Hi Piyush,
The easiest way to get started with Passkeys is just use our Identifier First Scenario wizard.

This will create an authsvc policy that you can use with Passkeys.
There are 2 additional steps outside of this wizard,
Pre-req step:
You have defined a FIDO2 Relying Party:

This is essentially where you define the URLs that the Passkeys will come from.

(Once saved you can add origins:)

And then the post-scenario step:
And then you just need to configure the RP to accept the authsvc login. (Which may already be done in your environment)

Then you can just go to this AAC policy:
https://example.com/mga/sps/authsvc/policy/ifa
or (if you're not using Path pased Authsvc URLs)
https://example.com/mga/sps/authsvc?PolicyId=urn:ibm:security:authentication:asf:ifa
I also like to configure ISVA to redirect to that policy for the login flow,
Use Local response redirect to do this:

Of course, once you've got this working, you can then tweak/modify and optimize the Passkey experience. And happy to guide you further in this space.
------------------------------
Philip Nye
IBM
Gold Coast
------------------------------
Original Message:
Sent: Wed January 17, 2024 09:15 AM
From: Piyush Agrawal
Subject: passkey latest cookbook based
Hello,
I am interested in implementing passkey support on our reverse proxies, aiming for a user experience similar to https://www.passkeys.io. I'm specifically looking for a solution that leverages browser inbuilt user experiences without the need for custom designs.
Could anyone provide information on the latest cookbook available, specifically focusing on version 10.0.6?
Your assistance is greatly appreciated.
------------------------------
Piyush Agrawal
https://www.linkedin.com/in/piyush-norway/
Gjensidige Norway
------------------------------