Skip to main content

What is passwordless WiFi?

Passwordless WiFi is any WiFi authentication scheme where users do not type a shared secret to join the network. Instead, access is tied to a device (a digital certificate or unique pre-shared key), an identity (SAML/SSO against an identity provider), or a carrier-style credential (Passpoint / OpenRoaming).

The shared-password model is a 20-year-old compromise. It leaks via screenshots, printed signage, and messaging apps; it forces a venue-wide rotation when one device is lost; and it offers no way to tell which device or which user is which on the network. Passwordless WiFi fixes all three at once.

Four ways to go passwordless

Each of the four approaches maps to a different use case. Most production deployments use two or more together.

EAP-TLS (client certificates)

The gold standard. Each device carries a unique X.509 certificate issued by your private CA. No password ever leaves the device. Ideal for corporate-managed endpoints enrolled via MDM.

Read: 802.1X authentication benefits →

iPSK (Identity PSK)

Every user or device gets its own unique pre-shared key on a single SSID. Revoke one key without affecting anyone else. Ideal for BYOD, IoT, student housing, and multi-tenant WiFi where each tenant gets their own Private Area Network.

Read: iPSK explained →

Passpoint / OpenRoaming

Carrier-style automatic onboarding. Supported phones connect once and roam across every Passpoint-certified venue worldwide without a captive portal. Purple runs on the OpenRoaming federation.

Read: Passpoint & Hotspot 2.0 →

SAML / SSO

Staff log in once with Entra ID, Google Workspace, or Okta and their device is issued short-lived credentials automatically. Leaves the network — access revokes automatically via SCIM.

Read: SAML staff WiFi →

How Purple deploys passwordless WiFi

Purple SecurePass and Purple Shield run as a cloud overlay on your existing Cisco, Aruba, Ruckus, Juniper Mist, Meraki, or Ubiquiti APs — no hardware swap. Devices enrol once via a branded onboarding flow, receive their certificate or iPSK automatically, and connect seamlessly from then on. Staff, guest, and multi-tenant segments stay isolated by SSID and VLAN; revocation happens per-device in a single click.

  • Guest WiFi: Passpoint + OpenRoaming on the public SSID, with a fallback branded captive portal for unsupported devices. See the Captive Portal product.
  • Staff WiFi: SAML/SSO via Entra ID, Google, or Okta, plus EAP-TLS certificates for managed devices. See Staff WiFi.
  • Multi-tenant WiFi: iPSK per tenant, with Private Area Networks that isolate each tenant's devices in a dedicated Layer 2 segment. See Multi-Tenant WiFi.

Password vs. passwordless

Shared passwordPasswordless
Credential per userShared with everyoneUnique per device or identity
Revoking one deviceRequires venue-wide rotationOne click, others unaffected
User experienceType password, retype, forgetConnect once, auto-reconnect
Credential leak impactEntire venue compromisedOne device, instantly revocable
Audit trailNone — all devices look identicalPer-device session logs
Compliance fit (GDPR, SOC 2)Weak — cannot attribute activityStrong — per-user accountability

Frequently asked

What is passwordless WiFi?

Passwordless WiFi replaces shared passwords (WPA2-Personal) with identity-based credentials — digital certificates, per-device keys (iPSK), or federated identity via SAML/SSO. Users connect without typing a password, and IT revokes access per-device rather than rotating a network-wide passphrase.

How is passwordless WiFi different from WPA3?

WPA3 is the encryption standard; passwordless is the authentication model. WPA3-Personal still relies on a shared password. WPA3-Enterprise supports certificate-based (EAP-TLS) passwordless auth. Passwordless WiFi pairs WPA3-Enterprise with automatic device enrolment so users never see a credential prompt.

Does passwordless WiFi require new hardware?

No. Any enterprise-grade access point that supports 802.1X (Cisco, Aruba, Ruckus, Juniper Mist, Meraki, Ubiquiti UniFi) can run passwordless WiFi. Purple layers onto existing infrastructure rather than replacing it.

What authentication methods count as passwordless?

Four common approaches: EAP-TLS (client certificates), iPSK (unique per-device pre-shared keys), Passpoint / OpenRoaming (carrier-style automatic onboarding), and SAML/SSO integration with an identity provider like Entra ID, Okta, or Google Workspace.

Is passwordless WiFi secure against credential theft?

Yes. Shared passwords leak via screenshots, messaging apps, and printed signage. Passwordless WiFi binds access to a specific device or identity, so a leaked credential compromises one user — not the entire venue. Revoking one device does not disrupt others.

How does passwordless WiFi handle guest access?

Guests onboard via Passpoint/OpenRoaming (auto-connect for supported devices) or a one-time captive portal that provisions a short-lived credential. No shared guest password is ever published.