{"id":82391,"date":"2024-08-03T16:06:21","date_gmt":"2024-08-03T08:06:21","guid":{"rendered":"https:\/\/version-2.com\/?p=82391"},"modified":"2024-07-31T16:08:35","modified_gmt":"2024-07-31T08:08:35","slug":"why-passwordless-authentication-is-the-way-forward","status":"publish","type":"post","link":"https:\/\/version-2.com\/en\/2024\/08\/why-passwordless-authentication-is-the-way-forward\/","title":{"rendered":"Why passwordless authentication is the way forward"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"82391\" class=\"elementor elementor-82391\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-35fe5dd post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"35fe5dd\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;cef08c3&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-409a2e9a\" data-id=\"409a2e9a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2493f1c elementor-widget elementor-widget-text-editor\" data-id=\"2493f1c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/a.storyblok.com\/f\/157611\/1200x627\/3e17a1332e\/passwordless-authentication.png\/m\/1080x0\/filters:quality(75)\" width=\"1080\" height=\"564\" \/><\/p><div class=\"richtext\"><h2 id=\"moving-beyond-passwords\" class=\"nord-text text-h2 leading-normal font-medium tracking-tight text-black font-bold\" style=\"line-height: 1.2;\">Moving beyond passwords<\/h2><p class=\"nord-text text-base leading-normal text-black\">Passwords have been the go-to method for securing access to online accounts and data from the early days of the Internet. However, as cyberattacks grow increasingly sophisticated, relying solely on passwords may no longer suffice.<\/p><p class=\"nord-text text-base leading-normal text-black\">Hacker-controlled machines are now too good at cracking them, particularly because many people use weak or reused passwords across multiple accounts, unaware that this practice makes the attackers\u2019 job effortless.<\/p><p class=\"nord-text text-base leading-normal text-black\">And so, the time has come to move beyond passwords and adopt more modern standards to safeguard digital assets. In other words, it&#8217;s time to go passwordless.<\/p><h2 id=\"what-is-passwordless-authentication\" class=\"nord-text text-h2 leading-normal font-medium tracking-tight text-black font-bold\" style=\"line-height: 1.2;\">What is passwordless authentication?<\/h2><p class=\"nord-text text-base leading-normal text-black\">Passwordless authentication is a cybersecurity method where users can access a service or application without entering a password. How does passwordless authentication work then? It allows users to utilize alternative authentication factors such as fingerprints or face IDs to verify their identity while logging into a service.<\/p><p class=\"nord-text text-base leading-normal text-black\">The goal of passwordless authentication is to provide a more convenient alternative to traditional passwords that can not only maintain but also enhance the level of protection against cyberattacks.<\/p><h2 id=\"types-of-passwordless-authentication\" class=\"nord-text text-h2 leading-normal font-medium tracking-tight text-black font-bold\" style=\"line-height: 1.2;\">Types of passwordless authentication<\/h2><p class=\"nord-text text-base leading-normal text-black\">Passwordless authentication can take many forms; however, some are now more popular than others. Let\u2019s now go through a few of the commonly used authentication techniques that do not require passwords.<\/p><h3 id=\"biometric-authentication\" class=\"nord-text text-h3 leading-normal font-medium tracking-tight text-black font-bold\" style=\"line-height: 1.2;\">Biometric authentication<\/h3><p class=\"nord-text text-base leading-normal text-black\">Probably the most popular passwordless authentication method available today, biometrics involves using built-in scanning tools on devices to verify unique biological characteristics such as fingerprints or facial features to confirm a user\u2019s identity. This method has become highly popular because most modern mobile phones support it. Also, fingerprints can&#8217;t be as easily stolen as James Bond movies might suggest, which makes biometric authentication a more secure option than passwords.<\/p><h3 id=\"authentication-apps\" class=\"nord-text text-h3 leading-normal font-medium tracking-tight text-black font-bold\" style=\"line-height: 1.2;\">Authentication apps<\/h3><p class=\"nord-text text-base leading-normal text-black\">This popular password-free authentication technique uses a dedicated app to generate time-limited codes for accessing accounts, ensuring high security. It works well because most people have their mobile phones with them, making it easier to check the app for a code than to remember all their passwords for different online accounts.<\/p><h3 id=\"hardware-tokens\" class=\"nord-text text-h3 leading-normal font-medium tracking-tight text-black font-bold\" style=\"line-height: 1.2;\">Hardware Tokens<\/h3><p class=\"nord-text text-base leading-normal text-black\">Generally speaking, hardware tokens are physical devices that generate authentication codes or utilize cryptographic keys to grant access to systems. They are quite popular due to their reliability in providing a second factor of authentication, which significantly enhances security. Also, hardware tokens do not rely on internet connectivity or software, making them more resilient against many forms of cyber threats.<\/p><h3 id=\"magic-links\" class=\"nord-text text-h3 leading-normal font-medium tracking-tight text-black font-bold\" style=\"line-height: 1.2;\">Magic Links<\/h3><p class=\"nord-text text-base leading-normal text-black\">With this method, users receive a link via email that, when clicked, allows them to log in to their account without entering a password. This approach simplifies the login process while ensuring security, as the link is usually valid for a limited time and can only be used once.<\/p><h3 id=\"passkeys\" class=\"nord-text text-h3 leading-normal font-medium tracking-tight text-black font-bold\" style=\"line-height: 1.2;\">Passkeys<\/h3><p class=\"nord-text text-base leading-normal text-black\">Compared to other types of passwordless authentication described in this section, passkeys are the new kid on the block, though already quite popular. <a class=\"nord-link cursor-pointer outline-none transition-colors duration-250 ease-out text-teal hover:text-teal-dark\" href=\"\/en\/blog\/what-is-a-passkey\/\" data-ga-slug=\"Link to \/blog\/what-is-a-passkey\/\" data-link=\"NordUIlink\">Passkeys<\/a> typically involve using a pair of cryptographic keys: a private key stored on the user\u2019s device and a corresponding public key on the website\u2019s server. Access is granted when these keys are successfully matched in a process often initiated through biometrics. This approach enhances convenience and significantly boosts security because attackers must acquire both keys to gain unauthorized access. Stealing the private key from the user\u2019s device is extremely difficult.<\/p><h2 id=\"the-benefits-of-passwordless-authentication\" class=\"nord-text text-h2 leading-normal font-medium tracking-tight text-black font-bold\" style=\"line-height: 1.2;\">The benefits of passwordless authentication<\/h2><p class=\"nord-text text-base leading-normal text-black\">As we\u2019ve already covered in this article, the benefits of passwordless authentication are plenty. These advantages become even clearer when compared to what passwords can provide. So, let&#8217;s delve into each major benefit in detail, starting with\u2026<\/p><p class=\"nord-text text-base leading-normal text-black\"><b>1. Enhanced security<\/b><\/p><p class=\"nord-text text-base leading-normal text-black\">The first, and arguably the most important, benefit of passwordless authentication is that it provides much more protection than traditional passwords. This is because it eliminates vulnerabilities commonly associated with password-based systems, such as phishing, brute-force attacks, and password reuse. With passwordless methods like biometrics or passkeys, authentication relies on unique and difficult-to-replicate factors, significantly reducing the risk of unauthorized access. As a result, adopting passwordless authentication strengthens overall security posture and helps keep outsiders at bay.<\/p><p class=\"nord-text text-base leading-normal text-black\"><b>2. Ease of use<\/b><\/p><p class=\"nord-text text-base leading-normal text-black\">When it comes to user convenience, passwordless authentication delivers a knockout blow to passwords, preventing them from getting back up. Firstly, the passwordless approach is much faster as it allows users to log in to a service or application with one click, whereas with passwords&#8230; well, you know the drill. Secondly, with passwordless authentication, users don\u2019t have to remember anything, freeing their minds and preventing the frustration of repeatedly entering incorrect passwords. And thirdly, this ease of use extends to business as well, preventing account lockouts and shopping cart abandonments, and keeping customers happier and more willing to use a given service.<\/p><p class=\"nord-text text-base leading-normal text-black\"><b>3. Reduced password-related support<\/b><\/p><p class=\"nord-text text-base leading-normal text-black\">Unlike traditional authentication methods that frequently lead to forgotten passwords and subsequent support requests, passwordless authentication effectively eliminates these issues. This significantly reduces the need for password-related support, saving time and resources while enhancing user satisfaction with a seamless login experience.<\/p><p class=\"nord-text text-base leading-normal text-black\"><b>4. Enhanced regulatory compliance<\/b><\/p><p class=\"nord-text text-base leading-normal text-black\">Embracing passwordless authentication is a strategic way for businesses to boost their compliance with regulations on data privacy. How so? By adopting secure methods like biometrics or passkeys, organizations can meet diverse data protection requirements without compromising user convenience. This proactive approach not only helps mitigate financial and reputational risks associated with non-compliance but also builds trust among customers and stakeholders.<\/p><p>\u00a0<\/p><h2 id=\"passwordless-authentication-use-cases\" class=\"nord-text text-h2 leading-normal font-medium tracking-tight text-black font-bold\" style=\"line-height: 1.2;\">Passwordless authentication use cases<\/h2><p class=\"nord-text text-base leading-normal text-black\">With the support of organizations such as the FIDO Alliance, which helps develop authentication standards to reduce the world\u2019s reliance on passwords, passwordless authentication methods have become highly popular among key players across all industries.<\/p><p class=\"nord-text text-base leading-normal text-black\">This should come as no surprise, especially considering that, according to a study by Secret Double Octopus and the Ponemon Institute called \u201cState of Workforce Passwordless Authentication,\u201d organizations can save up to $1.9 million by implementing passwordless authentication methods.<\/p><p class=\"nord-text text-base leading-normal text-black\">This explains why Microsoft has been promoting passwordless authentication through Windows Hello; why Amazon, Apple, and Google have introduced support for passkeys in their services; why Twitter offers password-free login options through third-party authentication apps and security keys; and so on \u2014 almost everywhere you look, a password-free login option is available. As a result, passwordless authentication is used today by millions of users worldwide and is gradually pushing passwords out of the picture.<\/p><h2 id=\"how-to-enable-passwordless-authentication-on-your-service\" class=\"nord-text text-h2 leading-normal font-medium tracking-tight text-black font-bold\" style=\"line-height: 1.2;\">How to enable passwordless authentication on your service<\/h2><p class=\"nord-text text-base leading-normal text-black\">If your website or application requires customers to log in but doesn&#8217;t offer passwordless options, consider adding this feature to your to-do list. The answer to whether your company and your customers will benefit from that is undoubtedly yes. The real question is: how can you integrate a password-free login option effectively?<\/p><p class=\"nord-text text-base leading-normal text-black\">Well, although you can hire a team of IT professionals and ask them to write passwordless logins into your code, this approach requires significant upfront investment and is rather time-consuming.<\/p><p class=\"nord-text text-base leading-normal text-black\">Fortunately, there are alternatives. For example, you can use <a class=\"nord-link cursor-pointer outline-none transition-colors duration-250 ease-out text-teal hover:text-teal-dark\" href=\"\/en\/passwordless-authentication\/\" data-ga-slug=\"Link to \/passwordless-authentication\" data-link=\"NordUIlink\">Authopia by NordPass<\/a>, a free tool that allows you to easily add a passkeys widget to the login form on your website or service. Here\u2019s how it works: you receive pre-written code that even those with basic IT skills can implement, you activate the widget by registering with Authopia, and voil\u00e0 \u2014 you have a password-free login option up and running!<\/p><p class=\"nord-text text-base leading-normal text-black\">As already mentioned, Authopia is free to use, which means you can quickly integrate passkey logins into your service and observe improvements in sign-ups and conversions today. So, don\u2019t miss out on this opportunity!<\/p><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2004c86 elementor-widget elementor-widget-shortcode\" data-id=\"2004c86\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"63567\" class=\"elementor elementor-63567\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-45e3ec76 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"45e3ec76\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-311e216d\" data-id=\"311e216d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3d9a2e6f elementor-widget elementor-widget-text-editor\" data-id=\"3d9a2e6f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About NordPass<br \/><\/strong>NordPass is developed by Nord Security, a company leading the global market of cybersecurity products.<\/p><p>The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-51a2bcf elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"51a2bcf\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c73a037\" data-id=\"c73a037\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-821bef5 elementor-widget elementor-widget-spacer\" data-id=\"821bef5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Moving beyond passwords Passwords have been the go-to m [&hellip;]<\/p>","protected":false},"author":149011790,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1273,973,1129,61],"tags":[1131,1272,974],"class_list":["post-82391","post","type-post","status-publish","format-standard","hentry","category-1273","category-nord-security","category-nordpass","category-press-release","tag-nordpass","tag-1272","tag-nord-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Why passwordless authentication is the way forward - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nordpass.com\/blog\/what-is-passwordless-authentication\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why passwordless authentication is the way forward - Version 2\" \/>\n<meta property=\"og:description\" content=\"Moving beyond passwords Passwords have been the go-to m [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nordpass.com\/blog\/what-is-passwordless-authentication\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2024-08-03T08:06:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/a.storyblok.com\/f\/157611\/1200x627\/3e17a1332e\/passwordless-authentication.png\/m\/1080x0\/filters:quality(75)\" \/>\n<meta name=\"author\" content=\"tracylamv2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"tracylamv2\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/what-is-passwordless-authentication\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/08\\\/why-passwordless-authentication-is-the-way-forward\\\/\"},\"author\":{\"name\":\"tracylamv2\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\"},\"headline\":\"Why passwordless authentication is the way forward\",\"datePublished\":\"2024-08-03T08:06:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/08\\\/why-passwordless-authentication-is-the-way-forward\\\/\"},\"wordCount\":1244,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/what-is-passwordless-authentication\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/a.storyblok.com\\\/f\\\/157611\\\/1200x627\\\/3e17a1332e\\\/passwordless-authentication.png\\\/m\\\/1080x0\\\/filters:quality(75)\",\"keywords\":[\"NordPass\",\"2024\",\"Nord Security\"],\"articleSection\":[\"2024\",\"Nord Security\",\"NordPass\",\"Press Release\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/08\\\/why-passwordless-authentication-is-the-way-forward\\\/\",\"url\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/what-is-passwordless-authentication\\\/\",\"name\":\"Why passwordless authentication is the way forward - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/what-is-passwordless-authentication\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/what-is-passwordless-authentication\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/a.storyblok.com\\\/f\\\/157611\\\/1200x627\\\/3e17a1332e\\\/passwordless-authentication.png\\\/m\\\/1080x0\\\/filters:quality(75)\",\"datePublished\":\"2024-08-03T08:06:21+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/what-is-passwordless-authentication\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nordpass.com\\\/blog\\\/what-is-passwordless-authentication\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/what-is-passwordless-authentication\\\/#primaryimage\",\"url\":\"https:\\\/\\\/a.storyblok.com\\\/f\\\/157611\\\/1200x627\\\/3e17a1332e\\\/passwordless-authentication.png\\\/m\\\/1080x0\\\/filters:quality(75)\",\"contentUrl\":\"https:\\\/\\\/a.storyblok.com\\\/f\\\/157611\\\/1200x627\\\/3e17a1332e\\\/passwordless-authentication.png\\\/m\\\/1080x0\\\/filters:quality(75)\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/what-is-passwordless-authentication\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Why passwordless authentication is the way forward\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\",\"name\":\"tracylamv2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"caption\":\"tracylamv2\"},\"url\":\"https:\\\/\\\/version-2.com\\\/en\\\/author\\\/tracylamv2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Why passwordless authentication is the way forward - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nordpass.com\/blog\/what-is-passwordless-authentication\/","og_locale":"en_US","og_type":"article","og_title":"Why passwordless authentication is the way forward - Version 2","og_description":"Moving beyond passwords Passwords have been the go-to m [&hellip;]","og_url":"https:\/\/nordpass.com\/blog\/what-is-passwordless-authentication\/","og_site_name":"Version 2","article_published_time":"2024-08-03T08:06:21+00:00","og_image":[{"url":"https:\/\/a.storyblok.com\/f\/157611\/1200x627\/3e17a1332e\/passwordless-authentication.png\/m\/1080x0\/filters:quality(75)","type":"","width":"","height":""}],"author":"tracylamv2","twitter_card":"summary_large_image","twitter_misc":{"Written by":"tracylamv2","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nordpass.com\/blog\/what-is-passwordless-authentication\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2024\/08\/why-passwordless-authentication-is-the-way-forward\/"},"author":{"name":"tracylamv2","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365"},"headline":"Why passwordless authentication is the way forward","datePublished":"2024-08-03T08:06:21+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2024\/08\/why-passwordless-authentication-is-the-way-forward\/"},"wordCount":1244,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/nordpass.com\/blog\/what-is-passwordless-authentication\/#primaryimage"},"thumbnailUrl":"https:\/\/a.storyblok.com\/f\/157611\/1200x627\/3e17a1332e\/passwordless-authentication.png\/m\/1080x0\/filters:quality(75)","keywords":["NordPass","2024","Nord Security"],"articleSection":["2024","Nord Security","NordPass","Press Release"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2024\/08\/why-passwordless-authentication-is-the-way-forward\/","url":"https:\/\/nordpass.com\/blog\/what-is-passwordless-authentication\/","name":"Why passwordless authentication is the way forward - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nordpass.com\/blog\/what-is-passwordless-authentication\/#primaryimage"},"image":{"@id":"https:\/\/nordpass.com\/blog\/what-is-passwordless-authentication\/#primaryimage"},"thumbnailUrl":"https:\/\/a.storyblok.com\/f\/157611\/1200x627\/3e17a1332e\/passwordless-authentication.png\/m\/1080x0\/filters:quality(75)","datePublished":"2024-08-03T08:06:21+00:00","breadcrumb":{"@id":"https:\/\/nordpass.com\/blog\/what-is-passwordless-authentication\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nordpass.com\/blog\/what-is-passwordless-authentication\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/nordpass.com\/blog\/what-is-passwordless-authentication\/#primaryimage","url":"https:\/\/a.storyblok.com\/f\/157611\/1200x627\/3e17a1332e\/passwordless-authentication.png\/m\/1080x0\/filters:quality(75)","contentUrl":"https:\/\/a.storyblok.com\/f\/157611\/1200x627\/3e17a1332e\/passwordless-authentication.png\/m\/1080x0\/filters:quality(75)"},{"@type":"BreadcrumbList","@id":"https:\/\/nordpass.com\/blog\/what-is-passwordless-authentication\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"Why passwordless authentication is the way forward"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365","name":"tracylamv2","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","caption":"tracylamv2"},"url":"https:\/\/version-2.com\/en\/author\/tracylamv2\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-lqT","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/82391","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/users\/149011790"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/comments?post=82391"}],"version-history":[{"count":4,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/82391\/revisions"}],"predecessor-version":[{"id":82395,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/82391\/revisions\/82395"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/media?parent=82391"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/categories?post=82391"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/tags?post=82391"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}