Skip to content

Commit ee18daf

Browse files
authored
Merge pull request #450 from passkeydeveloper/oct25-devsupport-updates
October 2025 device support updates
2 parents d9630cf + 8b5f15c commit ee18daf

2 files changed

Lines changed: 26 additions & 9 deletions

File tree

content/en/device-support/index.md

Lines changed: 9 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -160,15 +160,17 @@ This matrix represents the default capabilities for a user out of the box. Addit
160160
</tr>
161161
<tr>
162162
<td>
163-
Passkey Upgrades <sup><a href="#fn8">2</a></sup>
163+
<a href="../docs/reference/terms/#conditional-create" target="_blank">
164+
Passkey Upgrades
164165
<br />
165166
(Conditional Create)
167+
</a>
166168
</td>
167169
<td class="text-center">
168-
{{< fa fa-calendar-plus fa-xl mb-2>}}
170+
{{< fas fa-circle-check fa-xl mb-2 text-success >}}
169171
<span class="fs-6">
170172
<br />
171-
Chrome
173+
Chrome 142+ <sup><a href="#fn3">2</a></sup>
172174
<br />
173175
</span>
174176
<br />
@@ -241,7 +243,7 @@ This matrix represents the default capabilities for a user out of the box. Addit
241243
{{< fas fa-circle-check fa-xl mb-2 text-success >}}
242244
<span class="fs-6">
243245
<br />
244-
Chrome 136+ <sup><a href="#fn3">3</a></sup>
246+
Chrome 136+ <sup><a href="#fn3">2</a></sup>
245247
<br />
246248
<br />
247249
<br />
@@ -530,7 +532,7 @@ This matrix represents the default capabilities for a user out of the box. Addit
530532
<a href="/docs/reference/windows/">Windows</a>
531533
</td>
532534
</tr>
533-
<tr class="align-top">
535+
<tr class="align-middle">
534536
<td class="fw-bold">
535537
<a href="../docs/reference/terms/#device-bound-passkey" target="_blank">
536538
<span class="fst-italic">Device-bound</span> Passkeys
@@ -713,7 +715,7 @@ This matrix represents the default capabilities for a user out of the box. Addit
713715
</span>
714716
</td>
715717
</tr>
716-
<tr class="align-top">
718+
<tr class="align-middle">
717719
<td class="fw-bold">
718720
<a href="../docs/reference/terms/#attestation" target="_blank">
719721
Device-bound Passkey Attestation
@@ -741,7 +743,7 @@ This matrix represents the default capabilities for a user out of the box. Addit
741743
Device-bound passkeys supported
742744
<br />
743745
<sup id="fn8">2</sup>
744-
Also requires support from credential providers
746+
Also requires support from credential managers and operating systems
745747
<br />
746748
<sup id="fn3">3</sup>
747749
Windows 11 22H2+

content/en/docs/reference/terms/index.md

Lines changed: 17 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -75,6 +75,17 @@ See [_Autofill UI_](#autofill-ui)
7575

7676
See [_Autofill UI_](#autofill-ui)
7777

78+
## Conditional Create
79+
80+
A WebAuthn capability which allows a Relying Party to request the creation of a passkey after a successful sign in user another credential from their credential manager, such as a password.
81+
82+
Note:
83+
84+
- The browser, operating system, and credential manager must all support conditional create.
85+
- `conditionalCreate` in getClientCapabilities() represents only the browser's support for the capability and does signal OS and/or credential manager support.
86+
87+
{{< button color="light" button-size="sm" icon="fas fa-circle-info" cue=false order="first" tooltip="Go to reference in the WebAuthn specification" href="https://www.w3.org/TR/webauthn-3/#sctn-createCredential" >}}WebAuthn Spec Reference{{< /button >}}
88+
7889
## Credential Exchange
7990

8091
A standardized process to securely transfer passkeys, passwords, and other types of information from one [passkey provider](#passkey-provider) to another.
@@ -83,7 +94,7 @@ A standardized process to securely transfer passkeys, passwords, and other types
8394

8495
## Device-bound passkey
8596

86-
A FIDO2 [Discoverable Credential](#discoverable-credential) that is bound to a single authenticator. For example, FIDO2 security keys typically hold device-bound passkeys as the credential cannot leave the device. Device-bound passkeys have been previously referred to as _single-device passkeys_.
97+
A WebAuthn [Discoverable Credential](#discoverable-credential) that is bound to a single authenticator. For example, FIDO2 security keys typically hold device-bound passkeys as the credential cannot leave the device. Device-bound passkeys have been previously referred to as _single-device passkeys_.
8798

8899
## Discoverable Credential
89100

@@ -127,6 +138,10 @@ From the technical side, there are two flavors of passkeys: [synced](#synced-pas
127138

128139
An app and/or service that is responsible for storing and managing passkeys. Many operating systems include a default passkey provider ([first-party](#first-party-passkey-provider)), and many also support [third-party](#third-party-passkey-provider) providers. A passkey provider is a type of [credential manager](#credential-manager).
129140

141+
## Passkey Upgrades
142+
143+
See [_Conditional Create_](#conditional-create).
144+
130145
## Persistent Linking
131146

132147
The informal name for creating a relationship between a [Cross-Device Authentication authenticator](#cda-authenticator) (typically a phone or tablet) and [Cross-Device Authentication client](#cda-client) (typically a laptop or desktop), which enables future use without having to scan a QR code.
@@ -169,7 +184,7 @@ see [_Device-bound passkey_.](#device-bound-passkey)
169184

170185
## Synced passkey
171186

172-
A FIDO2 [Discoverable Credential](#discoverable-credential) that can reliably be used for bootstrapping sign-in, without requiring other login challenges such as passwords and OTPs. "Reliable" here means that the passkey should be available to, and usable by, the user whenever they need to sign in. This availability can be achieved through different means: for example, passkey providers could sync passkeys in real-time across a user's devices, restore passkeys from a backup whenever a user sets up a new device, offer passkeys across different contexts (a passkey established from an app can be used in the browser when visiting the app’s website), or allow users to [exercise passkeys across devices](#cross-device-authentication-cda) (by, say, using the passkey from a nearby phone when signing in from a laptop).
187+
A WebAuthn [Discoverable Credential](#discoverable-credential) that can reliably be used for bootstrapping sign-in, without requiring other login challenges such as passwords and OTPs. "Reliable" here means that the passkey should be available to, and usable by, the user whenever they need to sign in. This availability can be achieved through different means: for example, passkey providers could sync passkeys in real-time across a user's devices, restore passkeys from a backup whenever a user sets up a new device, offer passkeys across different contexts (a passkey established from an app can be used in the browser when visiting the app’s website), or allow users to [exercise passkeys across devices](#cross-device-authentication-cda) (by, say, using the passkey from a nearby phone when signing in from a laptop).
173188

174189
## Third-Party Passkey Provider
175190

0 commit comments

Comments
 (0)