This is the silent cost of passwordless authentication at scale. You replace passwords, you add magic links, WebAuthn, hardware keys, device trust scores. You win on UX. You win on phishing resistance. Then one day you open your IAM dashboard, and the number of roles, policies, and entitlements has exploded beyond reason.
The problem isn’t the authentication method itself. It’s the privilege sprawl that appears when you scale passwordless to thousands or millions of users, devices, and services. Every integration, every conditional access policy, every auditing requirement spawns another role variant. Soon, you are tracking hundreds of “similar but not identical” permission sets that differ by one or two rules.
When passwordless is rolled out across multiple teams, geographies, and vendor systems, the combinatorial growth of roles accelerates. Logging in feels seamless, but authorization management turns into a brittle, error-prone mess. This is the large-scale role explosion: a security, productivity, and compliance risk hiding beneath the very technology meant to harden your access layer.