Costs and Benefits of Implementation of Support for Passkeys
It is important to understand the costs and benefits of implementing support for passkeys. This section is intended to help you examine relevant costs and benefits for your organization.
Advantages of passkeysβ
When compared with other authentication methods, the benefits of passkeys include:
- Greater ease of use
- Higher sign-in success rates
- Faster time to sign in
- Improved bottom line
- Lower rate of cart abandonment
- Reduction in need for password resets during account recovery
- Lower costs for authentication
- Decrease in need for customer support
- Increase in customer loyalty and retention
- Proven and secure technology
- Reductions in phishing, credential stuffing, and attack surface
- Based on robust, open FIDO standards
- Supported by virtually every modern computing device and browser
- Are already being used at scale
Compare the costs and benefitsβ
For many companies, the costs, benefits, and risk profiles of various of authentication methods is not always obvious or documented holistically. As your organization considers new approaches to authentication, you can compare the costs and benefits of each. During this process, you should also apply your own unique requirements to each option.
When considering support for passkeys, an essential business planning step is to copy and adapt these considerations to build an inspirational business case for the adoption of passkeys that you can refine and socialize throughout your organization.
Refer to following table to better understand the range of authentication costs and benefits by comparing the relative costs and benefits of five common consumer authentication technologies.
Password | Synced Passkey | Password + OTP | Security Key (device-bound passkey) | ||
---|---|---|---|---|---|
Benefit analysis | |||||
Phishing resistent | No | π’ Yes | No | π’ Yes | |
Multi-factor | No | π’ Yes | π’ Yes | π’ Yes | |
NIST AAL2 | No | π’ Yes | π’ Yes | π’ Yes | |
Cognitive load for end users | Medium | π’ Low | High | π’ Low | |
Speed to sign in | Slow | π’ Fast | Very slow | π’ Fast | |
First try sign-in success rate | Low | π’ High | Low | π’ High | |
Rate of end user task abandonment | High | π’ Low | High | π’ Low | |
For use in regulated or unregulated industries | Both | Both | Both | Both | |
Cost analysis | |||||
Initial cost to deploy the technology | π’ Low | Medium | Medium | High | |
Maintenance costs of the technology | π’ Low | π’ Low | High | Medium | |
Contact center costs due to authentication issues | High | π’ Low | High | Medium | |
Volume of fraud cases and remediation costs due to the security model of the authentication | High | π’ Low | Medium | π’ Low | |
Volume of account lockout due to authentication issues | High | π’ Low | High | π’ Low |
Initial cost to deploy the technology: The cost for common authentication technologies is applicable to a range of technology acquisition approaches such as: building the technology in-house, purchasing the technology from a solutions provider, or implementing technologies that are already accounted for as sunk costs. For example, a Consumer Identity and Access Management (CIAM) system which is paid for and in use already might offer new authentication technologies without additional licensing fees.
Security keys: Security keys typically cost $20 to $75 (U.S. dollars). It is a best practice for end users to enroll two security keys, one for everyday use and a backup that is stored in a safe place.
OTP: Since passkeys are more secure than passwords, the online serviceβs authentication risk-engine can reduce the use of step-up OTP in many common scenarios, therefore saving SMS costs.
Contact center costs: Service providers commonly reference 30% to 60% of contact center costs attributed to account lockout caused by password and OTP issues.