The appName determines how the passkey will be named when created on your
user’s device. Use your application’s name or a clear identifier so users can
easily recognize it.
Web Integration (React/Next.js) - Hosted UI
1
Initiate Passkey Session
Request a passkey session from your backend, specifying the action (
create or auth), and receive a hosted UI URL.appName determines how the passkey will be named when it is created on your user’s device. Use your application’s name or a clear identifier so users can easily recognize it.
2
Embed Hosted UI
Add the hosted Passkey UI to your app using an 
iframe with the correct WebAuthn permissions.3
Handle Authentication Result
Listen for messages from the iframe to receive the session token or handle errors, then use the session token as a signer in Smart Account operations.
On successful authentication, the iframe will post a message of type 
authz_complete containing a sessionToken and the onchain passkey address. On error, a message of type authz_error will be sent with an error description. You can also extract these values from the redirect URL if using a full-page redirect.React Native Integration - Hosted UI
1
Initiate Passkey Session
Request a passkey session from your backend and receive the hosted UI URL.
2
Open Hosted UI in Browser
Launch the Passkey UI in the device browser using 
WebBrowser.openAuthSessionAsync.3
Process Redirect Result
Handle the redirect and extract the session token from the result for use as a signer in Smart Account operations.
WebAuthn Configuration Requirements
Required Settings
The on-chain passkey program has specific requirements that must be met for successful registration and authentication: User Presence Required:- userPresentmust be- truein the WebAuthn authenticator response
- This applies to both passkey creation and subsequent authentications
- The authenticator must verify user presence through biometric, PIN, or physical interaction
- Only ES256 (algorithm -7) is supported
- No other cryptographic algorithms are accepted by the on-chain program
Handling Registration Failures
If local passkey creation succeeds but submission fails:- The passkey exists locally but has no associated on-chain account
- Solution: Re-request a new URL with action: "create"and submit again
- The existing local passkey will work with the new challenge
- No need to recreate the local passkey
- Challenge expired (60-second timeout)
- Network issues during submission
- Invalid WebAuthn response format
Best Practices
- 
Challenge Handling:
- Parse challenge from URL parameters
- Use challenge directly - it’s already base64 encoded
- Never re-encode the challenge
- Return complete WebAuthn response objects
- Complete WebAuthn ceremony within 60 seconds of URL generation
 
- 
Session Management:
- Generate unique session keys for each authentication
- Implement proper expiration handling
- Securely store session tokens
 
- 
Error Handling:
- Implement comprehensive error handling
- Provide user-friendly error messages
- Log errors for debugging
 
- 
User Experience:
- Use clear, recognizable app names
- Provide loading states during authentication
- Handle both success and failure scenarios
 
- 
Security:
- Validate all inputs
- Use HTTPS for all communications
- Implement proper CORS policies
- Never expose API keys in client-side code
 
Advanced Integration
Need Your Own Custom Domain? If you need to host passkey flows on your own domain (e.g.,auth.yourcompany.com) for branding or compliance requirements, see Custom Domain.