Humans

Passkeys for
Humans

Secure human login and consent with explicit challenge/attestation workflows.

Use cases

*

Passkey-backed identity

Attach authenticators while keeping stable principal identity.

*

Login with SIG

Challenge/attestation flow for user-approved access.

*

Recovery

Rotate/revoke authenticators without losing principal continuity.

How it works

Get started in three steps

Use SIG reference web flow for reproducible auth behavior.

1

Challenge

Relying site creates audience-bound challenge.

2

Attest

User signs approved scopes.

3

Verify

Server verifies binding, replay, and scope subset.

Ed25519
Signing
JWS
Verification
HTTPS
Transport
100%
Open Source