A RetroSearch Logo

Home - News ( United States | United Kingdom | Italy | Germany ) - Football scores

Search Query:

Showing content from https://www.techtarget.com/searchsecurity/definition/passwordless-authentication below:

What is Passwordless Authentication? | Definition from TechTarget

By

Published: Dec 17, 2024

Passwordless authentication allows a user to sign into a service without using a password. This is often done using digital certificates, security tokens, one-time passwords (OTPs) or biometrics.

Passwordless authentication is generally considered more secure than using passwords. It's frequently combined with other authentication approaches, including multifactor authentication (MFA) and single sign-on to improve security and streamline the user experience.

Why passwords are becoming obsolete

Passwords have long been the standard for securing access to digital accounts and systems, but they come with many challenges.

First, strong passwords can be difficult to remember, so users often opt for simple, weak passwords such as "123456" or "password," as they're easy to recall. Additionally, with the growing number of accounts requiring passwords, users keep reusing the same simple password across multiple sites to avoid the hassle of remembering unique passwords for each account. However, reusing simple passwords makes them a prime target for security attacks, as cybercriminals often use phishing attempts, brute-force attacks, man-in-the-middle (MitM) attacks, credential stuffing and other tactics to gain unauthorized access.

Managing passwords can also be costly. Organizations incur significant costs in password management, including time and resources spent on password resets, data breaches and the resulting increase in IT support calls and lost productivity.

Inconsistent user behavior regarding passwords can also create challenges. Many users fail to follow password hygiene tips and best practices, such as regularly changing passwords or creating passphrases using a mix of different characters for different accounts. This inconsistency can lead to vulnerabilities within an organization.

How does passwordless authentication work?

Passwordless authentication proves that users are who they claim to be by demonstrating that they have something unique, such as a phone number or a certificate, or that they have the correct physical characteristics. Passwordless authentication occurs when factors other than passwords, such as those used in MFA, are used to verify identity and manage access.

Authentication factors are generally divided into the following three categories:

  1. Knowledge factors, or something you know, such as passwords, passphrases or security questions.
  2. Possession factors, or something you have, such as certificates, hardware tokens or authentication devices.
  3. Inherence factors, or something you are, such as biometrics, fingerprints or face scans.
Passwordless authentication uses possession or inherence factors to authenticate, rather than knowledge factors. Passwordless authentication methods

Common methods of passwordless authentication include the following:

What are possession factors?

Possession factors are items that a user physically owns and uses to authenticate their identity in passwordless systems. Unlike traditional methods that rely on something the user knows -- such as a password -- possession factors focus on what the user has.

One of the most common and well-tested forms of passwordless authentication possession factors is certificates or asymmetric keys. Many other forms of passwordless authentication rely on certificates to function in the background. These use cryptographically matched pairs of security keys to sign a request.

Hardware tokens, such as smart cards, secure tokens, NFC tokens and Rivest-Shamir-Adleman secure tokens are a human-friendly way to contain a certificate in a hardware device. These hardware devices handle the authentication signing process and protect the secret key from being leaked.

Time-based one-time passwords (TOTPs) involve a server and a device using a shared secret and the current time to generate a frequently changing OTP. Typically, these change every 60 seconds and are six numbers long. In the past, hardware devices with liquid-crystal display screens would show the OTP. Now, free two-factor authentication apps such as Google Authenticator or Microsoft Authenticator can be used to generate TOTPS.

A sent OTP occurs when the server sends a one-time-use password to a known contact channel by email or SMS text message. The password can be an alphanumeric code that the user types into an authentication prompt or a magic link the user clicks to authorize the device.

Notifications or prompts refer to messages the server sends asking the user of an already trusted device to confirm or authorize an action. Sometimes, the user might need to select the correct numbered prompt.

What are inherence factors?

Biometrics, such as fingerprints, face scans and voiceprints, can be measured and stored to prove that the person is authorized.

Identification documents, such as birth certificates, government IDs or passports, can authenticate a person. However, these are difficult to verify digitally. Some governments have begun issuing IDs with embedded smart cards or RFID tags.

How does one-time-use authentication work?

In a one-time-use authentication scenario, the server issues a challenge that can be accepted only if the user has the authentication factor. An OTP can be sent to a registered phone number or email address to accomplish this. After that, the user enters the OTP into the login box. In the case of a TOTP, the server verifies that the code the user enters matches the one generated by the server based on the current time. For push notifications, the server sends an alert to a smartphone app that the user must accept.

Passwordless authentication based on certificates is built on asymmetric public and private key pairs. The device generates a key pair and sends the public key to the server during provisioning. The private key is stored in a secure location, such as a Trusted Platform Module, smart card or security token. A passcode or biometric lock can be used to further secure the private key.

During authentication, the server generates a challenge, which is sent to the device. The user unlocks the private key, which is then used to sign the challenge. The server accepts the signed challenge and verifies the signature to authenticate the user. Using this method, no secrets are exchanged between the server and the client.

Examples of certificate-based passwordless authentication systems include the following:

Numerous physical characteristics are used for biometric authentication. Advantages and disadvantages of passwordless authentication

The passwordless authentication market is expected to grow significantly. Fortune Business Insights predicts it will increase from $18.82 billion in 2024 to $60.34 billion by 2032. While passwordless authentication offers significant security use cases and user experience benefits, organizations must carefully consider the potential challenges and risks associated with this approach.

Advantages of passwordless authentication

Passwordless authentication is considered much more secure than using passwords. However, there are many well-known cyberattacks against password authentication. These attacks can be done remotely without the user's knowledge. Passwordless authentication is resistant to these types of attacks and often alerts the user if something is wrong.

Passwordless authentication is resistant to the following types of attacks:

Other key benefits of passwordless authentication include the following:

Disadvantages of passwordless authentication

Passwordless authentication can also create unique challenges, including the following:

Passwordless authentication eliminates the human element, significantly reducing the risk of phishing and social engineering attacks. Explore its benefits in aiding identity security and learn how it compares to other authentication methods.

Continue Reading About What is passwordless authentication? Dig Deeper on Application and platform security

RetroSearch is an open source project built by @garambo | Open a GitHub Issue

Search and Browse the WWW like it's 1997 | Search results from DuckDuckGo

HTML: 3.2 | Encoding: UTF-8 | Version: 0.7.4