Footprint selected by Money2020 as one of top 7 fintechs at 2024 conference. Read more

Auth

Leverage passkeys to allow for frictionless and secure log-in.

Secure

Leverages the newest authentication technologies for fast and secure sign-in

Strong cryptography

Passkeys are based on the new technology standards of WebAuthn and FIDO2 to use strong public-key cryptography to authenticate people on the internet.

Strong

OS protected

Keys are secured by the OS, protected by device-based enclaves and biometrics, and accessible only in secure contexts where keys are bound to domains to prevent phishing

Phishing resistant

Underlying passkeys are public-private key pairs. Each public-key is uniquely bound to a specific “Relying Party” — or in simple terms a website like acmebank.com. This is great for both people and businesses. If you have a Acme Bank account, and then someone tries to phish your account, your keys for the real Acme Bank won’t surface on the fake Acme Bank.

Website
Cloud Key
Website

Secure enclaves

Passkeys leverage specialized hardware components called Secure Enclaves on most Apple, Windows, and Android devices. Each has a separate processor with its own secure storage that handles cryptographic operations related to security functions like passkeys.

decorativedecorative

Make it yours

Customize everything you need to seamlessly integrate it with your app

decorative
decorative
decorative

Make it yours

Customize everything you need to seamlessly integrate it with your app

Endless benefits

Authentication and identity are complex, Footprint Auth makes it easy

281590463725418693074251869307425186930742518693074251869307425186930742518693074251869307425186930742518693074251869307425186930742518693074251869307425186930742518693074251869307425186930742518693074251869307425186930742518693074251869307425186930742518693074251869307425186930742518693074251869307425186930742518693074251869307425186930742518693074251869307425186
No more phishing

Phishing is not possible because your device simply won’t return any credentials for a fake website like go0gle.com and because it’s a distributed system where you are in possession of your own cryptographic private key (and no one else) there’s no third-party man-in-the-middle to corrupt like a telco.

LaptopPhone
Easier Account Recovery

Passkeys sync across iCloud, meaning even if someone loses their phone or laptop, they would have their passkey as soon as they get a new device that only they could unlock.

Unknown charges

$120.77

Chargeback Disputes

With passkeys used for KYC and login, we can cryptographically prove the same person who created an account is the same person who logged back in at each session.

Email and SMS support

While most devices support passkeys today, sometimes users need another option. We make this easy by intelligently picking the right authentication factors that your work for your users. Magic-link email sign-in and SMS-based one-time passcodes add an additional layer and serve as a backstop for all your frictionless authentication needs.

Logged from iOS 17.1 - Buenos Aires, Argentina

Logged from Apple Macintosh, Mac OS 10.15.7

Collected: Email, Phone number and Name

Security logs

Built-in to Footprint are per-user, granular security logs so that you know when, how, and where your users are coming to your product. Footprint intelligently labels authentication data to detect anomalous behavior.

Device insights

Footprint layers cutting edge device fingerprinting and fraud technologies to detect when nefarious users are trying to access your products and proactively block and limit the damage they can do. Get real-time device insights and behavior analytics with actionable intel.

safe

Stronger Auth: more opportunities

Whether you want to auto-fill card numbers on a browser or progressively increase credit limits, using passkeys increases the fidelity of an identity over time allowing you to give your users more options as they earn your trust.