FIDO2 and WebAuthn: Ensuring Secure User Authentication
Open Source For You|September 2024
In today's digital landscape, securing online identities is more crucial than ever. Traditional passwords are no longer sufficient to protect sensitive information, which is where advanced passwordless authentication mechanisms like FIDO2 and WebAuthn come into play. These technologies offer a powerful solution for secure user authentication in a browser-based environment.
Aditya Mitra and Anisha Ghosh
FIDO2 and WebAuthn: Ensuring Secure User Authentication

IDO2, combined with WebAuthn, uses a challenge-response mechanism to authenticate users. This process involves a series of cryptographic requests and responses, ensuring that only the rightful users can access their account. Here’s a simplified look at how this works.

A user signs up on a web scanner and a security key, such as a USB device or a biometric scanner, and enters a PIN for verification. This setup process ensures that only the user can authenticate himself/herself in the future. This mechanism is not just limited to personal accounts but is also integrated into enterprise solutions. For instance, Microsoft’s cloud services, including Active Directory and Entra, utilise security keys as a secure method for users to sign in. Microsoft Entra is a cloud based identity and access management (IAM) solution for an organisation. It keeps a record of the roles and responsibilities of its members with the help of their ID known as Entra ID.

How data is managed

All information related to Entra ID is securely stored in Microsoft Graph, a platform that requires Graph API calls to perform various operations. Graph API is an HTTPbased API that apps can use to programmatically query data and perform a wide variety of other tasks. Typically, these operations are carried out through a user-friendly graphical interface. However, for developers and IT administrators, understanding the behind-the-scenes mechanics of these API calls is essential.

Accessing the Graph API

There are two primary methods to access the Graph API.

Delegated permissions: This method allows an application to access the API on behalf of the signed-in user. It’s particularly useful when the application needs to perform actions as the user.

Bu hikaye Open Source For You dergisinin September 2024 sayısından alınmıştır.

Start your 7-day Magzter GOLD free trial to access thousands of curated premium stories, and 9,000+ magazines and newspapers.

Bu hikaye Open Source For You dergisinin September 2024 sayısından alınmıştır.

Start your 7-day Magzter GOLD free trial to access thousands of curated premium stories, and 9,000+ magazines and newspapers.

OPEN SOURCE FOR YOU DERGISINDEN DAHA FAZLA HIKAYETümünü görüntüle
Linux Foundation launches LF India to foster open source innovation and support in India
Open Source For You

Linux Foundation launches LF India to foster open source innovation and support in India

The Linux Foundation, a nonprofit organisation dedicated to driving innovation through open source, has announced the launch of LF India.

time-read
1 min  |
January 2025
Red Hat launches Ansible Automation Platform Service on AWS
Open Source For You

Red Hat launches Ansible Automation Platform Service on AWS

Red Hat, Inc., has announced the general availability of the Red Hat Ansible Automation Platform Service on Amazon Web Services (AWS) as a managed offering available through AWS Marketplace.

time-read
1 min  |
January 2025
Fedora Asahi Remix 41 is now generally available
Open Source For You

Fedora Asahi Remix 41 is now generally available

The Fedora and Asahi Linux projects have announced the general availability of Fedora Asahi Remix 41, the latest version of this distribution tailored for Apple Silicon Macs.

time-read
1 min  |
January 2025
SageMath: A Second Glance at Cybersecurity
Open Source For You

SageMath: A Second Glance at Cybersecurity

The eighth article in the series on SageMath explores a classical encryption scheme called the Rail Fence cipher and introduces the concept of symmetric-key encryption.

time-read
10+ dak  |
January 2025
Building Cross-Platform Mobile Apps with lonic
Open Source For You

Building Cross-Platform Mobile Apps with lonic

Mobile apps are an intrinsic part of daily life today we use them to order food, groceries, taxis, and more. As these apps need to work across platforms, developers are focusing on cross-platform app development so that they code only once to create apps that function on multiple platforms. lonic is a framework that can help developers build apps faster than with native app development, while saving them time and money. Let’s learn how to install and deploy it.

time-read
3 dak  |
January 2025
Open Source AI Frameworks: Integrating AI with lot
Open Source For You

Open Source AI Frameworks: Integrating AI with lot

Open source Al helps loT devices learn, adapt, and automate actions based on real-time data, improving convenience and security. Here’s an overview of six key open source Al frameworks that help integrate Al with loT, and the challenges they face.

time-read
4 dak  |
January 2025
Open Source loT: A Primer for Everyone
Open Source For You

Open Source loT: A Primer for Everyone

Open source IoT platforms promise to play a central role in shaping the future, making it possible for more people and businesses to benefit from smarter, more efficient solutions. We look at a brief history of this tech and explore emerging trends.

time-read
10+ dak  |
January 2025
Using Open Source and Blockchain to Build Decentralised loT Networks
Open Source For You

Using Open Source and Blockchain to Build Decentralised loT Networks

Explore how blockchain is being integrated with loT to create decentralised networks. Find out how leading open source projects like IOTA and Streamr use blockchain to ensure data integrity, security, and privacy in loT ecosystems.

time-read
8 dak  |
January 2025
Internet of Things: Running Language Models on Edge Devices
Open Source For You

Internet of Things: Running Language Models on Edge Devices

Let’s delve into the technical aspects, challenges, and benefits of deploying language models on edge/loT devices.

time-read
8 dak  |
January 2025
How Open Source is Making Quantum Computing Accessible to Everyone
Open Source For You

How Open Source is Making Quantum Computing Accessible to Everyone

Open source initiatives are breaking down the barriers to quantum computing, making it accessible to everyone. Explore what quantum computing is, the challenges of traditional adoption, how open source platforms are democratising the technology, and how you can get started in this exciting domain.

time-read
5 dak  |
January 2025