{"id":52358,"date":"2021-08-04T12:00:00","date_gmt":"2021-08-04T16:00:00","guid":{"rendered":"https:\/\/live-jc-marketing-site.pantheonsite.io\/?p=52358"},"modified":"2024-11-08T17:14:40","modified_gmt":"2024-11-08T22:14:40","slug":"are-we-there-yet-approaching-a-passwordless-future-with-fido2","status":"publish","type":"post","link":"https:\/\/jumpcloud.com\/blog\/are-we-there-yet-approaching-a-passwordless-future-with-fido2","title":{"rendered":"Are We There Yet? Approaching a Passwordless Future with FIDO2"},"content":{"rendered":"\n
You\u2019ve likely heard of the passwordless concept before, and you may have heard predictions that passwordless environments would become a reality in our near future. However, the password hasn\u2019t gone extinct quite yet \u2014 in fact, you\u2019ve probably typed in at least one today to access your resources. So, is passwordless authentication<\/a> a coming reality or an elusive pipe dream?<\/p>\n\n\n\n In this blog, we\u2019ll explore the possibility of a passwordless world, what\u2019s driving the passwordless push, barriers to its adoption, developments in technologies like FIDO2 and WebAuthn powering passwordless authentication, and business environment changes that are bringing it closer to reality. <\/p>\n\n\n\n The passwordless world isn\u2019t a new concept. The IT community has been discussing the death of the password since 2004<\/a>, when Bill Gates predicted it at an RSA Security conference. <\/p>\n\n\n\n In 2011<\/a>, IBM echoed Gates\u2019 prediction, assigning the password\u2019s extinction a five-year timeline \u2014 but, just like Y2K and the 2012 Mayan doomsday, the password\u2019s death date came and went, and we continue to type our passwords in (or forget and reset them) day in and day out. <\/p>\n\n\n\n This brings us to the question: Is passwordless authentication even possible?<\/p>\n\n\n\n In short, yes. Essentially, passwordless authentication is multi-factor authentication (MFA)<\/a> where a password isn\u2019t one of the factors. Typically, logging into a resource requires a username and password, and with MFA, it usually requires a username\/password combination plus one other authentication factor, like a time-based one-time password (TOTP)<\/a>. With a passwordless login, the password would be replaced with another MFA factor<\/a>, like a push notification<\/a>, biometric<\/a>, or security token. This way, the user could simply scan their fingerprint and tap a button on their phone \u2014 or complete another combination of simple passwordless MFA<\/a> steps \u2014 to log in securely. <\/p>\n\n\n\n But just because something is possible doesn\u2019t mean it\u2019s desirable, which brings us to our next question: Is passwordless authentication safe<\/a>? Is it something we should be working toward?<\/p>\n\n\n\n When a technology has spent decades as the reigning security solution around the world, that means hackers have spent decades perfecting techniques for compromising it. Passwords are no longer a highly secure means of protecting resources \u2014 and especially not when they stand alone, without the added layer of MFA. In fact, compromised passwords were the leading source of breaches last year<\/a>, followed closely by shared credentials and phishing attacks. <\/p>\n\n\n\n Two main weaknesses of the password are driving the need for a better security solution:<\/p>\n\n\n\n Password theft<\/a> and hacking techniques are sophisticated and rampant. <\/strong>Hackers have developed ways to compromise just about every type of password, including TOTPs. From running phishing scams to sourcing compute power to mounting brute-force attacks that can guess billions of password combinations per second<\/a>, hackers have made it near impossible to create a password that someone couldn\u2019t crack.\u00a0<\/p>\n\n\n\n Users rarely follow password best practices. <\/strong>From writing passwords down to reusing them to using passwords like \u201cpassword123,\u201d users have trouble following password best practices. While most indiscretions are not malicious, they still create targets for compromise.<\/p>\n\n\n\n Most of these malpractices come from the inefficiency of the password as an authentication factor. As businesses move to cloud and SaaS-based models, users have to remember more and more passwords \u2014 an average of over 170. Expecting users to create and remember unique, complex passwords for each resource is unrealistic, and most use fewer than 20 passwords to lock all 170+ resources.\u00a0<\/p>\n\n\n\n As bad password habits become the norm and hackers learn to spot and target vulnerable password-protected accounts, companies have started looking for more secure ways to protect their assets. When implemented correctly, passwordless authentication does just that. So, what\u2019s taking so long? Why haven\u2019t we implemented it yet?<\/p>\n\n\n\nHave Rumors of the Password\u2019s Death Been Greatly Exaggerated?<\/h2>\n\n\n\n
Is Passwordless Authentication Possible?<\/h3>\n\n\n\n
Is Passwordless Authentication Secure?<\/h3>\n\n\n\n