A Well-Known URL for Relying Party Passkey Endpoints

W3C Working Draft,

More details about this document
This version:
https://www.w3.org/TR/2026/WD-passkey-endpoints-1-20260114/
Latest published version:
https://www.w3.org/TR/passkey-endpoints/
Editor's Draft:
https://w3c.github.io/webappsec-passkey-endpoints/
Previous Versions:
History:
https://www.w3.org/standards/history/passkey-endpoints-1/
Feedback:
public-webappsec@w3.org with subject line “[passkey-endpoints] … message topic …” (archives)
GitHub
Editors:
(Okta)
(Cisco)

Abstract

This specification defines a well-known URL which WebAuthn Relying Parties (RPs) can host to make their creation, management, and other informational endpoints discoverable by WebAuthn Clients and credential managers.

Status of this document

This section describes the status of this document at the time of its publication. A list of current W3C publications and the latest revision of this technical report can be found in the W3C technical reports index.

This document was published by the Web Application Security Working Group as a Working Draft using the Recommendation track. This document is intended to become a W3C Recommendation.

The (archived) public mailing list public-webappsec@w3.org (see instructions) is preferred for discussion of this specification. When sending e-mail, please put the text “passkey-endpoints” in the subject, preferably like this: “[passkey-endpoints] …summary of comment…

Publication as a Working Draft does not imply endorsement by W3C and its Members. This is a draft document and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to cite this document as other than a work in progress.

This document was produced by the Web Application Security Working Group.

This document was produced by a group operating under the W3C Patent Policy. W3C maintains a public list of any patent disclosures made in connection with the deliverables of the group; that page also includes instructions for disclosing a patent. An individual who has actual knowledge of a patent that the individual believes contains Essential Claim(s) must disclose the information in accordance with section 6 of the W3C Patent Policy.

This document is governed by the 18 August 2025 W3C Process Document.

1. Introduction

This section is non-normative.

WebAuthn Relying Parties (RPs) currently lack a way to programmatically advertise that they support passkeys, where a user can create a passkey for the service and where they can manage existing passkeys for the service. Passkeys can also be used for additional functions beyond sign in, such as signing and encryption. By proposing a well-known URL which defines a set of passkey-specific endpoints, this specification enables WebAuthn Clients and credential managers (authenticators) to link directly to workflow-specific and informational endpoints instead of the user needing to dig through their account settings and help pages.

2. Infrastructure

This specification depends on the Infra Standard. [INFRA]

This specification uses terminology from the Fetch, HTML, HTTP, and URL standards. [FETCH] [HTML] [HTTP-SEMANTICS] [URL]

3. Passkey Endpoints URLs

To advertise support for passkeys and/or provide direct endpoints for passkey creation and management, Relying Parties MUST host a JSON document at the path formed by concatenating the string .well-known/passkey-endpoints with the https scheme and relying party identifier as per [WELL-KNOWN]. A redirect MUST not be returned.

The passkey endpoints URL for RP ID "example.com" is "https://example.com/.well-known/passkey-endpoints".

3.1. Server Response

The server in this context is a WebAuthn Relying Party (RP) supporting passkeys.

A successful response MUST use the 200 OK HTTP status code and return a JSON object using the application/json content type.

The returned JSON object can contain any of the members defined below.

enroll

This OPTIONAL member contains a direct URL to the passkey creation page for a user account

manage

This OPTIONAL member contains a direct URL to the passkey management page for a user account

prfUsageDetails

This OPTIONAL member contains a URL to an informational page describing how the RP uses the WebAuthn Pseudo-Random Function Extension (PRF).

HTTP/1.1 200 OK
Content-Type: application/json

{
   "enroll": "https://example.com/account/manage/passkeys/create",
   "manage": "https://example.com/account/manage/passkeys",
   "prfUsageDetails": "https://example.com/help/passkeys#encryption"
}

An empty JSON object CAN be returned to signal support for passkeys, but not advertise specific endpoints.

HTTP/1.1 200 OK
Content-Type: application/json

{}

3.2. Client Processing

A client in this context can be either a WebAuthn WebAuthn Client or a credential manager (authenticator).

Given a passkey’s relying party identifier, generate a passkey endpoints URL by running these steps:

  1. Let url be a new URL with values set as follows:

    scheme

    "https"

    host

    the passkey’s relying party identifier

    port

    null

    path

    « ".well-known", "passkey-endpoints" ».

  2. Return url.

The passkey endpoints URL for RP ID "example.com" is "https://example.com/.well-known/passkey-endpoints".

4. Usage by WebAuthn Clients and Credential Managers

This section is non-normative.

enroll

Passkey enrollments are typically driven by an RP’s business logic and session context. Sometimes it can happen after a user successfully signs in with a password or goes through a password reset flow and other times when a user visits a dedicated "passkey creation" page.

These passkey creation entry points can be difficult for users to find, as they’re often buried inside account settings or help pages.

Sample usage when this member is present:

manage

Credential management is often buried inside account settings, which can be difficult for users to find.

When this member is present, credential managers can display a direct link to the RP’s passkey (or general credential management) page.

prfUsageDetails

Some Relying Parties (RPs) use the WebAuthn Pseudo-Random Function (PRF) Extension to sign or encrypt user data. Since passkeys are primarily designed for authentication, users may be unaware that deleting a PRF-enabled passkey could affect their saved data or other functionality.

RPs leveraging PRF should provide a dedicated informational page detailing how their passkeys are used beyond authentication and the implications of deletion. This page’s URL should be the value of the prfUsageDetails key.

When this member is present, credential managers should display a warning during the passkey deletion flow, including a link to the RP’s informational page.

5. IANA considerations

5.1. The passkey-endpoints well-known URI

This document defines the ".well-known" URI passkey-endpoints. This registration will be submitted to the IESG for review, approval, and registration with IANA using the template defined in [WELL-KNOWN] as follows:

URI suffix

passkey-endpoints

Change controller

W3C

Specification document(s)

This document is the relevant specification. (See § 3.1 Server Response)

Related information:

None.

Acknowledgements

Thanks to Arnar Birgisson, Rew Islam, Adam Langley, René Léveillé, Matthew Miller, Ricky Mondello, and Dan Veditz for their feedback on this proposal.

Conformance

Document conventions

Conformance requirements are expressed with a combination of descriptive assertions and RFC 2119 terminology. The key words “MUST”, “MUST NOT”, “REQUIRED”, “SHALL”, “SHALL NOT”, “SHOULD”, “SHOULD NOT”, “RECOMMENDED”, “MAY”, and “OPTIONAL” in the normative parts of this document are to be interpreted as described in RFC 2119. However, for readability, these words do not appear in all uppercase letters in this specification.

All of the text of this specification is normative except sections explicitly marked as non-normative, examples, and notes. [RFC2119]

Examples in this specification are introduced with the words “for example” or are set apart from the normative text with class="example", like this:

This is an example of an informative example.

Informative notes begin with the word “Note” and are set apart from the normative text with class="note", like this:

Note, this is an informative note.

Conformant Algorithms

Requirements phrased in the imperative as part of algorithms (such as "strip any leading space characters" or "return false and abort these steps") are to be interpreted with the meaning of the key word ("must", "should", "may", etc) used in introducing the algorithm.

Conformance requirements phrased as algorithms or specific steps can be implemented in any manner, so long as the end result is equivalent. In particular, the algorithms defined in this specification are intended to be easy to understand and are not intended to be performant. Implementers are encouraged to optimize.

Index

Terms defined by reference

References

Normative References

[FETCH]
Anne van Kesteren. Fetch Standard. Living Standard. URL: https://fetch.spec.whatwg.org/
[HTML]
Anne van Kesteren; et al. HTML Standard. Living Standard. URL: https://html.spec.whatwg.org/multipage/
[HTTP-SEMANTICS]
R. Fielding, Ed.; M. Nottingham, Ed.; J. Reschke, Ed.. HTTP Semantics. June 2022. Internet Standard. URL: https://httpwg.org/specs/rfc9110.html
[INFRA]
Anne van Kesteren; Domenic Denicola. Infra Standard. Living Standard. URL: https://infra.spec.whatwg.org/
[RFC2119]
S. Bradner. Key words for use in RFCs to Indicate Requirement Levels. March 1997. Best Current Practice. URL: https://datatracker.ietf.org/doc/html/rfc2119
[URL]
Anne van Kesteren. URL Standard. Living Standard. URL: https://url.spec.whatwg.org/
[WEBAUTHN-2]
Jeff Hodges; et al. Web Authentication: An API for accessing Public Key Credentials - Level 2. 8 April 2021. REC. URL: https://www.w3.org/TR/webauthn-2/
[WEBAUTHN-3]
Tim Cappalli; et al. Web Authentication: An API for accessing Public Key Credentials - Level 3. 27 January 2025. WD. URL: https://www.w3.org/TR/webauthn-3/
[WELL-KNOWN]
M. Nottingham. Well-Known Uniform Resource Identifiers (URIs). May 2019. Proposed Standard. URL: https://www.rfc-editor.org/rfc/rfc8615