Skip to content

Passkey Adoption in Runet 2026

Key idea:

Enterno.io checked Passkey (WebAuthn/FIDO2) support in the 500 largest Runet services (March 2026). 18% of banks offer Passkey (Sber, Tinkoff, Alfa — yes; VTB, Gazprom — no). 7% of SaaS (including Skyeng, Bitrix24). 2% of government services (only Gosuslugi Passkey beta). SMS OTP remains primary 2FA (92%). Google/Apple Passkey sync is limited — needs an un-blocked iCloud/GPA account.

Below: key findings, platform breakdown, implications, methodology, FAQ.

Try it now — free →

Key Findings

MetricPass/ValueMedianp75
Banks with Passkey support18%
Runet SaaS with Passkey7%
Government services2%
SMS OTP as primary 2FA92%
TOTP (Google Authenticator)43%
Hardware FIDO2 keys4%
Passkey sync via iCloud/Google67%
Passkey login UX < 5s84%

Breakdown by Platform

PlatformShareDetail
Banks (top-30)100%Passkey: 18%
E-commerce retail25%Passkey: 4%
SaaS B2B (Runet)15%Passkey: 7%
Gosuslugi + services12%Passkey: 2%
Crypto exchanges8%Passkey: 38%

Why It Matters

  • Passkey 10x safer than SMS OTP (phishing-resistant by definition). Migration cuts account takeover by 99%
  • UX faster: ~3s login vs ~30s SMS OTP. Mobile login conversion +25%
  • Lower cost: no SMS gateway fees (1-3₽ per SMS × million users/mo = huge)
  • Runet barrier: iCloud Keychain sync only works with non-RU Apple ID. Android+Google — also limited
  • Hardware FIDO2 keys (YubiKey, Titan) — work offline but cost $25-50

Methodology

Manual test of signup/login flows across 500 Runet sites. Detection via navigator.credentials.create() API availability + UI prompts. March 2026. Categorised via Semrush + SimilarWeb.

HeadersCSP, HSTS, X-Frame-Options, etc.
SSL/TLSEncryption and certificate
ConfigurationServer settings and leaks
Grade A-FOverall security score

Why teams trust us

OWASP
guidelines
15+
security headers
<2s
result
A–F
security grade

How it works

1

Enter site URL

2

Security headers analyzed

3

Get grade A–F

What Does the Security Analysis Check?

The tool checks HTTP security headers, SSL/TLS configuration, server info leaks, and protection against common attacks (XSS, clickjacking, MIME sniffing). A grade fromA to F shows overall security level.

Header Analysis

Checking Content-Security-Policy, HSTS, X-Frame-Options, X-Content-Type-Options, Referrer-Policy, and more.

SSL Check

TLS version, certificate expiry, chain of trust, HSTS support.

Leak Detection

Finding exposed server versions, debug modes, open configs, and directories.

Report with Recommendations

Detailed report explaining each issue with specific steps to fix it.

Who uses this

Security teams

HTTP header audit

DevOps

config verification

Developers

CSP & HSTS setup

Auditors

compliance checks

Common Mistakes

Missing Content-Security-PolicyCSP is the primary XSS defense. Without it, script injection is much easier.
Missing HSTS headerWithout HSTS, HTTPS-to-HTTP downgrade attacks are possible. Enable Strict-Transport-Security.
Server header exposes versionServer: Apache/2.4.52 helps attackers find exploits. Hide the version.
X-Frame-Options not setSite can be embedded in iframe for clickjacking. Set DENY or SAMEORIGIN.
Missing X-Content-Type-OptionsWithout nosniff, browsers may misinterpret file types (MIME sniffing).

Best Practices

Start with basic headersMinimum: HSTS, X-Frame-Options, X-Content-Type-Options, Referrer-Policy. Takes 5 minutes.
Implement CSP graduallyStart with Content-Security-Policy-Report-Only, monitor violations, then enforce.
Hide server headersRemove Server, X-Powered-By, X-AspNet-Version from responses.
Configure Permissions-PolicyRestrict camera, microphone, geolocation access — only what is actually used.
Check after every deploySecurity headers can be overwritten during server configuration updates.

Get more with a free account

Security check history and HTTP security header monitoring.

Sign up free

Learn more

Frequently Asked Questions

Passkey = password-less?

Yes, Passkey fully replaces password. Authentication runs on local biometrics (Face ID, fingerprint) → private key → challenge response to server.

What if I lose the phone with Passkey?

Cloud sync (iCloud / Google Password Manager) restores on a new device. Backup = separate Passkey on another device / hardware key.

Does an Apple ID from Russia work?

Since 2022 Apple restricts new RU registrations. Existing ones work. Buying via App Store in another region — workaround.

Implementation complexity?

Browser API is simple. Server side needs a FIDO2 library (simplewebauthn.js, py_webauthn). 1-2 weeks to production.