Following up on the GFF 2025 discussion, I’ve been doing deep research on biometric authentication for payments, and I need to share what I’ve learned. This is coming faster than I expected, and we need to be prepared.
The Technology: What’s Actually Happening
After researching Visa Payment Passkey and similar solutions, here’s what bookkeepers need to understand:
What is Visa Payment Passkey?
- Built on FIDO2 authentication standards (from the FIDO Alliance)
- Replaces passwords and OTP (one-time passcode) with device-native biometrics
- Uses fingerprint, facial recognition, or device PIN for payment authentication
- The biometric data NEVER leaves the user’s device (stored locally only)
How it works technically:
- Customer enrolls their payment card with their device
- A cryptographic “passkey” is created and stored on the device
- For payments, the device authenticates using biometrics
- The authentication result (NOT the biometric data) is sent to Visa
- Payment is approved based on cryptographic verification
Key security fact: Visa reports 50% lower fraud rates with biometric authentication vs. SMS one-time passcodes.
The Recordkeeping Challenge We’re Facing
Here’s my concern as a bookkeeper: What constitutes adequate documentation?
Traditional payment record:
Date: 10/15/2025
Merchant: Office Supplies Inc
Amount: $247.82
Payment Method: Visa ending in 4532
Authorization Code: 123456
OTP Confirmation: Sent to xxx-xxx-1234
Cardholder Signature: [available if requested]
Biometric-authenticated payment record:
Date: 10/15/2025
Merchant: Office Supplies Inc
Amount: $247.82
Payment Method: Visa ending in 4532
Authentication: Biometric (fingerprint)
FIDO2 Transaction ID: f7a3b2c9...
Device: iPhone 14 Pro
Questions I’m wrestling with:
- Is “biometric authentication successful” sufficient documentation?
- Do we need to record which biometric method was used (fingerprint vs. face)?
- What if the customer disputes the charge? How do we prove it was them?
- Should we retain the FIDO2 transaction ID? For how long?
Audit Trail Standards: What Do We Actually Need?
I’ve been researching audit trail requirements, and here’s what I found:
General audit trail best practices require:
- Timestamps (down to the millisecond) ✓
- User identification (who performed the action) ✓
- Tamper-proof storage (immutable records) ✓
- Clear documentation of each activity ✓
For financial workflows specifically:
- Record when invoices were received
- Who reviewed and approved them
- Any modifications made (with old/new values)
- Payment issue date and method
For SOX compliance (publicly traded companies):
- Minimum 366 days of audit logs
- Complete financial reporting system trails
- Access control documentation
The gap: None of these standards explicitly address biometric authentication! We’re in uncharted territory.
Privacy Regulations: Another Layer of Complexity
Different jurisdictions define and regulate biometric data differently:
GDPR (Europe):
- Biometric data is “special category” personal data
- Requires explicit consent and strict protection
- But: FIDO2 keeps biometric data on-device, never transmitted
CCPA/CPRA (California):
- Biometric information = data generated from measurements or analysis of human characteristics
- For the purpose of authenticating individuals accessing online accounts
Key insight: Since FIDO2-based systems don’t transmit actual biometric data (only authentication results), they may be compliant. But I’m not a lawyer!
What Payment Processors Are Providing
I reached out to several payment processors to ask what documentation they provide for biometric-authenticated transactions. Here’s what I learned:
Square (testing biometric auth):
- Transaction ID
- Authentication method (biometric/PIN/password)
- Device identifier
- Timestamp (to the second)
- Geographic location (if enabled)
Stripe (FIDO2 support coming):
- Similar data points to Square
- Plus: Authentication “strength” indicator
- Session ID linking multiple transactions
PayPal (NPCI integration announced):
- Still defining what data will be available
- Committed to FIDO2 standards compliance
The good news: Payment processors seem to understand we need audit trails. The data IS being captured.
Real-World Testing: What I’m Seeing
I convinced one early-adopter client to test biometric payments for his coffee shop. Here’s what we learned after 30 days:
The setup:
- iPad POS with fingerprint authentication
- Customers enrolled their cards with Face ID/Touch ID
- Testing period: September 1-30, 2025
Results:
- Transaction success rate: 97.3% (vs. 94.1% with SMS OTP)
- Average transaction time: 8.2 seconds (vs. 14.7 seconds with OTP)
- Customer satisfaction: Much higher (no more “I didn’t get the text!”)
- Fraud incidents: Zero (vs. 2 chargebacks previous month)
Documentation received:
- Full transaction details in Square dashboard
- Authentication method clearly marked
- Device information included
- Exportable to CSV for reconciliation
What worked well:
- Integration with QuickBooks was seamless
- Reconciliation actually EASIER (fewer failed transactions to track down)
- Customer disputes simpler (device-level authentication is hard to fake)
What needs improvement:
- No standard format for exporting biometric auth data
- Unclear how long we should retain device identifiers
- No guidance on what to do if customer loses enrolled device
Practical Recommendations for Bookkeepers
Based on my research and testing, here’s what I’m advising my clients:
Do:
-
Document the authentication method in your records
- Note: “Payment authenticated via biometric (FIDO2)”
- Include device type if available
-
Retain transaction IDs from payment processor
- These link to full authentication details
- Keep for standard retention period (7 years for most business records)
-
Update your chart of accounts if needed
- Might want to track payment methods separately
- Helps with reconciliation and reporting
-
Train on dispute resolution
- Different process than traditional chargebacks
- Device-based authentication changes the burden of proof
Don’t:
-
Don’t try to store biometric data yourself
- It stays on the customer’s device (by design)
- Privacy nightmare if you tried to collect it
-
Don’t assume old processes work
- “Where’s the signature?” - there isn’t one
- Need new verification procedures
-
Don’t ignore this technology
- It’s coming whether we’re ready or not
- Better to prepare now than scramble later
Integration with Beancount: My Wishlist
For those of us using plain-text accounting, I’d love to see:
Enhanced transaction metadata:
2025-10-15 * "Office Supplies Inc" "Office supplies"
auth_method: "biometric_fingerprint"
auth_standard: "FIDO2"
device_id: "iPhone-14-Pro-xxxxx"
fido_txn_id: "f7a3b2c9d8e1a4b5c6d7e8f9"
Expenses:Office:Supplies 247.82 USD
Liabilities:CreditCard:Visa
Import script support:
- Parse authentication method from CSV exports
- Flag transactions with different auth types
- Generate reports by payment method
Validation rules:
- Warn if biometric auth failed (might indicate fraud)
- Check for consistent device IDs per customer
- Alert on unusual authentication patterns
Questions for This Community
-
For CPAs/EAs: What documentation do you expect from clients using biometric payments?
-
For Beancount users: Has anyone started tracking authentication methods in transaction metadata?
-
For small business owners: Are your payment processors offering biometric authentication yet?
-
For everyone: How are you thinking about privacy compliance with biometric payment data?
I feel like we’re at the beginning of a major shift in how payments work. The technology is impressive (that 50% fraud reduction!), but the operational and compliance questions are significant.
Would love to hear from others who are navigating this transition.
Bob Martinez
Small Business Bookkeeping Specialist
Sources for this post:
- Visa Payment Passkey documentation (corporate.visa.com)
- FIDO Alliance FIDO2 specifications (fidoalliance.org)
- Real-world testing with Square POS (September 2025)
- Audit trail research from accounting compliance resources