Gift Egwuenu

Going Beyond Passwords: The Future of User Authentication

The future of authentication is passwordless. Learn to implement phishing-resistant login flows using passkeys, biometrics, and SSO.

Going Beyond Passwords: The Future of User Authentication
#1about 3 minutes

The inherent weaknesses and risks of traditional passwords

Traditional passwords are no longer secure due to common user mistakes, frequent data breaches, and sophisticated cyber attacks.

#2about 5 minutes

Best practices for creating and managing secure passwords

Following guidelines like using character combinations, avoiding personal information, and using password managers can significantly improve account security.

#3about 4 minutes

How passwordless authentication with magic links works

Passwordless authentication replaces traditional passwords with methods like magic links or one-time codes sent via email for a more secure login experience.

#4about 5 minutes

Securing accounts with multi-factor authentication layers

Multi-factor authentication adds a crucial security layer by requiring a second verification factor, such as an OTP, SMS code, or a physical security key.

#5about 2 minutes

Understanding the next generation of authentication with passkeys

Passkeys offer a phishing-resistant alternative to passwords by using device-based biometrics like fingerprints or face ID to create secure cryptographic keys.

#6about 5 minutes

How single sign-on simplifies access across applications

Single sign-on (SSO) uses a central identity provider to authenticate a user once, granting them access to multiple applications without separate logins.

#7about 2 minutes

A practical guide to adopting modern authentication methods

Successfully transitioning to modern authentication requires conducting a security assessment, choosing the right methods for your use case, and educating users.

#8about 2 minutes

Addressing SSO risks and account recovery options

The Q&A covers the security of a central SSO provider and the recovery mechanisms available when a user loses access to their phone for SMS-based authentication.

Related jobs
Jobs that call for the skills explored in this talk.

Featured Partners

From learning to earning

Jobs that call for the skills explored in this talk.