Skip to main content

Command Palette

Search for a command to run...

Why Passwordless Alone Is Not an Identity Strategy

Why WebAuthn needs federation, recovery flows, and lifecycle design to become a real identity strategy

Updated
5 min read
Why Passwordless Alone Is Not an Identity Strategy

When teams adopt WebAuthn or FIDO2, the excitement is understandable:

  • No passwords.

  • No phishing.

  • No credential stuffing.

  • Biometric UX.

  • Public-key cryptography.

It feels like the final answer.

But WebAuthn answers exactly one question:

Can this device prove control of a credential for this origin right now?

It does not answer:

  • Who is this user across systems?

  • What happens if the device is lost?

  • How do we bootstrap identity?

  • How do we link accounts?

  • How do we recover?

  • How do we federate across institutions?

Passwordless authentication solves proof of possession.

Identity strategy solves continuity over time.

Those are different problems.


The Illusion of “Pure Passwordless”

It’s tempting to imagine a system that:

  • Only uses WebAuthn

  • Has no identity provider

  • Has no fallback

  • Has no recovery flow

On paper, that sounds maximally secure.

In reality, it’s brittle.

Let’s walk through real scenarios.


Scenario 1 — Device Loss

User registers WebAuthn credential.

All good.

Then:

  • Phone is lost.

  • Laptop is replaced.

  • Browser storage is cleared.

Now what?

Without fallback:

  • The account is inaccessible.

  • Support must intervene manually.

  • Or recovery becomes weak (email-only reset).

If recovery is ad hoc, security erodes.

If recovery is absent, usability collapses.

This is why fallback is not compromise — it is necessity.


Fallback Is a Design Requirement

Fallback should not mean:

“Use a weaker method.”

It should mean:

“Use an alternate trust anchor.”

In your architecture, that trust anchor was Feide (OIDC).

WebAuthn provided:

  • Device-bound possession proof.

Feide provided:

  • Federated identity continuity.

That layering is deliberate.


Passwordless Without Federation Breaks at Scale

In a real system:

  • Users change devices.

  • Users move institutions.

  • Accounts are deactivated upstream.

  • Identity policies change.

Without federation:

  • You must manage identity lifecycle yourself.

  • You must build account verification logic.

  • You must build secure recovery flows.

  • You must handle identity merging.

That is significantly more complex than integrating an IdP.


Enrollment Is Identity Design

Enrollment is often treated as a one-time setup.

It is not.

Enrollment defines:

  • Who is allowed to create a credential?

  • How is that identity verified?

  • What trust anchor validates the user at registration?

Example (ASP.NET Core + OIDC bootstrap):

var externalUserId = claims.FindFirst("sub")?.Value;

var user = await FindOrCreateUser(externalUserId);

if (!user.WebAuthnCredentials.Any())
{
    return Redirect("/enable-passwordless");
}

Notice what happened:

  • OIDC verified identity.

  • Only then did WebAuthn credential get registered.

WebAuthn did not create identity.

It attached to it.

That ordering matters.


Recovery Is Where Identity Strategy Is Tested

The real test of maturity is not login success.

It’s failure recovery.

Lost device flow:

  1. User authenticates via OIDC.

  2. System validates sub claim.

  3. Existing WebAuthn credentials are revoked.

  4. New device registers fresh credential.

Example revocation logic:

_db.WebAuthnCredentials.RemoveRange(user.WebAuthnCredentials);
await _db.SaveChangesAsync();

Then redirect to registration.

This is structured recovery.

Without OIDC, you would need:

  • Email-only verification

  • Manual admin override

  • Or permanent account loss

None of those scale securely.


Device-Bound Authentication Is Not Portable Identity

WebAuthn credentials are bound to:

  • Origin

  • Device

  • RP ID

They are intentionally non-transferable.

That’s why they’re secure.

But identity is portable.

Identity must:

  • Survive device turnover

  • Integrate with external systems

  • Be recognized across services

That’s federation.


Federation Is Not the Enemy of Passwordless

There’s a misconception:

“If I use OIDC fallback, I weaken passwordless.”

That only happens when fallback bypasses verification.

In your architecture:

  • OIDC never created a session automatically.

  • Backend validated ID token.

  • Internal user mapping occurred.

  • HTTP-only cookie issued by your system.

OIDC proved identity.

WebAuthn proved possession.

The trust boundaries remained intact.


Architectural Maturity Means Layering

Let’s describe the trust model clearly.

Layer 1: Federation (Feide)

  • Asserts institutional identity

  • Manages upstream lifecycle

  • Provides recovery

Layer 2: Passwordless (WebAuthn)

  • Proves device possession

  • Phishing-resistant

  • Per-origin authentication

Layer 3: Session (HTTP-only cookie)

  • Server-controlled

  • Revocable

  • Protected from JS

Layer 4: Authorization

  • Application-level access control

  • Role management

Each layer solves a different problem.

No single layer replaces the others.


The Real Question

When designing authentication, the mature question is not:

“How do we eliminate passwords?”

It is:

“How do we design identity continuity over time?”

Passwordless improves authentication strength.

Federation ensures identity stability.

Together, they create resilience.


What Happens If You Ignore This

If passwordless stands alone:

  • Enrollment becomes fragile.

  • Recovery becomes weak.

  • Identity merging becomes manual.

  • Device loss becomes support nightmare.

  • Organizational integration becomes impossible.

The system becomes secure in theory, brittle in reality.


The Strategic Insight

Passwordless is a mechanism.

Identity strategy is a lifecycle.

Mechanisms can be secure.

Lifecycles must be resilient.

Your architecture works because:

  • It does not idolize passwordless.

  • It positions WebAuthn as primary.

  • It retains OIDC as structured fallback.

  • It treats recovery as planned, not emergency.

  • It separates identity from possession.

That separation is the mark of architectural maturity.


Final Reflection

Passwordless alone is not enough.

Not because it’s weak.

But because identity is larger than authentication.

A secure system must answer:

  • Who are you?

  • Can you prove it now?

  • What happens if you lose your device?

  • How do we recognize you tomorrow?

  • How do we integrate with your organization?

WebAuthn answers one of those questions exceptionally well.

Federation answers the rest.

Designing both — intentionally — is what turns passwordless from a feature into an identity strategy.


☰ Series Navigation

Core Series

Optional Extras

Passwordless: Modern Authentication Patterns for PWAs

Part 2 of 13

A practical deep dive into modern authentication for Progressive Web Apps. This series starts from principles — identity, trust, and user verification — and moves toward real-world passwordless systems powered by WebAuthn / FIDO2 and OpenID Connect.

Up next

Passwordless: What Worked, What Didn’t, What I’d Change

Production lessons from building a passwordless-first PWA with WebAuthn, Feide OIDC, and ASP.NET Core