Fortinet white logo
Fortinet white logo

Admin Guide

Passkey user verification

Passkey user verification

Passkeys provide secure, phishing-resistant user verification by using public-key cryptography instead of passwords. End users sign in using device-level authentication, such as biometrics (fingerprint/face ID) or a PIN, which unlocks a private key to verify their identity. The process is much faster than logging in with passwords, works across synchronized devices, and removes the need for memorizing credentials.

The Settings >Realm page of the FIC admin portal enables you to select a passkey user verification option when configuring a realm.

To select a passkey user verification option:
  1. Click Settings > Realm and select the desired realm.
  2. Click the Passkey tab.
  3. Select one of the following options:
    ParameterDescription
    Preferred (Default)Use of a user verification method is preferred, but can be omitted if no user verification method is available.
    DiscouragedUse of a user verification method is NOT encouraged. Still, user verification may be performed anyway on a case-by-case basis,
    RequiredUse of a user verification method is mandatory. The authentication request will fail if no user verification method is available,
  4. Click Apply Changes.

Passkey user verification

Passkey user verification

Passkeys provide secure, phishing-resistant user verification by using public-key cryptography instead of passwords. End users sign in using device-level authentication, such as biometrics (fingerprint/face ID) or a PIN, which unlocks a private key to verify their identity. The process is much faster than logging in with passwords, works across synchronized devices, and removes the need for memorizing credentials.

The Settings >Realm page of the FIC admin portal enables you to select a passkey user verification option when configuring a realm.

To select a passkey user verification option:
  1. Click Settings > Realm and select the desired realm.
  2. Click the Passkey tab.
  3. Select one of the following options:
    ParameterDescription
    Preferred (Default)Use of a user verification method is preferred, but can be omitted if no user verification method is available.
    DiscouragedUse of a user verification method is NOT encouraged. Still, user verification may be performed anyway on a case-by-case basis,
    RequiredUse of a user verification method is mandatory. The authentication request will fail if no user verification method is available,
  4. Click Apply Changes.