Passkeys: What They Are, Why We Want Them, and How to Use Them

Passkeys: What They Are, Why We Want Them, and How to Use Them

John Savill's Technical Training via YouTube Direct link

- Using a passkey

35 of 42

35 of 42

- Using a passkey

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Passkeys: What They Are, Why We Want Them, and How to Use Them

Automatically move to the next video in the Classroom when playback concludes

  1. 1 - Introduction
  2. 2 - Authentication history
  3. 3 - Why Authenticator wasn't phishing resistant
  4. 4 - Need protection from social engineering
  5. 5 - Passkeys
  6. 6 - Built on PKI
  7. 7 - Passwordless FIDO2
  8. 8 - How this works
  9. 9 - Relying Party
  10. 10 - Client
  11. 11 - Authenticator
  12. 12 - Public and private keys
  13. 13 - Authentication flow
  14. 14 - Need for a user gesture and intent
  15. 15 - Presence and proximity
  16. 16 - The promise of the protocol
  17. 17 - Additional detail
  18. 18 - WebAuthn use
  19. 19 - Relying Party ID
  20. 20 - WebAuthn client checks
  21. 21 - Javascript and API calls
  22. 22 - Key benefits for protection
  23. 23 - Presence and CTAP
  24. 24 - Bluetooth use
  25. 25 - Cross-device authentication
  26. 26 - How many passkeys
  27. 27 - Authenticator options
  28. 28 - Types of passkey
  29. 29 - Authenticator can roam
  30. 30 - Where can passkeys be used
  31. 31 - What is different from before
  32. 32 - Using with Entra
  33. 33 - Enabling passkeys in Entra
  34. 34 - User passkey addition
  35. 35 - Using a passkey
  36. 36 - Using passkey on same device
  37. 37 - Cross-device authentication
  38. 38 - Microsoft accounts
  39. 39 - Always synced
  40. 40 - MSA passkey CDA demo
  41. 41 - Summary
  42. 42 - Close

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.