Passkeys 360°

Passkeys for Every Surface
Unified Security for Apps & Agents

No passwords. No shared secrets. One phishing-resistant, device-bound credential.For AI agents, passkeys power Just-In-Time Authorization inside the conversation, backed by cryptographic proof.

Universal Coverage

One Credential. Every Surface.

Passkeys eliminate passwords across all authentication contexts: from user-facing apps to AI agents running in terminals.

Web App

Passkeys Autofill in browsers: users tap to sign in, no password typed.

Native Authentication

Native App

OAuth 2.0 Native Flows: app controls each step, no browser redirect.

Native Authentication

AI Agent (Chat)

Just-In-Time Authorization with Passkeys inline in AI Agents.

ANA Framework

AI Agent (CLI)

Just-In-Time Authorization with Passkeys in CLI Agents.

ANA Framework
Native Authentication: API-native, no redirect
ANA Framework: JIT AuthZ for AI agents

Passkeys 360°

What Passkeys Deliver on Every Surface

The same FIDO2/WebAuthn credential: device-bound, phishing-resistant, non-replayable: adapts natively to each context.

Web App: Autofill Login

Users tap a native browser autofill prompt to authenticate. No password typed, no phishing risk. The browser handles the WebAuthn handshake transparently.

Native App: API-Native Flow

Based on OAuth 2.0 Native Flows, the app drives each authentication step without redirecting to a browser. Passkey assertion is completed inline, returning a token directly.

AI Agent (Chat): Just-In-Time Authorization with Passkeys

When a sensitive action requires elevated authentication, the MCP Server triggers a passkey challenge via MCP Elicitation. The AI assistant presents the prompt inline: the user taps, the assertion is verified, an elevated token is issued.

AI Agent (CLI): Just-In-Time Authorization with Passkeys

CLI agents like Claude Code request the passkey challenge directly in the terminal. The user taps their security key — no browser redirect, no codes to copy, no context switch. Cryptographic proof returned inline.

Primary Use Case

Passkeys for AI Agents
Just-In-Time Authorization

When an AI agent needs to perform a privileged action, redirecting to the Identity Provider is technically possible — but it breaks the user's flow entirely. With the ANA (Agent-Native Authorization) framework, passkeys are triggered natively inside the conversation or terminal: no browser redirect, no codes to copy, no context switching.

Device-bound, non-replayable assertion

Signs a challenge bound to the exact operation, not a generic session token.

Phishing-resistant by design

Can't be phished, replayed, or intercepted. The agent only receives the assertion result.

Works in any AI assistant or CLI

GitHub Copilot, Claude, OpenAI, and CLI agents like Claude Code. No proprietary lock-in.

Key insight: Device-bound passkeys sign a non-replayable assertion cryptographically bound to the exact operation: phishing-resistant JIT authorization for every agent action that matters.

Agent CLI: ANA + Passkeys JIT Authorization Flow

User

"Disable policy X in production"

request

AI Agent (Chat / CLI)

Calls MCP Server → AuthZEN enforces JIT

MCP Elicitation

Passkey Challenge (FIDO2)

User taps security key / platform authenticator

signed assertion → IdP

Identity Provider

Verifies assertion, issues elevated token

elevated token

Action Authorized

Action completed — cryptographic proof recorded

Also Available

Passkeys for Web & Native Apps
Passwordless Login

Beyond agents, passkeys bring passwordless login to browser-based and native mobile applications, using the same Identity Provider and open standards. The IA+ IAM Platform powers both flows natively, with no browser redirect for native apps.

Web App: Passkeys Autofill

Users tap the browser autofill prompt to sign in. No password typed, no redirect.

Native App: OAuth 2.0 Native Authentication + Passkeys

App controls each step via OAuth 2.0 Native Flows. Passkey challenge completed inline, no browser opened.

Powered by Keycloak Extensions

Keycloak SPI extensions add passkey autofill, native flows, and OTP/SMS support. Standards-based, no lock-in.

Key insight: The same Identity Provider issues tokens for web logins, native app sessions, and agent JIT elevation — one platform, consistent policy, every surface.

Web App: Passkeys Autofill Flow

User

Opens login page

Browser (Conditional UI)

Passkey autofill prompt appears

WebAuthn / FIDO2

User taps authenticator

Identity Provider

Verifies assertion → issues token

Logged In

No password. No redirect.

Native App: OAuth 2.0 Native Authentication Flow

User

Taps "Sign in" in native app

Native App (OAuth 2.0 Native Flows)

Calls IdP API — receives step metadata

Passkey Challenge (inline)

App prompts — user taps authenticator

Identity Provider

Verifies assertion → issues token

Authenticated

No browser opened. Token returned directly.

Live Demos

See Passkeys 360 in Action: Agents, Web and Native Apps

Watch passkeys powering JIT AuthZ for AI agents and passwordless login for web and native apps. All backed by the same Identity Provider, zero browser redirects.

Passkeys 360: Enhancing Security Passkeys for Every Surface Apps and Agents - Demo Bank Portal

Portal Bank Portal with native passkey authentication
Step-Up Passkey step-up for sensitive operations
Agent AI Agent Chat with JIT AuthZ for critical operations
Done Web, native, and agent in one unified flow

Claude Code: Device-Bound Passkeys - CLI Agent (ANA)

Gateway AuthZEN enforces access control
Agent Orchestrates JIT AuthZ via MCP Elicitation
User Device-bound passkey signs a non-replayable, phishing-resistant assertion
Done Cryptographic proof bound to the exact operation

Key Benefits

Why Passkeys for AI Agents, Web and Native Apps

FIDO2 passkeys are the strongest authenticator across every surface: phishing-resistant, hardware-bound, and natively interpretable by browsers, apps, and AI agents alike.

Phishing-Resistant

FIDO2 passkeys are origin-bound and cryptographically challenge-response. They cannot be phished, stolen, or replayed: even if the agent is compromised.

Device-Bound Credential

The private key never leaves the device. Every assertion is hardware-backed: from platform authenticators (Touch ID, Windows Hello) to security keys (YubiKey).

No Passwords, No Secrets

Zero passwords to leak, rotate, or manage. The agent never handles a credential: only receives the outcome of a verified challenge from the Identity Provider.

Native in CLI & Chat Agents

The FIDO2 assertion completes natively in Claude Code, GitHub Copilot, and custom agents. No browser window, no redirect, no context switch: stays inside the flow.

Cryptographic Proof Per Action

Every JIT authorization is backed by a signed assertion bound to that exact operation. The Identity Provider issues a context-specific elevated token: not a generic session.

Open Standard: FIDO2 / WebAuthn

Built on FIDO2 and WebAuthn: open standards supported by every major platform, browser, and identity provider. No vendor lock-in.

Ready to Secure Your Agents with Passkeys?

Passkeys 360° is powered by the TwoGenIdentity Identity Access Plus (IA+) platform. Explore the ANA framework for JIT agent authorization, the Keycloak extensions for app-native passkey login, and the IA+ platform that ties it all together.