
The right middle ground is:
Device binding makes behavioral nudges work better
All of these principles work best when the passkey experience is consistent and predictable.
Device-bound passkeys reinforce a simple mental model:
That predictability is what makes nudges feel safe rather than manipulative.
FIDO and platform providers consistently emphasize that passkeys are phishing-resistant because they’re tied to the legitimate relying party and unlocked locally on the device. The user doesn’t need to “understand cryptography” for adoption to work. They just need the experience to be repeatable and reliable.
If passkeys feel inconsistent across devices, nudges lose credibility quickly.
How to tell if adoption is actually working
Most teams track passkey creation because it’s easy. But creation alone is misleading.
Better indicators include:
If passkeys are created but rarely used, the issue is usually behavioral, not technical.
If your goal is to increase passkey usage without triggering backlash:
Passkeys work best when users feel like they chose them.
The fastest way to stall adoption is to mandate behavior before trust is built. The fastest way to scale usage is to design flows that make passkeys feel like the obvious, safe, repeatable choice.
Organic adoption lasts longer than forced compliance.
Sources (for reference)
https://fidoalliance.org/wp-content/uploads/2024/10/Barometer-Report-2024-Oct-29.pdf
https://fidoalliance.org/passkey-adoption-doubles-in-2024-more-than-15-billion-online-accounts-can-leverage-passkeys/
https://blog.google/technology/safety-security/google-passkeys-update-april-2024/
https://fidoalliance.org/passkeys/
Most orgs running OTP-based MFA have 3–4 exploitable gaps they don’t know about. Our Authentication Assessment takes 2 minutes and shows you exactly where you stand — plus a phased migration roadmap.
Take the Assessment →Our 2-minute assessment scores your authentication setup and shows you exactly where the improvements are.
See Your Score →