{"id":24461,"date":"2025-07-30T18:30:48","date_gmt":"2025-07-30T14:30:48","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/passkey-enterprise-issues-and-threats\/24461\/"},"modified":"2025-07-30T18:30:48","modified_gmt":"2025-07-30T14:30:48","slug":"passkey-enterprise-issues-and-threats","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/passkey-enterprise-issues-and-threats\/24461\/","title":{"rendered":"Enterprise passkey adoptions: nuances and challenges"},"content":{"rendered":"<p>Transition to passkeys promises organizations a cost-effective path toward robust employee authentication, increased productivity, and regulatory compliance. We\u2019ve already covered all the pros and cons of this business solution in a <a href=\"https:\/\/www.kaspersky.com\/blog\/passkey-enterprise-readiness-pros-cons\/53986\/\" target=\"_blank\" rel=\"noopener nofollow\">separate, in-depth article<\/a>. However, the success of the transition \u2014 and even its feasibility \u2014 really hinges on the technical details and implementation specifics across numerous corporate systems.<\/p>\n<h2>Passkey support in identity management systems<\/h2>\n<p>Before tackling organizational hurdles and drafting policies, you\u2019ll have to determine if your core IT systems are ready for the switch to passkeys.<\/p>\n<p>Microsoft Entra ID (Azure AD) <a href=\"https:\/\/learn.microsoft.com\/en-us\/entra\/identity\/authentication\/how-to-enable-passkey-fido2\" target=\"_blank\" rel=\"nofollow noopener\">fully supports passkeys<\/a>, letting admins set them as the primary sign-in method. For hybrid deployments with on-premises resources, <a href=\"https:\/\/learn.microsoft.com\/en-us\/entra\/identity\/authentication\/howto-authentication-passwordless-security-key-on-premises\" target=\"_blank\" rel=\"nofollow noopener\">Entra ID can generate Kerberos tickets (TGTs)<\/a>, which your Active Directory domain controller can then process.<\/p>\n<p>However, Microsoft doesn\u2019t yet offer native passkey support for RDP, VDI, or on-premises-only AD sign-ins. That said, with a few workarounds, organizations can store passkeys on a hardware token like a YubiKey. This kind of token can <a href=\"https:\/\/www.keytos.io\/blog\/passwordless\/how-to-go-passwordless-in-azure-with-azure-cba\" target=\"_blank\" rel=\"nofollow noopener\">simultaneously support<\/a> both the traditional PIV (smart cards) technology and FIDO2 (passkeys). There are also <a href=\"https:\/\/rublon.com\/blog\/authenticate-local-windows-logins-using-fido-security-keys\/\" target=\"_blank\" rel=\"nofollow noopener\">third-party solutions<\/a> for these scenarios, but you\u2019ll need to evaluate how using them impacts your overall security posture and regulatory compliance.<\/p>\n<p>Good news for Google Workspace and Google Cloud users: they offer <a href=\"https:\/\/workspace.google.com\/blog\/product-announcements\/major-security-innovation-passkeys\" target=\"_blank\" rel=\"nofollow noopener\">full passkey support<\/a>.<\/p>\n<p>Popular identity management systems like Okta, Ping, Cisco Duo, and RSA IDplus also support FIDO2 and all major forms of passkeys.<\/p>\n<h2>Passkey support on client devices<\/h2>\n<p>We have a <a href=\"https:\/\/www.kaspersky.com\/blog\/full-guide-to-passkeys-in-2025-part-1\/53688\/\" target=\"_blank\" rel=\"noopener nofollow\">detailed post on the subject<\/a>. All modern operating systems from Google, Apple, and Microsoft support passkeys. However, if your company uses Linux, you\u2019ll likely need extra tools, and overall support is still limited.<\/p>\n<p>Also, while for all major operating systems it might look like full support on the surface, there\u2019s a lot of variety in how passkeys are stored, and that can lead to compatibility headaches. Combinations of several systems like Windows computers and Android smartphones are the most problematic. You might create a passkey on one device and then find you can\u2019t access it on another. For companies with a strictly managed device fleet, there are a couple of ways to tackle this. For example, you could have employees generate a separate passkey for each company device they use. This means a bit more initial setup: employees will need to go through the same process of creating a passkey on every device. However, once that\u2019s done, signing in takes minimal time. Plus, if they lose one device, they won\u2019t be completely locked out of their work data.<\/p>\n<p>Another option is to use a company-approved password manager to store and sync passkeys across all employees\u2019 devices. This is also a must for companies using Linux computers, as its operating system can\u2019t natively store passkeys. Just a heads-up: this approach might add some complexity when it comes to regulatory compliance audits.<\/p>\n<p>If you\u2019re looking for a solution with almost no issues with sync and multiple platforms, hardware passkeys like the YubiKey are the way to go. The catch is that they can be significantly more expensive to deploy and manage.<\/p>\n<h2>Passkey support in business applications<\/h2>\n<p>The ideal scenario for bringing passkeys into your business apps is to have all your applications sign in through single sign-on (SSO). That way, you only need to implement passkey support in your corporate SSO solution, such as Entra ID or Okta. However, if some of your critical business applications don\u2019t support SSO, or if that support isn\u2019t part of your contract (which, unfortunately, happens), you\u2019ll have to issue individual passkeys for users to sign in to each separate system. Hardware tokens can store anywhere from 25 to 100 passkeys, so your main extra cost here would be on the administrative side.<\/p>\n<p>Popular business systems that fully support passkeys include <a href=\"https:\/\/helpx.adobe.com\/manage-account\/using\/secure-sign-in-with-passkey.html\" target=\"_blank\" rel=\"nofollow noopener\">Adobe Creative Cloud<\/a>, <a href=\"https:\/\/docs.aws.amazon.com\/IAM\/latest\/UserGuide\/id_credentials_mfa_enable_fido.html\" target=\"_blank\" rel=\"nofollow noopener\">AWS<\/a>, <a href=\"https:\/\/docs.github.com\/en\/authentication\/authenticating-with-a-passkey\/about-passkeys\" target=\"_blank\" rel=\"nofollow noopener\">GitHub<\/a>, <a href=\"https:\/\/workspace.google.com\/blog\/product-announcements\/major-security-innovation-passkeys\" target=\"_blank\" rel=\"nofollow noopener\">Google Workspace<\/a>, <a href=\"https:\/\/product.hubspot.com\/blog\/passkeys-the-future-of-login-at-hubspot\" target=\"_blank\" rel=\"nofollow noopener\">HubSpot<\/a>, <a href=\"https:\/\/learn.microsoft.com\/en-us\/entra\/identity\/authentication\/how-to-enable-passkey-fido2\" target=\"_blank\" rel=\"nofollow noopener\">Office 365<\/a>, <a href=\"https:\/\/help.salesforce.com\/s\/articleView?id=xcloud.mfa_supported_verification_methods_securitykey.htm&amp;type=5\" target=\"_blank\" rel=\"nofollow noopener\">Salesforce<\/a>, and <a href=\"https:\/\/www.zoho.com\/accounts\/oneauth\/\" target=\"_blank\" rel=\"nofollow noopener\">Zoho<\/a>. Some <a href=\"https:\/\/community.sap.com\/t5\/crm-and-cx-blog-posts-by-sap\/password-less-registration-and-login-process-with-sap-cdc-part-2\/ba-p\/13572269\" target=\"_blank\" rel=\"nofollow noopener\">SAP systems<\/a> also support passkeys.<\/p>\n<h2>Employee readiness<\/h2>\n<p>Rolling out passkeys means getting your team up to speed regardless of the scenario. You don\u2019t want them scratching their heads trying to figure out new interfaces. The goal is for everyone to feel confident using passkeys on every single device. Here are the key things your employees will need to understand.<\/p>\n<ul>\n<li>Why passkeys beat passwords (they\u2019re much more secure, faster to sign in with, and don\u2019t need to be rotated)<\/li>\n<li>How biometrics work with passkeys (the biometric data never leaves the device, and isn\u2019t stored or processed by the employer)<\/li>\n<li>How to get their very first passkey (for example, Microsoft has a Temporary Access Pass feature, and third-party IAM systems often send an onboarding link; the process needs to be thoroughly documented, though)<\/li>\n<li>What to do if their device doesn\u2019t recognize their passkey<\/li>\n<li>What to do if they lose a device (sign in from another device that has its own passkey, or use an OTP, perhaps given to them in a sealed envelope for just such an emergency)<\/li>\n<li>How to sign in to work systems from other computers (if the company\u2019s policies permit it)<\/li>\n<li>What a passkey-related phishing attempt might look like<\/li>\n<\/ul>\n<h2>Passkeys are no silver bullet<\/h2>\n<p>Moving to passkeys doesn\u2019t mean your cybersecurity team can just cross identity threats off their risk list. Sure, it makes things tougher for attackers, but they can still do the following:<\/p>\n<ul>\n<li>Target systems that haven\u2019t switched to passkeys<\/li>\n<li>Go after systems that still have fallback login methods like passwords and OTPs<\/li>\n<li>Steal authentication tokens from devices infected with infostealers<\/li>\n<li>Use special techniques to bypass passkey protections<\/li>\n<\/ul>\n<p>While it\u2019s impossible to phish the passkey itself, attackers can set up fake web infrastructure to trick a victim into authenticating and validating a malicious session on a corporate service.<\/p>\n<p>A recent example of this kind of <a href=\"https:\/\/www.kaspersky.com\/blog\/what-is-aitm-in-spearphishing-attacks\/51919\/\" target=\"_blank\" rel=\"noopener nofollow\">AiTM attack<\/a> was <a href=\"https:\/\/expel.com\/blog\/poisonseed-downgrading-fido-key-authentications-to-fetch-user-accounts\/\" target=\"_blank\" rel=\"nofollow noopener\">documented in the U.S.<\/a> In that incident, the victim was lured to a fake authentication page for a corporate service, where attackers first phished their username and password, and then the session confirmation by having them scan a QR code. In <a href=\"https:\/\/expel.com\/blog\/an-important-update-and-apology-on-our-poisonseed-blog\/\" target=\"_blank\" rel=\"nofollow noopener\">this incident<\/a>, the security policies were configured correctly, so scanning this QR code did not lead to successful authentication. But since such a mechanism with passkeys was implemented, the attackers hope that somewhere it is configured incorrectly, and the physical proximity of the device on which authentication is carried out and the device where the key is stored is not checked.<\/p>\n<p>Ultimately, switching to passkeys requires detailed policy configuration. This includes both authentication policies (such as disabling passwords when a passkey is available, or banning physical tokens from unknown vendors) and monitoring policies (such as logging passkey registrations or cross-device scenarios from suspicious locations).<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kaspersky-next\">\n","protected":false},"excerpt":{"rendered":"<p>We dive into which corporate systems support passkeys, where compatibility falls short, and why we probably won&#8217;t be saying goodbye to passwords anytime soon.<\/p>\n","protected":false},"author":2722,"featured_media":24462,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1318,1916],"tags":[1047,1474,359,1457,787,2657,2462,2707,187,76,2721,321],"class_list":{"0":"post-24461","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-enterprise","9":"tag-2fa","10":"tag-accounts","11":"tag-authentication","12":"tag-business","13":"tag-cloud","14":"tag-identity-security","15":"tag-mfa","16":"tag-passkeys","17":"tag-passwords","18":"tag-phishing","19":"tag-sso","20":"tag-technology"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/passkey-enterprise-issues-and-threats\/24461\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/passkey-enterprise-issues-and-threats\/29347\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/passkey-enterprise-issues-and-threats\/12670\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/passkey-enterprise-issues-and-threats\/29295\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/passkey-enterprise-issues-and-threats\/28400\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/passkey-enterprise-issues-and-threats\/31269\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/passkey-enterprise-issues-and-threats\/29972\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/passkey-enterprise-issues-and-threats\/40208\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/passkey-enterprise-issues-and-threats\/13658\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/passkey-enterprise-issues-and-threats\/54003\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/passkey-enterprise-issues-and-threats\/23063\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/passkey-enterprise-issues-and-threats\/24090\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/passkey-enterprise-issues-and-threats\/32527\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/passkey-enterprise-issues-and-threats\/29511\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/passkey-enterprise-issues-and-threats\/35213\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/passkey-enterprise-issues-and-threats\/34859\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/passkeys\/","name":"passkeys"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/24461","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2722"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=24461"}],"version-history":[{"count":0,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/24461\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/24462"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=24461"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=24461"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=24461"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}