Passkeys and Verifiable Credentials: A Perfect Authentication Partnership

Two technologies are reshaping digital identity: passkeys and verifiable credentials. Separately, they solve different problems. Together, they could eliminate passwords while giving users control over their personal data.

Here's why this combination matters, and how it might transform authentication sooner than you think.

Understanding the Players

Passkeys: The Authentication Specialist

Passkeys have quickly become the star of the authentication world, and for good reason. Since their widespread adoption by browsers and operating systems in 2022, they've offered users a refreshingly simple experience:

Strengths:

  • Frictionless Experience: Built directly into browsers and operating systems, passkeys work seamlessly across devices
  • Universal Support: Every major password manager now supports them, making adoption painless
  • Phishing-Resistant: Domain-bound by design, passkeys are virtually immune to traditional phishing attacks

Limitations:

  • Single-Purpose Design: Passkeys do one thing, authentication, and they do it well, but that's all they do
  • Siloed Usage: Each passkey is tied to a specific web application, limiting cross-platform utility (Required for phishing resistance)
  • Only as secure as the weakest link: Passkeys are great and secure, but when traditional login methods are left in place, they still leave less secure avenues that can be compromised

Explain like I'm 5: What's a Passkey?

Imagine you have a special invisible stamp (Passkey) that only works on your favourite colouring book (Website or App). When you want to colour in that book, you stamp the book, and the book magically knows it's you and lets you in. The stamp won't work on any other colouring book, and nobody can steal it because it's invisible and lives inside your device, which is likely secured via a biometric lock. That's a passkey, a magic stamp that proves it's you, but only for one specific website or app at a time.

Verifiable Credentials: The digital equivalent of physical credentials

Verifiable credentials represent a different approach to digital identity, focusing on rich, portable information:

Strengths:

  • Interoperability and portability: One credential can work across multiple platforms and services
  • Rich Data Capacity: From digital IDs to driver's licenses, health records to professional certifications, verifiable credentials can represent virtually any type of information
  • User Control: Individuals decide what information to share and with whom they want to share it
  • Cryptographically tamperproof: Instantly verifiable

Limitations:

  • Implementation Complexity: The technical overhead can be daunting for developers and organisations
  • User Experience Challenges: Current implementations often involve clunky mobile apps and limited wallet support
  • Phishing target: While the credentials themselves are cryptographically secure, the rich data they contain makes them attractive targets for social engineering attacks

Explain like I'm 5: What's a Verifiable Credential?

Imagine you have a special, magic-like certificate (Verifiable Credential) that proves something about you, such as a digital diploma or ID card. This certificate is super special because it has three magical properties: it can’t be faked, it works everywhere, and you keep it in your magic wallet (your device) instead of someone else’s filing cabinet.

Here’s how the magic works: A trusted grown-up (Issuer), like a school or the government, gives you this magic certificate. You store it safely in your digital wallet, and whenever someone needs to verify that you have graduated or are old enough for something, you can show them your certificate. The amazing part is that they can instantly tell it’s real without having to call your school or check with anyone else, because the certificate has a special invisible signature that proves it’s genuine.

Unlike regular certificates that can be lost or damaged, your magic certificate remains safely on your phone and can be shared instantly with anyone who needs to view it. You’re in complete control. Only you decide when to show it and to whom, and nobody else can peek at your certificates without your permission. It’s like having all your essential documents in an unbreakable, invisible folder that only you can open and share.

In common

Both Passkeys and Verifiable Credentials leverage the extensively tested public-private key cryptography to secure digital payloads. They utilise this in various ways to produce similar yet intentionally distinct products.

The Winds of Change

The landscape is shifting dramatically. Both iOS and Android are integrating ISO 18013-7 compliant verifiable credentials support into their native wallets, setting the stage for a unified experience. While we're still about 6-12 months away from full deployment, this integration promises to transform how users interact with verifiable credentials.

The real game-changer? Soon, websites will be able to request ISO 18013-7 compliant verifiable credentials directly through the browser. With Safari 26 beta and the planned Chrome 140 (Aug-Sept 2025) supporting the Digital Credentials API, we're approaching a tipping point for mainstream adoption.

Yes, Firefox's absence from this party is notable, but with its sub-4% desktop market share and less than 1% mobile presence, it's unlikely to impact adoption rates significantly.

The Power of Partnership

Here's where things get interesting. Rather than competing technologies, passkeys and verifiable credentials are complementary pieces of a larger puzzle:

Seamless Authentication Flows

Imagine logging into a service with your passkey, then seamlessly presenting a verifiable credential when additional verification is needed. No passwords, no friction. Just secure, contextual authentication. Let's say, for example, you log into your banking app using a passkey, then use your verifiable credential to approve any transfer of money over $250. Perhaps this is with a bank-issued digital ID or a government-issued driver's license. The passkey handles the initial authentication, while the verifiable credential provides the necessary context and assurance for sensitive actions.

Enhanced Security Through Layering

Passkeys handle the "who you are" question with their phishing-resistant design, while verifiable credentials answer "what you're authorised to do" with cryptographically secure attestations. Together, they create multiple layers of security that are exponentially harder to compromise.

Context-Aware Access

This combination enables smart, situational authentication. A healthcare portal might use a passkey for basic access but request a medical license credential for prescription management. An age-restricted service could verify age through a credential without exposing unnecessary personal information.

Building Digital Trust

When users authenticate with a passkey and present cryptographically secure credentials, both parties gain confidence in the interaction. Service providers know they're dealing with verified individuals, while users maintain control over their personal information.

Looking Ahead

The convergence of passkeys and verifiable credentials represents more than just technical evolution; it's a fundamental shift in how we think about digital identity. As mobile device and browser support solidifies and user experience improves, we're moving toward a future where:

  • Password breaches become relics of the past
  • Identity verification happens seamlessly without sacrificing privacy
  • Users maintain sovereignty over their digital identities
  • Cross-platform interoperability becomes the norm, not the exception

The following 12 months will be crucial as these technologies mature and converge. Organisations that begin preparing now, understanding both technologies and their synergies, will be best positioned to deliver the secure, user-friendly experiences that tomorrow's digital citizens will demand.

The question isn't whether passkeys and verifiable credentials will work together, but how quickly we can realise their combined potential. The building blocks are in place; now it's time to start thinking and investigating how your digital products will remain secure in the years ahead.

Further reading

Matt McInnes, from VO (a company at the forefront of this technology and a partner of MakerX), has also blogged about Verifiable Credentials and Passkeys: The Power Duo. I highly recommend you read it.