{"id":93286,"date":"2024-10-29T12:05:58","date_gmt":"2024-10-29T04:05:58","guid":{"rendered":"https:\/\/version-2.com.sg\/?p=92712"},"modified":"2024-10-29T12:51:00","modified_gmt":"2024-10-29T04:51:00","slug":"the-msps-guide-to-passwordless-authentication","status":"publish","type":"post","link":"https:\/\/version-2.com\/zh\/2024\/10\/the-msps-guide-to-passwordless-authentication\/","title":{"rendered":"The MSP\u2019s Guide to Passwordless Authentication"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"93286\" class=\"elementor elementor-93286\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-35fe5dd post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"35fe5dd\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;cef08c3&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-409a2e9a\" data-id=\"409a2e9a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5a8be8f elementor-widget elementor-widget-text-editor\" data-id=\"5a8be8f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<article class=\"is-type-body-default is-important\"><p>Passwords were invented to protect things; to make systems more secure.\u00a0<\/p><p>But today? That is no longer the case.\u00a0<\/p><p>Instead of a reliable defense, passwords have become one of the weakest links in cybersecurity. Managed service providers (MSPs) face this struggle more than most. They manage countless user credentials, endless reset requests, and defend against password-related breaches across their clientele.\u00a0<\/p><p>Cybercriminals are getting smarter. Their ability to exploit weak or reused passwords is a growing threat to the integrity of client systems. Luckily, passwordless authentication provides a more secure alternative to using traditional passwords. Let\u2019s explore why passwords are problematic for your business, how you can benefit from passwordless authentication, and how to implement it successfully.<\/p><h2 id=\"h-why-passwords-are-a-problem-for-msps\" class=\"wp-block-heading\"><strong>Why Passwords are a Problem for MSPs<\/strong><\/h2><p>Can you guess the most common password in the world?\u00a0<\/p><p>Your guess is probably right. According to<a href=\"https:\/\/cybernews.com\/best-password-managers\/most-common-passwords\/\"> Cybernews<\/a> it is \u201c123456\u201d. While it\u2019s almost impossible to use such a password today due to password policies, weak passwords still lead to data breaches for many users.<\/p><p>In fact, weak passwords were the reason why<a href=\"https:\/\/explodingtopics.com\/blog\/password-stats\"> 30%<\/a> of internet users have experienced data breaches. For MSPs, making sure this never happens to their client is often the part of the deal. However, cyberattacks are more sophisticated than ever, which makes traditional password-based systems inefficient and risky.\u00a0<\/p><p>Some of the key reasons why as an MSP you should start rethinking about your password strategy for your clients:<\/p><h3 id=\"h-weak-password-practices\" class=\"wp-block-heading\">Weak password practices<\/h3><p>Many users continue to use weak passwords. Despite password policies, clients often reuse passwords across multiple platforms. They also create new ones that don\u2019t meet security standards. If a system or app isn\u2019t managed, the MSP may not have any control over the matter. This leaves gaps in client security postures that open the door to brute-force attacks and credential stuffing.<\/p><h3 id=\"h-credential-theft-and-phishing-attacks\" class=\"wp-block-heading\">Credential theft and phishing attacks<\/h3><p><a href=\"https:\/\/jumpcloud.com\/blog\/phishing-attack-statistics\">57%<\/a> of organizations go through phishing attempts on a weekly or daily basis.<\/p><p>Passwords are often the primary targets for attackers. They focus on credential theft largely through phishing attacks. Therefore organizations that don\u2019t implement passwordless authentication are under higher risk of these attacks. Regardless of the amount of security training you put in place, passwords will always be a risk if they are still in the equation.<\/p><h3 id=\"h-password-related-support-ticket-overload\" class=\"wp-block-heading\">Password-related support ticket overload<\/h3><p>Managing client password resets, account lockouts, and other passwords-related tickets consumes a significant amount of an MSPs\u2019 time. This could be used for more critical tasks and strategic IT management instead.<\/p><h3 id=\"h-compliance-risks\" class=\"wp-block-heading\">Compliance risks<\/h3><p>Compliance regulations like <strong>HIPAA<\/strong>, <strong>PCI-DSS<\/strong>, <strong>GDPR<\/strong>, and <strong>SOX<\/strong> mandate stringent guidelines around password policies. Ensuring all client environments meet these requirements can be a challenge, especially when each regulation has its own set of rules. On top of that, if you have multiple clients across different industries, it becomes even more difficult.<\/p><h3 id=\"h-security-gaps-due-to-human-error\" class=\"wp-block-heading\">Security gaps due to human error<\/h3><p>To err is human. Even when password policies are in place, human error leads to security risks. End users might bypass your policies (e.g. using personal information or predictable patterns in passwords) or fall victim to phishing attacks.<\/p><p><em>Suggested reading:<\/em><a href=\"https:\/\/jumpcloud.com\/blog\/it-password-security\"><em>Best Practices for IT Password Security<\/em><\/a><\/p><h2 id=\"h-what-is-passwordless-authentication\" class=\"wp-block-heading\"><strong>What is Passwordless Authentication?<\/strong><\/h2><p><a href=\"https:\/\/jumpcloud.com\/blog\/what-is-passwordless-authentication\">Passwordless authentication<\/a> is a security method that allows users to access applications, systems, and data without the need for a traditional password. Instead of requiring password input, passwordless authentication relies on alternative, more secure methods to verify user identities. These include biometrics, hardware tokens, email or SMS-based one-time passcodes (OTPs), cryptographic keys, and Single Sign-On (SSO).<\/p><\/article>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2b28e29 elementor-widget elementor-widget-video\" data-id=\"2b28e29\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;youtube_url&quot;:&quot;https:\\\/\\\/youtu.be\\\/CwMKwOGPMDg&quot;,&quot;video_type&quot;:&quot;youtube&quot;,&quot;controls&quot;:&quot;yes&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-wrapper elementor-open-inline\">\n\t\t\t<div class=\"elementor-video\"><\/div>\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1972e6e elementor-widget elementor-widget-text-editor\" data-id=\"1972e6e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<article class=\"is-type-body-default is-important\"><figure class=\"image is-16by9\"><noscript><iframe width=\"300\" height=\"315\" src=\"https:\/\/www.youtube.com\/embed\/CwMKwOGPMDg?rel=0\" frameborder=\"0\" allow=\"accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen=\"allowfullscreen\" class=\"has-ratio\"><\/iframe><\/noscript><\/figure><p>Passwordless authentication typically relies on multi-factor authentication (MFA) principles, using something the user has (a hardware token or device) or something the user is (biometrics) instead of just something they know (passwords).<\/p><p>Common passwordless<a href=\"https:\/\/jumpcloud.com\/blog\/mfa-best-practices-webinar-recap\"> authentication methods<\/a> include:<\/p><ul><li>Biometrics (fingerprint, facial recognition, iris scanning)<\/li><li>Hardware tokens (USB security keys, smart cards)<\/li><li>Mobile authentication apps (authenticator apps, push notifications)<\/li><li>Email or SMS verification (magic links, one-time passcodes)<\/li><li>Social login (OAuth)<\/li><\/ul><h2 id=\"h-benefits-of-passwordless-authentication-for-msps\" class=\"wp-block-heading\"><strong>Benefits of Passwordless Authentication for MSPs<\/strong><\/h2><h3 id=\"h-reduced-operational-costs\" class=\"wp-block-heading\"><strong>Reduced Operational Costs<\/strong><\/h3><p>Implementing passwordless authentication substantially reduces the time spent on password management, help desk support, and password-related security administration,. This helps MSPs lower their operational costs. For example, the time spent on password resets can be converted into more productive tasks that result in an optimized budget and improved service delivery.<\/p><h3 id=\"h-improved-security-for-your-client-base-a-compelling-selling-point\" class=\"wp-block-heading\"><strong>Improved Security for Your Client Base, A Compelling Selling Point<\/strong><\/h3><p>Passwords are the weak link in your client\u2019s security chain. By removing that risk from the equation, you also eliminate the vulnerabilities associated with them. Many users still rely on easily guessed or reused passwords. Transitioning to passwordless methods like biometrics or hardware tokens minimizes the risk of credential theft and unauthorized access.\u00a0<\/p><p>As an MSP, this shift helps you better protect your clients\u2019 sensitive information from potential data breaches and cyber threats. Providing passwordless authentication capabilities like biometrics for your clients not only<a href=\"https:\/\/jumpcloud.com\/blog\/data-privacy-day\"> secures their data<\/a> but also creates a compelling selling point for clients looking for top-tier security measures.<\/p><h3 id=\"h-greater-value-for-clients-differentiating-in-the-msp-market\" class=\"wp-block-heading\"><strong>Greater Value for Clients, Differentiating in the MSP Market<\/strong><\/h3><p>Going passwordless offers MSPs the opportunity to <strong>deliver greater value to clients<\/strong>. It does thisby boosting productivity and user convenience, making it a key differentiator in the competitive MSP market. By eliminating the hassles of traditional password management, such as forgotten passwords and frequent resets, clients experience fewer disruptions and a more seamless experience.\u00a0<\/p><p>The <strong>reduction in login friction<\/strong> allows employees to focus on their work. Without the constant need for password resets or support requests, end user (and thus client) satisfaction increases. MSPs that leverage passwordless authentication stand out in the market, offering a solution that not only improves security but also adds measurable operational value for clients.<\/p><h3 id=\"h-reduced-help-desk-overhead\" class=\"wp-block-heading\"><strong>Reduced Help Desk Overhead<\/strong><\/h3><p>According to Gartner, an estimated<a href=\"https:\/\/accessitautomation.com\/how-to-save-1-5-million-a-year-per-10000-users-on-password-resets-with-access-symphony\/\"> 40%<\/a> of IT help desk tickets are password-related, e.g. requests to reset forgotten or lost passwords. Considering that the average cost of an L1 support ticket is between $8 and $18, an organization with 210,000 support tickets a year could end up spending between $672,000 and $1,512,000 only to reset user passwords!<\/p><p>This statistics paints a clear picture of how much you can save on a yearly basis only by going passwordless and eliminating the password-related IT support tickets.<\/p><h3 id=\"h-scalability-and-flexibility\" class=\"wp-block-heading\"><strong>Scalability and Flexibility<\/strong><\/h3><p>As you expand your services and client base, managing authentication across multiple and diverse environments can become increasingly complex. Passwordless solutions scale better. With them MSPs can implement and secure access across various platforms and user bases. This level of flexibility is key for accommodating the unique security needs of each client while ensuring a consistent approach.<\/p><h2 id=\"h-how-to-implement-passwordless-authentication\" class=\"wp-block-heading\"><strong>How to Implement Passwordless Authentication<\/strong><\/h2><p>Transitioning to a passwordless environment requires careful planning and execution. MSPs should consider the following steps for a smooth implementation:<\/p><h3 id=\"h-step-1-assess-client-infrastructure-and-needs\" class=\"wp-block-heading\"><strong>Step 1. Assess Client Infrastructure and Needs<\/strong><\/h3><p>Start the passwordless authentication implementation process by <strong>assessing the client\u2019s IT infrastructure<\/strong>, <strong>the applications they use<\/strong> and <strong>the security risks they face<\/strong>. Map out the different departments, stakeholders, and workflows they interact with to understand unique use cases. This clear overview helps ensure that the solution fits within the client\u2019s broader security and operational strategy.\u00a0<\/p><p>More importantly, by <strong>mapping out potential security risks<\/strong> that your client might face due to password-related issues, you can make a stronger value offer and inform them about the importance of passwordless authentication.<\/p><h3 id=\"h-step-2-choose-the-right-passwordless-authentication-method\" class=\"wp-block-heading\"><strong>Step 2. Choose The Right Passwordless Authentication Method<\/strong><\/h3><p>Once the customer use case is clearly defined, it\u2019s time to identify the<a href=\"https:\/\/jumpcloud.com\/blog\/passwordless-authentication-methods-examples\"> best passwordless methods<\/a> for them. This could mean biometrics, hardware tokens, or mobile-based authentication. Each method has its pros and cons depending on the client\u2019s infrastructure, security needs, and user preferences. For example, biometrics offer a high level of security and convenience but might require special hardware.\u00a0<\/p><p>It\u2019s also\u00a0 equally important to opt for a solution that is MSP-friendly \u2013 offering ease of deployment, cross-platform compatibility, and ongoing maintenance. This will save time for you in the long run.<\/p><h3 id=\"h-step-3-educate-clients-train-end-users\" class=\"wp-block-heading\"><strong>Step 3. Educate Clients, Train End Users<\/strong><\/h3><p>As you prepare to fully deploy your passwordless solution, it\u2019s important to educate your clients about the advantages of this technology. Inform them about how passwordless authentication boosts security, reduces the risk of phishing attacks, and increases employee productivity by eliminating the need to memorize or manage passwords.\u00a0<\/p><p>Providing a clear context will not only help clients understand the value of the transition but also fade out any concerns they might have about moving away from traditional methods.\u00a0<\/p><p>Once you educate the client, start training the users especially in early stages, to help them adjust to the new process. Making the transition smooth will encourage adoption and reduce any resistance that may come up. As a bonus, try to collect user feedback to fine-tune the process.<\/p><h2 id=\"h-jumpcloud-go-switching-to-passwordless-is-as-easy-as-1-2-3\" class=\"wp-block-heading\"><strong>JumpCloud Go\u2122: Switching to Passwordless is as Easy as 1,2,3<\/strong><\/h2><p><a href=\"https:\/\/jumpcloud.com\/\">JumpCloud<\/a> unified open directory platform makes passwordless authentication a breeze for IT admins and MSPs.<a href=\"https:\/\/jumpcloud.com\/use-cases\/passwordless-authentication\"> JumpCloud Go<\/a> is a feature within the JumpCloud platform that specifically enables passwordless authentication for users accessing JumpCloud-protected web resources.\u00a0<\/p><p><strong>JumpCloud Go<\/strong> simplifies the transition to passwordless authentication by providing an integrated platform that supports a variety of authentication methods, including biometrics and mobile-based verification. (Windows Hello or Touch ID). It streamlines user access across different devices and applications, ensuring a seamless and secure login experience<\/p><ul><li>Ensure passwordless login experience across multiple platforms<\/li><li>Minimize phishing attacks<\/li><li>Let users log in quickly and securely using their trusted devices.\u00a0<\/li><li>Manage cross-platform user authentication from a single platform<\/li><li>Streamline compliance audits by meeting regulatory requirements for a strong authentication<\/li><\/ul><\/article>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2004c86 elementor-widget elementor-widget-shortcode\" data-id=\"2004c86\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"57539\" class=\"elementor elementor-57539\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6b25dc0d elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"6b25dc0d\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3cc1b37d\" data-id=\"3cc1b37d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-52c4a230 elementor-widget elementor-widget-text-editor\" data-id=\"52c4a230\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About JumpCloud<\/strong><br \/>At JumpCloud, our mission is to build a world-class cloud directory. Not just the evolution of Active Directory to the cloud, but a reinvention of how modern IT teams get work done. The JumpCloud Directory Platform is a directory for your users, their IT resources, your fleet of devices, and the secure connections between them with full control, security, and visibility.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Passwords were invented to protect things; to make syst [&hellip;]<\/p>\n","protected":false},"author":149011790,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1016,1273,61],"tags":[1017,1272],"class_list":["post-93286","post","type-post","status-publish","format-standard","hentry","category-jumpcloud","category-1273","category-press-release","tag-jumpcloud","tag-1272"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The MSP\u2019s Guide to Passwordless Authentication - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/jumpcloud.com\/blog\/comparing-encryption-tools-linux\" \/>\n<meta property=\"og:locale\" content=\"zh_HK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The MSP\u2019s Guide to Passwordless Authentication - Version 2\" \/>\n<meta property=\"og:description\" content=\"Passwords were invented to protect things; to make syst [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/jumpcloud.com\/blog\/comparing-encryption-tools-linux\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2024-10-29T04:05:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-10-29T04:51:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/version-2.com\/wp-content\/uploads\/2020\/04\/blog-v2-logo.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"250\" \/>\n\t<meta property=\"og:image:height\" content=\"70\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"tracylamv2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u4f5c\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"tracylamv2\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u9810\u8a08\u95b1\u8b80\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"369 \u5206\u9418\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/jumpcloud.com\\\/blog\\\/comparing-encryption-tools-linux#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2024\\\/10\\\/the-msps-guide-to-passwordless-authentication\\\/\"},\"author\":{\"name\":\"tracylamv2\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\"},\"headline\":\"The MSP\u2019s Guide to Passwordless Authentication\",\"datePublished\":\"2024-10-29T04:05:58+00:00\",\"dateModified\":\"2024-10-29T04:51:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2024\\\/10\\\/the-msps-guide-to-passwordless-authentication\\\/\"},\"wordCount\":1577,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"keywords\":[\"JumpCloud\",\"2024\"],\"articleSection\":[\"JumpCloud\",\"2024\",\"Press Release\"],\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/jumpcloud.com\\\/blog\\\/comparing-encryption-tools-linux#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2024\\\/10\\\/the-msps-guide-to-passwordless-authentication\\\/\",\"url\":\"https:\\\/\\\/jumpcloud.com\\\/blog\\\/comparing-encryption-tools-linux\",\"name\":\"The MSP\u2019s Guide to Passwordless Authentication - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"datePublished\":\"2024-10-29T04:05:58+00:00\",\"dateModified\":\"2024-10-29T04:51:00+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/jumpcloud.com\\\/blog\\\/comparing-encryption-tools-linux#breadcrumb\"},\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/jumpcloud.com\\\/blog\\\/comparing-encryption-tools-linux\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/jumpcloud.com\\\/blog\\\/comparing-encryption-tools-linux#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The MSP\u2019s Guide to Passwordless Authentication\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"zh-HK\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\",\"name\":\"tracylamv2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"caption\":\"tracylamv2\"},\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/author\\\/tracylamv2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The MSP\u2019s Guide to Passwordless Authentication - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/jumpcloud.com\/blog\/comparing-encryption-tools-linux","og_locale":"zh_HK","og_type":"article","og_title":"The MSP\u2019s Guide to Passwordless Authentication - Version 2","og_description":"Passwords were invented to protect things; to make syst [&hellip;]","og_url":"https:\/\/jumpcloud.com\/blog\/comparing-encryption-tools-linux","og_site_name":"Version 2","article_published_time":"2024-10-29T04:05:58+00:00","article_modified_time":"2024-10-29T04:51:00+00:00","og_image":[{"width":250,"height":70,"url":"https:\/\/version-2.com\/wp-content\/uploads\/2020\/04\/blog-v2-logo.jpg","type":"image\/jpeg"}],"author":"tracylamv2","twitter_card":"summary_large_image","twitter_misc":{"\u4f5c\u8005":"tracylamv2","\u9810\u8a08\u95b1\u8b80\u6642\u9593":"369 \u5206\u9418"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/jumpcloud.com\/blog\/comparing-encryption-tools-linux#article","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/2024\/10\/the-msps-guide-to-passwordless-authentication\/"},"author":{"name":"tracylamv2","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365"},"headline":"The MSP\u2019s Guide to Passwordless Authentication","datePublished":"2024-10-29T04:05:58+00:00","dateModified":"2024-10-29T04:51:00+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/zh\/2024\/10\/the-msps-guide-to-passwordless-authentication\/"},"wordCount":1577,"commentCount":0,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"keywords":["JumpCloud","2024"],"articleSection":["JumpCloud","2024","Press Release"],"inLanguage":"zh-HK","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/jumpcloud.com\/blog\/comparing-encryption-tools-linux#respond"]}]},{"@type":"WebPage","@id":"https:\/\/version-2.com\/zh\/2024\/10\/the-msps-guide-to-passwordless-authentication\/","url":"https:\/\/jumpcloud.com\/blog\/comparing-encryption-tools-linux","name":"The MSP\u2019s Guide to Passwordless Authentication - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"datePublished":"2024-10-29T04:05:58+00:00","dateModified":"2024-10-29T04:51:00+00:00","breadcrumb":{"@id":"https:\/\/jumpcloud.com\/blog\/comparing-encryption-tools-linux#breadcrumb"},"inLanguage":"zh-HK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/jumpcloud.com\/blog\/comparing-encryption-tools-linux"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/jumpcloud.com\/blog\/comparing-encryption-tools-linux#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"The MSP\u2019s Guide to Passwordless Authentication"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-HK"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365","name":"tracylamv2","image":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","caption":"tracylamv2"},"url":"https:\/\/version-2.com\/zh\/author\/tracylamv2\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-ogC","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/93286","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/users\/149011790"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/comments?post=93286"}],"version-history":[{"count":3,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/93286\/revisions"}],"predecessor-version":[{"id":93329,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/93286\/revisions\/93329"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/media?parent=93286"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/categories?post=93286"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/tags?post=93286"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}