{"id":28746,"date":"2022-07-15T13:52:19","date_gmt":"2022-07-15T13:52:19","guid":{"rendered":"https:\/\/easydmarc.com\/blog\/?p=28746"},"modified":"2023-07-12T10:38:22","modified_gmt":"2023-07-12T10:38:22","slug":"what-are-apple-passkeys-and-how-to-use-them","status":"publish","type":"post","link":"https:\/\/easydmarc.com\/blog\/what-are-apple-passkeys-and-how-to-use-them\/","title":{"rendered":"What are Apple Passkeys and How to Use Them?"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">A password-free future once seemed like a dream, but it\u2019s fast becoming a reality. On June 6th 2022, Apple announced at its Worldwide Developer Conference (WWDC) that it\u2019s bringing passwordless logins to Macs, iPhones, iPads, and Apple TVs by September 2022.\u00a0<\/span><\/p>\n<p><a href=\"https:\/\/easydmarc.com\/blog\/what-is-a-password-attack-in-cyber-security\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">Password Attacks<\/span><\/a><span style=\"font-weight: 400;\"> are rising; hence the idea is to let users log in to websites and apps using the new <\/span><b>Apple Passkey<\/b><span style=\"font-weight: 400;\"> feature built into iOS 16 and macOS Ventura. All you need is your\u00a0 Touch ID or Face ID!<\/span><\/p>\n<p><span style=\"font-weight: 400;\">With the public beta rolling in, we\u2019ve decided to dive into <\/span><b>Apple&#8217;s passwordless authentication<\/b><span style=\"font-weight: 400;\"> method and tell you all about how it eliminates the need for a <\/span><span style=\"font-weight: 400;\">password manager<\/span><span style=\"font-weight: 400;\">.<\/span><\/p>\n<h2><b>What is an Apple Passkey?<\/b><\/h2>\n<p><b>Apple Passkey <\/b><span style=\"font-weight: 400;\">is a technology built to replace passwords on apps and websites accessed via Apple devices. This is simply Apple\u2019s version of the FIDO credential, a cutting-edge, fast, and secure authentication standard based on cryptography.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It\u2019s a stronger, more convenient system resistant to all <\/span><a href=\"https:\/\/easydmarc.com\/blog\/top-9-different-types-of-password-attacks\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">types of password attacks<\/span><\/a><span style=\"font-weight: 400;\"> and phishing. Once released, <\/span><b>Apple\u2019s wireless trackpad passkey<\/b><span style=\"font-weight: 400;\"> will work across all Apple devices and a few non-Apple devices within close proximity.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The technology is built on the Web Authentication standard using public-key cryptography. When registering an account on an app or website, the OS via your device generates a unique key pair. The public cryptographic key is saved on the server and doesn\u2019t require protection. Meanwhile, the secured private key is kept secret\u2014which you\u2019ll use for actual sign-in.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Moreover, <\/span><b>Apple\u2019s passkey login<\/b><span style=\"font-weight: 400;\"> method can sync across a user\u2019s many devices via iCloud Keychain. End-to-end encrypted and requiring two-factor authentication, iCloud Keychain protects against unauthorized Apple ID access. It also safeguards a user\u2019s saved passwords and passkeys in the event of account compromise such as an attack, third-party access, etc.\u00a0\u00a0<\/span><\/p>\n<h3><b>Does Apple Passkey Substitute a Password?<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Yes, <\/span><b>Apple Passkeys<\/b><span style=\"font-weight: 400;\"> are set to replace passwords completely. The new technology is designed to use Face ID and Touch ID biometric authentication to authorize the passkey, which allows the user to log into an app or website seamlessly\u2014without entering a password.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Apple officials claim <\/span><b>Apple Passkeys<\/b><span style=\"font-weight: 400;\"> are even stronger than the multi-factor authentication method. Besides cryptographic technology, Apple Passkeys come with additional protection thanks to iCloud Keychain.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Once enabled, iCloud Keychain allows a user\u2019s device to generate and store a \u201csyncing identity\u201d using a unique key pair on its keychain. New devices can only join this \u201csyncing circle\u201d by being sponsored by an existing iCloud Keychain-enabled device or with iCloud Keychain recovery\u2014which, in turn, requires multi-factor authentication.\u00a0<\/span><\/p>\n<h3><b>How to Set up an Apple Passkey?<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Setting up <\/span><b>Apple Passkey <\/b><span style=\"font-weight: 400;\">is quite simple. You just have to use biometric features like fingerprint, iris, or retina recognition. To log into a passkey-enabled app or website with your Apple device:<\/span><\/p>\n<ul>\n<li><span style=\"font-weight: 400;\">Choose the passkey option.<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Use your Touch ID or Face ID to authenticate the passkey and log in.\u00a0<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Your unique <\/span><b>Apply Passkey<\/b><span style=\"font-weight: 400;\"> has now been created for that specific website or application, and stored on your device.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">It\u2019s as easy as that!\u00a0<\/span><\/p>\n<h3><b>How to Log in from Somebody Else\u2019s Computer?<\/b><\/h3>\n<p><b>Apple\u2019s passwordless authentication<\/b><span style=\"font-weight: 400;\"> technology allows you to log onto a website using someone else\u2019s computer too You will see a QR code option on the website\u2019s login page. Scan it with your Apple device and turn on Bluetooth so that your device and the computer are in maximum proximity.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">You\u2019ll be asked to authenticate the Apple Passkey for that website using your Apple Touch or Face ID. Your device will then connect with the computer to safely complete the login process.<\/span><\/p>\n<h2><b>Shaking up the World of Passwords<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">The new method of securing systems is set to cause a major technological shift. Its broad spectrum of cross-platform availability and device compatibility, from MacBook Air 2022 to iPhone, iPad, and Apple TV, makes it convenient and inclusive.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Besides Apple, Google has also announced future passkey support for Android in 2022, currently in developer testing.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It\u2019s unlikely that websites and applications will force you to use passkeys in the initial phases. They\u2019ll be available as an alternate option alongside passwords. But with unparalleled account security and ease of use, passkeys are bound to become mainstream in the near future.\u00a0<\/span><\/p>\n<h3><b>Does Phishing Have a Chance?<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">This next-generation<\/span><b> passkey login <\/b><span style=\"font-weight: 400;\">method is extremely resistant against <\/span><a href=\"https:\/\/easydmarc.com\/blog\/12-types-of-phishing-attacks-and-how-to-identify-them\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">phishing<\/span><\/a><span style=\"font-weight: 400;\"> and hacking. It eliminates the use of passwords, preventing hackers from stealing and misusing them.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Moreover, unique passkeys are linked to each website and application, so users can\u2019t be tricked into accessing a scammer\u2019s fraudulent phishing website or app.\u00a0<\/span><\/p>\n<h3><b>Will Industry Giants Join?<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Yes! Other tech giants will also join over the course of the coming year. Both Microsoft and Google have been working on passwordless technology for a better user experience. Once all the companies release their respective passkey versions, users will be able to use them across platforms.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Working together within the FIDO Alliance, platform vendors, tech companies, and software developers are ensuring passkey compatibility across as many platforms and devices as possible. Although still in its early stages, passkey compatibility is bound to grow as it becomes increasingly mainstream.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The FIDO Alliance already has hundreds of members, including board-level members like Samsung, PayPal, Visa, Yahoo! Japan, Meta, American Express, Wells Fargo, and Amazon. Sponsor-level members include Sony, Twitter, and Verizon. There are also government-level members and many associate-level members too.<\/span><\/p>\n<h3><b>Where Do Password Managers Stand?<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">At present, password managers have no role in <\/span><b>Apple Passkey<\/b><span style=\"font-weight: 400;\">. Still, there\u2019s a strong possibility that they\u2019ll be used to make the passkey ecosystem more portable.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Passkeys are stored on your phone or computer after they\u2019re initially set up. They can synchronize across devices\u2014behaving much like a password manager from a user\u2019s standpoint.<\/span><\/p>\n<h2><b>Final Thoughts<\/b><\/h2>\n<p><b>Apple Passkey<\/b><span style=\"font-weight: 400;\"> is a next-gen cryptographic technology that secures your accounts without the need for a password.\u00a0 It uses fingerprint or face recognition to authenticate unique passkeys across websites and applications, thereby\u2014<\/span><\/p>\n<ul>\n<li><span style=\"font-weight: 400;\">Vastly improving your online safety.<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Eliminating password attacks.<\/span><\/li>\n<li><span style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Significantly reducing the risk of phishing attacks.<\/span><\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Additionally, these passkeys sync across your Apple devices via iCloud Keychain, an end-to-end encrypted method requiring multi-factor authentication.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">But Apple\u2019s not the only one bringing passkeys to the masses. Tech giants like Microsoft and Google are working on their own versions too. Meanwhile, the FIDO Alliance continues to expand. Is this the end of passwords? We\u2019ll find out soon enough!<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A password-free future once seemed like a dream, &#8230;<\/p>\n","protected":false},"author":1,"featured_media":32543,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[204,199],"tags":[],"class_list":["post-28746","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-cybersecurity"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>What are Apple Passkeys and How to Use Them? | EasyDMARC<\/title>\n<meta name=\"description\" content=\"Apple Passkeys are set to replace passwords. Find out why they\u2019re more secure, and what you can expect from this new authentication method.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/easydmarc.com\/blog\/what-are-apple-passkeys-and-how-to-use-them\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What are Apple Passkeys and How to Use Them?\" \/>\n<meta property=\"og:description\" content=\"Apple Passkeys are set to replace passwords. Find out why they\u2019re more secure, and what you can expect from this new authentication method.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/easydmarc.com\/blog\/what-are-apple-passkeys-and-how-to-use-them\/\" \/>\n<meta property=\"og:site_name\" content=\"EasyDMARC\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/EasyDMARC\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-07-15T13:52:19+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-07-12T10:38:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/07\/What-are-Apple-Passkeys-and-How-to-Use-Them_-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1440\" \/>\n\t<meta property=\"og:image:height\" content=\"910\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EasyDMARC\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@easydmarc\" \/>\n<meta name=\"twitter:site\" content=\"@easydmarc\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EasyDMARC\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-are-apple-passkeys-and-how-to-use-them\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-are-apple-passkeys-and-how-to-use-them\\\/\"},\"author\":{\"name\":\"EasyDMARC\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#\\\/schema\\\/person\\\/449261e9810b270cc697c7c9c5b89e97\"},\"headline\":\"What are Apple Passkeys and How to Use Them?\",\"datePublished\":\"2022-07-15T13:52:19+00:00\",\"dateModified\":\"2023-07-12T10:38:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-are-apple-passkeys-and-how-to-use-them\\\/\"},\"wordCount\":1085,\"publisher\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-are-apple-passkeys-and-how-to-use-them\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/07\\\/What-are-Apple-Passkeys-and-How-to-Use-Them_-1.jpg\",\"articleSection\":[\"Blog\",\"Cybersecurity\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-are-apple-passkeys-and-how-to-use-them\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-are-apple-passkeys-and-how-to-use-them\\\/\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-are-apple-passkeys-and-how-to-use-them\\\/\",\"name\":\"What are Apple Passkeys and How to Use Them? | EasyDMARC\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-are-apple-passkeys-and-how-to-use-them\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-are-apple-passkeys-and-how-to-use-them\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/07\\\/What-are-Apple-Passkeys-and-How-to-Use-Them_-1.jpg\",\"datePublished\":\"2022-07-15T13:52:19+00:00\",\"dateModified\":\"2023-07-12T10:38:22+00:00\",\"description\":\"Apple Passkeys are set to replace passwords. Find out why they\u2019re more secure, and what you can expect from this new authentication method.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-are-apple-passkeys-and-how-to-use-them\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-are-apple-passkeys-and-how-to-use-them\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-are-apple-passkeys-and-how-to-use-them\\\/#primaryimage\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/07\\\/What-are-Apple-Passkeys-and-How-to-Use-Them_-1.jpg\",\"contentUrl\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/07\\\/What-are-Apple-Passkeys-and-How-to-Use-Them_-1.jpg\",\"width\":1440,\"height\":910,\"caption\":\"Passkeys written on a white background\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-are-apple-passkeys-and-how-to-use-them\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cybersecurity\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/cybersecurity\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"What are Apple Passkeys and How to Use Them?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/\",\"name\":\"EasyDMARC\",\"description\":\"Blog\",\"publisher\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/#organization\",\"name\":\"EasyDMARC\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/img\\\/logo.png\"},\"image\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/EasyDMARC\\\/\",\"https:\\\/\\\/x.com\\\/easydmarc\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/easydmarc\\\/mycompany\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#\\\/schema\\\/person\\\/449261e9810b270cc697c7c9c5b89e97\",\"name\":\"EasyDMARC\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g\",\"caption\":\"EasyDMARC\"},\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/author\\\/easydmarc\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"What are Apple Passkeys and How to Use Them? | EasyDMARC","description":"Apple Passkeys are set to replace passwords. Find out why they\u2019re more secure, and what you can expect from this new authentication method.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/easydmarc.com\/blog\/what-are-apple-passkeys-and-how-to-use-them\/","og_locale":"en_US","og_type":"article","og_title":"What are Apple Passkeys and How to Use Them?","og_description":"Apple Passkeys are set to replace passwords. Find out why they\u2019re more secure, and what you can expect from this new authentication method.","og_url":"https:\/\/easydmarc.com\/blog\/what-are-apple-passkeys-and-how-to-use-them\/","og_site_name":"EasyDMARC","article_publisher":"https:\/\/www.facebook.com\/EasyDMARC\/","article_published_time":"2022-07-15T13:52:19+00:00","article_modified_time":"2023-07-12T10:38:22+00:00","og_image":[{"width":1440,"height":910,"url":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/07\/What-are-Apple-Passkeys-and-How-to-Use-Them_-1.jpg","type":"image\/jpeg"}],"author":"EasyDMARC","twitter_card":"summary_large_image","twitter_creator":"@easydmarc","twitter_site":"@easydmarc","twitter_misc":{"Written by":"EasyDMARC","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/easydmarc.com\/blog\/what-are-apple-passkeys-and-how-to-use-them\/#article","isPartOf":{"@id":"https:\/\/easydmarc.com\/blog\/what-are-apple-passkeys-and-how-to-use-them\/"},"author":{"name":"EasyDMARC","@id":"https:\/\/easydmarc.com\/blog\/#\/schema\/person\/449261e9810b270cc697c7c9c5b89e97"},"headline":"What are Apple Passkeys and How to Use Them?","datePublished":"2022-07-15T13:52:19+00:00","dateModified":"2023-07-12T10:38:22+00:00","mainEntityOfPage":{"@id":"https:\/\/easydmarc.com\/blog\/what-are-apple-passkeys-and-how-to-use-them\/"},"wordCount":1085,"publisher":{"@id":"https:\/\/easydmarc.com\/blog\/#organization"},"image":{"@id":"https:\/\/easydmarc.com\/blog\/what-are-apple-passkeys-and-how-to-use-them\/#primaryimage"},"thumbnailUrl":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/07\/What-are-Apple-Passkeys-and-How-to-Use-Them_-1.jpg","articleSection":["Blog","Cybersecurity"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/easydmarc.com\/blog\/what-are-apple-passkeys-and-how-to-use-them\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/easydmarc.com\/blog\/what-are-apple-passkeys-and-how-to-use-them\/","url":"https:\/\/easydmarc.com\/blog\/what-are-apple-passkeys-and-how-to-use-them\/","name":"What are Apple Passkeys and How to Use Them? | EasyDMARC","isPartOf":{"@id":"https:\/\/easydmarc.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/easydmarc.com\/blog\/what-are-apple-passkeys-and-how-to-use-them\/#primaryimage"},"image":{"@id":"https:\/\/easydmarc.com\/blog\/what-are-apple-passkeys-and-how-to-use-them\/#primaryimage"},"thumbnailUrl":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/07\/What-are-Apple-Passkeys-and-How-to-Use-Them_-1.jpg","datePublished":"2022-07-15T13:52:19+00:00","dateModified":"2023-07-12T10:38:22+00:00","description":"Apple Passkeys are set to replace passwords. Find out why they\u2019re more secure, and what you can expect from this new authentication method.","breadcrumb":{"@id":"https:\/\/easydmarc.com\/blog\/what-are-apple-passkeys-and-how-to-use-them\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/easydmarc.com\/blog\/what-are-apple-passkeys-and-how-to-use-them\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/easydmarc.com\/blog\/what-are-apple-passkeys-and-how-to-use-them\/#primaryimage","url":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/07\/What-are-Apple-Passkeys-and-How-to-Use-Them_-1.jpg","contentUrl":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/07\/What-are-Apple-Passkeys-and-How-to-Use-Them_-1.jpg","width":1440,"height":910,"caption":"Passkeys written on a white background"},{"@type":"BreadcrumbList","@id":"https:\/\/easydmarc.com\/blog\/what-are-apple-passkeys-and-how-to-use-them\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/easydmarc.com\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/"},{"@type":"ListItem","position":3,"name":"Cybersecurity","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/cybersecurity\/"},{"@type":"ListItem","position":4,"name":"What are Apple Passkeys and How to Use Them?"}]},{"@type":"WebSite","@id":"https:\/\/easydmarc.com\/blog\/#website","url":"https:\/\/easydmarc.com\/blog\/","name":"EasyDMARC","description":"Blog","publisher":{"@id":"https:\/\/easydmarc.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/easydmarc.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/easydmarc.com\/#organization","name":"EasyDMARC","url":"https:\/\/easydmarc.com\/","logo":{"@type":"ImageObject","url":"https:\/\/easydmarc.com\/img\/logo.png"},"image":{"@id":"https:\/\/easydmarc.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/EasyDMARC\/","https:\/\/x.com\/easydmarc","https:\/\/www.linkedin.com\/company\/easydmarc\/mycompany\/"]},{"@type":"Person","@id":"https:\/\/easydmarc.com\/blog\/#\/schema\/person\/449261e9810b270cc697c7c9c5b89e97","name":"EasyDMARC","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g","caption":"EasyDMARC"},"url":"https:\/\/easydmarc.com\/blog\/author\/easydmarc\/"}]}},"jetpack_featured_media_url":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/07\/What-are-Apple-Passkeys-and-How-to-Use-Them_-1.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts\/28746","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/comments?post=28746"}],"version-history":[{"count":0,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts\/28746\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/media\/32543"}],"wp:attachment":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/media?parent=28746"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/categories?post=28746"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/tags?post=28746"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}