Show / Hide Table of Contents

    Using synced passkey in Safewhere Identify

    Continue with the Passkey authentication guide, this document explains how to use passkeys stored in Google Password Manager, iCloud Keychain and Samsung Pass with Safewhere Identify.

    Google Password Manager

    According to Google documentation (supported environments and use cases), here are some key notes:

    Google Password Manager stores, serves and synchronizes passkeys on Android and Chrome. Google Password Manager is enabled by default as a passkey provider on Android and available for all apps including Chrome and other browsers. Chrome on desktop operating systems (Windows, macOS, Linux and ChromeOS) comes with Google Password Manager support as well.

    Passkeys are synchronized across devices that are part of the same ecosystem. For example, if a user creates a passkey on Android, it's available on all Android devices as long as the user is signed in to the same Google account. However, the same passkey isn't available on iOS, macOS or Windows, even if you're using the same browser, like Chrome.

    A user can use a passkey on their phone to sign in on other devices by scanning a QR code, as long as the phone is near the laptop and the user approves the sign-in on the phone. This works across different operating systems and browsers.

    iCloud Keychain

    iCloud Keychain ensures that your passkeys are accessible across all your Apple devices linked to the same Apple ID. This seamless synchronization allows you to use passkeys on your iPhone, iPad, and Mac without the need for manual transfers.

    Samsung Pass

    Samsung Pass began supporting Passkeys with the release of the One UI 6.0 update in November 2023. This update allows users to sign in to apps and websites without entering IDs and passwords, utilizing biometric authentication instead. The feature was initially available on the Galaxy S23 series and is planned to extend to older Galaxy devices throughout 2024.

    Second factor authentication on a Windows machine using a passkey stored in Google Password Manager on the same device

    In this demonstration:

    • A user accesses IdentifyMe on a Windows machine and successfully signs in with the first factor authentication.
    • During the second factor authentication phase, the user unlocks Windows Hello to create a passkey in Google Password Manager.
    • The user logs out of IdentifyMe.
    • The user re-accesses IdentifyMe on a Windows machine and successfully signs in with the first factor authentication.
    • During the second factor authentication phase, the user's passkey in Google Password Manager is selected, and Windows Hello is prompted to authenticate the user.
    • The user unlocks Windows Hello to complete the login.

    To set up necessary connections in Identify, follow these steps:

    1. Create an OTP connection for WebAuthn as shown below. In this demonstration, a passkey is created on the device initiating the WebAuthn registration ceremony, so set the Authenticator type setting to Platform.

    2ndfactor-WebAuthn-OTP-2nd

    1. Set the OTP connection as the second factor of another identity provider (a Username & Password identity provider is used in this demonstration).

    After that, a user can log in and create a passkey:

    1. A user accesses IdentifyMe via Chrome on a Windows machine, and successfully signs in the first factor authentication.
    2. During the second factor authentication phase, Google Password Manager prompts the user to create a passkey.

    2ndfactor-passkey-google-password-manager.png

    Note: When a user creates a passkey with Google Password Manager, it is synchronized and end-to-end encrypted. If the first passkey for Google Password Manager is created on a desktop, Chrome asks to create a Google Password Manager PIN. The user needs to sign in to their Google Account and enter their Android device screen lock or Google Password Manager PIN to decrypt a synced passkey on a new environment.

    google-password-manager-recovery-PIN.png

    1. After the user clicks the Create button, Windows Hello on the Windows machine is prompted to authenticate the user.

    2ndfactor-passkey-google-password-manager-windows-hello.png

    1. After the user is authenticated with Windows Hello, a new passkey is created and saved to Google Password Manager.

    2ndfactor-passkey-google-password-manager-passkey-saved.png

    The user can now log in using the newly created passkey:

    1. The user re-accesses IdentifyMe on a Windows machine and successfully logs in with the first factor authentication.

    2. The user's passkey in Google Password Manager is selected, and Windows Hello is prompted to authenticate the user.

    2ndfactor-passkey-google-password-manager-login.png

    1. The user unlocks Windows Hello to complete the login.

    Second factor authentication on an iPad using a passkey in iCloud Keychain from an iPhone

    In this demonstration:

    • A user accesses IdentifyMe on an iPhone and successfully signs in with the first factor authentication.
    • During the second factor authentication phase, the user unlocks the phone to create a passkey in iCloud Keychain.
    • The user accesses IdentifyMe on an iPad that has the same Apple ID as the iPhone and successfully signs in with the first factor authentication.
    • On the iPad, the user chooses to sign in with a passkey in iCloud Keychain.
    • The user is prompted to approve the use of their passkey on the iPad device, for example, with Touch ID. After doing so, they're signed in on the iPad.

    Note: The passkey itself is not transferred to the iPad but remains securely stored in iCloud Keychain.

    To set up necessary connections in Identify, follow these steps:

    1. Create an OTP connection for WebAuthn as shown below. In this demonstration, a passkey is created on the device initiating the WebAuthn registration ceremony, so set the Authenticator type setting to Platform.

    2ndfactor-WebAuthn-OTP-2nd

    1. Set the OTP connection as the second factor of another identity provider (a Username & Password identity provider is used in this demonstration).

    After that, a user can log in and create a passkey:

    1. A user accesses IdentifyMe on an iPhone and successfully signs in with the first factor authentication.
    2. During the second factor authentication phase, the user unlocks the phone to create a passkey in iCloud Keychain.

    iphone-2ndfactor-passkey-icloud-keychain.png

    The user can now log in using the newly created passkey:

    1. The user accesses IdentifyMe on an iPad that has the same iCloud account as the iPhone and successfully signs in with the first factor authentication.
    2. On the iPad, the user chooses to sign in with a passkey in iCloud Keychain.

    ipad-2ndfactor-passkey-icloud-keychain.png 3. The user is prompted to approve the use of their synced passkey on the iPad device, for example, with Touch ID. After doing so, they're signed in on the iPad.

    Second factor authentication on a Windows machine using a passkey in Google Password Manager from an Android phone

    In this demonstration:

    • A user accesses IdentifyMe on an Android phone and successfully signs in with the first factor authentication.
    • During the second factor authentication phase, the user unlocks the phone to create a passkey in Google Password Manager.
    • The user accesses IdentifyMe on a Windows machine and successfully signs in with the first factor authentication.
    • On the Windows machine, the user chooses to sign in with a passkey from another device.
    • The two devices connect via Bluetooth.
    • The user is prompted to approve the use of their passkey on the Android device, for example, with a fingerprint sensor. After doing so, they're signed in on the Windows machine.

    Note: The passkey itself is not transferred to the Windows machine but remains securely stored in Google Password Manager, accessible via the Android device for authentication.

    To set up necessary connections in Identify, follow these steps:

    1. Create an OTP connection for WebAuthn as shown below. In this demonstration, a passkey is created on the device initiating the WebAuthn registration ceremony, so set the Authenticator type to Platform.

    2ndfactor-WebAuthn-OTP-2nd

    1. Set the OTP connection as the second factor of another identity provider (a Username & Password identity provider is used in this demonstration).

    After that, a user can log in and create a passkey:

    1. A user accesses IdentifyMe on an Android phone and successfully signs in with the first factor authentication.

    2. During the second factor authentication phase, the user unlocks the phone to create a passkey in Google Password Manager.

    android-2ndfactor-passkey-google-password-manager.png

    The user can now log in using the newly created passkey:

    1. The user accesses IdentifyMe on a Windows machine and successfully signs in with the first factor authentication.

    2. On the Windows machine, the user chooses to sign in with a passkey from another device.

    android-2ndfactor-passkey-select-device.png

    1. The user is prompted to turn on Bluetooth on the Windows machine.

    android-2ndfactor-passkey-turn-on-bluetooth.png

    1. The Windows machine displays a QR code.

    android-2ndfactor-passkey-display-QR-code.png

    1. The user uses the camera of the Android phone or Google Lens to scan this QR code.

    android-2ndfactor-passkey-scan-QR-code.png

    1. Then, the Android phone connects to the Windows machine.

    android-2ndfactor-passkey-connect-windows-machine.png

    1. The user is prompted to approve the use of their passkey on the Android device, for example, with a fingerprint sensor. After doing so, they're signed in on the Windows machine. Note that the passkey itself isn't transferred to the Windows machine.

    android-2ndfactor-passkey-scan-finger-print.png

    Second factor authentication on a Windows machine using a passkey in iCloud Keychain from an iPhone

    In this demonstration:

    • A user accesses IdentifyMe on a Windows machine and successfully signs in with the first factor authentication.
    • During the second factor authentication phase, the user chooses to save a passkey to an iPhone, iPad, or Android device. In this demonstration, the user uses an iPhone.
    • The user logs out of IdentifyMe.
    • The user re-accesses IdentifyMe on a Windows machine and successfully signs in with the first factor authentication.
    • On the Windows machine, the user chooses to sign in with a passkey from another device.
    • The two devices connect via Bluetooth.
    • The user is prompted to approve the use of their passkey on the iPhone device, for example, with Face ID. After doing so, they're signed in on the Windows machine.

    To set up necessary connections in Identify, follow these steps:

    1. Create an OTP connection for WebAuthn as shown below. In this demonstration, a passkey is created on a device different from the one initiating the WebAuthn registration ceremony, so set the Authenticator type setting to Cross platform.

    2ndfactor-WebAuthn-cross-platform.png

    1. Set the OTP connection as the second factor of another identity provider (a Username & Password identity provider is used in this demonstration).

    After that, a user can log in and create a passkey:

    1. A user accesses IdentifyMe on a Windows machine and successfully signs in with the first factor authentication.
    2. During the second factor authentication phase, select the option I have already set it up.

    web-authn-registration-register

    1. On the Register device form, click the Register button. The system will prompt you for an authorization gesture.
    2. The user chooses to save a passkey to an iPhone, iPad, or Android device. In this demonstration, the user uses an iPhone.

    2ndfactor-cross-device-windows-security.png

    1. The browser will display a QR code. The user uses the mobile phone's camera to scan it.

    qr-scan

    1. The user taps on the Use passkey to sign in for Android or Save a passkey on iPhone option that appears on the user's phone screen.

    scan-qr-on-phone

    1. The user's phone will then try to connect with the Windows machine via Bluetooth.

    2ndfactor-cross-device-iPhone-connect

    1. A notification is displayed when these devices are connected.

    connect-phone-laptop

    1. The user is prompted to authenticate with Face ID to complete the login.

    2ndfactor-cross-device-use-FaceId-sign-in

    1. After the passkey is saved successfully to the iPhone, a notification is displayed on the Windows machine. Then, the user clicks the OK button.

    passkey-save

    1. The system will prompt the user to save a recovery code as a backup. Tick the I have safely recorded this code checkbox and click Continue to complete onboarding.

    recovery-code-onboarding

    The user can now log in using the newly created passkey:

    1. The user accesses IdentifyMe on a Windows machine and successfully signs in with the first factor authentication.

    2. On the Windows machine, the user chooses to sign in with a passkey from another device.

    android-2ndfactor-passkey-select-device.png

    1. The user is prompted to turn on Bluetooth on the Windows machine.

    android-2ndfactor-passkey-turn-on-bluetooth.png

    1. The Windows machine displays a QR code.

    android-2ndfactor-passkey-display-QR-code.png

    1. The user uses the camera of the iPhone to scan this QR code.

    2ndfactor-cross-device-iPhone-scan-QRcode.png

    1. Then, the iPhone connects to the Windows machine.

    2ndfactor-cross-device-iPhone-connect.png

    1. The user is prompted to approve the use of their passkey on the iPhone device, for example, with Face ID. After doing so, they're signed in on the Windows machine. Note that the passkey itself isn't transferred to the Windows machine.

    2ndfactor-cross-device-use-FaceId-sign-in.png

    Second factor authentication on a Windows machine using a passkey in Samsung Pass from a Samsung device.

    Prerequisites:

    • A Samsung device running One UI 6.0 or later.
    • Bluetooth enabled on the Samsung device.

    In this demonstration:

    • A user accesses IdentifyMe on a Windows machine and successfully signs in with the first factor authentication.
    • During the second factor authentication phase, the user chooses to save a passkey to a Samsung device.
    • The user logs out of IdentifyMe.
    • The user re-accesses IdentifyMe on a Windows machine and successfully signs in with the first factor authentication.
    • On the Windows machine, the user chooses to sign in with a passkey from Samsung device.
    • The two devices connect via Bluetooth.
    • The user is prompted to approve the use of their passkey on the Samsung device, for example, with Fingerprint. After doing so, they're signed in on the Windows machine.

    To set up necessary connections in Identify, follow these steps:

    1. Create an OTP connection for WebAuthn as shown below. In this demonstration, a passkey is created on a device different from the one initiating the WebAuthn registration ceremony, so set the Authenticator type setting to Cross platform.

      2ndfactor-WebAuthn-cross-platform.png

    2. Set the OTP connection as the second factor of another identity provider (a Username & Password identity provider is used in this demonstration).

    After that, a user can log in and create a passkey:

    1. A user accesses IdentifyMe on a Windows machine and successfully signs in with the first factor authentication.

    2. During the second factor authentication phase, select the option I have already set it up.

      web-authn-registration-register

    3. On the Register device form, click the Register button. The system will prompt you for an authorization gesture.

    4. Select Samsung device to save passkey

      • The user selects a Samsung device in the Windows prompt when it detects the device via Bluetooth.

      • Alternatively, the user could choose the iPhone, iPad, or Android device option.

      passkey-samsungpass-onboarding-select-device.png

    5. The browser will display a QR code. The user uses the Samsung device's camera to scan it.

      passkey-samsungpass-onboarding-scanqrcode.png

    6. After scanning, the Windows machine notifies that it is connected to the Samsung device.

      passkey-samsungpass-onboarding-connected.png

    7. Authenticate Using Biometrics on Samsung Device

      • The user approves the creation of a passkey by authenticating via biometrics (e.g., fingerprint or facial recognition) on the Samsung device.
      • Upon success, the passkey is saved to the Samsung device, and a confirmation notification is displayed on the Windows machine.
      • The user then clicks OK

      passkey-samsungpass-onboarding-passkey-saved.png

    8. The system will prompt the user to save a recovery code as a backup. Tick the I have safely recorded this code checkbox and click Continue to complete onboarding.

      recovery-code-onboarding.png

    9. Passkey Information Saved to Samsung Pass Manager

      • After successfully creating and saving the passkey on the Samsung device, the passkey information will be stored in the Samsung Pass manager. In the demonstration, this is shown as follows:

        passkey-samsungpass-onboarding-samsung-pass-key-storage.png

      • The title "Safewhere" in the screenshot above is derived from the Organization Display Name setting in Safewhere Admin. This can be configured in the Safewhere Admin settings, as shown below:

        passkey-samsungpass-onboarding-org-display-name.png

      • The Organization Display Name is used as a label to identify the service associated with the passkey within Samsung Pass. This ensures that users can easily identify which service the passkey belongs to when managing their credentials in Samsung Pass.

    The user can now log in using the newly created passkey:

    1. The user accesses IdentifyMe on a Windows machine and successfully signs in with the first factor authentication.

    2. The user selects the option to sign in with a passkey using the Samsung device detected via Bluetooth or selects the iPhone, iPad, or Android device option.

      passkey-samsungpass-authenticate-select-option.png

    3. The browser displays a QR code. The user scans it using the Samsung device's camera.

      passkey-samsungpass-onboarding-scanqrcode.png

    4. After scanning, the Windows machine notifies that it is connected to the Samsung device.

      passkey-samsungpass-authenticate-device-connected.png

    5. Authenticate with Biometrics on a Samsung device

      • The user approves the use of the passkey by authenticating via biometrics on the Samsung device.
      • Once approved, the user is successfully signed into IdentifyMe on the Windows machine.
    Back to top Generated by DocFX