From d6c38f3feb713a3dc5f46a1da9cedcc8cf3de3c9 Mon Sep 17 00:00:00 2001 From: Carla Urrea Stabile <110599104+carlastabile-okta@users.noreply.github.com> Date: Tue, 21 Nov 2023 23:50:29 +0100 Subject: [PATCH] Add link to webauthn.me in relevant blog posts (#1466) * add webauthnme link with UTM * add link to java post * add webauthnme link --------- Co-authored-by: Alisa <7586237+alisaduncan@users.noreply.github.com> --- ...04-17-webauthn-developers-guide-to-whats-on-the-horizon.md | 1 + .../2019-01-16-history-and-future-of-async-javascript.md | 1 + .../_posts/2020-12-18-how-to-use-webauthn-csharp-dotnet.md | 1 + _source/_posts/2022-04-26-webauthn-java.md | 4 +++- _source/_posts/2023-08-30-passwordless-authentication.md | 4 ++-- 5 files changed, 8 insertions(+), 3 deletions(-) diff --git a/_source/_posts/2018-04-17-webauthn-developers-guide-to-whats-on-the-horizon.md b/_source/_posts/2018-04-17-webauthn-developers-guide-to-whats-on-the-horizon.md index b528835e06..aed863d250 100644 --- a/_source/_posts/2018-04-17-webauthn-developers-guide-to-whats-on-the-horizon.md +++ b/_source/_posts/2018-04-17-webauthn-developers-guide-to-whats-on-the-horizon.md @@ -59,5 +59,6 @@ The spec itself is currently a W3C "Candidate Recommendation", which is the seco * [Web authentication and Windows Hello](https://docs.microsoft.com/en-us/microsoft-edge/dev-guide/device/web-authentication) * [FIDO2 Project](https://fidoalliance.org/fido2/) * Learn more about [Okta's plans to support WebAuthn](https://www.okta.com/blog/2018/04/its-a-new-world-with-webauthn-passwordless-authentication-goes-primetime/) +* [webauthn.me](https://a0.to/webauthnme-okta-blog) If you're looking for more security-focused information like this, you might want to check out our new [security site](https://sec.okta.com/), where we're publishing lots of other interesting security pieces. diff --git a/_source/_posts/2019-01-16-history-and-future-of-async-javascript.md b/_source/_posts/2019-01-16-history-and-future-of-async-javascript.md index d0413baecb..f5526be35c 100644 --- a/_source/_posts/2019-01-16-history-and-future-of-async-javascript.md +++ b/_source/_posts/2019-01-16-history-and-future-of-async-javascript.md @@ -189,5 +189,6 @@ Want to learn more about asynchronous JavaScript, or just JavaScript in general? * [Add Authentication to Your Vanilla JavaScript App in 20 Minutes](/blog/2018/06/05/authentication-vanilla-js) * [Build a Video Chat Service with JavaScript, WebRTC, and Okta](/blog/2018/05/08/build-video-chat-app-with-javascript-webrtc-and-okta) * [WebAuthn: A Developer's Guide to What's on the Horizon](/blog/2018/04/17/webauthn-developers-guide-to-whats-on-the-horizon) +* [webauthn.me](https://a0.to/webauthnme-okta-blog) As usual, if you have any comments, questions, or suggestions leave a comment below. Don't forget to follow us on [Twitter](https://twitter.com/oktadev), [Facebook](https://www.facebook.com/oktadevelopers/), and [LinkedIn](https://www.linkedin.com/company/oktadev/) and watch our kick-ass videos on [YouTube](https://www.youtube.com/channel/UC5AMiWqFVFxF1q9Ya1FuZ_Q). diff --git a/_source/_posts/2020-12-18-how-to-use-webauthn-csharp-dotnet.md b/_source/_posts/2020-12-18-how-to-use-webauthn-csharp-dotnet.md index b57d9bfb07..32d4077278 100644 --- a/_source/_posts/2020-12-18-how-to-use-webauthn-csharp-dotnet.md +++ b/_source/_posts/2020-12-18-how-to-use-webauthn-csharp-dotnet.md @@ -779,5 +779,6 @@ For more Passwordless authentication, ASP.NET Core, and Okta articles, check out - [The Ultimate Guide to FIDO2 and WebAuthn Terminology](/blog/2019/04/the-ultimate-guide-to-fido2-and-webauthn-terminology/) - [ASP.NET Core 3.0 MVC Secure Authentication](/blog/2019/11/15/aspnet-core-3-mvc-secure-authentication) - [Okta .NET management SDK](https://github.com/okta/okta-sdk-dotnet) +- [webauthn.me](https://a0.to/webauthnme-okta-blog) If you like this topic, be sure to [follow us on Twitter](https://twitter.com/oktadev), subscribe to [our YouTube Channel](https://youtube.com/c/oktadev), and [follow us on Twitch](https://www.twitch.tv/oktadev). diff --git a/_source/_posts/2022-04-26-webauthn-java.md b/_source/_posts/2022-04-26-webauthn-java.md index 266c9e0be4..c0c059a1e0 100644 --- a/_source/_posts/2022-04-26-webauthn-java.md +++ b/_source/_posts/2022-04-26-webauthn-java.md @@ -14,7 +14,7 @@ type: awareness github: https://github.com/oktadev/webauthn-java-example --- -The [Web Authentication (WebAuthn)](https://webauthn.io/) specification, given [official approval](https://www.w3.org/2019/03/pressrelease-webauthn-rec.html) by the World Wide Web Consortium (W3C) and the FIDO Alliance in 2019, aims to strengthen online security by allowing users to sign in to sites with elements like biometrics and FIDO security keys. The WebAuthn API can replace or supplement less-secure passwords, which may be weak and are often shared. +The [Web Authentication (WebAuthn)](https://a0.to/webauthnme-okta-blog) specification, given [official approval](https://www.w3.org/2019/03/pressrelease-webauthn-rec.html) by the World Wide Web Consortium (W3C) and the FIDO Alliance in 2019, aims to strengthen online security by allowing users to sign in to sites with elements like biometrics and FIDO security keys. The WebAuthn API can replace or supplement less-secure passwords, which may be weak and are often shared. WebAuthn is supported by default in Firefox and Chrome browsers and can be used in Edge browsers on recent Windows systems. As support for the new standard is built into more devices, more websites will offer this easier, more secure method of authentication. @@ -732,6 +732,8 @@ Walking through this sample is a great way to learn how WebAuthn works in Java, Associating devices with sign-ins provides a powerful tool to make many of the challenges, failures, and abuses of passwords a thing of the past. Once initial development is complete, user registration is simpler, more secure, and more sustainable. Using the WebAuthn specification, developers can create passwordless applications with an increasingly broad and accessible range of hardware authenticators. +You can learn more about WebAuthn by testing out our tool [webauthn.me](https://a0.to/webauthnme-okta-blog) + Check out these posts for more information about WebAuthn: * [WebAuthn: A Developer's Guide to What's on the Horizon](/blog/2018/04/17/webauthn-developers-guide-to-whats-on-the-horizon) diff --git a/_source/_posts/2023-08-30-passwordless-authentication.md b/_source/_posts/2023-08-30-passwordless-authentication.md index e6d2d0f3ce..ee7b337525 100644 --- a/_source/_posts/2023-08-30-passwordless-authentication.md +++ b/_source/_posts/2023-08-30-passwordless-authentication.md @@ -107,7 +107,7 @@ So how does this work? At a high level, your FIDO2 authentication flow utilizes 2. Something you have, the authenticator device, which may be a security key or a capable phone 3. Something you are, biometric data such as fingerprint or facial recognition -Before we authenticate, we need an account with compliant credentials, so let's start with the registration process. We'll use a public demo site demonstrating how passkeys work as we step through what's going on in the registration and authentication process. Follow along at Auth0's [webauthn.me](https://webauthn.me/). +Before we authenticate, we need an account with compliant credentials, so let's start with the registration process. We'll use a public demo site demonstrating how passkeys work as we step through what's going on in the registration and authentication process. Follow along at Auth0's [webauthn.me](https://a0.to/webauthnme-okta-blog). There are a couple of components at play. From the user's perspective, they interact with a website and a device like their phone. From a technology perspective, there's WebAuthn and CTAP2. I'll show screenshots of each step, discuss the interaction between the web app and server of the relying party, and describe the hand-off between WebAuthn and CTAP2. @@ -138,7 +138,7 @@ The user is now registered to use FIDO2 authentication mechanisms in the future. We can see what user authentication looks like with an account for the site set up and the initial passkey created. -The user opens their favorite website (the Relying Party) in their browser (the Client) and initiates signing in by entering their username. In the [webauthn.me](https://webauthn.me) site we're using, the user authenticates immediately after registering as the next step demonstrating the process. +The user opens their favorite website (the Relying Party) in their browser (the Client) and initiates signing in by entering their username. In the [webauthn.me](https://a0.to/webauthnme-okta-blog) site we're using, the user authenticates immediately after registering as the next step demonstrating the process. {% img blog/passwordless-authentication/webauthnme-authn.jpg alt:"webauthn.io site authenticate user prompt from the browser" width:"800" %}{: .center-image }