How to enable passkeys on Google

Replace your password with a passkey on Google in under 3 minutes. Phishing-resistant, fingerprint-unlocked, free.

By Ana Kovács · Senior Privacy Analyst Reviewed by Lena Park · Cybersecurity Editor Published: Updated: ⏱ 3 min read how-to · passkey · google · 2fa · tutorial
Quick answer

Visit g.co/passkeys, sign in with your existing password and 2FA, click 'Create a passkey,' approve with your device's biometric (Face ID, Touch ID, Windows Hello, or screen lock). The passkey is stored on your device and synced to your other devices via Google Password Manager or your platform's keychain. Use it to sign in instead of typing a password.

Key takeaways

  • Passkeys are phishing-resistant — the same security as a hardware key with biometric ease.
  • Setup takes 2-3 minutes; sync is automatic across your platform's devices.
  • Your password remains active alongside the passkey until you choose to remove it.
  • Test in incognito mode before fully relying on it.
  • Set up passkeys on at least 2 devices so losing one doesn't lock you out.

Step-by-step

1. Open a browser on your phone or computer where you'd like to create the passkey.

2. Go to g.co/passkeys (or Google Account → Security → Passkeys).

3. Sign in with your current Google password and 2FA if prompted.

4. On the passkeys page, click 'Create a passkey.'

5. Your device will prompt you to approve with biometric or screen lock — fingerprint, Face ID, Windows Hello, or PIN.

6. Once created, you'll see the passkey listed. You can name it (e.g., 'iPhone' or 'Work laptop').

7. Sign out of Google and try signing back in. You should now see 'Use a passkey' as the first option — no password required.

What to do on each device

iPhone/iPad: passkeys sync via iCloud Keychain. Create one on your phone; it appears on your other Apple devices automatically.

Android: passkeys sync via Google Password Manager. Same auto-sync.

Windows: Windows Hello stores passkeys locally. Cross-device use via QR code from your phone.

Mac: iCloud Keychain or third-party password manager.

Linux: Use a password manager (Bitwarden, 1Password) or a hardware key like YubiKey.

Verify it actually works before relying on it

Open a private/incognito window. Try signing in to Google. You should see 'Use a passkey' or be prompted automatically. Approve with biometric.

If anything fails, your password still works — passkeys are added alongside, not replacing, until you choose to remove the password.

Recommendation: keep your password and 2FA enabled for the first month while you confirm the passkey works on every device you use.

Troubleshooting common issues

'Create a passkey' button is greyed out: your browser may not support FIDO2. Try Chrome, Edge, Safari, or Firefox latest versions.

Passkey doesn't appear on a second device: check that you're signed in to the same iCloud/Google account on both. Sync can take a minute.

'Try another way' fallback: if biometric fails, you can still sign in with password + 2FA.

Hardware key option: instead of biometric, you can use a YubiKey or Titan key — choose 'Use a security key' during creation.

Frequently asked questions

Will my password stop working when I add a passkey?

No. Passkeys are added alongside your password. You can later remove the password if you choose, but it remains active by default.

What if I lose all my devices?

Use Google's account recovery process — backup codes, recovery phone, recovery email. Set these up before relying on passkeys exclusively.

Can I use the same passkey across Apple and Google ecosystems?

Cross-ecosystem sync isn't automatic. You can create separate passkeys on iPhone (via iCloud Keychain) and on a Windows PC (via Windows Hello), and both work for your Google account.

Are passkeys safer than 2FA via authenticator app?

Yes. Passkeys are phishing-resistant. Authenticator codes can be phished by typing them into a fake site.

What about my YubiKey — should I keep using it?

Yes. YubiKeys can store passkeys too, and they're the most resilient backup. Keep your YubiKey registered as a 2FA method even after creating a passkey.

Sources & further reading

We cite primary sources whenever possible. Below is the reference list relevant to this category. Specific facts in this article are checked against vendor documentation and the sources we link to inline.

How we research: see our Source Policy and Review Methodology. If you spot an inaccuracy, please tell us — we publish corrections at the top of the affected article.

Ana Kovács · Senior Privacy Analyst

Ana has spent 9 years writing about consumer privacy, encryption protocols, and secure remote-work setups.

Related guides