Passkeys: What They Are, Why We Want Them, and How to Use Them
Offered By: John Savill's Technical Training via YouTube
Course Description
Overview
Syllabus
- Introduction
- Authentication history
- Why Authenticator wasn't phishing resistant
- Need protection from social engineering
- Passkeys
- Built on PKI
- Passwordless FIDO2
- How this works
- Relying Party
- Client
- Authenticator
- Public and private keys
- Authentication flow
- Need for a user gesture and intent
- Presence and proximity
- The promise of the protocol
- Additional detail
- WebAuthn use
- Relying Party ID
- WebAuthn client checks
- Javascript and API calls
- Key benefits for protection
- Presence and CTAP
- Bluetooth use
- Cross-device authentication
- How many passkeys
- Authenticator options
- Types of passkey
- Authenticator can roam
- Where can passkeys be used
- What is different from before
- Using with Entra
- Enabling passkeys in Entra
- User passkey addition
- Using a passkey
- Using passkey on same device
- Cross-device authentication
- Microsoft accounts
- Always synced
- MSA passkey CDA demo
- Summary
- Close
Taught by
John Savill's Technical Training
Related Courses
SC-300: Implement an Authentication and Access Management solutionMicrosoft via Microsoft Learn Navigating Passwordless Authentication with FIDO2 & WebAuthn
Security BSides San Francisco via YouTube How FIDO2 and WebAuthn Stop Account Takeovers
RSA Conference via YouTube Securing Online Identities with Simple, Secure, Open Standards
Security BSides San Francisco via YouTube WebAuthn - How to FIDO
RSA Conference via YouTube