Authentication

FIDO2 Security Keys vs Passkeys: What's the Difference?

1Kosmos

What is FIDO2?

FIDO2 is an open authentication standard from the FIDO Alliance and W3C that enables passwordless authentication using public key cryptography. The standard includes WebAuthn (handles website-to-authenticator communication) and CTAP (manages device-to-authenticator connections).

Both hardware security keys and passkeys implement FIDO2. The confusion arises because FIDO2 supports multiple credential types with different storage and portability characteristics.

What are passkeys?

Passkeys are FIDO2 credentials that sync across devices through cloud ecosystems like iCloud Keychain, Google Password Manager, or password managers like 1Password. Your device generates a cryptographic key pair; the private key stays encrypted on your device or syncs securely, while the public key goes to the service.

Passkeys are discoverable credentials (also called resident credentials) used for passwordless login. You authenticate with biometrics like Face ID or Touch ID, or a device PIN.

How do hardware keys and passkeys differ?

Hardware security keys store credentials on a physical device you must carry and physically present to authenticate, while passkeys store credentials on your device or in the cloud and sync across your ecosystem for seamless access.

The key difference is portability: hardware keys require physical possession, while passkeys follow you across devices automatically.

Hardware security keys

  • Store credentials on a physical device (e.g., YubiKey)

  • Private key never leaves the hardware

  • Require physical possession to authenticate

  • Need to carry the key or register multiple keys per service

  • Maximize security through physical isolation

Synced passkeys

  • Store credentials on your device with cross-device sync

  • Private key encrypted during sync, never exposed in plaintext

  • Accessible on all devices in your ecosystem (e.g., iPhone, iPad, Mac)

  • Reduce lockout risk if you lose a device

  • Credentials exist in multiple locations

Software-bound passkeys

  • Live in password manager vaults (e.g., 1Password)

  • Work like synced passkeys but aren't platform-specific

  • Provide cross-platform flexibility

When should you use hardware security keys?

Hardware security keys excel when physical security and regulatory compliance are priorities.

Best for:

  • High-risk roles (IT admins, executives, privileged users)

  • Regulated industries requiring NIST AAL3 compliance

  • Finance, healthcare, and government organizations

  • Shared or unmanaged devices (kiosks, public computers)

  • Scenarios where credentials cannot be remotely compromised

When should you use passkeys?

Passkeys work best for everyday authentication where convenience matters most.

Best for:

  • Consumer applications across phones, tablets, and computers

  • Remote workers using managed devices in one ecosystem

  • Organizations deploying passwordless authentication at scale

  • Scenarios requiring less user training

  • Eliminating physical hardware distribution logistics

1Kosmos 1Key: FIDO2 for shared workforce environments

While hardware security keys and synced passkeys address many authentication needs, frontline workers who share devices across shifts require a different FIDO2 approach.

What is 1Kosmos 1Key?

1Kosmos 1Key is a FIDO2 and CTAP2-certified biometric authenticator purpose-built for shared workstations. Stateless touch and fingerprint readers remain bolted on at terminals, nixing the need for workers to carry individual tokens.

How does 1Key work?

  1. 1Key captures and hashes biometric data directly on the hardware, and raw fingerprints never leave the device.

  2. During authentication, the system performs FIDO2-compliant verification with integrated biometric matching, generating cryptographic proof using a private key.

  3. Each credential is then bound to a verified human identity through government document verification during enrollment.

When should you use 1Key?

1Key is purpose-built for deskless workers on secure floors who authenticate through shared kiosks, tablets, and Zebra scanners rather than personal mobile devices.

Best for:

  • Manufacturing plants, retail stores, and BPO/call centers

  • Environments where mobile phones are restricted

  • Workers who rotate across multiple shared stations

  • Organizations needing hardware-based security without per-employee token costs

  • Healthcare facilities with shared terminal access

Ready to implement enterprise-grade passwordless authentication?

See how 1Kosmos Workforce delivers verified identity and FIDO2 security for organizations with complex authentication requirements.

FAQs

What is the difference between FIDO2 keys such as Yubico and passkeys?

FIDO2 keys like YubiKey are physical hardware devices that store credentials on the device itself, requiring you to carry and insert or tap the key to authenticate. Passkeys are software-based FIDO2 credentials stored on your phone, computer, or password manager that sync across devices through cloud services. Both use the same FIDO2 standard and provide phishing-resistant authentication, but hardware keys offer device-bound security while passkeys prioritize convenience and cross-device accessibility.

Can I use a passkey stored in 1Password as a security key?

Yes. Password managers that support FIDO2 can store passkeys that work anywhere a hardware security key is accepted. The underlying technology is the same, but the credential is stored in your password vault rather than on a physical device.

Why do some services call them "security keys" and others "passkeys"?

The terminology reflects how the credential is being used. "Security key" typically refers to a second factor for two-factor authentication, while "passkey" usually means a passwordless login that replaces your password entirely. Both can use the same FIDO2 technology.

Are hardware security keys more secure than synced passkeys?

Hardware keys provide stronger guarantees against remote attacks because credentials never leave the physical device. Synced passkeys are still highly secure and phishing-resistant, but they exist in multiple locations, which slightly expands the attack surface. The practical security difference depends on your threat model and operational requirements.

Can I use both hardware keys and passkeys together?

Absolutely. Many organizations use hardware keys for high-risk roles and administrative access while deploying passkeys for general workforce authentication. Registering both types as backup methods also protects against device loss and ensures you can always access your accounts.

Enter our orbit.

Transform how you verify and authenticate

Secure onboarding, eliminate passwords, and stop fraud on one platform. Schedule a demo and see it in action.

Transform how you verify and authenticate

Secure onboarding, eliminate passwords, and stop fraud on one platform. Schedule a demo and see it in action.

Transform how you verify and authenticate

Secure onboarding, eliminate passwords, and stop fraud on one platform. Schedule a demo and see it in action.