Build or buy a passkey solution? Discover the pros & cons of DIY passkeys vs. passkey vendor solutions (SaaS & on-prem), challenges, costs & best practices.
Vincent
Created: March 7, 2025
Updated: March 11, 2025
Our mission is to make the Internet a safer place and passkeys provide a superior solution to achieve that. That's why we want to keep you updated with the latest industry insights here.
The idea of building your own passkey implementation sounds appealing: full control, custom integrations and no vendor lock-in. After all, FIDO2 is based on open standards and writing the first lines of WebAuthn code seems easy enough. How hard can it really be?
But this is often where the complexity starts, especially when you plan to build a solution for a large-scale consumer deployment scenario with millions of users in an industry such as:
The real challenge begins beyond the first successful passkey login and often just unveils while you are already implementing your passkeys solution. Suddenly things like odd edge cases, confusing user errors and potential user lock-outs due to non-availability of passkeys appear. What seemed like a straightforward integration turns into months or even years of development effort, unexpected maintenance costs and a potentially failed passkey project.
However, building your own solution can also be the right choice for certain organizations and specific requirements. We’ve talked to dozens of organizations about their passkey implementation plans and accompanied some on their journey hands-on. This guide will help you determine when a Do-It-Yourself (DIY) passkey approach might make sense and when choosing an established passkey provider is the smarter decision.
With our Buy vs. Build Passkey Guide, we want to answer the following questions:
Passwords are outdated, insecure and frustrating. Passkeys eliminate phishing risks, improve user experience and simplify authentication - making them the news standard of secure logins. Whether you build in-house or use an external solution, integrating passkeys is a major upgrade for security and usability.
Google found that leading with the ease of use story or the speed story resonates and works. People generally grumble about signing in, so anything that makes the process easier and faster is a win.
On top of these security benefits, there’s huge potential for operational cost savings with passkeys. You can reduce the number of SMS OTPs sent to users that can stack up massively for large user bases. Moreover, the burden password and MFA recoveries put on your customer support teams is also a cost factor that can be eliminated.
Aside, passkeys improve the login success rates and login times for users, ultimately resulting in better conversion rates, which is a major driver for top line growth in industries like e-commerce, retail or travel.
The end goal for many organizations considering the introduction of passkeys is to go fully passwordless. To reach this goal, there are typically four phases that need to be completed. The speed at which these phases progress depends largely on the organization's technical capabilities, login patterns and user base. In some cases, external factors such as public pressure to introduce more secure authentication or financial constraints may also play a role.
Let’s go through these four phases and describe them, as implementing passkeys is only one step in ensuring the success of a passkey project.
The first step in the transition to a fully passwordless system is to integrate passkeys as a login method. At this stage, passwords and other authentication methods remain in place as fallbacks to ensure users can still access their accounts if they haven’t yet adopted passkeys. Successful integration requires seamless compatibility with existing login flows and security policies. Organizations should focus on making passkey creation straightforward, ensuring that both technical and non-technical users can adopt the new authentication method without friction.
Once passkeys are integrated, the next challenge is driving user adoption of passkeys. Many organizations underestimate the importance of this phase, but without widespread user adoption, a passkey project is likely to fail. The goal is to encourage as many users as possible to create and use passkeys, ideally making them the default login method.
Key tactics for increasing adoption include proactive user education, UI nudges that promote passkey creation and incentive programs that reward users for switching. Organizations should set a critical adoption threshold, such as 50-80% of active users utilizing passkeys, before progressing to the next phase. For a deeper understanding of why adoption is crucial, refer to our dedicated article on how poor adoption rates can jeopardize your passkey project.
As passkey adoption reaches a critical mass, organizations can begin phasing out passwords. However, removing passwords too early or without careful planning can lead to usability issues and increased support requests. A phased approach is recommended:
By strategically guiding users toward full passwordless authentication, organizations can maximize security without disrupting the user experience.
Once passwords are removed, account recovery mechanisms must be robust and secure. Traditional recovery methods often rely on manual interventions, such as support tickets or email resets, which can introduce security risks and operational costs. Organizations must implement modern, self-service account recovery solutions that maintain security while improving user experience.
Key elements of automated account recovery include:
Many organizations already invest in automated recovery processes independently of their passwordless transition to reduce costs and enhance usability. However, in a passkey-driven ecosystem, these mechanisms become even more critical to maintaining security and reducing friction.
Based on these four phases, we will now try to help you evaluate the buy vs. build decision. Thus, it’s very important for the long-term success of your passkey project to have all phases in mind and not just integrate passkeys (this can still be an objective but then you leave the full potential of passkeys unused).
Choosing between a DIY and external passkey solution depends on your company’s technical resources, security priorities, size of deployment and long-term passkey strategy. In the next section, we’ll break down the key aspects to help you make the best decision.
The following table shows different evaluation criteria that you need to assess. Based on the statement that you lean more toward, different number of points are provided.
How to use the evaluation matrix:
For each criterion, choose whether your company needs a simpler or more elaborated solution.
Download the full Buy vs Build Passkey guide for free and get access to all the evaluation criteria.
Buy or Build a Passkey Solution?
Get a complete checklist for passkey deployment, comparing DIY vs. vendor solutions (SaaS & on-prem), key challenges, costs and best practices.
When deciding whether to build or buy a passkey solution, it’s important to look at the entire process, not just a single phase of passkey rollout. Even if your near-term priority is to offer passkeys as an MVP, you should anticipate the longer-term implications especially driving adoption. Below is how we recommend using this guide and interpreting your results, with an emphasis on why adoption matters more than almost any other factor.
No matter how advanced your passkey solution is, if users don’t adopt it by creating passkeys and using passkeys for login, the entire project is at risk. In our experience, organizations often underestimate the effort needed to move users away from passwords. Even if you implement passkeys seamlessly at a technical level, low adoption will lead to:
High adoption sometimes 50% or even +80% of your user base is typically required before you can make meaningful strides toward reducing or removing passwords altogether. Organizations like Google and Amazon set explicit adoption targets and systematically run A/B tests, user education campaigns and UI nudges to ensure passkeys are widely embraced. This concentrated effort on adoption is not optional; it’s what transforms your passkey rollout from a feature into a tangible competitive advantage.
This guide is designed to help you make informed decisions about passkey implementations at every stage of the journey:
Of these, Phase 2 (Increase Adoption) is the most important. You can evaluate each section separately, but keep in mind that your long-term success and ROI often hinge on how seriously you take adoption from the outset.
If you’re at the early stage of deciding to implement passkeys, begin with the first section of the evaluation matrix (passkey integration) and fill it out with management, IT, product owners, and other key decision-makers. Ask yourselves:
Answering these questions upfront ensures your passkey project doesn’t become a dead-end. Organizations that fail to plan for adoption often find themselves stuck with passwords for years to come, undercutting the entire security and user experience strategy.
Throughout the matrix, each evaluation criterion can land you anywhere from lowest complexity (1) to highest complexity (5). The more of your answers that shift to and beyond the neutral zone (3), the stronger the case for using a specialized passkey vendor:
These factors can overwhelm in-house teams, both technically and organizationally. A managed passkey solution can often deliver proven best practices, quick updates, and real-world expertise to ramp up adoption much faster than a DIY approach.
As a passkey specialist, we at Corbado have a strong viewpoint. If passkeys are on your roadmap and you want a state-of-the-art implementation that actively drives adoption, Corbado Connect can help you tackle complexities at scale. Here’s why:
Adoption is built into the solution: Our platform is designed around maximizing user opt-in through smart nudges, analytics, and continuous A/B testing which also drives cost savings.
Next Steps:
By addressing passkeys in a holistic manner and making adoption one of the key targets, you’ll achieve the best outcomes. That means stronger security, simplified logins, and a real path to a passwordless future. If you’re interested in learning more about Corbado Connect and how we help our clients achieve high passkey adoption, we’re here to talk.
Now that we’ve helped to determine the right approach to answer the question “Buy vs Build?”, we analyze how to evaluate the success of a passkey deployment. Therefore, we define input and output KPIs of a passkey project.
Input KPIs help track the early-stage adoption of passkeys and whether the necessary conditions for widespread use are being established. These indicators precede actual login behavior but are crucial for enabling meaningful adoption and optimize the deployment.
KPI | Definition | Why It Matters | How to Measure | Benchmark |
---|---|---|---|---|
Passkey Acceptance Rate | Percentage of users who, after successfully logging in (post-sign-in), receive a “nudge” (a prompt or suggestion encouraging them to set up a passkey) and choose to create a passkey. This KPI specifically measures user responsiveness to these post-sign-in prompts, highlighting the effectiveness of the nudge messaging in driving passkey creation. This approach is considered state-of-the-art because users typically do not proactively create passkeys through account or credential management settings. Instead, passkeys are most successfully adopted when users are prompted directly after logging in, making nudges the primary driver of passkey creation. Make sure to diffentiate between the very first nudge and following ones as the rates drops. | High acceptance indicates successful user persuasion and nudge design. Low rates signal friction, unclear messaging, or user hesitancy. | Formula: (# of users who complete passkey creation after nudge) ÷ (# of users exposed to the nudge). Segment by OS/browser/device. | 50%-75% on first nudge, up to 85% over multiple nudges on mobile. Lower on desktop. Heavily depends on wording and implementation. |
Passkey Creation Success Rate | Proportion of users who begin the passkey registration ceremony but successfully complete it (i.e., no abandonment). | Shows how many users drop out mid-creation due to confusing UX, technical issues, or user second thoughts. | Formula: (# of completed passkey registrations) ÷ (# of registration attempts) Analyze failure points by OS/browser/device. | Close to 100%. |
Number of Created Passkeys | Cumulative count of newly created passkeys in a given period (daily, weekly, monthly). | A raw adoption measure often considered a semi-output KPI. Reflects the volume of passkey usage and potential future login shifts away from passwords. | Formula: Sum of all newly registered passkeys across OS, browser, device categories. Monitor growth trends over time. The absolute number has no implication it depends on the size of the user base. | A substantial amount per day as soon as rolled out completely. |
These input KPIs serve as leading indicators of future passkey adoption and allow organizations to fine-tune user education, UX flows, and technical implementation.
Output KPIs (OKRs) measure the actual success of passkey adoption by evaluating user behavior, operational improvements and business impact. These indicators reflect the real-world effectiveness of a passkey deployment. The Passkey Login Rate is a core Output KPI because it directly reflects actual passkey adoption and usage. A rising passkey login rate indicates successful onboarding and continued user preference for passkeys over legacy authentication methods.
KPI | Definition | Why It Matters | How to Measure | Benchmark |
---|---|---|---|---|
User Activation Rate | Among all users who have seen at least one nudge (could be multiple prompts over time), the percentage who have ultimately created at least one passkey. | Measures overall passkey onboarding success across multiple nudges. Users may reject the first nudge but convert later. | Formula: (# of unique users who have created ≥1 passkey) ÷ (# of unique users who have ever been shown at least one nudge) Segment by OS, browser, device to see who eventually adopts passkeys. Once the deployment grows, deleted passkeys must also be reflected here. | Over 50% in 12 months. Passkey login rate converges to User Activation Rate. It will depend on your user’s composition. |
Passkey Login Rate | The percentage of all login events that are completed using a passkey rather than a legacy method (password, SMS OTP, etc.). | Demonstrates real-world passkey usage frequency. A consistently low login rate indicates that users either prefer or revert to passwords despite initially creating passkeys, reflects low activation rates (as a high login rate can only occur if activation itself is high), or results from a suboptimal login implementation that does not automatically leverage existing passkeys. | Formula: (# of passkey logins) ÷ (Total logins) Segment by OS/browser/device or user group. This helps locate problem platforms or demographics with low passkey usage. | Over 20% in weeks, over 50% in 12 months. (heavily depends on how you implement) |
Passkey Login Success Rate | Proportion of passkey login attempts that end in success without reverting to a fallback. | Reveals friction within the passkey flow. A lower rate may indicate user confusion, environment constraints, or device compatibility issues leading to fallback. A non 100% is expected, as users switch devices or try to login from devices that are not connected. Highly depends on user pattern and devices used. | Formula: (# of successful passkey logins) ÷ (# of attempted passkey logins) Track partial attempts, where the user abandons passkey partway and switches to password. | Over 95% on mobile web. Over 99% on Native Apps. Desktop login rates depend on how many of your users have multiple devices and where they register first. |
Passkey Login Time vs. Legacy Login Time | Comparison of average time-to-authenticate via passkeys vs. passwords (or other legacy methods), from the moment the user initiates login to successful completion. | Faster passkey sign-ins correlate to higher user satisfaction and sustained usage. | Log the start and success timestamps of each login attempt. Calculate average passkey login time vs. average legacy login time. Segment by OS/browser/device for deeper insights. | 3x-5x speed gains. When compared to existing MFA (PW+SMS). |
Fallback Rate | How often users revert to passwords or another non-passkey method during a login attempt initially begun with a passkey. | Shows ongoing reliance on legacy flows, possibly due to poor passkey reliability or lack of user comfort. | Formula: (# of fallback events) ÷ (# of passkey login attempts) Correlate fallback data to user surveys or support tickets to identify root causes. | This KPI is basically the inverted passkey login rate and depends on your implementation. |
It’s important to optimize primarily for passkey login success and passkey login rate to ensure a frictionless user experience, while simultaneously working to increase user activation rates - but only when the login success rate is sufficiently high to avoid introducing user frustration. Additionally, tracking these KPIs by different segments (such as OS, browser, and device) and specific use cases (e.g., cross-device logins) can provide deeper insights into adoption patterns and potential friction points.
Accurately measuring both input (e.g. acceptance, creation) and output KPIs (e.g. login rate, fallback usage) requires gathering data from three main sources:
To calculate metrics like Passkey Acceptance Rate or Passkey Creation Success Rate, you must detect how many users see a post–sign-in nudge, how many click “Yes, create a passkey,” and whether they actually finish the passkey creation. This calls for JavaScript (or native mobile) event tracking to capture:
You’ll also need user agent parsing or client hints to tie acceptance rates back to specific OS / browser versions to be able to detect specific broken paths.
After a user initiates registration on the frontend, the server must confirm if a new passkey was really stored. You’ll need access to the database or an external identity provider’s API that records each credential’s creation event. This repository helps you count how many passkeys exist per user and track the final outcome (success or failure), ensuring you know precisely which attempts ended in completed registrations.
For metrics like Fallback Rate, you must look at your current authentication logs & processes. By unifying these logs with frontend events, you see if a user started a passkey login, got an error, and switched to the fallback login (e.g. SMS or password).
Finally, measuring time-based KPIs such as Passkey Login Time vs. Legacy Login Time relies on both client and server timestamps. Because many organizations only log successful sign-ins, you must add instrumentation for partial or failed passkey flows to truly gauge friction and fallback. Integrating these three data sources, while respecting privacy and regulatory constraints, is often more complex than anticipated and is another factor that leads some teams to adopt specialized passkey platforms that provide built-in analytics and event tracking.
Corbado Connect components implicitly collect all the described data points (hundreds of different ones) by automatically generating a unique process for every user starting an authentication process. Through seamless integration, Corbado also gathers authentication metrics from your existing solution. This holistic view precisely pinpoints improvements for users, providing comprehensive insights into all essential passkey KPIs without additional effort on your end.
Additionally, the following output KPIs effects should also appear after a successful passkey deployment and are most of the time already collected within the enterprise:
Operational & Cost Reduction Metrics
Business & UX Impact Metrics
By specifically tracking passkey input and output KPIs and relating them to other data, organizations can quantify the impact of their passkey deployment and make data-driven improvements to maximize adoption, reduce costs, and enhance security.
Choosing the right passkey solution depends on your specific challenges, security requirements and cost considerations. Below are key recommendations for buy vs. build decisions across different sectors.
Key Considerations:
Recommendation:
Most banks and financial institutions should rely on a passkey vendor solution rather than building in-house, as managing passkey infrastructure internally introduces hidden complexities that exceed traditional IT expertise. Implementing passkey authentication at scale requires continuous optimizations and updates, WebAuthn compatibility management and seamless integration with legacy banking systems - all of which passkey vendors already handle.
Banks like Ubank, Revolut and Finom are leading the way in passkey adoption, recognizing the technology's potential to enhance security while improving user experience. The passkey ROI analysis often favors buying a passkey solution rather than investing in ongoing maintenance and updates, with implementations showing significant reductions in fraud attempts and authentication-related support costs.
Examples: Armstrong Bank, First Financial Bank, Ubank, Revolut, Finom, Neobank, Cathay Financial Holdings, Stripe, PayPal, Square
Key Considerations:
Recommendation:
A passkey vendor solution is the most effective way to meet compliance requirements while simplifying authentication. Passkey vendors handle security patches, compliance updates and authentication reliability, reducing the burden on IT teams.
Examples: CVS Health, Caremark, Helsana, NHS, Swica
Key Considerations:
Recommendation:
E-commerce platforms benefit most from a passkey implementation provider offering high adoption rates. Major platforms like Amazon and Shopify have implemented passkey authentication, demonstrating the technology's growing adoption in e-commerce. Real-world data shows that over 27% of initial password logins fail, while passkey-based authentication can achieve up to 95-97% successful login rates as shown at previous adoptions. Passkey ROI analysis shows that higher conversion rates and lower fraud losses quickly justify the investment.
Amazon recently said that they set an ambitious target of 100% passkey adoption and the complete elimination of passwords.
Google also found out that trial users that interact with passkeys are 20% more likely to convert o paying customers than those who don’t.
Examples: KAYAK, Amazon, Mercari, Best Buy, eBay, Home Depot, Shopify, Target
Key Considerations:
Recommendation:
Most travel companies should implement passkey solutions to enhance security and user experience. Leading companies like Kayak and major airlines are already utilizing passkey authentication to improve their user experience. Pre-built solutions provide stronger fraud detection, seamless login experiences, and instant multi-device support. The hospitality sector is particularly benefiting from reduced check-in times and improved security through passkey implementation, ensuring smooth authentication across all touchpoints (apps, kiosks, web, and partner platforms).
Examples: Air New Zealand, Bolt, Grab, Uber, Hyatt
Key Considerations:
Recommendation:
An external passkey solution is best suited for quick deployment and regulatory compliance. Insurance providers report up a significant reduction in authentication-related support tickets after implementing passkeys. A passkey implementation provider with customizable authentication flows and integrated identity verification ensures security while keeping customer logins simple. Passkey ROI analysis suggests that reducing password resets and fraud losses offsets vendor costs.
Examples: Branch
Key Considerations:
Recommendation:
For government agencies, a specialized passkey solution that meets strict security standards while ensuring accessibility is essential. The implementation success at VicRoads demonstrates that government organizations benefit most from external passkey solutions that handle compliance requirements and security updates automatically. Therefore, choose a passkey implementation provider that offers enterprise-grade security, supports multi-device authentication and provides adaptive authentication flows to accommodate all citizens.
Example: VicRoads, myGov, State of Michigan
Key Considerations:
Recommendation:
For telecom and utility providers, adopting an external passkey solution is the recommended approach. Given the scale, complexity, and security demands of these industries, a managed passkey provider ensures compliance, high availability, and seamless integration with existing authentication infrastructure. Telecom giants and digital-first utility providers are already embracing passkeys as part of their security modernization efforts to reduce fraud and improve user experience. Additionally, outsourcing passkey implementation lowers the Total Cost of Ownership (TCO) compared to building in-house, as ongoing maintenance, security updates, and regulatory compliance are handled by the provider.
Example: Deutsche Telekom, Telstra, SK Telecom
Key Considerations:
Recommendation:
For most B2B SaaS providers, an external passkey implementation is the optimal choice. Implementation is usually faster than in-house development. Digital B2B companies like Notion, Hubspot or Vercel have already embraced passkeys to enhance their authentication security. The Total Cost of Ownership is significantly lower than in-house development, as maintenance, updates, and compliance requirements are covered by the provider.
Example: Canva, DocuSign, Notion
Passkeys have become the global standard for authentication, simplifying logins for end users while enhancing security. As companies evaluate how to implement passkeys, they must decide whether to build an in-house solution or leverage a specialized passkey vendor. While DIY implementations offer full control, they require significant technical expertise, development resources, and continuous maintenance. In contrast, passkey vendors provide a faster, scalable, and cost-effective approach, ensuring high adoption rates, seamless user experience, and compliance with evolving security standards,
This guide addressed the following key questions::
What components are needed to implement passkeys and go passwordless?
A successful passkey deployment requires FIDO2/WebAuthn infrastructure, seamless UX flows, fallback mechanisms, and secure account recovery options. Companies must also consider cross-platform compatibility and security compliance.
Should I implement passkeys in-house or use an external vendor?
While in-house development offers control, it comes with high complexity, ongoing maintenance costs, and security responsibilities. Most large-scale consumer-facing organizations benefit from an external passkey solution that provides quick deployment, lower operational costs and reduced technical overhead.
What is the benefit of having a passkey vendor when there are open-source libraries?
Open-source WebAuthn libraries provide a starting point but lack enterprise-grade security, passkey-optimized user experience and adoption-enhancing features. A passkey vendor ensures seamless deployment, scalability, and optimized user adoption strategies that bring better ROI, reducing friction for both users and developers.
What are the biggest challenges in building a passkey solution?
Developing an in-house passkey system requires deep expertise in WebAuthn, multi-device support and passkey adoption. Maintaining ongoing device and browser complexity and ensuring high adoption rates further add to the complexity.
What are the risks of implementing passkeys in-house?
Companies risk high development costs, prolonged deployment timelines, and ongoing security maintenance burdens. Compliance failures, security vulnerabilities, and poor user adoption can derail the success of a passkey rollout. A vendor-managed passkey solution mitigates these risks by offering a proven, scalable authentication infrastructure with built-in security and regulatory compliance.
Enjoyed this read?
🤝 Join our Passkeys Community
Share passkeys implementation tips and get support to free the world from passwords.
🚀 Subscribe to Substack
Get the latest news, strategies, and insights about passkeys sent straight to your inbox.
Related Articles
Enterprise Guide: Passkeys for Existing Large-Scale Consumer Deployments
Vincent - September 26, 2024
Integrating Passkeys into Enterprise Stack (Enterprise Passkeys Guide 4)
Vincent - October 28, 2024
Testing Passkey Implementations (Enterprise Passkeys Guide 5)
Vincent - December 9, 2024
Table of Contents