Gift Egwuenu

Going Beyond Passwords: The Future of User Authentication

The future of authentication is passwordless. Learn to implement phishing-resistant login flows using passkeys, biometrics, and SSO.

Going Beyond Passwords: The Future of User Authentication
#1about 3 minutes

The inherent weaknesses and risks of traditional passwords

Traditional passwords are no longer secure due to common user mistakes, frequent data breaches, and sophisticated cyber attacks.

#2about 5 minutes

Best practices for creating and managing secure passwords

Following guidelines like using character combinations, avoiding personal information, and using password managers can significantly improve account security.

#3about 4 minutes

How passwordless authentication with magic links works

Passwordless authentication replaces traditional passwords with methods like magic links or one-time codes sent via email for a more secure login experience.

#4about 5 minutes

Securing accounts with multi-factor authentication layers

Multi-factor authentication adds a crucial security layer by requiring a second verification factor, such as an OTP, SMS code, or a physical security key.

#5about 2 minutes

Understanding the next generation of authentication with passkeys

Passkeys offer a phishing-resistant alternative to passwords by using device-based biometrics like fingerprints or face ID to create secure cryptographic keys.

#6about 5 minutes

How single sign-on simplifies access across applications

Single sign-on (SSO) uses a central identity provider to authenticate a user once, granting them access to multiple applications without separate logins.

#7about 2 minutes

A practical guide to adopting modern authentication methods

Successfully transitioning to modern authentication requires conducting a security assessment, choosing the right methods for your use case, and educating users.

#8about 2 minutes

Addressing SSO risks and account recovery options

The Q&A covers the security of a central SSO provider and the recovery mechanisms available when a user loses access to their phone for SMS-based authentication.

Related jobs
Jobs that call for the skills explored in this talk.

job ad

Saby Company
Delebio, Italy

Intermediate

d

Saby Company
Delebio, Italy

Junior

Featured Partners

Related Articles

View all articles
CH
Chris Heilmann
The top 200 passwords of 2024 can be cracked in less than a second
Passwords are a pain and with biometric logins, passkeys and other two factor authentication methods should be a thing of the past. In reality, though, a lot of systems still use username and password as the only security measure and users choose al...
The top 200 passwords of 2024 can be cracked in less than a second
CH
Chris Heilmann
Dev Digest 138 - Are you secure about this?
Hello there! This is the 2nd "out of the can" edition of 3 as I am on vacation in Greece eating lovely things on the beach. So, fewer news, but lots of great resources. Many around the topic of security. Enjoy! News and ArticlesGoogle Pixel phones t...
Dev Digest 138 - Are you secure about this?
CH
Chris Heilmann
Dev Digest 116 - WWWAI?
This time, learn how to un-AI Google's search results, what's new on the web, avoid a new security hole and go back to BASICS with us. News and ArticlesWhat a week. Google, Microsoft, OpenAI and many others had their big flagship events announcing th...
Dev Digest 116 - WWWAI?

From learning to earning

Jobs that call for the skills explored in this talk.