Passkeys -- discoverable WebAuthn credentials synchronized across devices—are widely promoted as the future of passwordless authentication. Built on the FIDO2 standard, they eliminate shared secrets and resist phishing while offering usability through platform credential managers. Since their introduction in 2022, major vendors have integrated passkeys into operating systems and browsers, and prominent websites have announced support. Yet the true extent of adoption across the broader web remains unknown.
Measuring this is challenging because websites implement passkeys in heterogeneous ways. Some expose explicit ``Sign in with passkey'' buttons, others hide options under multi-step flows or rely on conditional mediation, and many adopt external mechanisms such as JavaScript libraries or OAuth-based identity providers. There is no standardized discovery endpoint, and dynamic, JavaScript-heavy pages complicate automated detection.
This paper makes two contributions. First, we present
This module will list all archived passkey snapshots in a table. You can filter and search the archive, for instance, only select domains with passkey, only select domains of a specific scan, or select all domains matching a custom MongoDB query for more advanced fine-grained filtering.
Go to the ArchiveThis module allows you to compute statistics on our passkey archive. You can load the latest scan, a specific scan, or a ground truth to show aggregated statistics of the data, including the number of passkey implementations, login pages, authentication mechanisms, and the position of passkey buttons on the browser canvas.
Go to the StatisticsThis module allows you to download our passkey archive as a large JSON file. Since our API uses pagination and does not provide all data at once, we provide a large JSON file holding all passkey snapshots instead. The file allows you to apply your own parsing and queries for individual filtering.
Go to the DatasetPasskeys are discoverable WebAuthn credentials synchronized across devices, widely promoted as the future of passwordless authentication. Built on the FIDO2 standard, they eliminate shared secrets and resist phishing while offering superior usability through platform credential managers. Passkeys use public-key cryptography where each credential consists of a public key stored on the server and a private key stored securely on the user's device. Authentication happens through cryptographic proof of possession of the private key, typically via biometrics (fingerprint, face recognition) or device PIN. Since their introduction in 2022, major vendors including Apple, Google, and Microsoft have integrated passkeys into operating systems and browsers, enabling seamless cross-device synchronization and authentication.
FidentiKit is an open-source browser-based crawler that implements 43 heuristics across five categories—UI elements, DOM structures, WebAuthn API calls, network patterns, and library detection—to detect passkey adoption across the web. It continuously iterates over websites, determines their login pages, and checks whether they support passkey authentication. FidentiKit uses detection techniques such as virtual authenticators to capture WebAuthn implementation parameters, making it the first large-scale measurement tool capable of comprehensively analyzing passkey adoption.
The passkey archive will be our central collection and long-term storage of artifacts and data, including every component of this website that lets you explore or download our archived data. FidentiKit is the tool that generates the data that is fed into our passkey archive. You can think of our passkey archive as the Tranco Top Sites Ranking and the Internet Archive's Wayback Machine but for passkey adoption research.
FidentiKit executes the following steps to determine login pages of websites:
shop.com/login or subdomains like login.shop.comFidentiKit executes the following steps to detect passkey support on login pages:
navigator.credentials.create and navigator.credentials.get APIs to detect WebAuthn calls.well-known/passkey-endpoints and other well-known metadata filesFidentiKit detects multiple authentication mechanisms:
FidentiKit also captures detailed WebAuthn implementation parameters including create/get options, credentials, and CDP events when passkeys are detected (Under development)
Yes, FidentiKit also detects username and password logins by integrating the LastPass password manager. Password managers already use sophisticated algorithms to find username and password fields. These algorithms go beyond checking the type attributes of <input> fields. Lastpass is the most downloaded password manager with over 10 million users in the Chrome web store and has been extensively studied in academic research. The extension injects a uniquely identifiable icon into all username and password fields, allowing FidentiKit to identify all fields.
Passkey adoption measurement is crucial for understanding the transition from passwords to passwordless authentication. Large-scale measurements of passkey adoption are challenging because websites implement passkeys in heterogeneous ways—some expose explicit "Sign in with passkey" buttons, others hide options under multi-step flows or rely on conditional mediation, and many adopt external mechanisms such as JavaScript libraries or OAuth-based identity providers. There is no standardized discovery endpoint, and dynamic, JavaScript-heavy pages complicate automated detection. FidentiKit addresses these challenges with 43 heuristics developed through manual iterative refinement over sites. We see our open-source passkey archive and the FidentiKit tool as a baseline for future passkey adoption research. FidentiKit's extensible architecture and (upcoming - virtual authenticator) capabilities enable comprehensive analysis of WebAuthn implementations, capturing not just detection but also detailed implementation parameters for security researchers.
Yes, FidentiKit is open-source and will be actively maintained for research purposes. Our passkey archive contains all data and is provided throughout this website in various formats, i.e., as downloadable JSON files or via APIs that can be filtered with queries. The archive includes detection results, WebAuthn implementation parameters, screenshots, and all artifacts captured during the analysis process.
If you use our data or tooling for your research, please feel free to cite our publication:
TBA
TBA
Feel free to contact us regarding this research, the artifacts, or the tooling.