{"id":85915,"date":"2024-08-26T11:36:30","date_gmt":"2024-08-26T03:36:30","guid":{"rendered":"https:\/\/version-2.com\/?p=85915"},"modified":"2024-08-22T11:38:31","modified_gmt":"2024-08-22T03:38:31","slug":"what-is-webauthn-a-deep-dive-into-passwordless-authentication","status":"publish","type":"post","link":"https:\/\/version-2.com\/en\/2024\/08\/what-is-webauthn-a-deep-dive-into-passwordless-authentication\/","title":{"rendered":"What is WebAuthn? A deep dive into passwordless authentication"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"85915\" class=\"elementor elementor-85915\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-35fe5dd post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"35fe5dd\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;cef08c3&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-409a2e9a\" data-id=\"409a2e9a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2493f1c elementor-widget elementor-widget-text-editor\" data-id=\"2493f1c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-medium\" src=\"https:\/\/a.storyblok.com\/f\/157611\/1062x598\/42d6d16de1\/what-is-webauthn.png\/m\/1080x0\/filters:quality(75)\" width=\"1080\" height=\"608\" \/>\n<div class=\"richtext\">\n<h2 id=\"we\u2019re-sorry-passwords-\u2013-you\u2019re-just-not-enough-anymore\" class=\"nord-text text-h2 leading-normal font-medium tracking-tight text-black font-bold\" style=\"line-height: 1.2;\">We\u2019re sorry, passwords \u2013 you\u2019re just not enough anymore<\/h2>\n<p class=\"nord-text text-base leading-normal text-black\">There was a time when passwords were our go-to for authentication. When they were made strong, they were reliable, tough to guess, and hard to crack. These days, however, with hackers using highly sophisticated phishing tactics and advanced password-cracking algorithms, passwords have been reduced to a weak link in our security practices. Sad but true.<\/p>\n<p class=\"nord-text text-base leading-normal text-black\">And so, it\u2019s time for us to explore better options for protecting our accounts and data. This means moving to a <a class=\"nord-link cursor-pointer outline-none transition-colors duration-250 ease-out text-teal hover:text-teal-dark\" href=\"\/en\/blog\/what-is-passwordless-authentication\/\" data-ga-slug=\"Link to \/blog\/what-is-passwordless-authentication\">passwordless<\/a> approach, which might sound a bit daunting but can actually make things more secure and user-friendly. Let us explain a bit more.<\/p>\n\n<h2 id=\"limitations-of-password-based-authentication\" class=\"nord-text text-h2 leading-normal font-medium tracking-tight text-black font-bold\" style=\"line-height: 1.2;\">Limitations of password-based authentication<\/h2>\n<p class=\"nord-text text-base leading-normal text-black\">An average internet user has around <a class=\"nord-link cursor-pointer outline-none transition-colors duration-250 ease-out text-teal hover:text-teal-dark\" href=\"\/en\/blog\/how-many-passwords-does-average-person-have\/\" data-ga-slug=\"Link to \/blog\/how-many-passwords-does-average-person-have\">170 online accounts<\/a>. Let&#8217;s suppose you have fewer, say, 40 accounts. Even then, once you start using a strong, 16-character password for each and every one of those accounts, you&#8217;ll quickly see it&#8217;s not a convenient method of ensuring online protection. And the problem is, it&#8217;s not so safe anymore, either.<\/p>\n<p class=\"nord-text text-base leading-normal text-black\">According to Verizon\u2019s <a class=\"nord-link cursor-pointer outline-none transition-colors duration-250 ease-out text-teal hover:text-teal-dark\" href=\"https:\/\/www.verizon.com\/about\/news\/2023-data-breach-investigations-report\" target=\"_blank\" rel=\"noopener noreferrer\" data-ga-slug=\"Link to https:\/\/www.verizon.com\/about\/news\/2023-data-breach-investigations-report\" data-link=\"NordUIlink\">2023 Data Breach Investigations Report<\/a>, stolen credentials are among the top three main methods of accessing organizations. This happens for a few reasons. First, many people reuse passwords across multiple accounts, so if one account is compromised, it can lead to others being at risk, too. Second, a lot of people use weak passwords that are easy to guess or crack. Third, cybercriminals trick users into revealing their login details through phishing. Additionally, many users don&#8217;t use multi-factor authentication (MFA), which normally provides an extra layer of security when hackers get ahold of their login credentials.<\/p>\n<p class=\"nord-text text-base leading-normal text-black\">With these security concerns in mind, some organizations have explored the possibility of getting rid of passwords altogether and replacing them with something better. This brings us to WebAuthn.<\/p>\n\n<h2 id=\"what-is-webauthn-exactly\" class=\"nord-text text-h2 leading-normal font-medium tracking-tight text-black font-bold\" style=\"line-height: 1.2;\">What is WebAuthn, exactly?<\/h2>\n<p class=\"nord-text text-base leading-normal text-black\">Developed by the World Wide Web Consortium (W3C) in collaboration with the FIDO Alliance, WebAuthn is a web standard for secure authentication based on public-key cryptography. In simpler terms, WebAuthn allows users to log in to websites without using passwords, instead relying on biometrics, security keys, or other authenticators like <a class=\"nord-link cursor-pointer outline-none transition-colors duration-250 ease-out text-teal hover:text-teal-dark\" href=\"\/en\/blog\/what-is-a-passkey\/\" data-ga-slug=\"Link to \/blog\/what-is-a-passkey\">passkeys<\/a>.<\/p>\n<p class=\"nord-text text-base leading-normal text-black\">The main goal of WebAuthn is to provide a more secure alternative to passwords, creating a safer online environment and significantly reducing the risk of phishing and other cyberattacks. Importantly, WebAuthn is backed by major web browsers and platforms, so you get a seamless and secure experience no matter what device or service you&#8217;re using.<\/p>\n\n<h2 id=\"so-how-does-webauthn-work\" class=\"nord-text text-h2 leading-normal font-medium tracking-tight text-black font-bold\" style=\"line-height: 1.2;\">So, how does WebAuthn work?<\/h2>\n<p class=\"nord-text text-base leading-normal text-black\">The process is pretty straightforward, and once you know the steps, you can easily visualize WebAuthn in action. Here&#8217;s how it works in a nutshell:<\/p>\n\n<ol class=\"leading-relaxed List_list__BljM0 List_ol__Aykkt\">\n \t<li class=\"ListItem_item__ZgGQo list-item mb-2\">\n<p class=\"nord-text text-base leading-normal text-black\"><b>Signing up:<\/b> When you register for a service, the server sends a random value (also known as a \u201cchallenge\u201d) to your device.<\/p>\n<\/li>\n \t<li class=\"ListItem_item__ZgGQo list-item mb-2\">\n<p class=\"nord-text text-base leading-normal text-black\"><b>Creating keys:<\/b> Your device uses this challenge to generate a pair of keys: a public key, which is sent to and stored on the server, and a private key, which remains safely on your device.<\/p>\n<\/li>\n \t<li class=\"ListItem_item__ZgGQo list-item mb-2\">\n<p class=\"nord-text text-base leading-normal text-black\"><b>Logging in:<\/b> Each time you log in, the server sends a new challenge. Your device encrypts this challenge with the private key, and the server verifies the encrypted data using the public key it has stored.<\/p>\n<\/li>\n<\/ol>\n<p class=\"nord-text text-base leading-normal text-black\">The whole idea is to keep your private key safe, even if the server gets hacked. This way, unauthorized parties can\u2019t get access because the private key never leaves your device.<\/p>\n&nbsp;\n<h2 id=\"the-benefits-of-webauthn\" class=\"nord-text text-h2 leading-normal font-medium tracking-tight text-black font-bold\" style=\"line-height: 1.2;\">The benefits of WebAuthn<\/h2>\n<p class=\"nord-text text-base leading-normal text-black\">The WebAuthn standard is a real game-changer for everyone involved, though the benefits vary depending on whether you&#8217;re an end-user or a business. So, let\u2019s now break down what each side can potentially gain and dive into how WebAuthn can help both hit a home run.<\/p>\n\n<h3 id=\"end-users\" class=\"nord-text text-h3 leading-normal font-medium tracking-tight text-black font-bold\" style=\"line-height: 1.2;\">End-users<\/h3>\n<p class=\"nord-text text-base leading-normal text-black\">The biggest benefit for users is how much easier and quicker logging in becomes. No more hassle with complex passwords \u2013 often, it\u2019s just one click to get into your accounts. And you don\u2019t have to stress about security, either. WebAuthn boosts your privacy by using advanced cryptography, making it nearly impossible for cybercriminals to get into your accounts. Plus, it seriously cuts down on the risk of password theft and phishing attacks.<\/p>\n\n<h3 id=\"businesses\" class=\"nord-text text-h3 leading-normal font-medium tracking-tight text-black font-bold\" style=\"line-height: 1.2;\">Businesses<\/h3>\n<p class=\"nord-text text-base leading-normal text-black\">For businesses, WebAuthn is a way to fight off the growing threat of credential-based cyberattacks. By adopting this standard, organizations can enhance their security posture with minimal disruption, as WebAuthn integrates smoothly with existing systems and workflows. This transition also translates into cost savings and improved operational efficiency by reducing password-related support requests. Not to mention the fact that businesses that implement WebAuthn can elevate their reputation by being seen as security-conscious.<\/p>\n\n<h2 id=\"webauthn-in-practice-\u2013-popular-use-cases\" class=\"nord-text text-h2 leading-normal font-medium tracking-tight text-black font-bold\" style=\"line-height: 1.2;\">WebAuthn in practice \u2013 popular use cases<\/h2>\n<p class=\"nord-text text-base leading-normal text-black\">Thanks to organizations like the FIDO Alliance, WebAuthn is gaining traction across many different sectors. In e-commerce, it\u2019s revolutionizing the way customers log in and pay, making transactions more secure and smoother. Banking institutions have started to use WebAuthn to safeguard online transactions and account access, adding a robust defense against unauthorized access. Social media sites are also jumping on board, using WebAuthn to fend off phishing attacks and streamline the login process for their users. There are many other industries where WebAuthn has made a significant impact, which is why it\u2019s becoming a technology that might soon make passwords a relic of the past.<\/p>\n\n<h2 id=\"challenges-and-limitations\" class=\"nord-text text-h2 leading-normal font-medium tracking-tight text-black font-bold\" style=\"line-height: 1.2;\">Challenges and limitations<\/h2>\n<p class=\"nord-text text-base leading-normal text-black\">This might sound a little bold, but there are no major challenges or limitations when dealing with WebAuthn. While there might be some obstacles, they can be easily addressed with common-sense actions or by using available tools. Let us explain.<\/p>\n<p class=\"nord-text text-base leading-normal text-black\">First, for WebAuthn to work properly and provide the right level of security, biometric data must be handled with the utmost care, ensuring it is protected against unauthorized access and misuse. This is a straightforward practice and essential for maintaining user trust. Though some might find this a big challenge, it is manageable with current security protocols and best practices, making it more of a standard requirement than a hurdle.<\/p>\n<p class=\"nord-text text-base leading-normal text-black\">Second, some might argue that reliance on biometric devices may not be universally available or convenient for all users. However, as biometric technology becomes more prevalent in our digital lives, this concern is diminishing. NordVPN&#8217;s <a class=\"nord-link cursor-pointer outline-none transition-colors duration-250 ease-out text-teal hover:text-teal-dark\" href=\"https:\/\/nordvpn.com\/blog\/us-biometrics-survey\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-ga-slug=\"Link to https:\/\/nordvpn.com\/blog\/us-biometrics-survey\/\" data-link=\"NordUIlink\">survey<\/a> shows that more than 50% of Americans use biometrics daily, while other <a class=\"nord-link cursor-pointer outline-none transition-colors duration-250 ease-out text-teal hover:text-teal-dark\" href=\"https:\/\/www.biometricupdate.com\/202211\/cisco-report-81-percent-of-all-smartphones-have-biometrics-enabled#:~:text=The%20percentage%20of%20phones%20with,growth%20for%20several%20consecutive%20years.\" target=\"_blank\" rel=\"noopener noreferrer\" data-ga-slug=\"Link to https:\/\/www.biometricupdate.com\/202211\/cisco-report-81-percent-of-all-smartphones-have-biometrics-enabled#:~:text=The%20percentage%20of%20phones%20with,growth%20for%20several%20consecutive%20years.\" data-link=\"NordUIlink\">research<\/a> indicates that over 80% of smartphones have biometric capabilities. So, we&#8217;re on track to make it a global standard.<\/p>\n<p class=\"nord-text text-base leading-normal text-black\">Third, some claim that implementing passwordless solutions can be complex for developers, requiring companies to make significant investments and extra effort. However, there are already tools available that simplify this process, enabling businesses to implement password-free logins based on passkeys with ease. One such tool is Authopia.<\/p>\n\n<h2 id=\"introduce-passwordless-logins-for-your-customers-today\" class=\"nord-text text-h2 leading-normal font-medium tracking-tight text-black font-bold\" style=\"line-height: 1.2;\">Introduce passwordless logins for your customers today<\/h2>\n<p class=\"nord-text text-base leading-normal text-black\">Dedicated to helping organizations make passwordless options part of their login experience, we\u2019ve created a tool called <a class=\"nord-link cursor-pointer outline-none transition-colors duration-250 ease-out text-teal hover:text-teal-dark\" href=\"\/en\/passwordless-authentication\/\" data-ga-slug=\"Link to \/passwordless-authentication\">Authopia<\/a> that allows them to easily add a passkey widget to their website or service.<\/p>\n<p class=\"nord-text text-base leading-normal text-black\">It&#8217;s super simple to use: you just grab the pre-written code, have someone with basic IT knowledge implement it, register your product with Authopia, and voil\u00e0 \u2013 you\u2019ve got a passkey option available for your customers. It\u2019s quick, efficient, and doesn\u2019t require a big investment or the hiring of additional IT specialists. So, if you want to be ahead of the curve and enhance your login experience, consider giving Authopia a try.<\/p>\n<p class=\"nord-text text-base leading-normal text-black\">If you need more info on going passwordless, check out our other materials, like the one where we <a class=\"nord-link cursor-pointer outline-none transition-colors duration-250 ease-out text-teal hover:text-teal-dark\" href=\"\/en\/blog\/passkey-vs-password\/\" data-ga-slug=\"Link to \/blog\/passkey-vs-password\">compare passwords and passkeys<\/a> to help you decide which is best.<\/p>\n\n<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2004c86 elementor-widget elementor-widget-shortcode\" data-id=\"2004c86\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"63567\" class=\"elementor elementor-63567\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-45e3ec76 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"45e3ec76\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-311e216d\" data-id=\"311e216d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3d9a2e6f elementor-widget elementor-widget-text-editor\" data-id=\"3d9a2e6f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About NordPass<br \/><\/strong>NordPass is developed by Nord Security, a company leading the global market of cybersecurity products.<\/p><p>The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-51a2bcf elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"51a2bcf\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c73a037\" data-id=\"c73a037\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-821bef5 elementor-widget elementor-widget-spacer\" data-id=\"821bef5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>We\u2019re sorry, passwords \u2013 you\u2019re just not enough anymore [&hellip;]<\/p>","protected":false},"author":149011790,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_feature_clip_id":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1273,973,1129,61],"tags":[974,1131,1272],"class_list":["post-85915","post","type-post","status-publish","format-standard","hentry","category-1273","category-nord-security","category-nordpass","category-press-release","tag-nord-security","tag-nordpass","tag-1272"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What is WebAuthn? A deep dive into passwordless authentication - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nordpass.com\/blog\/what-is-webauthn\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is WebAuthn? A deep dive into passwordless authentication - Version 2\" \/>\n<meta property=\"og:description\" content=\"We\u2019re sorry, passwords \u2013 you\u2019re just not enough anymore [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nordpass.com\/blog\/what-is-webauthn\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2024-08-26T03:36:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/a.storyblok.com\/f\/157611\/1062x598\/42d6d16de1\/what-is-webauthn.png\/m\/1080x0\/filters:quality(75)\" \/>\n<meta name=\"author\" content=\"tracylamv2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"tracylamv2\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/what-is-webauthn\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/08\\\/what-is-webauthn-a-deep-dive-into-passwordless-authentication\\\/\"},\"author\":{\"name\":\"tracylamv2\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\"},\"headline\":\"What is WebAuthn? A deep dive into passwordless authentication\",\"datePublished\":\"2024-08-26T03:36:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/08\\\/what-is-webauthn-a-deep-dive-into-passwordless-authentication\\\/\"},\"wordCount\":1269,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/what-is-webauthn\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/a.storyblok.com\\\/f\\\/157611\\\/1062x598\\\/42d6d16de1\\\/what-is-webauthn.png\\\/m\\\/1080x0\\\/filters:quality(75)\",\"keywords\":[\"Nord Security\",\"NordPass\",\"2024\"],\"articleSection\":[\"2024\",\"Nord Security\",\"NordPass\",\"Press Release\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/08\\\/what-is-webauthn-a-deep-dive-into-passwordless-authentication\\\/\",\"url\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/what-is-webauthn\\\/\",\"name\":\"What is WebAuthn? A deep dive into passwordless authentication - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/what-is-webauthn\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/what-is-webauthn\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/a.storyblok.com\\\/f\\\/157611\\\/1062x598\\\/42d6d16de1\\\/what-is-webauthn.png\\\/m\\\/1080x0\\\/filters:quality(75)\",\"datePublished\":\"2024-08-26T03:36:30+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/what-is-webauthn\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nordpass.com\\\/blog\\\/what-is-webauthn\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/what-is-webauthn\\\/#primaryimage\",\"url\":\"https:\\\/\\\/a.storyblok.com\\\/f\\\/157611\\\/1062x598\\\/42d6d16de1\\\/what-is-webauthn.png\\\/m\\\/1080x0\\\/filters:quality(75)\",\"contentUrl\":\"https:\\\/\\\/a.storyblok.com\\\/f\\\/157611\\\/1062x598\\\/42d6d16de1\\\/what-is-webauthn.png\\\/m\\\/1080x0\\\/filters:quality(75)\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/what-is-webauthn\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is WebAuthn? A deep dive into passwordless authentication\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\",\"name\":\"tracylamv2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"caption\":\"tracylamv2\"},\"url\":\"https:\\\/\\\/version-2.com\\\/en\\\/author\\\/tracylamv2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is WebAuthn? A deep dive into passwordless authentication - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nordpass.com\/blog\/what-is-webauthn\/","og_locale":"en_US","og_type":"article","og_title":"What is WebAuthn? A deep dive into passwordless authentication - Version 2","og_description":"We\u2019re sorry, passwords \u2013 you\u2019re just not enough anymore [&hellip;]","og_url":"https:\/\/nordpass.com\/blog\/what-is-webauthn\/","og_site_name":"Version 2","article_published_time":"2024-08-26T03:36:30+00:00","og_image":[{"url":"https:\/\/a.storyblok.com\/f\/157611\/1062x598\/42d6d16de1\/what-is-webauthn.png\/m\/1080x0\/filters:quality(75)","type":"","width":"","height":""}],"author":"tracylamv2","twitter_card":"summary_large_image","twitter_misc":{"Written by":"tracylamv2","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nordpass.com\/blog\/what-is-webauthn\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2024\/08\/what-is-webauthn-a-deep-dive-into-passwordless-authentication\/"},"author":{"name":"tracylamv2","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365"},"headline":"What is WebAuthn? A deep dive into passwordless authentication","datePublished":"2024-08-26T03:36:30+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2024\/08\/what-is-webauthn-a-deep-dive-into-passwordless-authentication\/"},"wordCount":1269,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/nordpass.com\/blog\/what-is-webauthn\/#primaryimage"},"thumbnailUrl":"https:\/\/a.storyblok.com\/f\/157611\/1062x598\/42d6d16de1\/what-is-webauthn.png\/m\/1080x0\/filters:quality(75)","keywords":["Nord Security","NordPass","2024"],"articleSection":["2024","Nord Security","NordPass","Press Release"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2024\/08\/what-is-webauthn-a-deep-dive-into-passwordless-authentication\/","url":"https:\/\/nordpass.com\/blog\/what-is-webauthn\/","name":"What is WebAuthn? A deep dive into passwordless authentication - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nordpass.com\/blog\/what-is-webauthn\/#primaryimage"},"image":{"@id":"https:\/\/nordpass.com\/blog\/what-is-webauthn\/#primaryimage"},"thumbnailUrl":"https:\/\/a.storyblok.com\/f\/157611\/1062x598\/42d6d16de1\/what-is-webauthn.png\/m\/1080x0\/filters:quality(75)","datePublished":"2024-08-26T03:36:30+00:00","breadcrumb":{"@id":"https:\/\/nordpass.com\/blog\/what-is-webauthn\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nordpass.com\/blog\/what-is-webauthn\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/nordpass.com\/blog\/what-is-webauthn\/#primaryimage","url":"https:\/\/a.storyblok.com\/f\/157611\/1062x598\/42d6d16de1\/what-is-webauthn.png\/m\/1080x0\/filters:quality(75)","contentUrl":"https:\/\/a.storyblok.com\/f\/157611\/1062x598\/42d6d16de1\/what-is-webauthn.png\/m\/1080x0\/filters:quality(75)"},{"@type":"BreadcrumbList","@id":"https:\/\/nordpass.com\/blog\/what-is-webauthn\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/zh\/"},{"@type":"ListItem","position":2,"name":"What is WebAuthn? A deep dive into passwordless authentication"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365","name":"tracylamv2","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","caption":"tracylamv2"},"url":"https:\/\/version-2.com\/en\/author\/tracylamv2\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-mlJ","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/85915","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/users\/149011790"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/comments?post=85915"}],"version-history":[{"count":4,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/85915\/revisions"}],"predecessor-version":[{"id":85919,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/85915\/revisions\/85919"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/media?parent=85915"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/categories?post=85915"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/tags?post=85915"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}