Contact salesSign inSign up
AuthsignalAuthsignal
Product
Passwordless / multi-factor authentication (MFA)
Drop-in authentication
Passkeys
Biometric authentication
Risk-based authentication
WhatsApp OTP
Authenticator apps (TOTP)
App verification
Push authenticationQR code verificationIn-app verification
SMS OTP
Email OTP
Magic links
See all authenticators
See less authenticators
Palm biometrics
Contactless payments & identity verification
Flexible integration modes
Pre-built UI
Low code
UI components
Customizable
Custom UI
Flexible
Digital credentials API Beta
Authenticate customers instantly using digital credentials
Session management
Keep users signed in across web and mobile after authentication
Fraud Controls
Rules and policies engine
Step-up authentication
No-code rule creation
Risk alerts
User observability
Audit trails
Dynamic linking
Why Authsignal?
Complete authentication infrastructure from enrollment to step-up auth, modular by design
Solutions
By USE CASE
View All
Account takeovers (ATO)
Go passwordless
Call center
SMS cost optimization
Existing apps
QR code payments
Step-up MFA
Palm biometrics payments
By INDUSTRY
View All
Financial services
Marketplace
e-Commerce
FinTech
Crypto
Healthcare
By Integration (identity provider)
Amazon Cognito
Azure AD B2C
Duende IdentityServer
Keycloak
Auth0
NextAuth.js
Custom identity provider
By ROLe
Engineers
Product
Passwordless / Multi-factor Authentication (MFA)
Flexible Integration Modes
Pre-built UI · Low code
UI Components · Customizable
Custom UI · Flexible
Digital credentials API Beta
Authenticate customers instantly using digital credentials
Session management
Issue JWT access and refresh tokens
Why Authsignal?
Plug in Authsignal to elevate your IDP — effortless integration with any architecture.
Drop-in Authentication
Passkeys
Biometric authentication
WhatsApp OTP
Risk-based authentication
SMS OTP
Email OTP
Magic links
Authenticator apps (TOTP)
Push notifications
App verification
Push authenticationQR code verificationIn-app verification
Palm Biometrics
Contactless payments & identity verification
Fraud Controls
Rules and Policies Engine
Step-up Authentication
No Code Rule Creation
Risk Alerts
User Observability
Audit Trails
Use Cases
Financial services
Account takeovers (ATO)
Marketplace
Go passwordless
e-Commerce
Solutions
By Use Case
Account takeovers (ATO)
Go passwordless
Call center
SMS cost optimization
Existing apps
QR code payments
Step-up MFA
Palm Biometric Payments
View all Use Cases
By Industry
Financial services
Marketplace
e-Commerce
FinTech
Crypto
Healthcare
View all Industries
By Integration (identity provider)
Amazon Cognito
Azure AD B2C
Duende IdentityServer
Keycloak
Auth0
NextAuth.js
Custom identity provider
By Role
Engineers
PricingAboutDocsBlog
Schedule a call
Try Authsignal
AUS Flag

Authsignal secures millions of passkey transactions out of our hosted Sydney region.

AUS Flag

Authsignal secures millions of passkey transactions out of our hosted Sydney region.

Join us today!
Right icon
Blog
/
Current article
Compliance
FIDO2
NIST
Passkeys
Passwordless authentication

NIST 800-63B Passkeys Supplementary Guidelines: 2024 Part 2 Implementation.

Justin Soong
⬤
May 14, 2025
Share
NIST supplementary guidelines for Passkeys - April 2024 - Part 2 - implementation considerations

This blog post is part 2 in a series of blog posts.

  • NIST Passkeys Supplementary Guidelines: 2024 Part 1.
  • NIST Passkeys Supplementary Guidelines: 2024 Part 2 Implementation.

‍

In the first part of our analysis, we introduced the newly published NIST supplement for passkeys. We broke down the changes and clarified positions regarding synced/syncable passkeys against NIST’s digital identity guidelines for authentication, commonly known as 800-63B. The supplement clarifies that synced passkeys across a “sync fabric” are allowed and can reach AAL2 assurance levels.

We continue analyzing the supplement in part 2, focusing on implementation considerations.

Passkey implementation considerations to meet AAL2

Passkeys are based on the W3C's WebAuthn specification, which establishes a standard for browsers and passkey managers/providers to handle the challenge-response cryptographic process during registration and verification (referred to as "sync fabric"). WebAuthn can be customized by a Relying Party (RP) using various flags. To meet AAL2 requirements, the RP must explicitly set certain flags.

To meet AAL2 standards the following flags will need to be set or interrogated

Passkeys - User Presence (UP)

The user presence flag during a WebAuthn ceremony is set when the user has interacted with the authenticator. With user presence, the intent is not to identify the user but to ensure that a user is physically present during authentication. The term authorization gesture is used in the official w3C WebAuthn specifications.

Implementation requirements for User Presence (UP)

💡 Federal agencies SHALL confirm that the User Present flag has been set. Supports Authentication Intent.

‍

An example of user presence using a passkey provider authentication mechanism, the user simply clicks on the Sign in button.

‍

An example of user presence using a Yubikey via the capacitive sensor.

‍

Passkeys - User Verification (UV)

The user verification flag on passkeys ensures that the user's identity is verified using an available “user verification” method. It seeks to ascertain that not only a user was present during authentication (User Presence) but also provides an assurance level that the same user who registered the passkey is initiating the verification. This is commonly implemented by authentication via biometrics, screen lock, or a PIN before the passkey is used. This adds an extra layer of security by requiring proof of the user's identity during the authentication process.

💡 Federal agencies SHALL indicate that UV is preferred, and all assertions SHALL be inspected to confirm the value of the UV flag. This indicates whether the authenticator can be treated as a multi-factor cryptographic authenticator. If the user is not verified, agencies may treat the authenticator as a single-factor cryptographic authenticator by adding an RP-specific memorized secret to the authentication event. A further extension to the WebAuthn Level 3 specification provides additional data on verification methods if agencies seek to gain context on the local authentication event.

‍

An Example of the macOS iCloud keychain User Verification prompt via touch ID.

‍

‍

Additional considerations

The above flags on user presence and user verification are prerequisites noted in the supplement for AAL2. Additionally, the following features of passkeys can be used to gain more insights during registration and verification ceremonies.

Backup eligibility

Indicates whether the authenticator can be synced to a different device

💡 Federal agencies MAY use this flag if they intend to establish policies restricting syncable authenticators. This flag is necessary to distinguish between authenticators that are device-bound or those that may be cloned to more than one device.

Backup state

Indicates whether an authenticator has been synced to a different device

💡 Federal agencies MAY use this flag if they intend to establish restrictions on authenticators that have been synced to other devices. However, due to user experience concerns, agencies SHOULD NOT change the acceptance of public-facing applications based on this flag. This flag MAY be used to support the restriction of syncable authenticators for specific enterprise decisions.

Enterprise attestation

Some authenticators support attestation features that can be used to determine the capabilities and manufacturer of a specific authenticator, for example, Yubikeys. It’s important to note that attestation data varies from authenticator to authenticator, and the use of attestation should be use case driven.

💡 For enterprise use cases, agencies SHOULD implement attestation capabilities based on the functionality offered by their platform providers. Preferably, this would be an enterprise attestation where the RP requests uniquely identifying information about the authenticator.

The NIST supplement adds further guidance for non-enterprise use cases, like large consumer-facing applications and websites. It calls out the regression back to weaker authenticator types like SMS OTP.

💡 Attestations SHOULD NOT be used for broad public-facing applications. Such a requirement (i.e., one that blocks some public users’ syncable authenticators if they do not support attestation) may divert users to less secure authentication options that are vulnerable to phishing, such as Short Message Service (SMS) one-time password (OTP).

Round up

The NIST supplement provides clarity on the implementation considerations when it comes to achieving AAL2 requirements. The key flags that are required are the user verification and user presence flags. It is refreshing to see that NIST considers it regressive when passkeys are configured to be too restrictive when used in broad public-facing applications.

Authsignal is a member of the FIDO alliance and is actively helping organizationsuplift their customer account security and experience by adopting passkeys. We offer a range of drop-in solutions that have been tuned for the consumer and have seen incredible results on nationwide demographics and critical customer services. Authsignal’s passkey implementations are tuned and can quickly assist in meeting assurance-level requirements.

Question icon
Have a question?
Talk to an expert
NewsletterDemo PasskeysView docs
Compliance
FIDO2
NIST
Passkeys
Passwordless authentication

You might also like

Why pension funds are turning to liveness detection for presence verification
Liveness Detection
Identity Verification
Fraud prevention

Why pension funds are turning to liveness detection for presence verification

April 21, 2026
How a global real estate company strengthened MFA with Authsignal
Azure AD B2C
Multi-factor authentication
Passkeys

How a global real estate company strengthened MFA with Authsignal

April 14, 2026
What is Visa VAMP? Thresholds, fees, and how it affects your dispute ratio
Visa VAMP
Chargebacks
Dispute Management

What is Visa VAMP? Thresholds, fees, and how it affects your dispute ratio

April 13, 2026

Secure your customers’ accounts today with Authsignal

Passkey demoCreate free account
Authsignal Purple Logo

Authsignal delivers passwordless and multi-factor authentication as a service. Focused on powering mid-market and enterprise businesses to rapidly deploy optimized good customer flows that enable a flexible and risk-based approach to authentication.

AICPA SOCFido Certified
LinkedInTwitter
Passwordless / multi-factor authentication (MFA)
Pre-built UI (low code)UI components (customizable)Custom UI (flexible)
Why Authsignal?
Drop-in authentication
Risk-based authentication PasskeysBiometric authenticationWhatsApp OTPSMS OTPEmail OTPMagic linksAuthenticator apps (TOTP)Push authenticationPalm biometricsDigital Credential Verification API
Rules and policies engine
User observability
Industries
Financial services
Marketplace
e-Commerce
FinTech
Crypto
View all industries
Teams
Engineers
Use cases
Account takeovers (ATO)
Go passwordless
Call center
SMS cost optimization
Existing apps
View all use cases
Identity providers (IDPs)
Amazon Cognito
Auth0
Azure AD B2C
Custom identity provider
Duende IdentityServer
Keycloak
NextAuth.js
Integrations
ASP.NET
C#
Java
Node.js
Open ID Connect (OIDC)
PHP
Python
React
Ruby
Ruby on Rails
Compare
Twilio Verify vs AuthsignalAuth0 vs AuthsignalAWS Cognito vs Authsignal + AWS Cognito
Resources
BlogDeveloper docsFree Figma mobile passkeys templateFree Figma desktop passkeys templateFree Figma webapp passkeys template
Company
About usWhy AuthsignalGuidesCareersPress releasesPartnersContact us
What is
SMS OTP
Risk Based Authentication
IP Spoofing
Passwordless authentication
Multi-Factor Authentication (MFA)
United States
+1 214 974-4877
Ireland
+353 12 676529
Australia
+61 387 715 810
New Zealand
+64 275 491 983
© 2026 Authsignal - All Rights Reserved
Terms of servicePrivacy policySecuritySystem statusCookies