Skip to content

Commit

Permalink
passkeys 2fa
Browse files Browse the repository at this point in the history
  • Loading branch information
pilcrowonpaper committed Jun 23, 2024
1 parent 07b659d commit 4717953
Showing 1 changed file with 5 additions and 3 deletions.
8 changes: 5 additions & 3 deletions pages/mfa.md
Original file line number Diff line number Diff line change
Expand Up @@ -11,7 +11,7 @@ title: "Multi-factor authentication (MFA)"
- [Generate QR code](#generate-qr-code)
- [Validate OTPs](#validate-otps)
- [SMS](#sms)
- [Passkeys](#passkeys)
- [WebAuthn (passkeys)](#webauthn-passkeys)
- [Recovery codes](#recovery-codes)

## Overview
Expand Down Expand Up @@ -91,9 +91,11 @@ We discourage SMS based MFA as it can be intercepted and unreliable at times. Ho

Throttling must be implemented. A basic example is blocking attempts for 15 to 60 minutes after the 5th consecutive failed attempt. The user should also be notified to change the password as well.

## Passkeys
## WebAuthn (passkeys)

Passkeys allow you to use in-device authentication methods, such as biometrics and pin-codes. See the [Passkeys](/passkeys) guide.
The [Web Authentication API (WebAuthn)](https://developer.mozilla.org/en-US/docs/Web/API/Web_Authentication_API) allows applications to use user devices for authentication using public key cryptography. You can either verify the user's identity with the devices PIN code or biometrics, or just verify the device. Both works as a second factor and the latter can be more user-friendly as users aren't prompted for their password/fingerprint.

See the [passkeys](/passkeys) guide for implementations.

## Recovery codes

Expand Down

0 comments on commit 4717953

Please sign in to comment.