{"id":18325,"date":"2021-03-31T17:04:12","date_gmt":"2021-03-31T17:04:12","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=18325"},"modified":"2023-06-06T16:46:49","modified_gmt":"2023-06-06T16:46:49","slug":"passwordless-authentication-101","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/trends\/passwordless-authentication-101\/","title":{"rendered":"Passwordless Authentication 101"},"content":{"rendered":"<p>Although they are the most common tool used to verify a person&#8217;s identity, passwords are the least secure mode of authentication. They can be easily hacked, stolen, or otherwise compromised, which makes them a huge cybersecurity risk factor. More and more businesses are adopting passwordless authentication strategies to minimize this gaping vulnerability, so you may be wondering: what is passwordless authentication and what are the benefits?<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_68_1 ez-toc-wrap-left counter-flat ez-toc-counter ez-toc-custom ez-toc-container-direction\">\n<p class=\"ez-toc-title\">Table of Contents<\/p>\n<label for=\"ez-toc-cssicon-toggle-item-66d6da39b376e\" class=\"ez-toc-cssicon-toggle-label\"><span class=\"ez-toc-cssicon\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #ffffff;color:#ffffff\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #ffffff;color:#ffffff\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/label><input type=\"checkbox\"  id=\"ez-toc-cssicon-toggle-item-66d6da39b376e\"  aria-label=\"Toggle\" \/><nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.esecurityplanet.com\/trends\/passwordless-authentication-101\/#What-is-passwordless-authentication\" title=\"What is passwordless authentication?\">What is passwordless authentication?<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.esecurityplanet.com\/trends\/passwordless-authentication-101\/#Benefits-of-passwordless-authentication\" title=\"Benefits of passwordless authentication\">Benefits of passwordless authentication<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.esecurityplanet.com\/trends\/passwordless-authentication-101\/#Examples-of-passwordless-authentication\" title=\"Examples of passwordless authentication\">Examples of passwordless authentication<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.esecurityplanet.com\/trends\/passwordless-authentication-101\/#Biometric-authentication\" title=\"Biometric authentication\">Biometric authentication<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.esecurityplanet.com\/trends\/passwordless-authentication-101\/#Single-sign-on\" title=\"Single sign-on\">Single sign-on<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/www.esecurityplanet.com\/trends\/passwordless-authentication-101\/#Email-based-authentication\" title=\"Email-based authentication\">Email-based authentication<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/www.esecurityplanet.com\/trends\/passwordless-authentication-101\/#Identity-access-management-IAM-software\" title=\"Identity access management (IAM) software\">Identity access management (IAM) software<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/www.esecurityplanet.com\/trends\/passwordless-authentication-101\/#Making-the-switch-to-passwordless-authentication\" title=\"Making the switch to passwordless authentication\">Making the switch to passwordless authentication<\/a><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"What-is-passwordless-authentication\"><\/span>What is passwordless authentication?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>The difference between password and passwordless authentication methods stems from the core types of information used in the login process. Password authentication is based on knowledge; a user must provide something they <em>know<\/em> such as an email address, traditional password, or a personal identification number (PIN).<\/p>\n<p>Passwordless authentication, on the other hand, is derived from different types of information the user <em>has<\/em>. The first type is inherence. With these factors, a user&#8217;s identity is verified by their biometric data, such as fingerprints, retinal scans, or voice recognition. These authentication methods are exceptionally difficult to hack or replicate because of how unique they are to the individual user.<\/p>\n<p>Passwordless authentication can also be done via information the user possesses. This could be an email verification link, a physical security card, an authentication app, or a <a href=\"https:\/\/www.webopedia.com\/definitions\/one-time-password-definition-meaning\/\">one-time password<\/a>. Possession factors are also significantly more secure than passwords because they require a user to access a separate device or application in real time.<\/p>\n<p>In either case, the passwordless authentication process requires a pair of cryptographic keys: one that&#8217;s private and one that&#8217;s public. The private key is unique to the individual user, and since it&#8217;s not a traditional password, it&#8217;s much more difficult for a hacker to intercept. The public key is hosted on the application or system the user is trying to access with the private key. Access is only granted if the public and private key match, so the public key is useless without its private counterpart.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Benefits-of-passwordless-authentication\"><\/span>Benefits of passwordless authentication<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>In addition to improved security, passwordless authentication offers a number of benefits.<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li aria-level=\"1\"><strong>Better IT visibility:<\/strong> Passwordless authentication eliminates the variability of an individual user&#8217;s password health, so you can maintain a tighter grip on your organization&#8217;s security landscape.<\/li>\n<li aria-level=\"1\"><strong>Simpler user experience:<\/strong> When users can log in using an inherence or possession factor, they won&#8217;t waste time or become frustrated trying to remember, update, or reset their passwords. This makes the login process much simpler, so employees can get to work immediately.<\/li>\n<li aria-level=\"1\"><strong>Cost savings:<\/strong> Passwordless authentication saves money on helpdesk resources as well as the cost of monitoring and maintaining passwords for your users. Furthermore, you&#8217;ll be able to avoid phishing and credential stuffing attacks, which could result in a costly data breach.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h2><span class=\"ez-toc-section\" id=\"Examples-of-passwordless-authentication\"><\/span>Examples of passwordless authentication<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Passwordless authentication comes in a wide range of implementations. Some require specialized hardware and others may take the form of software that integrates with your existing systems.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Biometric-authentication\"><\/span>Biometric authentication<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>As mentioned above, biometric authentication involves a user&#8217;s specific biological property, like their iris, <a href=\"https:\/\/www.esecurityplanet.com\/products\/facial-recognition-software\/\">face<\/a>, fingerprint, or voice. Usually this method involves a piece of specialized hardware that has biometric recognition capabilities and can connect to a computer to grant access.<\/p>\n<p>This solves the problem of forgotten or reused passwords, thereby reducing the volume of password reset support tickets you&#8217;ll need to address. Biometric data is also much more difficult to hack or fake, so you can rest assured that an authenticated user is who they say they are.<\/p>\n<p>Prominent biometric authentication technology vendors include:<\/p>\n<ul>\n<li aria-level=\"1\"><a href=\"https:\/\/www.hidglobal.com\/\">HID<\/a><\/li>\n<li aria-level=\"1\"><a href=\"https:\/\/www.jumio.com\/\">Jumio<\/a><\/li>\n<li aria-level=\"1\"><a href=\"https:\/\/www.daon.com\/\">Daon<\/a><\/li>\n<\/ul>\n<h3><span class=\"ez-toc-section\" id=\"Single-sign-on\"><\/span>Single sign-on<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Although some <a href=\"https:\/\/www.esecurityplanet.com\/products\/single-sign-on-solutions\/\">single sign-on (SSO) solutions<\/a> still require a password, they effectively eliminate all other passwords a user needs. SSO provides a centralized platform for a user to access a large number of applications and systems without needing to use separate login credentials for each one. They&#8217;re usually deployed on-premises, but many vendors offer a SaaS option that you can integrate with your existing security software.<\/p>\n<p>A full-service SSO tool also includes a desktop multi-factor authentication (MFA) application so users can have a true passwordless experience. Plus, most solutions offer a backend dashboard through which you can monitor your users&#8217; access and activity across the board.<\/p>\n<p>One of these single sign-on vendors might be the right fit for you:<\/p>\n<ul>\n<li aria-level=\"1\"><a href=\"https:\/\/www.lastpass.com\/products\/enterprise-password-management-and-sso\">LastPass Enterprise<\/a><\/li>\n<li aria-level=\"1\"><a href=\"https:\/\/duo.com\/\">Duo<\/a><\/li>\n<li aria-level=\"1\"><a href=\"https:\/\/www.hypr.com\/passwordless-single-sign-on-saml\/\">Hypr<\/a><\/li>\n<\/ul>\n<h3><span class=\"ez-toc-section\" id=\"Email-based-authentication\"><\/span>Email-based authentication<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Email-based authentication takes the guesswork out of the login process for users who are already logged into their corporate email account. This method works similarly to an SSO platform, but users don&#8217;t need to log in to a separate account for the sole purpose of accessing the right systems. Instead, users select &#8220;Log in with X&#8221; at the sign-in page for the integrated application and receive an email notification with a link to finish the login process.<\/p>\n<p>Email-based authentication is somewhat more complex because it requires some development expertise, but it&#8217;s a suitable solution for smaller organizations that don&#8217;t have as many business platforms to manage. It&#8217;s also ideal for employees that don&#8217;t have a smartphone, since some other authentication methods require a user to access a mobile application to complete the process.<\/p>\n<p>Consider one of these email authentication tools:<\/p>\n<ul>\n<li aria-level=\"1\"><a href=\"https:\/\/swoopnow.com\/\">Swoop<\/a><\/li>\n<li aria-level=\"1\"><a href=\"https:\/\/fusionauth.io\/\">FusionAuth<\/a><\/li>\n<li aria-level=\"1\"><a href=\"https:\/\/magic.link\/\">Magic<\/a><\/li>\n<\/ul>\n<h3><span class=\"ez-toc-section\" id=\"Identity-access-management-IAM-software\"><\/span>Identity access management (IAM) software<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><a href=\"https:\/\/www.esecurityplanet.com\/products\/best-iam-software\/\">Identity access management (IAM) software<\/a> is a broader category of security management tools that control which users have access to specific applications. These are ideal for admins at large organizations who want to set specific roles and privileges for individual users and keep track of <em>how<\/em> each person is using their access.<\/p>\n<p>For most IAM products, passwordless authentication plays an integral role in maintaining a secure environment to closely monitor each user&#8217;s access and privileges. By removing passwords from the equation, you can create a strong barrier around your organization&#8217;s applications and systems. This means only the right people will be able to access the right information and resources.<\/p>\n<p>Top IAM software solutions include:<\/p>\n<ul>\n<li aria-level=\"1\"><a href=\"https:\/\/www.onelogin.com\/\">OneLogin<\/a><\/li>\n<li aria-level=\"1\"><a href=\"https:\/\/www.pingidentity.com\/en.html\">Ping Identity<\/a><\/li>\n<li aria-level=\"1\"><a href=\"https:\/\/www.okta.com\/\">Okta<\/a><\/li>\n<\/ul>\n<p><em><strong>Related<\/strong>: <\/em><a href=\"https:\/\/www.esecurityplanet.com\/applications\/what-is-a-passkey\/\">What Is a Passkey? The Future of Passwordless <\/a><\/p>\n<h2><span class=\"ez-toc-section\" id=\"Making-the-switch-to-passwordless-authentication\"><\/span>Making the switch to passwordless authentication<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>While it&#8217;s unlikely that you&#8217;ll be able to eliminate passwords from your corporate environment completely, reducing the number of password-based authentication instances in favor of passwordless methods will have a tremendous benefit for your cybersecurity posture. You&#8217;ll be able to increase IT visibility, improve user experience, and reduce total costs involved with maintaining user credentials.<\/p>\n<p>Whether you choose to implement an advanced solution with specialized hardware or a simpler software solution, an ecosystem with fewer passwords is one with fewer opportunities for a successful malicious attack.<\/p>\n\n\n<div id=\"ta-campaign-widget-66d6da39af8dd-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6da39af8dd\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6da39af8dd\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6da39af8dd\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6da39af8dd\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6da39af8dd\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6da39af8dd\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Although they are the most common tool used to verify a person&#8217;s identity, passwords are the least secure mode of authentication. They can be easily hacked, stolen, or otherwise compromised, which makes them a huge cybersecurity risk factor. More and more businesses are adopting passwordless authentication strategies to minimize this gaping vulnerability, so you may [&hellip;]<\/p>\n","protected":false},"author":159,"featured_media":18326,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[16],"tags":[],"b2b_audience":[33],"b2b_industry":[],"b2b_product":[244],"class_list":["post-18325","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trends","b2b_audience-awareness-and-consideration","b2b_product-it-management-best-practices"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Passwordless Authentication 101 | eSecurity Planet<\/title>\n<meta name=\"description\" content=\"Passwordless authentication addresses the largest security vulnerability of all: passwords. Learn more about the benefits of passwordless authentication.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/trends\/passwordless-authentication-101\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Passwordless Authentication 101 | eSecurity Planet\" \/>\n<meta property=\"og:description\" content=\"Passwordless authentication addresses the largest security vulnerability of all: passwords. Learn more about the benefits of passwordless authentication.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/trends\/passwordless-authentication-101\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2021-03-31T17:04:12+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-06-06T16:46:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/03\/pexels-andrea-piacquadio-3766227-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1707\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kaiti Norton\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kaiti Norton\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/passwordless-authentication-101\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/passwordless-authentication-101\/\"},\"author\":{\"name\":\"Kaiti Norton\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/a9bab2a98d99b2e5fd48b6406aef738f\"},\"headline\":\"Passwordless Authentication 101\",\"datePublished\":\"2021-03-31T17:04:12+00:00\",\"dateModified\":\"2023-06-06T16:46:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/passwordless-authentication-101\/\"},\"wordCount\":1092,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/passwordless-authentication-101\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/03\/pexels-andrea-piacquadio-3766227-scaled.jpg\",\"articleSection\":[\"Trends\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/passwordless-authentication-101\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/trends\/passwordless-authentication-101\/\",\"name\":\"Passwordless Authentication 101 | eSecurity Planet\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/passwordless-authentication-101\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/passwordless-authentication-101\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/03\/pexels-andrea-piacquadio-3766227-scaled.jpg\",\"datePublished\":\"2021-03-31T17:04:12+00:00\",\"dateModified\":\"2023-06-06T16:46:49+00:00\",\"description\":\"Passwordless authentication addresses the largest security vulnerability of all: passwords. Learn more about the benefits of passwordless authentication.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/passwordless-authentication-101\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/trends\/passwordless-authentication-101\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/passwordless-authentication-101\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/03\/pexels-andrea-piacquadio-3766227-scaled.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/03\/pexels-andrea-piacquadio-3766227-scaled.jpg\",\"width\":2560,\"height\":1707,\"caption\":\"Picture of a woman working on a laptop in a cafe.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/passwordless-authentication-101\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Passwordless Authentication 101\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/a9bab2a98d99b2e5fd48b6406aef738f\",\"name\":\"Kaiti Norton\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/526eeed355a7228b28b9476b0ea40851?s=96&d=blank&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/526eeed355a7228b28b9476b0ea40851?s=96&d=blank&r=g\",\"caption\":\"Kaiti Norton\"},\"description\":\"Kaiti Norton is a Nashville-based Content Writer for eSecurity Planet, Webopedia, and Small Business Computing. She is passionate about helping brands build genuine connections with their customers through relatable, research-based content.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/kaiti-norton\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Passwordless Authentication 101 | eSecurity Planet","description":"Passwordless authentication addresses the largest security vulnerability of all: passwords. Learn more about the benefits of passwordless authentication.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/trends\/passwordless-authentication-101\/","og_locale":"en_US","og_type":"article","og_title":"Passwordless Authentication 101 | eSecurity Planet","og_description":"Passwordless authentication addresses the largest security vulnerability of all: passwords. Learn more about the benefits of passwordless authentication.","og_url":"https:\/\/www.esecurityplanet.com\/trends\/passwordless-authentication-101\/","og_site_name":"eSecurity Planet","article_published_time":"2021-03-31T17:04:12+00:00","article_modified_time":"2023-06-06T16:46:49+00:00","og_image":[{"width":2560,"height":1707,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/03\/pexels-andrea-piacquadio-3766227-scaled.jpg","type":"image\/jpeg"}],"author":"Kaiti Norton","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Kaiti Norton","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/trends\/passwordless-authentication-101\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/passwordless-authentication-101\/"},"author":{"name":"Kaiti Norton","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/a9bab2a98d99b2e5fd48b6406aef738f"},"headline":"Passwordless Authentication 101","datePublished":"2021-03-31T17:04:12+00:00","dateModified":"2023-06-06T16:46:49+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/passwordless-authentication-101\/"},"wordCount":1092,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/passwordless-authentication-101\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/03\/pexels-andrea-piacquadio-3766227-scaled.jpg","articleSection":["Trends"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/trends\/passwordless-authentication-101\/","url":"https:\/\/www.esecurityplanet.com\/trends\/passwordless-authentication-101\/","name":"Passwordless Authentication 101 | eSecurity Planet","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/passwordless-authentication-101\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/passwordless-authentication-101\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/03\/pexels-andrea-piacquadio-3766227-scaled.jpg","datePublished":"2021-03-31T17:04:12+00:00","dateModified":"2023-06-06T16:46:49+00:00","description":"Passwordless authentication addresses the largest security vulnerability of all: passwords. Learn more about the benefits of passwordless authentication.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/passwordless-authentication-101\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/trends\/passwordless-authentication-101\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/trends\/passwordless-authentication-101\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/03\/pexels-andrea-piacquadio-3766227-scaled.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/03\/pexels-andrea-piacquadio-3766227-scaled.jpg","width":2560,"height":1707,"caption":"Picture of a woman working on a laptop in a cafe."},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/trends\/passwordless-authentication-101\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"Passwordless Authentication 101"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/a9bab2a98d99b2e5fd48b6406aef738f","name":"Kaiti Norton","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/526eeed355a7228b28b9476b0ea40851?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/526eeed355a7228b28b9476b0ea40851?s=96&d=blank&r=g","caption":"Kaiti Norton"},"description":"Kaiti Norton is a Nashville-based Content Writer for eSecurity Planet, Webopedia, and Small Business Computing. She is passionate about helping brands build genuine connections with their customers through relatable, research-based content.","url":"https:\/\/www.esecurityplanet.com\/author\/kaiti-norton\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/18325"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/159"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=18325"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/18325\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/18326"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=18325"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=18325"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=18325"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=18325"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=18325"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=18325"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}