Over the last two years, passkeys have moved from “early” to “everywhere.” The FIDO Alliance reported that more than 15 billion online accounts can leverage passkeys, and that passkey adoption “doubled in 2024.” FIDO Alliance
Google has also shared scale numbers that are hard to ignore: passkeys were used to authenticate users more than 1 billion times across more than 400 million Google Accounts (as of April 2024). blog.google
So why do many teams still see passkeys behaving like a feature that exists, but is not reliably chosen?
Because the hard part is no longer the cryptography. The hard part is getting everyday users to understand what is happening, trust it, and repeat it.
That is a usability problem.
Most companies measure passkeys with “did we ship it?” metrics:
But utilization is a different measurement:
Consumer data already hints at this gap. FIDO’s 2024 barometer reports that passkey familiarity has risen, but it is still not universal (57% familiar in 2024, up from 39% in 2022). FIDO Alliance If almost half your users are not even familiar with the concept, the UX cannot assume “they get it.”
The practical takeaway: adoption is not a feature launch. It is a behavior change program.
Passkeys feel simple when everything is aligned: same device, Face ID works, the prompt looks familiar, and the login finishes quickly.
Confusion shows up when any of those assumptions break.
A passkey prompt often looks like:
To a user, that can feel like “my phone is asking for Face ID,” not “I am using a new login method called a passkey.”
If your UI says “Use passkey” but the system prompt says something else, users may hesitate. Hesitation creates drop-off, especially in high-intent flows like checkout, onboarding, or account recovery.
Users do not experience “platform ecosystems.” They experience “my stuff.”
A common trust-breaking moment looks like this:
Even when this is expected behavior, it can feel like unreliability. And unreliability is what pushes users back to passwords.
If you offer passkeys as an option but your flow makes fallback effortless and default, you are training users to treat passkeys as optional friction.
A subtle example:
This pattern is common when teams optimize for immediate success rate, not long-term behavior change.
If you want utilization, you have to design for device change, reinstall, device loss, and device upgrade.
When these flows are unclear, users conclude one of two things:
Both outcomes reduce future usage.
One reason passkeys can feel confusing is that the user experience is not entirely owned by your product team.
Passkeys are delivered through operating systems, browsers, and credential managers. That means:
Even major platforms are still iterating on passkey UX and portability. For example, Microsoft has been working on making passkeys more usable across Windows devices by adding passkey syncing in Edge on Windows 11. That change is explicitly aimed at reducing “passkeys are stuck on one device” friction. Windows Central
When the same user sees different experiences across contexts, they do not interpret it as “standards evolution.” They interpret it as “this login method is unpredictable.”
This section is intentionally practical. If you implement only a few of these, you will typically see measurable utilization improvements.
Do not start with “add a passkey settings page.”
Start with one of these high-leverage moments:
Your goal is to attach passkey creation to a moment of motivation.
Most confusion comes from the gap between your UI and the system prompt.
Good UX copy does two jobs:
Example pattern:
This reduces abandon rate because the prompt feels expected, not suspicious.
After creation, show a short confirmation that connects the action to value:
Then ensure the next sign-in defaults to passkey where possible.
Google has pushed adoption by making passkeys a primary experience for accounts, rather than hiding them as an advanced setting. Their scale numbers suggest that defaulting behavior matters. blog.google
Fallbacks are necessary. The mistake is making fallback invisible.
When a passkey attempt fails:
This keeps trust intact.
If you do not measure the funnel, you will optimize the wrong thing.
Minimum funnel metrics:
If you want one north-star metric, pick: percent of eligible sign-ins completed with passkeys.
Device binding is often discussed like a security detail. But it also affects adoption.
Here is the usability argument:
When a passkey is clearly tied to a specific device and protected by that device’s local unlock (Face ID, fingerprint, PIN), users build a stable mental model:
That mental model is what creates repeat usage.
It is also why passkeys are commonly described as resistant to phishing, since they are bound to the legitimate relying party and rely on device-based authentication. The Verge
If you want passkeys to become habitual, you need them to feel deterministic and predictable. Device binding is a big part of that predictability.
Passkeys are scaling quickly, and awareness is rising, but usability is what determines whether they become the default behavior or remain a checkbox feature. FIDO Alliance+1
If your passkey rollout feels slower than expected, it is probably not because users hate passkeys. It is because your product is asking them to adopt a new mental model, across devices, with inconsistent prompts.
Treat passkey adoption like a guided program, design for trust at every step, and the utilization curve usually follows.
sources
https://fidoalliance.org/passkey-adoption-doubles-in-2024-more-than-15-billion-online-accounts-can-leverage-passkeys/
https://fidoalliance.org/wp-content/uploads/2024/10/Barometer-Report-2024-Oct-29.pdf
https://blog.google/technology/safety-security/google-passkeys-update-april-2024/
https://www.windowscentral.com/microsoft/windows-11/microsoft-finally-makes-passkeys-viable-thanks-to-edge-on-windows-11-you-can-finally-sync-them-across-devices
https://www.theverge.com/news/689410/facebook-passkey-support-phishing-attacks
Most orgs running OTP-based MFA have 3–4 exploitable gaps they don’t know about. Our Authentication Assessment takes 2 minutes and shows you exactly where you stand — plus a phased migration roadmap.
Take the Assessment →Our 2-minute assessment scores your authentication setup and shows you exactly where the improvements are.
See Your Score →