Step A2 of 4

Agent Accepts Invite

Agent sets up passkey on work device for secure authentication

�� Invitation Email

🔐 Onboarding Page

Welcome, Emma Thompson!

🏢 Shepherd & Wedderburn LLP

You're joining the Undoubt platform as an agent

🔑 Why Passkeys?

We use passkeys to secure verified communications with clients. Passkeys are device-bound, hardware-protected, and use your biometrics (Face ID/Touch ID/Windows Hello). This ensures only you can issue verified instructions—no one can impersonate you, even with your password.

1

Confirm Identity

Verify your email (emma.thompson@shepwedd.com). Optional: Authenticate via firm SSO (Entra ID/Azure AD) for additional security.

2

Create Passkey

Register your device-bound passkey using biometric authentication. This creates a non-exportable private key stored in your device hardware.

3

Complete Setup

Review your role, permissions, and department assignment. Accept terms and complete onboarding.

🔑 Passkey Creation

portal.shepwedd.undoubt.com is requesting passkey creation

Create your agent passkey for secure authentication

👤

Touch ID / Face ID / Windows Hello

Agent: Emma Thompson
Firm: Shepherd & Wedderburn LLP
Role: Solicitor
Department: Residential Conveyancing

Agent Account Details

Agent ID: AGENT-SW-ET-7A29
Email: emma.thompson@shepwedd.com
Firm Tenant: FIRM-SW-A8F2-4D91
Created: 9 December 2025
Permissions: Verified emails, Client verification, Bank details, Document approval

Security Details

Device-Bound Passkey

Your passkey is created and stored in your device's hardware security module (TPM on Windows, Secure Enclave on Apple, Titan chip on Google). Key characteristics:

  • Private key never leaves your device—cannot be extracted or exported
  • Requires your biometric (face/fingerprint) to use—cannot be stolen
  • Bound to portal.shepwedd.undoubt.com domain—phishing impossible
  • Device attestation proves genuine hardware, not virtual machine
  • Backend stores only public key—even database breach is harmless
  • No passwords to remember, phish, or leak

What Happens Next?

Link Outlook Add-in

Now that Emma has a passkey-secured agent account, she needs to connect her Outlook add-in to this identity. This allows the add-in to:

  • Call the backend with her authenticated agent identity
  • Generate verification references when composing emails
  • Verify customer instructions received via email
  • Enforce her specific permissions (bank details, approvals, etc.)