SlideShare a Scribd company logo
1 of 50
Passwords are passé.
WebAuthn is simpler, stronger and
ready to go
Michael Furman
Security Architect
What will we see today?
• What’s wrong with passwords?
• What is 2FA?
• Why is 2FA better?
• WebAuthn drilldown
• WebAuthn benefits
• What is my next step?
About Me
• 20+ years in software engineering
• 10+ years in application security
• 4+ years Lead Security Architect at Tufin
• www.linkedin.com/in/furmanmichael/
• ultimatesecpro@gmail.com
• Read my blog https://ultimatesecurity.pro/
• Follow me on twitter @ultimatesecpro
• I like to travel, read books and listen to music.
About Tufin
• Market Leader in Security Policy Orchestration for
firewalls and cloud
– New Tufin products integrate security into DevOps
pipeline
• Established in 2005
• Used in over 2,000 enterprises, including 40
Fortune 100 companies
• We are constantly growing!
www.tufin.com/careers/
What’s wrong with passwords?
• Subject to brute force attacks
• Can be stolen via phishing attacks
What is a brute force attack?
“A brute-force attack is an attempt to discover a
password by systematically trying every possible
combination of letters, numbers, and symbols
until you discover the one correct combination
that works.”
https://www.owasp.org/index.php/Blocking_Brute_Force_Attacks
How to prevent a brute force attack?
• Enforce brute force protection
– Lock user after subsequent login failures
• Enforce complex passwords
– Passphrases
Complex passwords. Really?
• Do users really use complex passwords?
• List of common passwords
https://en.wikipedia.org/wiki/List_of_the_most_common_passwords
– First place: ‘123456’
– Second place: ‘password’
How to enforce complex passwords?
• Password policies
• What is a password policy?
A Password Policy is the set of restrictions
and/or requirements that a user must follow
to ensure that their password is strong.
Sample password policy
• Minimum 12 characters
• Must include:
– uppercase letters
– lowercase letters
– digits
– non-alphanumeric (special) characters
• Must be different from username
Sample password policy
• Change every 60 days
• Password cannot be reused
• Prevent incremental changes
(e.g. Passw0rd, Passw1rd, Passw2rd)
My “favorite” password policy
Do password policies work?
• Technically? Yes. But ...
• Frustrates users
• Users evade policies
– Write the passwords down
– Forget the replaced password
• Potentially increase administrative costs
What is a phishing attack?
• Phishing is a type of social engineering attack
often used to steal user data, including login
credentials and credit card numbers.
• It occurs when an attacker, masquerading as a
trusted entity, dupes a victim into opening an
email, instant message, or text message.
https://www.incapsula.com/web-application-
security/phishing-attack-scam.html
Can I prevent phishing attacks?
• Complex
• Multi-million$ industry of its own
• E.g. https://www.owasp.org/index.php/Phishing
Best password advice
• Passwords are like underwear
Picture is from https://it.ie/keep-passwords-secure/
What is Two-Factor Authentication?
Two-factor authentication (2FA) is a method of
confirming a user's claimed identity by utilizing a
combination of two different factors:
1. Something they know
2. Something they have or something they are
https://en.wikipedia.org/wiki/Two-step_verification
Why 2FA is more secure?
• The attacker should not know the 2nd factor!
• Weaker passwords are still crackable,
but who cares!
Types of 2FA
• Text Message (SMS)
• OTP
• WebAuthn
2FA using Text Messages (SMS)
• SMS contains authentication code
Is 2FA using SMS secure?
• “NIST is no longer recommending Two-Factor
authentication using SMS”
Bruce Schneier blog (2016)
https://www.schneier.com/blog/archives/2016/08/nist_is_no_long.html
NIST stands for National Institute of Standards and Technology
• SMS can be intercepted
Signaling System No. 7 (SS7) protocols vulnerability
2FA using one-time password (OTP)
• Authentication using OTP generated by:
– Mobile device applications
• Google Authenticator
• FreeOTP
– Dedicated device
• RSA SecurID
Picture is from https://en.wikipedia.org/wiki/RSA_SecurID
2FA using OTP Mobile device:
Registration
• Scan QR code (shared secret) provided by
server on mobile device
2FA using OTP Mobile device:
Authentication
• Provide OTP generated by mobile device to
server to complete authentication
Is 2FA using OTP secure?
• No currently known vulnerabilities
• Possible attack vector:
– OTP relies on a shared secret key (QR code)
– An attacker may gain access to these keys
– High complexity
2FA Migration from SMS to OTP
• Instagram
https://techcrunch.com/2018/07/17/instagram-2-factor/
• Facebook
https://www.theverge.com/2018/5/23/17385654/facebook-
two-factor-authentication-process-app-phone-number
Ideal 2FA?
• Biometric scan
– Fingerprint
– Retina
Fingerprint Scan Example
Picture is from the “Back to the Future Part II” movie
Retina Scan Example
Picture is from the “Despicable Me” movie
Is biometric scan secure?
Picture is from the “Demolition Man” movie
What is WebAuthn?
• WebAuthn (Web Authentication)
– standard web API (Credential Management API)
– is incorporated into browsers
– allows very secure 2FA
– based on the FIDO specification
https://www.w3.org/TR/webauthn/
What is FIDO?
• FIDO = Fast Identity Online
• FIDO Alliance started from a conversation in 2009
– Ramesh Kesanupalli (CTO of Validity Sensors) asked Michael
Barrett (PayPal’s CISO) if he was interested in fingerprint-
enabling paypal.com
– Michael replied that he was, but only if it could be achieved via
open standards
• FIDO Alliance launched in 2013 with six member companies
– over 250 members worldwide today
https://fidoalliance.org/about/history/
How WebAuthn Works
• Registration
• Authentication
WebAuthn Components
Diagram is from https://developer.mozilla.org/en-US/docs/Web/API/Web_Authentication_API
WebAuthn Components
• Server (Relying Party) - server side component
of application uses WebAuthn to register and
authenticate users
• JavaScript Application - client side component
of application uses WebAuthn to register and
authenticate users
WebAuthn Components
• Browser – a WebAuthn-compatible browser
• Authenticator – creates and stores credentials
– embedded into an operating system
– USB or Bluetooth Security Key
Demo
WebAuthn Registration
Diagram is from https://developer.mozilla.org/en-US/docs/Web/API/Web_Authentication_API
WebAuthn Registration
• Step 0: Application requests registration
• Step 1: Server sends challenge, user Info, and
Relying Party info
WebAuthn Registration
• Step 2: Browser calls
authenticatorMakeCredential() on
Authenticator
• Step 3: Authenticator creates new PKI Key
Pair and attestation
• Step 4: Authenticator returns Public Key and
other data to browser
WebAuthn Registration
• Step 5: Browser creates final data (including
Public Key) and JavaScript application sends
response to server
• Step 6: Server validates and finalizes
registration
– store the new Public Key associated with the
user's account for future use
WebAuthn Authentication
Diagram is from https://developer.mozilla.org/en-US/docs/Web/API/Web_Authentication_API
WebAuthn Authentication
• Authentication flow similar to registration
flow
• Primary differences:
– authentication doesn't require user or relying
party information
– authentication creates an assertion using
previously generated key pair
WebAuthn Authentication
• Step 0: Application requests authentication
• Step 1: Server sends challenge
• Step 2: Browser calls
authenticatorGetCredential() on Authenticator
• Step 3: Authenticator creates an assertion
• Step 4: Authenticator returns data to browser
WebAuthn Authentication
• Step 5: Browser creates final data (including
Public Key) and JavaScript application sends
response to server
• Step 6: Server validates and finalizes
authentication
Demo
WebAuthn Benefits
• Fingerprint or facial biometrics authenticators
• Based on PKI
• User credentials and biometric templates:
– never leave the user’s device
– never stored on backend servers
Very secure 2FA
WebAuthn Adoption
• Google Chrome version 67
• Mozilla Firefox version 60
• Microsoft Edge build 17723
• Use services that adopted WebAuthn
https://www.yubico.com/setup/#security-key
• Google employees use Titan Security Keys
https://thehackernews.com/2018/07/google-titan-
security-key-fido.html
What is my next step?
• Implement it yourself
https://developers.google.com/web/updates/2018/05/webauthn
https://hacks.mozilla.org/2018/01/using-hardware-token-based-2fa-with-
the-webauthn-api/
https://www.yubico.com/why-yubico/for-developers/
• Wait for someone else to do it for you!
e.g. Keycloak
https://ultimatesecurity.pro/post/oidc-presentation/
Summary
• Bad 2FA is better than no 2FA
• WebAuthn is a better, more secure 2FA
• Prepare for WebAuthn
Thank you!
• Contact me
– www.linkedin.com/in/furmanmichael/
– ultimatesecpro@gmail.com
– https://ultimatesecurity.pro/
– @ultimatesecpro

More Related Content

What's hot

WebAuthn and Security Keys
WebAuthn and Security KeysWebAuthn and Security Keys
WebAuthn and Security KeysFIDO Alliance
 
FIDO Workshop-Demo Breakdown.pptx
FIDO Workshop-Demo Breakdown.pptxFIDO Workshop-Demo Breakdown.pptx
FIDO Workshop-Demo Breakdown.pptxFIDO Alliance
 
FIDO2 Specifications Overview
FIDO2 Specifications OverviewFIDO2 Specifications Overview
FIDO2 Specifications OverviewFIDO Alliance
 
Getting Started With WebAuthn
Getting Started With WebAuthnGetting Started With WebAuthn
Getting Started With WebAuthnFIDO Alliance
 
Multifactor Authentication
Multifactor AuthenticationMultifactor Authentication
Multifactor AuthenticationRonnie Isherwood
 
Web Authentication API
Web Authentication APIWeb Authentication API
Web Authentication APIFIDO Alliance
 
Google & FIDO Authentication
Google & FIDO AuthenticationGoogle & FIDO Authentication
Google & FIDO AuthenticationFIDO Alliance
 
Fido Technical Overview
Fido Technical OverviewFido Technical Overview
Fido Technical OverviewFIDO Alliance
 
FIDO UAF 1.0 Specs: Overview and Insights
FIDO UAF 1.0 Specs: Overview and InsightsFIDO UAF 1.0 Specs: Overview and Insights
FIDO UAF 1.0 Specs: Overview and InsightsFIDO Alliance
 
RPで受け入れる認証器を選択する ~Idance lesson 2~
RPで受け入れる認証器を選択する ~Idance lesson 2~RPで受け入れる認証器を選択する ~Idance lesson 2~
RPで受け入れる認証器を選択する ~Idance lesson 2~5 6
 
FIDO UAF Specifications: Overview & Tutorial
FIDO UAF Specifications: Overview & Tutorial FIDO UAF Specifications: Overview & Tutorial
FIDO UAF Specifications: Overview & Tutorial FIDO Alliance
 
WebAuthn - The End of the Password As We Know It?
WebAuthn - The End of the Password As We Know It?WebAuthn - The End of the Password As We Know It?
WebAuthn - The End of the Password As We Know It?Thomas Konrad
 
Securing a Web App with Security Keys
Securing a Web App with Security KeysSecuring a Web App with Security Keys
Securing a Web App with Security KeysFIDO Alliance
 
A study on biometric authentication techniques
A study on biometric authentication techniquesA study on biometric authentication techniques
A study on biometric authentication techniquesSubhash Basistha
 
Alamo ACE - Threat Hunting with CVAH
Alamo ACE - Threat Hunting with CVAHAlamo ACE - Threat Hunting with CVAH
Alamo ACE - Threat Hunting with CVAHBrandon DeVault
 
Getting Started with FIDO2
Getting Started with FIDO2Getting Started with FIDO2
Getting Started with FIDO2FIDO Alliance
 

What's hot (20)

Webauthn Tutorial
Webauthn TutorialWebauthn Tutorial
Webauthn Tutorial
 
WebAuthn and Security Keys
WebAuthn and Security KeysWebAuthn and Security Keys
WebAuthn and Security Keys
 
FIDO Workshop-Demo Breakdown.pptx
FIDO Workshop-Demo Breakdown.pptxFIDO Workshop-Demo Breakdown.pptx
FIDO Workshop-Demo Breakdown.pptx
 
FIDO Masterclass
FIDO MasterclassFIDO Masterclass
FIDO Masterclass
 
FIDO2 Specifications Overview
FIDO2 Specifications OverviewFIDO2 Specifications Overview
FIDO2 Specifications Overview
 
Getting Started With WebAuthn
Getting Started With WebAuthnGetting Started With WebAuthn
Getting Started With WebAuthn
 
Multifactor Authentication
Multifactor AuthenticationMultifactor Authentication
Multifactor Authentication
 
Web Authentication API
Web Authentication APIWeb Authentication API
Web Authentication API
 
Google & FIDO Authentication
Google & FIDO AuthenticationGoogle & FIDO Authentication
Google & FIDO Authentication
 
Fido Technical Overview
Fido Technical OverviewFido Technical Overview
Fido Technical Overview
 
Secure Your Encryption with HSM
Secure Your Encryption with HSMSecure Your Encryption with HSM
Secure Your Encryption with HSM
 
FIDO UAF 1.0 Specs: Overview and Insights
FIDO UAF 1.0 Specs: Overview and InsightsFIDO UAF 1.0 Specs: Overview and Insights
FIDO UAF 1.0 Specs: Overview and Insights
 
FIDO2 & Microsoft
FIDO2 & MicrosoftFIDO2 & Microsoft
FIDO2 & Microsoft
 
RPで受け入れる認証器を選択する ~Idance lesson 2~
RPで受け入れる認証器を選択する ~Idance lesson 2~RPで受け入れる認証器を選択する ~Idance lesson 2~
RPで受け入れる認証器を選択する ~Idance lesson 2~
 
FIDO UAF Specifications: Overview & Tutorial
FIDO UAF Specifications: Overview & Tutorial FIDO UAF Specifications: Overview & Tutorial
FIDO UAF Specifications: Overview & Tutorial
 
WebAuthn - The End of the Password As We Know It?
WebAuthn - The End of the Password As We Know It?WebAuthn - The End of the Password As We Know It?
WebAuthn - The End of the Password As We Know It?
 
Securing a Web App with Security Keys
Securing a Web App with Security KeysSecuring a Web App with Security Keys
Securing a Web App with Security Keys
 
A study on biometric authentication techniques
A study on biometric authentication techniquesA study on biometric authentication techniques
A study on biometric authentication techniques
 
Alamo ACE - Threat Hunting with CVAH
Alamo ACE - Threat Hunting with CVAHAlamo ACE - Threat Hunting with CVAH
Alamo ACE - Threat Hunting with CVAH
 
Getting Started with FIDO2
Getting Started with FIDO2Getting Started with FIDO2
Getting Started with FIDO2
 

Similar to WebAuthn is simpler, stronger and ready to go

Fragments-Plug the vulnerabilities in your App
Fragments-Plug the vulnerabilities in your AppFragments-Plug the vulnerabilities in your App
Fragments-Plug the vulnerabilities in your AppAppsecco
 
Multi-Factor Authentication - "Moving Towards the Enterprise"
Multi-Factor Authentication - "Moving Towards the Enterprise" Multi-Factor Authentication - "Moving Towards the Enterprise"
Multi-Factor Authentication - "Moving Towards the Enterprise" mycroftinc
 
The Best Shield Against Ransomware for IBM i
The Best Shield Against Ransomware for IBM iThe Best Shield Against Ransomware for IBM i
The Best Shield Against Ransomware for IBM iPrecisely
 
Lock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM iLock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM iPrecisely
 
Effectively Defending Your IBM i from Malware with Multi-Factor Authentication
 Effectively Defending Your IBM i from Malware with Multi-Factor Authentication  Effectively Defending Your IBM i from Malware with Multi-Factor Authentication
Effectively Defending Your IBM i from Malware with Multi-Factor Authentication Precisely
 
LoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated CybersecurityLoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated CybersecurityRohit Kapoor
 
Certes webinar securing the frictionless enterprise
Certes webinar   securing the frictionless enterpriseCertes webinar   securing the frictionless enterprise
Certes webinar securing the frictionless enterpriseJason Bloomberg
 
How to write secure code
How to write secure codeHow to write secure code
How to write secure codeFlaskdata.io
 
Meeting the Cybersecurity Challenge
Meeting the Cybersecurity ChallengeMeeting the Cybersecurity Challenge
Meeting the Cybersecurity ChallengeNet at Work
 
Defending Your IBM i Against Malware
Defending Your IBM i Against MalwareDefending Your IBM i Against Malware
Defending Your IBM i Against MalwarePrecisely
 
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
 Webinar: Beyond Two-Factor: Secure Access Control for Office 365 Webinar: Beyond Two-Factor: Secure Access Control for Office 365
Webinar: Beyond Two-Factor: Secure Access Control for Office 365SecureAuth
 
Combat Passwords on Post-Its with Multi-Factor Authentication for IBM i
Combat Passwords on Post-Its with Multi-Factor Authentication for IBM iCombat Passwords on Post-Its with Multi-Factor Authentication for IBM i
Combat Passwords on Post-Its with Multi-Factor Authentication for IBM iPrecisely
 
Strong authentication implementation guide
Strong authentication   implementation guideStrong authentication   implementation guide
Strong authentication implementation guideNis
 
ISC2_Cyber_Security_Notes.pdf
ISC2_Cyber_Security_Notes.pdfISC2_Cyber_Security_Notes.pdf
ISC2_Cyber_Security_Notes.pdfCCNAAccount
 
2016, A New Era of OS and Cloud Security - Tudor Damian
2016, A New Era of OS and Cloud Security - Tudor Damian2016, A New Era of OS and Cloud Security - Tudor Damian
2016, A New Era of OS and Cloud Security - Tudor DamianITCamp
 
How Does a Data Breach Happen?
How Does a Data Breach Happen? How Does a Data Breach Happen?
How Does a Data Breach Happen? Claranet UK
 
Seminar-Two Factor Authentication
Seminar-Two Factor AuthenticationSeminar-Two Factor Authentication
Seminar-Two Factor AuthenticationDilip Kr. Jangir
 
Two factor authentication 2018
Two factor authentication 2018Two factor authentication 2018
Two factor authentication 2018Will Adams
 

Similar to WebAuthn is simpler, stronger and ready to go (20)

Fragments-Plug the vulnerabilities in your App
Fragments-Plug the vulnerabilities in your AppFragments-Plug the vulnerabilities in your App
Fragments-Plug the vulnerabilities in your App
 
Multi-Factor Authentication - "Moving Towards the Enterprise"
Multi-Factor Authentication - "Moving Towards the Enterprise" Multi-Factor Authentication - "Moving Towards the Enterprise"
Multi-Factor Authentication - "Moving Towards the Enterprise"
 
The Best Shield Against Ransomware for IBM i
The Best Shield Against Ransomware for IBM iThe Best Shield Against Ransomware for IBM i
The Best Shield Against Ransomware for IBM i
 
Lock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM iLock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM i
 
Effectively Defending Your IBM i from Malware with Multi-Factor Authentication
 Effectively Defending Your IBM i from Malware with Multi-Factor Authentication  Effectively Defending Your IBM i from Malware with Multi-Factor Authentication
Effectively Defending Your IBM i from Malware with Multi-Factor Authentication
 
WebAuthn & FIDO2
WebAuthn & FIDO2WebAuthn & FIDO2
WebAuthn & FIDO2
 
LoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated CybersecurityLoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated Cybersecurity
 
Certes webinar securing the frictionless enterprise
Certes webinar   securing the frictionless enterpriseCertes webinar   securing the frictionless enterprise
Certes webinar securing the frictionless enterprise
 
How to write secure code
How to write secure codeHow to write secure code
How to write secure code
 
Meeting the Cybersecurity Challenge
Meeting the Cybersecurity ChallengeMeeting the Cybersecurity Challenge
Meeting the Cybersecurity Challenge
 
Defending Your IBM i Against Malware
Defending Your IBM i Against MalwareDefending Your IBM i Against Malware
Defending Your IBM i Against Malware
 
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
 Webinar: Beyond Two-Factor: Secure Access Control for Office 365 Webinar: Beyond Two-Factor: Secure Access Control for Office 365
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
 
Combat Passwords on Post-Its with Multi-Factor Authentication for IBM i
Combat Passwords on Post-Its with Multi-Factor Authentication for IBM iCombat Passwords on Post-Its with Multi-Factor Authentication for IBM i
Combat Passwords on Post-Its with Multi-Factor Authentication for IBM i
 
Strong authentication implementation guide
Strong authentication   implementation guideStrong authentication   implementation guide
Strong authentication implementation guide
 
ISC2_Cyber_Security_Notes.pdf
ISC2_Cyber_Security_Notes.pdfISC2_Cyber_Security_Notes.pdf
ISC2_Cyber_Security_Notes.pdf
 
2016, A New Era of OS and Cloud Security - Tudor Damian
2016, A New Era of OS and Cloud Security - Tudor Damian2016, A New Era of OS and Cloud Security - Tudor Damian
2016, A New Era of OS and Cloud Security - Tudor Damian
 
How Does a Data Breach Happen?
How Does a Data Breach Happen? How Does a Data Breach Happen?
How Does a Data Breach Happen?
 
Seminar-Two Factor Authentication
Seminar-Two Factor AuthenticationSeminar-Two Factor Authentication
Seminar-Two Factor Authentication
 
Cybersecurity update 12
Cybersecurity update 12Cybersecurity update 12
Cybersecurity update 12
 
Two factor authentication 2018
Two factor authentication 2018Two factor authentication 2018
Two factor authentication 2018
 

More from Michael Furman

OWASP Top 10 2021 What's New
OWASP Top 10 2021 What's NewOWASP Top 10 2021 What's New
OWASP Top 10 2021 What's NewMichael Furman
 
How can you deliver a secure product
How can you deliver a secure productHow can you deliver a secure product
How can you deliver a secure productMichael Furman
 
Istio Security Overview
Istio Security OverviewIstio Security Overview
Istio Security OverviewMichael Furman
 
Top 3 tips for security documentation
Top 3 tips for security documentationTop 3 tips for security documentation
Top 3 tips for security documentationMichael Furman
 
OWASP A4 XML External Entities (XXE)
OWASP A4 XML External Entities (XXE)OWASP A4 XML External Entities (XXE)
OWASP A4 XML External Entities (XXE)Michael Furman
 
OpenId Connect Protocol
OpenId Connect ProtocolOpenId Connect Protocol
OpenId Connect ProtocolMichael Furman
 

More from Michael Furman (7)

OWASP Top 10 2021 What's New
OWASP Top 10 2021 What's NewOWASP Top 10 2021 What's New
OWASP Top 10 2021 What's New
 
How can you deliver a secure product
How can you deliver a secure productHow can you deliver a secure product
How can you deliver a secure product
 
Istio Security Overview
Istio Security OverviewIstio Security Overview
Istio Security Overview
 
Top 3 tips for security documentation
Top 3 tips for security documentationTop 3 tips for security documentation
Top 3 tips for security documentation
 
OWASP Top Ten 2017
OWASP Top Ten 2017OWASP Top Ten 2017
OWASP Top Ten 2017
 
OWASP A4 XML External Entities (XXE)
OWASP A4 XML External Entities (XXE)OWASP A4 XML External Entities (XXE)
OWASP A4 XML External Entities (XXE)
 
OpenId Connect Protocol
OpenId Connect ProtocolOpenId Connect Protocol
OpenId Connect Protocol
 

Recently uploaded

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 

WebAuthn is simpler, stronger and ready to go

  • 1. Passwords are passé. WebAuthn is simpler, stronger and ready to go Michael Furman Security Architect
  • 2. What will we see today? • What’s wrong with passwords? • What is 2FA? • Why is 2FA better? • WebAuthn drilldown • WebAuthn benefits • What is my next step?
  • 3. About Me • 20+ years in software engineering • 10+ years in application security • 4+ years Lead Security Architect at Tufin • www.linkedin.com/in/furmanmichael/ • ultimatesecpro@gmail.com • Read my blog https://ultimatesecurity.pro/ • Follow me on twitter @ultimatesecpro • I like to travel, read books and listen to music.
  • 4. About Tufin • Market Leader in Security Policy Orchestration for firewalls and cloud – New Tufin products integrate security into DevOps pipeline • Established in 2005 • Used in over 2,000 enterprises, including 40 Fortune 100 companies • We are constantly growing! www.tufin.com/careers/
  • 5. What’s wrong with passwords? • Subject to brute force attacks • Can be stolen via phishing attacks
  • 6. What is a brute force attack? “A brute-force attack is an attempt to discover a password by systematically trying every possible combination of letters, numbers, and symbols until you discover the one correct combination that works.” https://www.owasp.org/index.php/Blocking_Brute_Force_Attacks
  • 7. How to prevent a brute force attack? • Enforce brute force protection – Lock user after subsequent login failures • Enforce complex passwords – Passphrases
  • 8. Complex passwords. Really? • Do users really use complex passwords? • List of common passwords https://en.wikipedia.org/wiki/List_of_the_most_common_passwords – First place: ‘123456’ – Second place: ‘password’
  • 9. How to enforce complex passwords? • Password policies • What is a password policy? A Password Policy is the set of restrictions and/or requirements that a user must follow to ensure that their password is strong.
  • 10. Sample password policy • Minimum 12 characters • Must include: – uppercase letters – lowercase letters – digits – non-alphanumeric (special) characters • Must be different from username
  • 11. Sample password policy • Change every 60 days • Password cannot be reused • Prevent incremental changes (e.g. Passw0rd, Passw1rd, Passw2rd) My “favorite” password policy
  • 12. Do password policies work? • Technically? Yes. But ... • Frustrates users • Users evade policies – Write the passwords down – Forget the replaced password • Potentially increase administrative costs
  • 13. What is a phishing attack? • Phishing is a type of social engineering attack often used to steal user data, including login credentials and credit card numbers. • It occurs when an attacker, masquerading as a trusted entity, dupes a victim into opening an email, instant message, or text message. https://www.incapsula.com/web-application- security/phishing-attack-scam.html
  • 14. Can I prevent phishing attacks? • Complex • Multi-million$ industry of its own • E.g. https://www.owasp.org/index.php/Phishing
  • 15. Best password advice • Passwords are like underwear Picture is from https://it.ie/keep-passwords-secure/
  • 16. What is Two-Factor Authentication? Two-factor authentication (2FA) is a method of confirming a user's claimed identity by utilizing a combination of two different factors: 1. Something they know 2. Something they have or something they are https://en.wikipedia.org/wiki/Two-step_verification
  • 17. Why 2FA is more secure? • The attacker should not know the 2nd factor! • Weaker passwords are still crackable, but who cares!
  • 18. Types of 2FA • Text Message (SMS) • OTP • WebAuthn
  • 19. 2FA using Text Messages (SMS) • SMS contains authentication code
  • 20. Is 2FA using SMS secure? • “NIST is no longer recommending Two-Factor authentication using SMS” Bruce Schneier blog (2016) https://www.schneier.com/blog/archives/2016/08/nist_is_no_long.html NIST stands for National Institute of Standards and Technology • SMS can be intercepted Signaling System No. 7 (SS7) protocols vulnerability
  • 21. 2FA using one-time password (OTP) • Authentication using OTP generated by: – Mobile device applications • Google Authenticator • FreeOTP – Dedicated device • RSA SecurID Picture is from https://en.wikipedia.org/wiki/RSA_SecurID
  • 22. 2FA using OTP Mobile device: Registration • Scan QR code (shared secret) provided by server on mobile device
  • 23. 2FA using OTP Mobile device: Authentication • Provide OTP generated by mobile device to server to complete authentication
  • 24. Is 2FA using OTP secure? • No currently known vulnerabilities • Possible attack vector: – OTP relies on a shared secret key (QR code) – An attacker may gain access to these keys – High complexity
  • 25. 2FA Migration from SMS to OTP • Instagram https://techcrunch.com/2018/07/17/instagram-2-factor/ • Facebook https://www.theverge.com/2018/5/23/17385654/facebook- two-factor-authentication-process-app-phone-number
  • 26. Ideal 2FA? • Biometric scan – Fingerprint – Retina
  • 27. Fingerprint Scan Example Picture is from the “Back to the Future Part II” movie
  • 28. Retina Scan Example Picture is from the “Despicable Me” movie
  • 29. Is biometric scan secure? Picture is from the “Demolition Man” movie
  • 30. What is WebAuthn? • WebAuthn (Web Authentication) – standard web API (Credential Management API) – is incorporated into browsers – allows very secure 2FA – based on the FIDO specification https://www.w3.org/TR/webauthn/
  • 31. What is FIDO? • FIDO = Fast Identity Online • FIDO Alliance started from a conversation in 2009 – Ramesh Kesanupalli (CTO of Validity Sensors) asked Michael Barrett (PayPal’s CISO) if he was interested in fingerprint- enabling paypal.com – Michael replied that he was, but only if it could be achieved via open standards • FIDO Alliance launched in 2013 with six member companies – over 250 members worldwide today https://fidoalliance.org/about/history/
  • 32. How WebAuthn Works • Registration • Authentication
  • 33. WebAuthn Components Diagram is from https://developer.mozilla.org/en-US/docs/Web/API/Web_Authentication_API
  • 34. WebAuthn Components • Server (Relying Party) - server side component of application uses WebAuthn to register and authenticate users • JavaScript Application - client side component of application uses WebAuthn to register and authenticate users
  • 35. WebAuthn Components • Browser – a WebAuthn-compatible browser • Authenticator – creates and stores credentials – embedded into an operating system – USB or Bluetooth Security Key
  • 36. Demo
  • 37. WebAuthn Registration Diagram is from https://developer.mozilla.org/en-US/docs/Web/API/Web_Authentication_API
  • 38. WebAuthn Registration • Step 0: Application requests registration • Step 1: Server sends challenge, user Info, and Relying Party info
  • 39. WebAuthn Registration • Step 2: Browser calls authenticatorMakeCredential() on Authenticator • Step 3: Authenticator creates new PKI Key Pair and attestation • Step 4: Authenticator returns Public Key and other data to browser
  • 40. WebAuthn Registration • Step 5: Browser creates final data (including Public Key) and JavaScript application sends response to server • Step 6: Server validates and finalizes registration – store the new Public Key associated with the user's account for future use
  • 41. WebAuthn Authentication Diagram is from https://developer.mozilla.org/en-US/docs/Web/API/Web_Authentication_API
  • 42. WebAuthn Authentication • Authentication flow similar to registration flow • Primary differences: – authentication doesn't require user or relying party information – authentication creates an assertion using previously generated key pair
  • 43. WebAuthn Authentication • Step 0: Application requests authentication • Step 1: Server sends challenge • Step 2: Browser calls authenticatorGetCredential() on Authenticator • Step 3: Authenticator creates an assertion • Step 4: Authenticator returns data to browser
  • 44. WebAuthn Authentication • Step 5: Browser creates final data (including Public Key) and JavaScript application sends response to server • Step 6: Server validates and finalizes authentication
  • 45. Demo
  • 46. WebAuthn Benefits • Fingerprint or facial biometrics authenticators • Based on PKI • User credentials and biometric templates: – never leave the user’s device – never stored on backend servers Very secure 2FA
  • 47. WebAuthn Adoption • Google Chrome version 67 • Mozilla Firefox version 60 • Microsoft Edge build 17723 • Use services that adopted WebAuthn https://www.yubico.com/setup/#security-key • Google employees use Titan Security Keys https://thehackernews.com/2018/07/google-titan- security-key-fido.html
  • 48. What is my next step? • Implement it yourself https://developers.google.com/web/updates/2018/05/webauthn https://hacks.mozilla.org/2018/01/using-hardware-token-based-2fa-with- the-webauthn-api/ https://www.yubico.com/why-yubico/for-developers/ • Wait for someone else to do it for you! e.g. Keycloak https://ultimatesecurity.pro/post/oidc-presentation/
  • 49. Summary • Bad 2FA is better than no 2FA • WebAuthn is a better, more secure 2FA • Prepare for WebAuthn
  • 50. Thank you! • Contact me – www.linkedin.com/in/furmanmichael/ – ultimatesecpro@gmail.com – https://ultimatesecurity.pro/ – @ultimatesecpro

Editor's Notes

  1. Hi everyone, Thank you for joining the last lecture for today. What will we see today? First, we will understand what is wrong with passwords. Then, we will learn what is two factor authentication and why it is better. I will elaborate WebAuthn and we will know its benefits. Finally, we will see our next step.
  2. Before we begin, a couple of words about me and the company I work for - Tufin. I have many years of experience in software development. Like most of you here today, I particularly like application security. I started to work in this area more than 10 years ago, and enjoy each day I work on it. For the last few years, I am responsible for the application security of all Tufin products. Recently I have started to write a blog – you are more then welcomed to read it. Something personal: I like traveling, reading books and listening to music. I particularly enjoy listen to jazz.
  3. And now, a couple of words about Tufin. Tufin is a great company. It is already over 13 years old. We have a lot of customers. Our customers are all around the world: in Israel, USA, Europe, Asia. Some are huge companies, others are much smaller. We have customers in many industries. For example: AT&T, BMW and Visa. Recently we have started to develop products that integrate security into DevOps pipeline. You are more then welcomed to visit our booth. Tufin is always growing. When I joined the company about 5 years ago, it took up only one and half floors. Now it takes up almost 4 floors and that is only in Israel. We have also expanded abroad. We recently opened up a new main office in Boston. We are always looking for good people. We are looking for Java, C++, DevOps people. We are looking for Docker and Kubernetes gurus. You can visit our site to see our open positions in RnD, Sales, Marketing and additional areas.
  4. What’s wrong with passwords? Passwords are subject to brute force attacks. Passwords can be stolen via phishing attacks.
  5. You may configure your authentication service to lock a user after more than 5 failed logins. Or you may enforce complex passwords.
  6. Raise your hand if you use complex password. ‘123456’ and ‘password’ on the first places.
  7. We may use password policies to enforce complex passwords.
  8. Lets see the sample password policy.
  9. Prevent incremental changes is my “favorite” one.
  10. It is not simple to follow password policies. You need to remember complex passwords, replace them on time … In addition, somebody need to manage policies. Do we have a way to prevent successful authentication even the password is cracked? We will see later…
  11. What is a phishing attack? Phishing is a type of attack used to steal user confidential data. Couple of phishing attacks were recently in Israel.
  12. can we prevent phishing attacks? Of course we can, but 1. It is the complex task. 2. It is subject to human failure 3. If it succeeds, then user is in trouble I will not elaborate it today since possible to talk about it couple of hours. What we will see from this presentation that there is a better authentication schema that prevent accessing the account with a stolen password!
  13. Before we will start our two factor authentication journey I want to give you the best password advice: passwords are like underwear. Do not think someone use underwear more than one month? So, remember to change your passwords. Can you imagine the situation when you share underwear with someone else? Or you use underwear of someone else? Same with passwords *do not share it with other people One more question: have you seen even once someone pin an underwear to a display? Or leave an underwear under a keyboard? It is not a smart or safe idea. Therefore, do not do the same for your passwords.
  14. Lets start to talk about Two-Factor Authentication.
  15. Attacker will not be able to access your account – only you know the second factor. It is good way to prevent phishing attacks.
  16. Stages of implementing a 2FA authentication: 1) Registration – you need to register the two factor authentication with your account. 2) Generation – a second factor is generated. 3) Delivery – the second factor should be delivered to a user. 4) Authentication – the user authenticates using the second factor.
  17. Lets start with the SMS example. First, you need to register – you need to configure your phone number in your account. Then, during the authentication an authentication service generates a long number. The number is delivered via SMS to your phone.
  18. Is it secure?
  19. Another example is the authentication using one-time password.
  20. Similar: First, you need to register. Usually you need to scan a QR cone on your mobile device.
  21. The device generates OTP. You need to provide the OTP code to your authentication server to complete authentication. ============== There are two different algorithms to choose from for your OTP generators. Time Based (TOTP) Counter Based (HOTP). For TOTP, your token generator will hash the current time and a shared secret. For HOTP a shared counter is used instead of the current time. 
  22. Is this OTP secure? We do not have known vulnerabilities. The theoretical attack may use the shared secrets.
  23. Social network providers (e.g. Instagram, Facebook) understand the weakness of the 2FA via SMS. Therefore they are migrating from SMS to OTP. Note that SMS was formally declared as unsecure in 2016 – what took them so long?!?!
  24. What would be ideal 2FA? The ideal 2FA should use the biometric data. The fingerprint or retina scan are good examples.
  25. Once again, movies lead the way in technology The fingerprint scan of Jennifer Parker works even in the future. Jennifer can easily enter into her home by using her finger as the “key”.
  26. Even animated movies ... The Retina Scan allows Gru to enter the bank using the most secure technological advances.
  27. Is biometric scan secure? Yes, but there is a way to brute force the biometric scan, at least in movies. The criminal Simon escapes from the prison using the retina scan of a stolen eyeball. In reality, though, we can trust biometric scans: US and Israel immigration trusts biometric scans to let people enter their borders without human intervention.
  28. WebAuthn (Web Authentication) is Credential Management API that allows very secure 2FA. WebAuthn is based on the FIDO specification.
  29. What is FIDO? FIDO stands for Fast Identity Online. The story of the FIDO Alliance is very interesting. It started from a conversation in 2009 between CTO of Validity Sensors and CISO of PayPal. Ramesh asked Michael if he was interested in fingerprint-enabling paypal.com. Michael replied positively, but he wanted to achieve it via open standards because Michael did not want to bind PayPal to a specific vendor. You should read the history of FIDO –it’s really exciting. ---------------------------- U2F Universal 2nd Factor UAF Universal Authentication Framework protocol
  30. Remember the 4 stages: Registration Generation Delivery Authentication WebAuthn requires only registration and authentication. WebAuthn does not require Generation, since your biometric data is already with you. By the same logic, Delivery of biometric data is not needed. so WebAuthn cut out 2 of the 4 stages!
  31. https://demo.yubico.com/webauthn/ The fact that a browser can access a physical authenticator is amazing!
  32. The slide shows the WebAuthn Registration flow. Very important that Steps 2, 3 and 4 part of the protocol already implemented by browsers and authenticators. The application related steps are 1,5 and 6. You may implement these steps and to use with any compatible browser and authenticators.
  33. Lets elaborate these steps. I do not expect you will remember these steps after the presentation, but it will be great you will see the big picture.
  34. WebAuthn is – finally - being adopted quite rapidly. For example: All the major browser have adopted WebAuthn. Google employees use WebAuthn to access Google’s services. you can also adopt WebAuthn
  35. How can I adopt WebAuthn in my application? Do it yourself - open guidelines and implement it. remember that the application related steps include only 1, 5 and 6. Or 2. Wait for someone else to do it for you! For example, Keycloak! Tufin has already adopted Keycloak, and we are just waiting when it will implement WebAuthn. The Keycloak RFE already been opened.
  36. The takeaways: First of all, better to use any 2FA than to be without 2FA. Second, WebAuthn is a very secure 2FA. And, last but not least, you should prepare for using WebAuthn.
  37. Thank you for participating in my lecture! Please contact me if you need any additional information, or if you want to send me your resume.