Passkeys (passwordless authentication) are a replacement for passwords based on Fast IDentity Online (FIDO) standards which allow you to sign into your Microsoft personal (or work/school) account much faster and more securely without a password or additional authentication. A passkey has no username or password so it cannot be exposed or stolen. A passkey can only be used with the account on which it was set up and they are linked to a specific device (computer, tablets or smartphone).
Unlike passwords which you have to remember and type, passkeys are stored as secrets on a device and can use a device's unlock mechanism such as Windows Hello biometrics (fingerprint or facial recognition) or PIN sign-In options to authenticate them before signing in. Passkeys can be used without the need for other sign-in challenges, making the authentication process faster, secure, and more convenient. A passkey is invisible, virtual and based on public-key cryptography (keypair concept: a private key stored securely with the user and a public key). The passkey is purposely hidden from access inside the TPM (Trusted Platform Module) and the remote third-party website you are attempting to access.
Since passkeys are unique to each website or application you don't have to worry about someone else using your passkey to access them. Passkeys are also resistant to and helps protect against phishing attacks. These features make passkeys a more secure option than a password.
Microsoft has long been a proponent of passwordless authentication for years and other industries have been moving in that direction too. Use of passkeys are "strongly recommended" by Microsoft along with a single biometric and PIN option.
These security enhancements are the new norm in today's world due to the number of data breaches reported where extensive amounts of personal/financial/business information (including usernames and passwords) is stolen by hackers, then leaked or published for sale on the Dark Web. Criminals can then use that information for identity theft, hacking, extortion and any number of other nefarious purposes. We as users of this technology must take steps to minimize the risk of all sorts of threats, not just Microsoft sign-in attempts.