The Technical Limitations of Current Passkey Systems

Passkeys are a major security improvement, but current implementations have limitations in portability, recovery, and adoption. Here's an honest take.

The Technical Limitations of Current Passkey Systems
The Technical Limitations of Current Passkey Systems

Passkeys are a genuine security advancement. But they're also a maturing technology, and a site committed to being the definitive resource on passkeys has an obligation to cover the limitations honestly — not just the strengths. Understanding where current passkey systems fall short is essential for anyone evaluating adoption, planning a deployment, or advising others. This post covers the real technical constraints of passkeys as they exist today. Not theoretical concerns, but concrete limitations that affect real implementations right now.

1. Cross-Platform and Cross-Ecosystem Portability

This is the most significant practical limitation of passkeys today. The synced passkey model - which we covered in Different types of passkeys: a comprehensive guide - ties your credentials to a platform ecosystem. iCloud Keychain passkeys sync across Apple devices. Google Password Manager passkeys sync across Google/Android devices. The two don't talk to each other natively. A user who registers a passkey on iPhone and later switches to Android faces a real problem. The passkey stored in iCloud Keychain isn't accessible on Android. They're not locked out permanently - they can re-register a new passkey or fall back to an alternative authentication method - but the experience is disruptive and confusing for non-technical users.

The FIDO Alliance has published a specification for credential exchange between platforms, and third-party managers like 1Password are building cross-ecosystem solutions. But as of now, native cross-ecosystem passkey portability doesn't exist in a seamless, standardised form. For organisations with users across multiple ecosystems, this is a concrete deployment consideration.

2. Account Recovery Complexity

Password-based systems have a well-understood recovery flow: forgot your password, reset via email. It's not particularly secure, but it's universal and users understand it.

Passkey recovery is more complex - and the complexity varies significantly by platform, service, and passkey type. If you lose your only device and haven't set up synced passkeys or registered multiple passkeys across devices, recovery falls back to whatever the service provides: email verification, backup codes, identity verification processes. In some cases that fallback is weaker than the passkey itself, which creates a security paradox - the strength of your authentication is only as good as your weakest recovery path.

Synced passkeys partially address this by making device loss less catastrophic, but they introduce a dependency on platform account access. If you lose access to your Apple ID or Google account, you may lose access to your passkeys too. Recovery then becomes a two-step problem. This isn't a reason to avoid passkeys. It's just a reason to plan recovery flows deliberately.

3. Inconsistent Implementation Across Services and Browsers

WebAuthn is a standard, but standards have conformance levels and implementation choices. In practice, passkey behaviour varies meaningfully across browsers, operating systems, and services. Some specific inconsistencies that affect users today:

  • UI inconsistency: The passkey creation and authentication prompts look and behave differently in Chrome, Safari, Firefox, and Edge. Users switching between browsers encounter different flows for what should be the same action
  • Conditional UI support: WebAuthn's Conditional UI — which allows passkey suggestions to appear automatically in login fields, like password autofill — is supported inconsistently across browsers and platforms
  • Attestation handling: Different services have different policies about which authenticators they trust based on attestation data, which can cause legitimate authenticators to be rejected or downgraded
  • Error messaging: When passkey authentication fails, error messages are often cryptic, unhelpful, or absent. Users don't know whether the problem is the device, the browser, the service, or the passkey itself

These inconsistencies create friction during adoption and increase support burden. They're largely solvable at the implementation level, but they require active effort from browser vendors, platform providers, and service developers to resolve.

4. Limited Legacy System Compatibility

Passkeys require relatively modern infrastructure on both the client and server side. WebAuthn requires a modern browser. Platform passkeys require a recent operating system. Server-side implementation requires a WebAuthn library and associated changes to authentication flows.

For organisations with:

  • Users on older operating systems or browsers
  • Legacy authentication infrastructure built around username/password flows
  • Embedded systems or IoT devices without modern browser environments
  • Enterprise applications that haven't been updated to support WebAuthn

...passkeys may not be immediately deployable everywhere. The transition period requires maintaining password-based fallbacks, which means running parallel authentication systems with the associated cost and complexity.

Older FIDO U2F hardware security keys are partially compatible with FIDO2 but don't support fully passwordless passkey authentication. Organisations with existing U2F deployments face an upgrade decision.

5. Passkey Discovery and Management UX

Where are your passkeys? This is a harder question to answer than it should be.

Passwords have decades of established UX: password managers, browser autofill, and password settings pages are well understood. Passkey management is still catching up. Users frequently face:

  • Orphaned passkeys: A passkey registered on a device that no longer exists, still showing up in the service's account settings with no clear way to identify or clean it up
  • Duplicate passkeys: Multiple passkeys registered for the same service across different devices and managers, with no unified view
  • Unclear storage location: Users don't know whether their passkey is in iCloud Keychain, Google Password Manager, a third-party manager, or the browser — and the service can't tell them
  • Inconsistent revocation UX: Revoking a passkey is straightforward on some platforms and buried or confusing on others

This is fundamentally a tooling and UX maturity problem rather than a technical one, but it has real technical causes: the absence of a standardised passkey management API that services could use to provide better visibility.

6. Biometric Fallback and Accessibility Constraints

Passkey authentication typically relies on device-level biometrics as the primary unlock method. When biometrics fail — wet fingers, glasses affecting face recognition, injuries affecting fingerprint reads — the fallback is usually a device PIN. That fallback works, but it introduces a dependency on the PIN's strength and the user's ability to remember it.

For users who cannot use biometrics reliably — due to disability, injury, or device limitations — the experience degrades. PIN-based authentication works but loses some of the usability advantage that makes passkeys compelling, and the accessibility of PIN entry interfaces varies.

Additionally, shared devices present a specific challenge. Passkeys are inherently personal — bound to an individual's device and biometrics. Shared device scenarios (kiosk computers, shared workstations, family devices) don't fit naturally into the passkey model and require specific solutions.

7. Enterprise Policy and Attestation Gaps

Enterprise deployments require control. Specifically, the ability to verify that authentication devices meet policy requirements — a property provided by FIDO2's attestation mechanism, which we touched on in WebAuthn: The backbone of modern passkey authentication.

In practice, attestation has gaps:

  • Synced passkeys and attestation: When passkeys are synced across devices via a platform credential manager, the attestation model becomes more complex. The attestation identifies the platform (Apple, Google) rather than a specific device, which may not satisfy policies requiring individual device verification
  • Attestation metadata maintenance: The FIDO Metadata Service, which provides the attestation metadata organisations use to evaluate authenticators, requires active maintenance and monitoring. Outdated metadata can cause valid authenticators to be incorrectly rejected
  • Policy inconsistency: Different identity providers implement attestation policy enforcement with varying granularity, making it difficult to enforce consistent policy across a heterogeneous environment

These gaps mean enterprise passkey deployments often require more careful architecture than consumer deployments.

8. Post-Quantum Cryptography Readiness

Current passkey implementations rely on elliptic curve cryptography — specifically ECDSA with P-256 or EdDSA with Ed25519. These algorithms are secure against classical computers but are theoretically vulnerable to sufficiently powerful quantum computers.

NIST finalised its first post-quantum cryptographic standards in 2024. The FIDO Alliance has begun working on post-quantum passkey specifications, but widespread implementation is not imminent. For most deployments this is a future consideration rather than an immediate risk — the quantum computers capable of breaking current elliptic curve keys don't yet exist. But for long-lived infrastructure or highly sensitive environments, it's a factor in architectural planning.

Putting the Limitations in Context

None of these limitations negate the core case for passkeys. Compared to passwords — which are vulnerable to phishing, brute force, credential stuffing, and server-side breaches — passkeys represent a substantial improvement even with these constraints.

The honest framing is: passkeys are the right direction, and current implementations are genuinely good, but the ecosystem is still maturing. Cross-platform portability, management UX, and recovery flows in particular have meaningful room to improve. For organisations evaluating adoption, these limitations translate into concrete planning requirements — not reasons to wait indefinitely, but factors to address in deployment design.