Web Authn

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 8

Security of yours passwords

Most popular passwords:


123456
123456789
password
qwerty Passwords are:
-weak
-forgotten
-reused
-stolen
WebAuthn keeps you safe online
How does WebAuthn work?
Process of authorization

1.User registers to 2.Choosing an authenticator


a web service

4.Rapid recovery from 3.User authenticates


lost/stolen devices to the web service
Authentication Options
1.Passwordless Authentication
Strong single factor authentication using a hardware
authenticator.

2.Two factor authentication


Strong two factor authentication using a hardware
authenticator as an extra layer of protection
beyond a password.

3.Multi-factor authentication
Strong multi-factor authentication using a
hardware authenticator and a PIN or biometric.
Authenticators
YubiKey 5 Series
It is a hardware based authentication
solution that offers strong two-factor,
multi-factor and passwordless
authentication.

Yubico Security Key


It combines hardware-based authentication,
public key cryptography, and the U2F and
FIDO2 protocols to eliminate account
takeovers.
Advantages of
WebAuthn

You might also like