Passkeys: What They Are, Why We Want Them, and How to Use Them
Offered By: John Savill's Technical Training via YouTube
Course Description
Overview
Syllabus
- Introduction
- Authentication history
- Why Authenticator wasn't phishing resistant
- Need protection from social engineering
- Passkeys
- Built on PKI
- Passwordless FIDO2
- How this works
- Relying Party
- Client
- Authenticator
- Public and private keys
- Authentication flow
- Need for a user gesture and intent
- Presence and proximity
- The promise of the protocol
- Additional detail
- WebAuthn use
- Relying Party ID
- WebAuthn client checks
- Javascript and API calls
- Key benefits for protection
- Presence and CTAP
- Bluetooth use
- Cross-device authentication
- How many passkeys
- Authenticator options
- Types of passkey
- Authenticator can roam
- Where can passkeys be used
- What is different from before
- Using with Entra
- Enabling passkeys in Entra
- User passkey addition
- Using a passkey
- Using passkey on same device
- Cross-device authentication
- Microsoft accounts
- Always synced
- MSA passkey CDA demo
- Summary
- Close
Taught by
John Savill's Technical Training
Related Courses
AWS Security – Encryption FundamentalsAmazon Web Services via AWS Skill Builder Cryptography
(ISC)² via Coursera Cryptography: Learn Public Key Infrastructure from Scratch
Packt via Coursera CISO Security Controls: Network Controls
Cybrary Криптографические методы защиты информации
National Research Nuclear University MEPhI via edX