Prøve GULL - Gratis
FIDO2 and WebAuthn: Ensuring Secure User Authentication
Open Source For You
|September 2024
In today's digital landscape, securing online identities is more crucial than ever. Traditional passwords are no longer sufficient to protect sensitive information, which is where advanced passwordless authentication mechanisms like FIDO2 and WebAuthn come into play. These technologies offer a powerful solution for secure user authentication in a browser-based environment.
IDO2, combined with WebAuthn, uses a challenge-response mechanism to authenticate users. This process involves a series of cryptographic requests and responses, ensuring that only the rightful users can access their account. Here’s a simplified look at how this works.
A user signs up on a web scanner and a security key, such as a USB device or a biometric scanner, and enters a PIN for verification. This setup process ensures that only the user can authenticate himself/herself in the future. This mechanism is not just limited to personal accounts but is also integrated into enterprise solutions. For instance, Microsoft’s cloud services, including Active Directory and Entra, utilise security keys as a secure method for users to sign in. Microsoft Entra is a cloud based identity and access management (IAM) solution for an organisation. It keeps a record of the roles and responsibilities of its members with the help of their ID known as Entra ID.
How data is managed
All information related to Entra ID is securely stored in Microsoft Graph, a platform that requires Graph API calls to perform various operations. Graph API is an HTTPbased API that apps can use to programmatically query data and perform a wide variety of other tasks. Typically, these operations are carried out through a user-friendly graphical interface. However, for developers and IT administrators, understanding the behind-the-scenes mechanics of these API calls is essential.
Accessing the Graph API There are two primary methods to access the Graph API.
Delegated permissions: This method allows an application to access the API on behalf of the signed-in user. It’s particularly useful when the application needs to perform actions as the user.
Denne historien er fra September 2024-utgaven av Open Source For You.
Abonner på Magzter GOLD for å få tilgang til tusenvis av kuraterte premiumhistorier og over 9000 magasiner og aviser.
Allerede abonnent? Logg på
FLERE HISTORIER FRA Open Source For You
Open Source For You
Sending IoT Sensor Data to Public or Private Servers
This IoT system shows a simple and effective way to send sensor data using an ESP8266 microchip.
3 mins
March 2026
Open Source For You
Popular FOSS Tools for LLM Observability, Monitoring and Evaluation
This overview of popular tools for monitoring large language models also sheds light on how LLM-as-a-judge enhances their performance.
2 mins
March 2026
Open Source For You
Data Deduplication Done the Right Way
Deduplication helps to save space on Linux-based storage systems. Choose the right platform and check whether it meets your goals.
6 mins
March 2026
Open Source For You
The Relevance of Rubber Duck Debugging in the Age of AI
Discover why rubber duck debugging is a powerful process today. There's also a step-by-step guide on how to use it in the age of artificial intelligence.
4 mins
March 2026
Open Source For You
GitHub weighs turning off pull requests as AĬ slop floods projects
GitHub has formally acknowledged that AI-generated 'slop' is overwhelming open source projects, forcing maintainers to sift through poor pull requests (PRS), abandoned submissions and guideline violations - and is now considering restricting or even disabling pull requests, the core mechanism of open collaboration.
1 min
March 2026
Open Source For You
Global banks are deploying Ethereum's Layer-2 stack
Banks are standardising on Ethereum's open source stack as production financial infrastructure, shifting from experimental pilots and proprietary blockchains to live Layer-2 networks for tokenised deposits, interbank payments, and cross-border settlement.
1 min
March 2026
Open Source For You
OpenClaw's creator joins OpenAl
In a move that reinforces its commitment to open development rather than acquisition, OpenAI has brought Peter Steinberger, founder of OpenClaw, into the company while placing the popular AI agent under a foundation structure to ensure it remains open source.
1 min
March 2026
Open Source For You
LibreOffice 26.2 comes with native Markdown support
LibreOffice 26.2 has been released by The Document Foundation, strengthening its position as a fully free and open source office suite for Windows, macOS, and Linux, with support for more than 120 languages.
1 min
March 2026
Open Source For You
Indian government mandates labelling of Al-generated content and quicker deletion of illegal deepfakes
India has introduced sweeping AI content rules that immediately place pressure on social platforms and open source AI ecosystems to label, trace and rapidly remove AI Open ource synthetic media at scale.
1 min
March 2026
Open Source For You
I2C and I3C: How Modern Devices Communicate
I3C and I2C are both two-wire communication protocols that help exchange data between multiple devices. While I3C preserves the simplicity of I2C, it introduces new features suited for today's sensor-rich devices.
8 mins
March 2026
Listen
Translate
Change font size
