Passwordless Security for Enterprises
Passwordless Security for Enterprises
Passwordless authentication is any form of authentication that doesn’t require the user to provide a password at
$1 million login. Going passwordless is a journey for most organizations—first moving away from passwords and legacy forms of
MFA, which are all highly vulnerable to phishing, and moving to a modern MFA approach which offers strong phishing-
costs associated with annual defense. Once there, an organization is well poised to move to passwordless.
password reset3
While any form of multi-factor authentication (MFA) offers better security than passwords, not all MFA is created
equal. Basic or legacy forms of MFA passwordless such as SMS, mobile authentication and one-time passcodes
can be easily bypassed by malicious actors, making them susceptible to account takeovers from phishing, social
engineering and attacker-in-the-middle attacks. The only truly phishing-resistant and passwordless authentication
$5.2 million methods involve either Smart Card or FIDO2-based authentication protocols.
Only FIDO and Smart Card/PIV NIST 800-638-4 | Dec. 16, 2022
(PKI) are phishing-resistant
Yubico Getting
Yubico Getting
started
started
withwith
passwordless
passwordless 2 2
What are passkeys?
Passkeys are the modern, convenient replacement for passwords—a secure passwordless experience, based on
phishing-resistant FIDO2 authentication protocols, that is easy and available for individuals and organizations alike.
SMS
Smart Card Smart Card
Password Mobile Push
FIDO U2F FIDO2 WebAuthn
OTP
A passkey is just a new name for a passwordless-enabled FIDO2/WebAuthn credential, which is good at blocking
phishing attacks. The passkey is the credential itself, a digital file. The passkey lives in an authenticator such as a
phone, laptop, or a device purpose-built for security such as a hardware security key. This distinction is important
when choosing a passkey implementation for an enterprise environment.
Passkey Authenticators
Device-bound passkeys offer enterprises greater control of their FIDO credentials compared to synced passkeys.
However, there are different types of device-bound passkeys—those that reside in general purpose devices such as
smartphones, laptops and tablets, and those that reside in hardware security keys purpose built for strong security.
Device-bound passkeys in modern FIDO security keys offer the highest security assurance and provide enterprises
with trusted credential lifecycle management and attestation abilities. With this passkey approach enterprises can
deliver the simplest user onboarding and credential recovery experience across devices and platforms, all while staying
in compliance with the most stringent requirements across industries.
APP APP
• Lives on a smartphone, tablet, etc. • Lives in general purpose devices such as • Lives on a security key or other hardware
• Copyable/shareable smartphones and tablets. For example separate from everyday devices
using an authenticator app • Best option for enterprises; meet higher
• Consumer grade; lower security and
compliance assurance • Middle ground option for enterprises; but security and compliance assurance
less secure than device-bound passkeys • Only passkeys that meet Authenticator
on hardware security keys Assurance Level 3 (AAL3)
APP APP
Synced/shareable between devices Unmanaged syncing Managed syncing No syncing between devices
Works across Apple/Google/ May not work Works across all platforms Works across all platforms
Microsoft
User registration/onboarding Weak; backed by password Weak; app backed by password Most secure as user registration
not reliant on a password
Credential recovery Easy to recover Time to replace phone and costly Fastest with a backup key
Risk/Costs Perceived as “free”; high IT/ Perceived as cheaper than HW; Perceived as higher cost upfront;
helpdesk costs and higher risk but risk exposure gaps can be but less costly due to lowered
exposure is costly costly in long run breach risk and reduced IT burden
Works across enterprise scenarios Not in mobile-restricted, Not in mobile-restricted, Works across all enterprise scenarios
shared workstations shared workstations
The YubiKey is a multi-protocol security key, supporting a range of authentication protocols, passwordless authentication
via both Smart Card/PIV and passkey (FIDO2/WebAuthn), along with OTP and OpenPGP, integrating seamlessly across
Strongest Security High Return legacy on-premises and modern cloud environments to help organizations bridge to a passwordless future. YubiKeys
work with over 1,000 products, services and applications including leading identity and access management (IAM)
Reduce risk Experience ROI
by of platforms, privileged access management (PAM) solutions and cloud services. The YubiKey is proven to reduce risk by
99.9% and deliver significant business value to large enterprises at scale, delivering an ROI of 203%6, with a frictionless
99.9% 203% user experience, a frictionless user experience, letting users quickly and securely log in with a single tap or touch.
Unlike synced passkeys that reside in devices not purpose-built for security, and delivering the ease of copying and
sharing which introduces risk for the enterprise, device-bound passkeys residing in YubiKeys are not shareable or
copyable, enabling the enterprise to better track and trust the FIDO credential, which is critical at scale, for compliance
and for audits. Device-bound passkeys that live on a portable security key such as the YubiKey, also ensure that
More Value Faster users can seamlessly and securely work across a range of platforms and devices, and across the ecosystem (e.g. Apple,
Google, Microsoft).
Reduce support Decrease time to
tickets by authenticate by
Device-bound passkeys enable enterprises to implement passwordless and meet the most strict security and
75% >4x wregulated industries. Any other passkey available today supports only up to Authenticator Assurance Level 2 (AAL2).
Given the threat landscape, the need to move toward passwordless gets clearer on a daily basis. But how do you start
the journey to passwordless authentication? The remainder of this guide will detail six key best practices to implement
the highest-assurance path to passwordless using device-bound passkeys residing in the YubiKey.
The biggest benefit that Hyatt is going to receive from deploying YubiKeys is to be able to get rid
of passwords in our environment. You can’t compromise what you don’t have. I think we’re going
to have a great big party once we turn that button off and there’s no more passwords anywhere in
the environment.”
Art Chernobrov | Director of Identity, Access, and Endpoints | Hyatt Hotels Corporation
To read the case study go to yubi.co/hyatt.
01. Plan
Clarify use cases and
ensure readiness
A phased approach is the best way to ensure a
frictionless deployment. Put your high value users
and data first, then expand. Rank use cases and
user populations based on risk, workforce location,
business impact and ease of technical integration.
Highest risk users— Protect against Hardware keys can Require a solution
require security passkeys being shared go where mobile that cannot be shared
keys with hardware to other devices or devices are not among employees
attestation to know compromised by other allowed (e.g. call or compromised if
where the credentials devices attached to centers, manufacturing attached to personal
are stored the iCloud account environments, server iCloud accounts
rooms, clean rooms,
hardened rooms)
HR/Learning
IT Security Finance Help Desk
& Development
03. Integrate
Works with
Ensure your environment is
YubiKey YubiKey-ready
YubiKeys, the industry’s #1 YubiKeys can work with over 1,000 applications and seamlessly across your technical stack, below are
security keys, work with services, including leading IAM platforms such as Microsoft, some critical questions to think about. It’s considered
hundreds of products, services, Okta, Ping and Google. YubiKeys offer platform flexibility a best practice to first answer these questions for
and applications. To browse between Apple, Google and Microsoft for your passkey your pilot program, then circle around for each
YubiKey compatibility go to implementation. To ensure that YubiKeys are integrated expanded deployment.
yubi.co/wwyk.
Who needs access? What passwordless Where in your environment How does location
approach will you take? do you require strong impact deployment?
Employees, contractors,
authentication?
third parties, supply chain Smart Card, synced or Remote, hybrid, on-
device-bound passkeys Corporate systems and premise, multi-location
E-comm hardware/servers,
shared workstations and What types of devices
POS terminals, network, need to be supported?
apps, and dev tools
Owned, BYOD, desktop,
How do you manage laptop, smartphone,
access? tablet, POS terminals,
inventory scanners
IAM, IdP, PAM, SSO, VPN
04. Launch
What?
Offer flexibility and Two YubiKeys per Future-proof with Encourage security Plan an event to
choice since YubiKeys person for backup extra keys to cover with personal use make the future of
are available in a for churn or lost/ policies your organization’s
variety of form factors stolen keys security exciting
Go Live events
Why users love the YubiKey Support the launch with a series of kick-off communica-
tions that introduce the YubiKey to users—communicate
early, often. The ideal Go Live communications make
users excited about the modern features of the YubiKey.
Faster
Easier
More Secure
06. Measure
Folks that aren’t really computer
savvy are able to register so
Report on security and
quickly, so painlessly, and then
business impact
begin using their YubiKey so
effortlessly and instantaneously— We know the truth is in the numbers. Validate the pilot
that’s an easy win for us.” against these metrics, then expand to other users to
increase the overall business impact.
Art Chernobrov | Director of
Identity, Access, and Endpoints |
Hyatt Hotels Corporation
Deployment Performance Security User
metrics: metrics: metrics:
Deployment metrics: metrics:
YubiEnterprise YubiEnterprise
Subscription Delivery
Device-bound passkeys using hardware security keys such as the YubiKey offer the most secure passkey
authentication approach to meet the strictest compliance requirements. A set of deployment best practices that have
already helped hundreds of organizations efficiently get on the bridge to passwordless can help you demystify how to
get started.
Modern enterprises recognize that security as a service can take all the guesswork out of achieving success. When
you choose YubiKeys as a Service, you get to make decisions as you go with custom insights and help from Yubico
experts, simplifying the process of scaling YubiKeys and delivering passwordless experiences to wider circles of users
as your business needs grow. We include success guides and priority support to help you be successful as quickly
as possible.
If you want a closer partnership on any of the six steps of this plan, Yubico’s Professional Services team is here to help.