Secure
Leverages the newest authentication technologies for fast and secure sign-in
Strong cryptography
Passkeys are based on the new technology standards of WebAuthn and FIDO2 to use strong public-key cryptography to authenticate people on the internet.
OS protected
Keys are secured by the OS, protected by device-based enclaves and biometrics, and accessible only in secure contexts where keys are bound to domains to prevent phishing
Phishing resistant
Underlying passkeys are public-private key pairs. Each public-key is uniquely bound to a specific “Relying Party” — or in simple terms a website like acmebank.com. This is great for both people and businesses. If you have a Acme Bank account, and then someone tries to phish your account, your keys for the real Acme Bank won’t surface on the fake Acme Bank.
Secure enclaves
Passkeys leverage specialized hardware components called Secure Enclaves on most Apple, Windows, and Android devices. Each has a separate processor with its own secure storage that handles cryptographic operations related to security functions like passkeys.
Make it yours
Customize everything you need to seamlessly integrate it with your app
Make it yours
Customize everything you need to seamlessly integrate it with your app
Endless benefits
Authentication and identity are complex, Footprint Auth makes it easy
Phishing is not possible because your device simply won’t return any credentials for a fake website like go0gle.com and because it’s a distributed system where you are in possession of your own cryptographic private key (and no one else) there’s no third-party man-in-the-middle to corrupt like a telco.
Passkeys sync across iCloud, meaning even if someone loses their phone or laptop, they would have their passkey as soon as they get a new device that only they could unlock.
Unknown charges
$120.77
With passkeys used for KYC and login, we can cryptographically prove the same person who created an account is the same person who logged back in at each session.
While most devices support passkeys today, sometimes users need another option. We make this easy by intelligently picking the right authentication factors that your work for your users. Magic-link email sign-in and SMS-based one-time passcodes add an additional layer and serve as a backstop for all your frictionless authentication needs.
Logged from iOS 17.1 - Buenos Aires, Argentina
Logged from Apple Macintosh, Mac OS 10.15.7
Collected: Email, Phone number and Name
Built-in to Footprint are per-user, granular security logs so that you know when, how, and where your users are coming to your product. Footprint intelligently labels authentication data to detect anomalous behavior.
Footprint layers cutting edge device fingerprinting and fraud technologies to detect when nefarious users are trying to access your products and proactively block and limit the damage they can do. Get real-time device insights and behavior analytics with actionable intel.