Passkey Authentication

Sarah authenticates using a passkeyβ€”a modern, phishing-resistant credential stored securely in her device's hardware. The experience differs slightly between first-time setup and returning visits.

πŸ” Two Scenarios

First Time: Customer sets up passkey with onboarding details
Returning: Customer simply confirms with biometric authentication

πŸ†• First Time Setup

πŸ”’ https://shepwedd.com/verify

Set Up Your Verification Account

Enter your details to create a secure passkey

πŸ‘†

Browser Prompts: Create Passkey

"shepwedd.com wants to create a passkey for sarah.mitchell@example.com"

πŸ“± Face ID
πŸ‘† Touch ID
πŸ”‘ Windows Hello

πŸ”„ Returning User

πŸ”’ https://shepwedd.com/verify

πŸ”‘ Key Points About Passkeys

πŸ”

Private Key Never Leaves Device

The cryptographic private key is stored in your device's secure hardware (TPM, Secure Enclave). It never travels over the networkβ€”only the public key is shared.

🌐

Domain-Bound Credentials

The passkey is cryptographically bound to shepwedd.com. Even if a phishing site looks identical, the passkey won't work on fake domains.

πŸ›‘οΈ

Phishing-Resistant

Unlike passwords, passkeys cannot be phished, intercepted, or stolen. The browser and device work together to verify the authentic domain.

⚑

Simple User Experience

No passwords to remember or type. Just a quick biometric confirmation (Face ID, Touch ID, or Windows Hello) and you're authenticated.

πŸ” The Security Architecture

Passkeys use public-key cryptography (WebAuthn standard):

1
Key Pair Generation

Device creates public/private key pair. Private key stored in hardware security module.

2
Public Key Registration

Public key sent to shepwedd.com server. Private key stays in device.

3
Challenge-Response

Server sends challenge. Device signs with private key. Server verifies with public key.

4
Domain Binding

Browser enforces that passkey only works on shepwedd.comβ€”never on phishing sites.