Platform PhoenixAuth
PhoenixAuth · Coming Soon

Authentication that survives compromise

PhoenixAuth combines passwordless passkeys with Post-Compromise Security. Device stolen? Credentials phished? One Phoenix refresh locks the attacker out — automatically.

PCS Post-Compromise Secure
FIDO2 WebAuthn Compatible
PQC Quantum-Resistant
0 Passwords Required

Authentication fails at the worst moment

80% of breaches involve compromised credentials. Current MFA gets phished. Passkeys don't recover. No authentication system today automatically heals after compromise.

🎣

Real-Time Phishing Bypasses MFA

Adversary-in-the-middle relays bypass TOTP, push notifications, and even SMS OTP in real-time.

📱

Lost Device = Lost Access

Passkeys tied to a single device. Phone stolen or broken? Start over. No cryptographic recovery path.

🔑

Okta Got Breached. Twice.

Even identity providers get compromised. When the SSO fails, every downstream service is exposed.

$ traditional_auth --status
⚠ CREDENTIAL COMPROMISED
✗ Session hijacked
✗ MFA bypassed via relay
✗ Manual recovery required

$ phoenix_auth --refresh
✓ VaultKey rotated in TEE
✓ Session credentials refreshed
✓ Stolen passkey invalidated
✓ Attacker locked out instantly

Authentication reimagined

PhoenixAuth builds on the same Phoenix Core Engine as PhoenixSig — PCS, PQC, and Threshold — with a purpose-built authentication layer.

🔑

Phoenix Passkeys

WebAuthn/FIDO2 compatible passkeys with Post-Compromise Security. PQC-backed (ML-DSA) and recoverable via Phoenix refresh. Lost device? Social recovery. Stolen credential? Instant invalidation.

🔄

Continuous Authentication

Session-bound signatures with periodic re-verification. Anomaly-triggered step-up. Zero-downtime refresh keeps sessions alive while rotating the cryptographic material underneath.

📈

Adaptive Step-Up

Risk-based escalation — low-risk actions pass through, high-value operations require biometric or multi-party approval. Policy-driven, fully configurable per role and action.

Time-Delayed Actions

Sensitive changes (password reset, security settings, large transfers) are held for a configurable delay. Multi-channel notifications. Cancel window. Guardian alerts.

👥

Social Recovery

Designate guardians who can help recover your account via M-of-N threshold approval. Time-delayed for security. Automatic Phoenix refresh post-recovery.

📱

Device Trust Network

Multi-device enrollment with trust levels. Cross-device verification for sensitive actions. Lost device revocation without losing your identity.

What's on the roadmap

PhoenixAuth is being built in phases. Here's what's coming beyond the core features.

Phase 2

Location-Bound Auth

Geofencing rules, travel mode, anomaly detection, and VPN awareness. Deny authentication from unexpected locations automatically.

Geofence · Travel Mode · Anomaly
Phase 3

Biometric Liveness

Anti-deepfake challenge-response verification. TEE attestation ensures the biometric check runs on real hardware, not emulated environments.

Anti-Deepfake · TEE Attestation
Phase 4

ZK-Phoenix (Anonymous Auth)

Prove membership without revealing identity. Anonymous voting, privacy-preserving access, credential non-linkability. Zero-knowledge proofs on Phoenix Core.

ZK Proofs · Anonymous · Non-Linkable

Where PhoenixAuth shines

🏢

Enterprise SSO

Phoenix Passkeys replace phishable MFA. Device trust network verifies endpoints. Continuous auth detects session anomalies. SSO survives provider breaches.

OIDC SAML Okta Alternative
🏦

Banking & FinTech

Step-up auth for high-value transactions. Time-delayed transfers. Location binding. Continuous session verification. Every transaction cryptographically proven.

PSD2 SCA PCI DSS Step-Up Auth
🏥

Healthcare

Biometric liveness prevents credential sharing. Continuous auth ensures the right person accesses the right records. Full audit trail for HIPAA compliance.

HIPAA Biometric Audit Trail

Designed for developers

PhoenixAuth integrates with your existing identity stack via standard protocols.

phoenixauth-sdk.ts
// 1. Create a Phoenix Passkey
const passkey = await phoenix.auth.createPasskey({
userId: "user@company.com",
displayName: "Jane Doe"
});

// 2. Authenticate
const session = await phoenix.auth.authenticate({
type: "passkey",
challenge: serverChallenge
});

// 3. Step-up for sensitive actions
const approval = await phoenix.auth.stepUp({
action: "transfer",
amount: 50000,
requiredLevel: "high"
});
WebAuthn / FIDO2 OIDC / OAuth 2.0 SAML 2.0 DID REST API TypeScript SDK Rust SDK

Also explore PhoenixSig

PhoenixAuth shares the same Phoenix Core Engine as PhoenixSig. Combine both for complete cryptographic identity — one key system for signing and authenticating.

"Same guardian network. Same recovery process. Same PCS."
Explore PhoenixSig →

Join the PhoenixAuth waitlist

PhoenixAuth is currently in development. Join the waitlist to get early access, shape the product with your feedback, and be among the first to deploy authentication that survives compromise.

Early access to PhoenixAuth beta
Direct input on feature prioritization
Priority onboarding and integration support

Join the Waitlist

We'll notify you when PhoenixAuth is ready for early access.

We respect your privacy. No spam, ever.