{"id":9847,"date":"2021-04-26T15:00:36","date_gmt":"2021-04-26T13:00:36","guid":{"rendered":"https:\/\/www.robin-data.io\/?p=9847"},"modified":"2025-03-24T13:46:57","modified_gmt":"2025-03-24T12:46:57","slug":"passwordless-authentication-over-fido2","status":"publish","type":"post","link":"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/passwordless-authentication-over-fido2","title":{"rendered":"Passwordless authentication via FIDO2"},"content":{"rendered":"<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-gu3wuv-c2dfa7c83c61159cc1a82cab3ec7268f\">\n.flex_column.av-gu3wuv-c2dfa7c83c61159cc1a82cab3ec7268f{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-gu3wuv-c2dfa7c83c61159cc1a82cab3ec7268f av_one_full  avia-builder-el-0  el_before_av_one_full  avia-builder-el-first  first flex_column_div av-zero-column-padding'     ><p><section  class='av_textblock_section av-kr4o3wnh-4eac0f24ce6cc5617d0b040d519804a7'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p><a href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\">Data Protection Academy<\/a> \u00bb <a href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\">Data Protection Wiki<\/a> \u00bb <strong>Passwordless authentication<\/strong><\/p>\n<\/div><\/section><br \/>\n<br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-knrqo7lo-b67cd25beada9add53b892632c48eed9\">\n#top .hr.hr-invisible.av-knrqo7lo-b67cd25beada9add53b892632c48eed9{\nheight:15px;\n}\n<\/style>\n<div  class='hr av-knrqo7lo-b67cd25beada9add53b892632c48eed9 hr-invisible  avia-builder-el-3  el_after_av_codeblock  el_before_av_heading'><span class='hr-inner'><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-knszwr33-d13318b5bb6f2c729f671fcaaf14ba69\">\n#top .av-special-heading.av-knszwr33-d13318b5bb6f2c729f671fcaaf14ba69{\npadding-bottom:10px;\ncolor:#303440;\n}\nbody .av-special-heading.av-knszwr33-d13318b5bb6f2c729f671fcaaf14ba69 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-knszwr33-d13318b5bb6f2c729f671fcaaf14ba69 .special-heading-inner-border{\nborder-color:#303440;\n}\n.av-special-heading.av-knszwr33-d13318b5bb6f2c729f671fcaaf14ba69 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-knszwr33-d13318b5bb6f2c729f671fcaaf14ba69 av-special-heading-h1 custom-color-heading blockquote modern-quote  avia-builder-el-4  el_after_av_hr  el_before_av_textblock'><h1 class='av-special-heading-tag'  itemprop=\"headline\"  >Passwordless authentication via FIDO2<\/h1><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-12npdkn-3a12e1a030c019f8d136e2bc10f06d02'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p>Passwords are hard to remember and usually not secure. Today, there are solutions that do without the combination of lower and upper case letters, numbers and special characters. In particular, experts in the field of data protection and information security have long since stopped using passwords to make access to systems much more secure.<\/p>\n<p>Passwordless authentication is the current trend in IT security and a system that does not require the use of passwords at all.  With passwordless authentication, the password is replaced by much more secure factors. In the following article, you can read why it is better to do without passwords yesterday rather than today and which common methods are available.<\/p>\n<\/div><\/section><\/p><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-enxp4n-5daae652b5c947e6ce1d0f9f564001ce\">\n.flex_column.av-enxp4n-5daae652b5c947e6ce1d0f9f564001ce{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-enxp4n-5daae652b5c947e6ce1d0f9f564001ce av_one_full  avia-builder-el-6  el_after_av_one_full  el_before_av_one_full  first flex_column_div av-zero-column-padding  column-top-margin'     ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-knsyb97a-8aeb15feb09dbcb981af2d2cda92c1bd\">\n#top .av-special-heading.av-knsyb97a-8aeb15feb09dbcb981af2d2cda92c1bd{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-knsyb97a-8aeb15feb09dbcb981af2d2cda92c1bd .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-knsyb97a-8aeb15feb09dbcb981af2d2cda92c1bd .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-knsyb97a-8aeb15feb09dbcb981af2d2cda92c1bd av-special-heading-h2 blockquote modern-quote  avia-builder-el-7  el_before_av_hr  avia-builder-el-first'><h2 class='av-special-heading-tag'  itemprop=\"headline\"  >Most important information about passwordless authentication<\/h2><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-knrqo7lo-25-3533a09b78f7cfb6b17c2cc8c612830e\">\n#top .hr.hr-invisible.av-knrqo7lo-25-3533a09b78f7cfb6b17c2cc8c612830e{\nheight:15px;\n}\n<\/style>\n<div  class='hr av-knrqo7lo-25-3533a09b78f7cfb6b17c2cc8c612830e hr-invisible  avia-builder-el-8  el_after_av_heading  el_before_av_textblock'><span class='hr-inner'><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<section  class='av_textblock_section av-knrqr9ex-0ac2ac7422e6926021c4d6bd590570e4'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><ul>\n<li style=\"font-size: 20px;\">The use of passwords poses many IT security risks and is increasingly being replaced by less vulnerable options<\/li>\n<li style=\"font-size: 20px;\">Passwordless authentication is one such option and is very secure using cryptographic key pairings<\/li>\n<li style=\"font-size: 20px;\">FIDO2 is a standard that uses passwordless authentication to enable strong passwordless authentication.<\/li>\n<li style=\"font-size: 20px;\">FIDO2 is a joint project of the FIDO Alliance and the W3C and combines the Client to Authenticator Protocol (CTAP) with the Web Authentication API (WebAuthn).<\/li>\n<\/ul>\n<\/div><\/section><\/p><\/div><\/p>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-a7et07-e423e4bfa23762e1cee8f345c664599e\">\n.flex_column.av-a7et07-e423e4bfa23762e1cee8f345c664599e{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-a7et07-e423e4bfa23762e1cee8f345c664599e av_one_full  avia-builder-el-10  el_after_av_one_full  el_before_av_hr  first flex_column_div av-zero-column-padding  column-top-margin'     ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-5p798n-69070ccd064297a00062c0fc1c6225e6\">\n#top .av-special-heading.av-5p798n-69070ccd064297a00062c0fc1c6225e6{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-5p798n-69070ccd064297a00062c0fc1c6225e6 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-5p798n-69070ccd064297a00062c0fc1c6225e6 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-5p798n-69070ccd064297a00062c0fc1c6225e6 av-special-heading-h3 blockquote modern-quote  avia-builder-el-11  el_before_av_hr  avia-builder-el-first'><h3 class='av-special-heading-tag'  itemprop=\"headline\"  >Contents for passwordless authentication<\/h3><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-knrqo7lo-24-e8b4878a5b3d07a874ea179b4cb36f3f\">\n#top .hr.hr-invisible.av-knrqo7lo-24-e8b4878a5b3d07a874ea179b4cb36f3f{\nheight:15px;\n}\n<\/style>\n<div  class='hr av-knrqo7lo-24-e8b4878a5b3d07a874ea179b4cb36f3f hr-invisible  avia-builder-el-12  el_after_av_heading  el_before_av_iconlist'><span class='hr-inner'><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-knrqv0oe-7178e64a2ca90a70895d4cc6b2689786\">\n#top .avia-icon-list-container.av-knrqv0oe-7178e64a2ca90a70895d4cc6b2689786 .iconlist_icon{\ncolor:#127db3;\nfont-size:20px;\n}\n#top .avia-icon-list-container.av-knrqv0oe-7178e64a2ca90a70895d4cc6b2689786 .iconlist_icon svg:first-child{\nstroke:#127db3;\nfill:#127db3;\nheight:20px;\nwidth:20px;\n}\n#top #wrap_all .avia-icon-list-container.av-knrqv0oe-7178e64a2ca90a70895d4cc6b2689786 .av_iconlist_title{\nfont-size:20px;\n}\n<\/style>\n<div  class='avia-icon-list-container av-knrqv0oe-7178e64a2ca90a70895d4cc6b2689786  avia-builder-el-13  el_after_av_hr  avia-builder-el-last'><ul class='avia-icon-list avia_animate_when_almost_visible avia-icon-list-left av-iconlist-small av-knrqv0oe-7178e64a2ca90a70895d4cc6b2689786 avia-iconlist-animate'>\n<li><div class='iconlist_icon av-oqm3zr-e1f702ee118447338c7dd6c6879a1ac7 avia-font-fontello avia-iconfont avia-font-fontello'><span class='av-icon-char' data-av_icon='\ue806' data-av_iconfont='fontello' aria-hidden=\"true\"><\/span><\/div><article class=\"article-icon-entry av-iconlist-empty\"  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"iconlist_content_wrap\"><header class=\"entry-content-header\" aria-label=\"Icon: &lt;a href=&#039;#warum-sollte-man-auf-passwoerter-verzichten&#039; title=&#039;Why should you do without passwords?&#039;&gt;Why should you do without passwords?&lt;\/a&gt;\"><div class='av_iconlist_title iconlist_title_small'  itemprop=\"headline\" ><a href='#warum-sollte-man-auf-passwoerter-verzichten' title='Why should you do without passwords?'>Why should you do without passwords?<\/a><\/div><\/header><div class='iconlist_content'  itemprop=\"text\" ><\/div><\/div><footer class=\"entry-footer\"><\/footer><\/article><div class=\"iconlist-timeline\"><\/div><\/li>\n<li><div class='iconlist_icon av-md41t3-591a3ddfbe971ac00f95dea84b7f44d0 avia-font-fontello avia-iconfont avia-font-fontello'><span class='av-icon-char' data-av_icon='\ue806' data-av_iconfont='fontello' aria-hidden=\"true\"><\/span><\/div><article class=\"article-icon-entry\"  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"iconlist_content_wrap\"><header class=\"entry-content-header\" aria-label=\"Icon: &lt;a href=&#039;#passwortlose-authentifizierung&#039; title=&#039;How does passwordless authentication work? &#039;&gt;How does passwordless authentication work? &lt;\/a&gt;\"><div class='av_iconlist_title iconlist_title_small'  itemprop=\"headline\" ><a href='#passwortlose-authentifizierung' title='How does passwordless authentication work? '>How does passwordless authentication work? <\/a><\/div><\/header><div class='iconlist_content'  itemprop=\"text\" ><ul style=\"font-size: 16px;\">\n<li><a href=\"#vorteile-passwortlose-authentifizierung\">The advantages of passwordless authentication<\/a><\/li>\n<li><a href=\"#verfahren-der-passwortlosen-authentifizierung\">Which methods of passwordless authentication are available?<\/a><\/li>\n<\/ul>\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><\/article><div class=\"iconlist-timeline\"><\/div><\/li>\n<li><div class='iconlist_icon av-e4fys7-78c9ef087e57d9d97dbecf932cb42f19 avia-font-fontello avia-iconfont avia-font-fontello'><span class='av-icon-char' data-av_icon='\ue806' data-av_iconfont='fontello' aria-hidden=\"true\"><\/span><\/div><article class=\"article-icon-entry\"  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"iconlist_content_wrap\"><header class=\"entry-content-header\" aria-label=\"Icon: &lt;a href=&#039;#fido2&#039; title=&#039;What is FIDO 2?&#039;&gt;What is FIDO 2?&lt;\/a&gt;\"><div class='av_iconlist_title iconlist_title_small'  itemprop=\"headline\" ><a href='#fido2' title='What is FIDO 2?'>What is FIDO 2?<\/a><\/div><\/header><div class='iconlist_content'  itemprop=\"text\" ><ul style=\"font-size: 16px;\">\n<li><a href=\"#funktionsweise-fido2\">How does FIDO 2 work?<\/a><\/li>\n<li><a href=\"#voraussetzungen-fido2\">What are the requirements for using FIDO2 authentication?<\/a><\/li>\n<li><a href=\"#merkmale-fido2\">The most important features of FIDO2?<\/a><\/li>\n<li><a href=\"#vorteile-fido2\">The advantages of FIDO2 over password authentication?<\/a><\/li>\n<li><a href=\"#produkte-fido2\">Products for the use of the FIDO-2 standard<\/a><\/li>\n<\/ul>\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><\/article><div class=\"iconlist-timeline\"><\/div><\/li>\n<li><div class='iconlist_icon av-4hcw93-855a47a27585a0fd358d3e830c953665 avia-font-fontello avia-iconfont avia-font-fontello'><span class='av-icon-char' data-av_icon='\ue806' data-av_iconfont='fontello' aria-hidden=\"true\"><\/span><\/div><article class=\"article-icon-entry\"  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"iconlist_content_wrap\"><header class=\"entry-content-header\" aria-label=\"Icon: &lt;a href=&#039;#webauthn&#039; title=&#039;What is Webauthn?&#039;&gt;What is Webauthn?&lt;\/a&gt;\"><div class='av_iconlist_title iconlist_title_small'  itemprop=\"headline\" ><a href='#webauthn' title='What is Webauthn?'>What is Webauthn?<\/a><\/div><\/header><div class='iconlist_content'  itemprop=\"text\" ><ul style=\"font-size: 16px;\">\n<li><a href=\"#funktionsweise-webauthn\">How Webauthn works<\/a><\/li>\n<\/ul>\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><\/article><div class=\"iconlist-timeline\"><\/div><\/li>\n<li><div class='iconlist_icon av-45gvav-aef241ccd303cd8b62c2434ac50fdf8c avia-font-fontello avia-iconfont avia-font-fontello'><span class='av-icon-char' data-av_icon='\ue806' data-av_iconfont='fontello' aria-hidden=\"true\"><\/span><\/div><article class=\"article-icon-entry av-iconlist-empty\"  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"iconlist_content_wrap\"><header class=\"entry-content-header\" aria-label=\"Icon: &lt;a href=&#039;#ctap&#039; title=&#039;What&#039;s CTAP?&#039;&gt;What&#039;s CTAP?&lt;\/a&gt;\"><div class='av_iconlist_title iconlist_title_small'  itemprop=\"headline\" ><a href='#ctap' title='What&#039;s CTAP?'>What's CTAP?<\/a><\/div><\/header><div class='iconlist_content'  itemprop=\"text\" ><\/div><\/div><footer class=\"entry-footer\"><\/footer><\/article><div class=\"iconlist-timeline\"><\/div><\/li>\n<li><div class='iconlist_icon av-3pz653-7acc00133c45e08736bab6cd6cf0ad3e avia-font-fontello avia-iconfont avia-font-fontello'><span class='av-icon-char' data-av_icon='\ue806' data-av_iconfont='fontello' aria-hidden=\"true\"><\/span><\/div><article class=\"article-icon-entry av-iconlist-empty\"  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"iconlist_content_wrap\"><header class=\"entry-content-header\" aria-label=\"Icon: &lt;a href=&#039;#umsetzung-in-robin-data&#039; title=&#039;Implementation in the Robin Data Software&#039;&gt;Implementation in the Robin Data Software&lt;\/a&gt;\"><div class='av_iconlist_title iconlist_title_small'  itemprop=\"headline\" ><a href='#umsetzung-in-robin-data' title='Implementation in the Robin Data Software'>Implementation in the Robin Data Software<\/a><\/div><\/header><div class='iconlist_content'  itemprop=\"text\" ><\/div><\/div><footer class=\"entry-footer\"><\/footer><\/article><div class=\"iconlist-timeline\"><\/div><\/li>\n<li><div class='iconlist_icon av-bwqo13-af86338329b922f540a72ff1cb6a4e51 avia-font-fontello avia-iconfont avia-font-fontello'><span class='av-icon-char' data-av_icon='\ue806' data-av_iconfont='fontello' aria-hidden=\"true\"><\/span><\/div><article class=\"article-icon-entry av-iconlist-empty\"  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"iconlist_content_wrap\"><header class=\"entry-content-header\" aria-label=\"Icon: &lt;a href=&#039;#fazit&#039; title=&#039;Conclusion&#039;&gt;Conclusion&lt;\/a&gt;\"><div class='av_iconlist_title iconlist_title_small'  itemprop=\"headline\" ><a href='#fazit' title='Conclusion'>Conclusion<\/a><\/div><\/header><div class='iconlist_content'  itemprop=\"text\" ><\/div><\/div><footer class=\"entry-footer\"><\/footer><\/article><div class=\"iconlist-timeline\"><\/div><\/li>\n<\/ul><\/div><\/p><\/div>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-knsycbat-9a8ee9b889c9266f7682ece6f7600523\">\n#top .hr.hr-invisible.av-knsycbat-9a8ee9b889c9266f7682ece6f7600523{\nheight:15px;\n}\n<\/style>\n<div  class='hr av-knsycbat-9a8ee9b889c9266f7682ece6f7600523 hr-invisible  avia-builder-el-14  el_after_av_one_full  el_before_av_heading'><span class='hr-inner'><span class=\"hr-inner-style\"><\/span><\/span><\/div>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-4o7dpj-38287d74b89c1452fd3f3e286ddb742d\">\n#top .av-special-heading.av-4o7dpj-38287d74b89c1452fd3f3e286ddb742d{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-4o7dpj-38287d74b89c1452fd3f3e286ddb742d .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-4o7dpj-38287d74b89c1452fd3f3e286ddb742d .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  id=\"warum-sollte-man-auf-passwoerter-verzichten\"  class='av-special-heading av-4o7dpj-38287d74b89c1452fd3f3e286ddb742d av-special-heading-h2 blockquote modern-quote  avia-builder-el-15  el_after_av_hr  el_before_av_textblock'><h2 class='av-special-heading-tag'  itemprop=\"headline\"  > Why should you do without passwords?<\/h2><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div>\n<section  class='av_textblock_section av-mo4cs7-02227768af4f2915b17b42af30460b65'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p>There are several reasons for the decision not to use passwords:<\/p>\n<ul>\n<li>The majority of <strong>weak passwords<\/strong> <strong>used<\/strong>which users can remember (on the top places: \"Password\", \"123456\")<\/li>\n<li><strong>One password is usually used for multiple accounts<\/strong> is used: If third parties have gained access to the account via this password, they can log in to other accounts.<\/li>\n<li>Passwords <strong>use unsafe methods<\/strong> MD5 (Rainbowtable attack)<\/li>\n<li>Even complex <strong>Passwords are hackable<\/strong>: Hackers can crack passwords via various methods such as keylogging or phishing, even if users follow regulations, because the standard password requirements (e.g. 8 characters, 1 uppercase letter, 1 number) are no hurdle for software and algorithms and are combined within seconds<\/li>\n<li><strong>Password managers are vulnerable<\/strong> because even the initial password for logging into the password manager is hackable or can be chosen too weak by the user<\/li>\n<li>2-factor authentication is a good option,<strong> but not as secure as passwordless authentication, <\/strong>because here too <span data-offset-key=\"1q4rh-0-0\">Phishing allow third parties unauthorised access to your applications,\u00a0<\/span>but the procedure is at least more secure than the verification via a password.<\/li>\n<li>Password management is a <strong>time and cost factor in IT departments<\/strong> because passwords must be kept secure to reduce the risk of data protection mishaps, and employee inquiries about forgotten passwords must be resolved manually by resetting them.<\/li>\n<\/ul>\n<\/div><\/section>\n<div id='avia-messagebox-' class='avia_message_box av_notification av-knsi4914-2dc2009420568903b44100fc9e13aea1 avia-color-blue avia-size-large avia-icon_select-yes avia-border-  avia-builder-el-17  el_after_av_textblock  el_before_av_textblock' ><span class='avia_message_box_title' >Info<\/span><div class=\"avia_message_box_content\"><span class='avia_message_box_icon avia-iconfont avia-font-entypo-fontello' data-av_icon='\ue83e' data-av_iconfont='entypo-fontello' ><\/span><p>81 % of data breaches are based on weak or compromised passwords<\/p>\n<\/div><\/div>\n<section  class='av_textblock_section av-mo4cs7-23-b04d94e5a65b32f49de7cdd3fd04d047'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p style=\"text-align: center; font-size: 12px;\">2019, Data Breach Investigations Report, Verizon<\/p>\n<\/div><\/section>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-knrryvj4-4accd0d1cea0de3677d6b50b0e8d9f24\">\n.flex_column.av-knrryvj4-4accd0d1cea0de3677d6b50b0e8d9f24{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  id=\"passwortlose-authentifizierung\"  class='flex_column av-knrryvj4-4accd0d1cea0de3677d6b50b0e8d9f24 av_one_full  avia-builder-el-19  el_after_av_textblock  el_before_av_one_third  first flex_column_div av-zero-column-padding  column-top-margin'     ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-61j56f-36909f377dc1ddcb93354b42617bd0e2\">\n#top .av-special-heading.av-61j56f-36909f377dc1ddcb93354b42617bd0e2{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-61j56f-36909f377dc1ddcb93354b42617bd0e2 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-61j56f-36909f377dc1ddcb93354b42617bd0e2 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-61j56f-36909f377dc1ddcb93354b42617bd0e2 av-special-heading-h2 blockquote modern-quote  avia-builder-el-20  el_before_av_textblock  avia-builder-el-first'><h2 class='av-special-heading-tag'  itemprop=\"headline\"  >How does passwordless authentication work?<\/h2><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-q0oms7-478076816db22fc177686184a2386abc'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p>Simply put, passwordless authentication is a method of verifying the user's identity without using a password. Thus, the most significant difference from password-based authentication is that no stored secrets are used to access systems in order to verify the user's identity.<\/p>\n<p>With passwordless authentication, a key pair (a so-called \"credential\") is generated. This key pair always consists of a private and a public key. However, the public key functions more as a (public) lock that can only be opened with the private key. The combination of key and lock is unique per application and this increases the data security enormously.<\/p>\n<p>Users who want to log in via passwordless authentication need either an \"external authenticator\" (e.g. a hardware token) or an \"internal authenticator\" (e.g. a fingerprint) to generate the key pair of private key and public lock. When the user logs in to a system, the user keeps the private key and the public key (or public lock) is sent to the system. The system the user wants to log in to uses the public key to decrypt the private key. If the encryption and decryption sequence works - when the private key fits into the public lock - it is verified that the user is also the owner of the private key. The login is successful.<\/p>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-482qxj-fe7f455ffdd742d3e4b5cf5e7839b7dd\">\n#top .av-special-heading.av-482qxj-fe7f455ffdd742d3e4b5cf5e7839b7dd{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-482qxj-fe7f455ffdd742d3e4b5cf5e7839b7dd .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-482qxj-fe7f455ffdd742d3e4b5cf5e7839b7dd .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  id=\"vorteile-passwortlose-authentifizierung\"  class='av-special-heading av-482qxj-fe7f455ffdd742d3e4b5cf5e7839b7dd av-special-heading-h3 blockquote modern-quote  avia-builder-el-22  el_after_av_textblock  el_before_av_textblock'><h3 class='av-special-heading-tag'  itemprop=\"headline\"  >The advantages of passwordless authentication<\/h3><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-q0oms7-21-8de75e3ffcfe97d639622edb65c4a662'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p>Passwordless authentication is more contemporary, optimised for mobile devices, more convenient and also saves costs compared to using passwords.<\/p>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-knsjtg72-e764ecad01c8e960f85dbad1eae73e04\">\n.iconbox.av-knsjtg72-e764ecad01c8e960f85dbad1eae73e04 .iconbox_icon{\ncolor:#127db3;\n}\n.iconbox.av-knsjtg72-e764ecad01c8e960f85dbad1eae73e04 .iconbox_icon.avia-svg-icon svg:first-child{\nfill:#127db3;\nstroke:#127db3;\n}\n<\/style>\n<article  class='iconbox iconbox_left_content av-knsjtg72-e764ecad01c8e960f85dbad1eae73e04  avia-builder-el-24  el_after_av_textblock  el_before_av_icon_box'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='iconbox_icon heading-color avia-iconfont avia-font-fontello' data-av_icon='\uf132' data-av_iconfont='fontello'  ><\/div><div class=\"iconbox_content\"><header class=\"entry-content-header\" aria-label=\"Icon: Increased security by dispensing with passwords\"><h4 class='iconbox_content_title'  itemprop=\"headline\" >Increased security by eliminating passwords<\/h4><\/header><div class='iconbox_content_container'  itemprop=\"text\" ><p>Despite the BSI's advice on the use of passwords, user-controlled passwords always represent a risk and are vulnerable to attacks. This is because the requirements for passwords must not only be known to the user, but must also be adhered to by the user himself and at all times. If the password falls out of the login process, the risk or vulnerability for phishing attacks, password loss or password reuse is reduced and IT security is increased.<\/p>\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><\/article><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-knsjtg72-19-5a5b960bd0f3fc75bd4060a520a37a0e\">\n.iconbox.av-knsjtg72-19-5a5b960bd0f3fc75bd4060a520a37a0e .iconbox_icon{\ncolor:#127db3;\n}\n.iconbox.av-knsjtg72-19-5a5b960bd0f3fc75bd4060a520a37a0e .iconbox_icon.avia-svg-icon svg:first-child{\nfill:#127db3;\nstroke:#127db3;\n}\n<\/style>\n<article  class='iconbox iconbox_left_content av-knsjtg72-19-5a5b960bd0f3fc75bd4060a520a37a0e  avia-builder-el-25  el_after_av_icon_box  el_before_av_icon_box'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='iconbox_icon heading-color avia-iconfont avia-font-entypo-fontello' data-av_icon='\ue8da' data-av_iconfont='entypo-fontello'  ><\/div><div class=\"iconbox_content\"><header class=\"entry-content-header\" aria-label=\"Icon: Convenient authentication via all channels\"><h4 class='iconbox_content_title'  itemprop=\"headline\" >Convenient authentication via all channels<\/h4><\/header><div class='iconbox_content_container'  itemprop=\"text\" ><p>The use of traditional passwords implies an administrative burden on users, is outdated, and is not optimised for use on mobile devices (e.g., logging into the Apple store via fingerprint). Passwordless authentication is a far more efficient option and allows users to quickly log in to applications or devices.<\/p>\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><\/article><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-knsjtg72-18-4428d836d571b3d551de3559d84968af\">\n.iconbox.av-knsjtg72-18-4428d836d571b3d551de3559d84968af .iconbox_icon{\ncolor:#127db3;\n}\n.iconbox.av-knsjtg72-18-4428d836d571b3d551de3559d84968af .iconbox_icon.avia-svg-icon svg:first-child{\nfill:#127db3;\nstroke:#127db3;\n}\n<\/style>\n<article  class='iconbox iconbox_left_content av-knsjtg72-18-4428d836d571b3d551de3559d84968af  avia-builder-el-26  el_after_av_icon_box  el_before_av_icon_box'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='iconbox_icon heading-color avia-iconfont avia-font-entypo-fontello' data-av_icon='\ue8dd' data-av_iconfont='entypo-fontello'  ><\/div><div class=\"iconbox_content\"><header class=\"entry-content-header\" aria-label=\"Icon: Lean registration processes improve user experience\"><h4 class='iconbox_content_title'  itemprop=\"headline\" >Streamlined registration processes improve user experience<\/h4><\/header><div class='iconbox_content_container'  itemprop=\"text\" ><p style=\"text-align: left;\">Registration or login via a password always means a certain hurdle on the user side. By using passwordless authentication methods, this hurdle is removed and users can access business e-mails or other applications without a password, for example.<\/p>\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><\/article><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-knsjtg72-17-6f12e0947fb900be3be8ad5b83d890c4\">\n.iconbox.av-knsjtg72-17-6f12e0947fb900be3be8ad5b83d890c4 .iconbox_icon{\ncolor:#127db3;\n}\n.iconbox.av-knsjtg72-17-6f12e0947fb900be3be8ad5b83d890c4 .iconbox_icon.avia-svg-icon svg:first-child{\nfill:#127db3;\nstroke:#127db3;\n}\n<\/style>\n<article  class='iconbox iconbox_left_content av-knsjtg72-17-6f12e0947fb900be3be8ad5b83d890c4  avia-builder-el-27  el_after_av_icon_box  el_before_av_heading'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='iconbox_icon heading-color avia-iconfont avia-font-fontello' data-av_icon='\uf075' data-av_iconfont='fontello'  ><\/div><div class=\"iconbox_content\"><header class=\"entry-content-header\" aria-label=\"Icon: Cost savings by eliminating passwords\"><h4 class='iconbox_content_title'  itemprop=\"headline\" >Cost savings due to omission of passwords<\/h4><\/header><div class='iconbox_content_container'  itemprop=\"text\" ><p>The administration of passwords, as well as the changing of passwords to continuously generate their security, takes time and is often managed by IT teams. So does the password forgetting process, should users forget their password despite careful storage. Using passwordless authentication eliminates this cost.<\/p>\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><\/article><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-2tv9hj-7dbe733ab0adc0b22ff6761acb457792\">\n#top .av-special-heading.av-2tv9hj-7dbe733ab0adc0b22ff6761acb457792{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-2tv9hj-7dbe733ab0adc0b22ff6761acb457792 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-2tv9hj-7dbe733ab0adc0b22ff6761acb457792 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  id=\"verfahren-der-passwortlosen-authentifizierung\"  class='av-special-heading av-2tv9hj-7dbe733ab0adc0b22ff6761acb457792 av-special-heading-h3 blockquote modern-quote  avia-builder-el-28  el_after_av_icon_box  el_before_av_textblock'><h3 class='av-special-heading-tag'  itemprop=\"headline\"  >Which methods of passwordless authentication are available?<\/h3><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-q0oms7-20-8dcef46eddfbd49f2ae46e12ff4a901a'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p>There are now numerous passwordless authentication methods, the best known of which are TouchID, facial recognition and pattern recognition. These methods have been used as standard on mobile devices for years.<\/p>\n<\/div><\/section><\/p><\/div>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-esx3gn-ba032ace78d81c91b09d09f42a75527c\">\n.flex_column.av-esx3gn-ba032ace78d81c91b09d09f42a75527c{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-esx3gn-ba032ace78d81c91b09d09f42a75527c av_one_third  avia-builder-el-30  el_after_av_one_full  el_before_av_one_third  first flex_column_div av-zero-column-padding  column-top-margin'     ><style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-knsjtg72-16-9428df26d6be6d83f7839b046100dae0\">\n.iconbox.av-knsjtg72-16-9428df26d6be6d83f7839b046100dae0 .iconbox_icon{\nbackground-color:#ffffff;\ncolor:#127db3;\n}\n.iconbox.av-knsjtg72-16-9428df26d6be6d83f7839b046100dae0 .iconbox_icon.avia-svg-icon svg:first-child{\nfill:#127db3;\nstroke:#127db3;\n}\n<\/style>\n<article  class='iconbox iconbox_top av-knsjtg72-16-9428df26d6be6d83f7839b046100dae0  avia-builder-el-31  avia-builder-el-no-sibling  main_color'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"iconbox_content\"><header class=\"entry-content-header\" aria-label=\"Icon: Fingerprint\"><div class='iconbox_icon heading-color avia-iconfont avia-font-entypo-fontello' data-av_icon='\ue82b' data-av_iconfont='entypo-fontello'  ><\/div><h4 class='iconbox_content_title'  itemprop=\"headline\" >Fingerprint<\/h4><\/header><div class='iconbox_content_container'  itemprop=\"text\" ><\/div><\/div><footer class=\"entry-footer\"><\/footer><\/article><\/div>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-bz21kn-24b683f21572f79ce425479b7bb4e05d\">\n.flex_column.av-bz21kn-24b683f21572f79ce425479b7bb4e05d{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-bz21kn-24b683f21572f79ce425479b7bb4e05d av_one_third  avia-builder-el-32  el_after_av_one_third  el_before_av_one_third  flex_column_div av-zero-column-padding  column-top-margin'     ><style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-knsjtg72-15-1139b4d3853f00133492d14b53b4b0a3\">\n.iconbox.av-knsjtg72-15-1139b4d3853f00133492d14b53b4b0a3 .iconbox_icon{\nbackground-color:#ffffff;\ncolor:#127db3;\n}\n.iconbox.av-knsjtg72-15-1139b4d3853f00133492d14b53b4b0a3 .iconbox_icon.avia-svg-icon svg:first-child{\nfill:#127db3;\nstroke:#127db3;\n}\n<\/style>\n<article  class='iconbox iconbox_top av-knsjtg72-15-1139b4d3853f00133492d14b53b4b0a3  avia-builder-el-33  avia-builder-el-no-sibling  main_color'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"iconbox_content\"><header class=\"entry-content-header\" aria-label=\"Icon: Face recognition\"><div class='iconbox_icon heading-color avia-iconfont avia-font-entypo-fontello' data-av_icon='\ue80a' data-av_iconfont='entypo-fontello'  ><\/div><h4 class='iconbox_content_title'  itemprop=\"headline\" >Facial recognition<\/h4><\/header><div class='iconbox_content_container'  itemprop=\"text\" ><\/div><\/div><footer class=\"entry-footer\"><\/footer><\/article><\/div>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-bgmoef-552b44bc77fc049cb22ba7a9ba07355a\">\n.flex_column.av-bgmoef-552b44bc77fc049cb22ba7a9ba07355a{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-bgmoef-552b44bc77fc049cb22ba7a9ba07355a av_one_third  avia-builder-el-34  el_after_av_one_third  el_before_av_one_third  flex_column_div av-zero-column-padding  column-top-margin'     ><style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-knsjtg72-14-8a60d981209c811ca1b46fde24728ef7\">\n.iconbox.av-knsjtg72-14-8a60d981209c811ca1b46fde24728ef7 .iconbox_icon{\nbackground-color:#ffffff;\ncolor:#127db3;\n}\n.iconbox.av-knsjtg72-14-8a60d981209c811ca1b46fde24728ef7 .iconbox_icon.avia-svg-icon svg:first-child{\nfill:#127db3;\nstroke:#127db3;\n}\n<\/style>\n<article  class='iconbox iconbox_top av-knsjtg72-14-8a60d981209c811ca1b46fde24728ef7  avia-builder-el-35  avia-builder-el-no-sibling  main_color'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"iconbox_content\"><header class=\"entry-content-header\" aria-label=\"Icon: Pattern recognition\"><div class='iconbox_icon heading-color avia-iconfont avia-font-entypo-fontello' data-av_icon='\ue8d9' data-av_iconfont='entypo-fontello'  ><\/div><h4 class='iconbox_content_title'  itemprop=\"headline\" >Pattern Recognition<\/h4><\/header><div class='iconbox_content_container'  itemprop=\"text\" ><\/div><\/div><footer class=\"entry-footer\"><\/footer><\/article><\/div>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-9nwn87-d8ec34e870e78bc6361fa392e0784db3\">\n.flex_column.av-9nwn87-d8ec34e870e78bc6361fa392e0784db3{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-9nwn87-d8ec34e870e78bc6361fa392e0784db3 av_one_third  avia-builder-el-36  el_after_av_one_third  el_before_av_one_third  first flex_column_div av-zero-column-padding  column-top-margin'     ><style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-knsjtg72-13-2a157c1ca418d3848afa0f3e3b1dee68\">\n.iconbox.av-knsjtg72-13-2a157c1ca418d3848afa0f3e3b1dee68 .iconbox_icon{\nbackground-color:#ffffff;\ncolor:#127db3;\n}\n.iconbox.av-knsjtg72-13-2a157c1ca418d3848afa0f3e3b1dee68 .iconbox_icon.avia-svg-icon svg:first-child{\nfill:#127db3;\nstroke:#127db3;\n}\n<\/style>\n<article  class='iconbox iconbox_top av-knsjtg72-13-2a157c1ca418d3848afa0f3e3b1dee68  avia-builder-el-37  avia-builder-el-no-sibling  main_color'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"iconbox_content\"><header class=\"entry-content-header\" aria-label=\"Icon: Voice recognition\"><div class='iconbox_icon heading-color avia-iconfont avia-font-entypo-fontello' data-av_icon='\ue85e' data-av_iconfont='entypo-fontello'  ><\/div><h4 class='iconbox_content_title'  itemprop=\"headline\" >Voice Recognition<\/h4><\/header><div class='iconbox_content_container'  itemprop=\"text\" ><\/div><\/div><footer class=\"entry-footer\"><\/footer><\/article><\/div>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-89al3b-be570675772864034e3f2b547c37c48b\">\n.flex_column.av-89al3b-be570675772864034e3f2b547c37c48b{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-89al3b-be570675772864034e3f2b547c37c48b av_one_third  avia-builder-el-38  el_after_av_one_third  el_before_av_one_third  flex_column_div av-zero-column-padding  column-top-margin'     ><style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-knsjtg72-12-052f062c0b01a4dfd152269d8d3412ff\">\n.iconbox.av-knsjtg72-12-052f062c0b01a4dfd152269d8d3412ff .iconbox_icon{\nbackground-color:#ffffff;\ncolor:#127db3;\n}\n.iconbox.av-knsjtg72-12-052f062c0b01a4dfd152269d8d3412ff .iconbox_icon.avia-svg-icon svg:first-child{\nfill:#127db3;\nstroke:#127db3;\n}\n<\/style>\n<article  class='iconbox iconbox_top av-knsjtg72-12-052f062c0b01a4dfd152269d8d3412ff  avia-builder-el-39  avia-builder-el-no-sibling  main_color'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"iconbox_content\"><header class=\"entry-content-header\" aria-label=\"Icon: SMS\"><div class='iconbox_icon heading-color avia-iconfont avia-font-entypo-fontello' data-av_icon='\ue8ac' data-av_iconfont='entypo-fontello'  ><\/div><h4 class='iconbox_content_title'  itemprop=\"headline\" >SMS<\/h4><\/header><div class='iconbox_content_container'  itemprop=\"text\" ><\/div><\/div><footer class=\"entry-footer\"><\/footer><\/article><\/div>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-6ihzx3-5e2816b8afda52355fee84d49b173d4c\">\n.flex_column.av-6ihzx3-5e2816b8afda52355fee84d49b173d4c{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-6ihzx3-5e2816b8afda52355fee84d49b173d4c av_one_third  avia-builder-el-40  el_after_av_one_third  el_before_av_one_third  flex_column_div av-zero-column-padding  column-top-margin'     ><style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-knsjtg72-11-91e8a14b10ced896e0da3167ebab5cf8\">\n.iconbox.av-knsjtg72-11-91e8a14b10ced896e0da3167ebab5cf8 .iconbox_icon{\nbackground-color:#ffffff;\ncolor:#127db3;\n}\n.iconbox.av-knsjtg72-11-91e8a14b10ced896e0da3167ebab5cf8 .iconbox_icon.avia-svg-icon svg:first-child{\nfill:#127db3;\nstroke:#127db3;\n}\n<\/style>\n<article  class='iconbox iconbox_top av-knsjtg72-11-91e8a14b10ced896e0da3167ebab5cf8  avia-builder-el-41  avia-builder-el-no-sibling  main_color'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"iconbox_content\"><header class=\"entry-content-header\" aria-label=\"Icon: E-mail\"><div class='iconbox_icon heading-color avia-iconfont avia-font-entypo-fontello' data-av_icon='\ue805' data-av_iconfont='entypo-fontello'  ><\/div><h4 class='iconbox_content_title'  itemprop=\"headline\" >E-mail<\/h4><\/header><div class='iconbox_content_container'  itemprop=\"text\" ><\/div><\/div><footer class=\"entry-footer\"><\/footer><\/article><\/div>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-4g611j-a262ecbc1cd9863aef0e46361170161d\">\n.flex_column.av-4g611j-a262ecbc1cd9863aef0e46361170161d{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-4g611j-a262ecbc1cd9863aef0e46361170161d av_one_third  avia-builder-el-42  el_after_av_one_third  el_before_av_one_third  first flex_column_div av-zero-column-padding  column-top-margin'     ><style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-knsjtg72-10-c6fe8e92ef64b11acf3fa4b95a61e915\">\n.iconbox.av-knsjtg72-10-c6fe8e92ef64b11acf3fa4b95a61e915 .iconbox_icon{\nbackground-color:#ffffff;\ncolor:#127db3;\n}\n.iconbox.av-knsjtg72-10-c6fe8e92ef64b11acf3fa4b95a61e915 .iconbox_icon.avia-svg-icon svg:first-child{\nfill:#127db3;\nstroke:#127db3;\n}\n<\/style>\n<article  class='iconbox iconbox_top av-knsjtg72-10-c6fe8e92ef64b11acf3fa4b95a61e915  avia-builder-el-43  avia-builder-el-no-sibling  main_color'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"iconbox_content\"><header class=\"entry-content-header\" aria-label=\"Icon: Social Login\"><div class='iconbox_icon heading-color avia-iconfont avia-font-entypo-fontello' data-av_icon='\ue8f3' data-av_iconfont='entypo-fontello'  ><\/div><h4 class='iconbox_content_title'  itemprop=\"headline\" >Social Login<\/h4><\/header><div class='iconbox_content_container'  itemprop=\"text\" ><\/div><\/div><footer class=\"entry-footer\"><\/footer><\/article><\/div>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-2ixj3r-fd118839d28207c93eb09cf719ebe359\">\n.flex_column.av-2ixj3r-fd118839d28207c93eb09cf719ebe359{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-2ixj3r-fd118839d28207c93eb09cf719ebe359 av_one_third  avia-builder-el-44  el_after_av_one_third  el_before_av_one_third  flex_column_div av-zero-column-padding  column-top-margin'     ><style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-knsjtg72-9-e7d54fb628860253e6986e5c077c21d7\">\n.iconbox.av-knsjtg72-9-e7d54fb628860253e6986e5c077c21d7 .iconbox_icon{\nbackground-color:#ffffff;\ncolor:#127db3;\n}\n.iconbox.av-knsjtg72-9-e7d54fb628860253e6986e5c077c21d7 .iconbox_icon.avia-svg-icon svg:first-child{\nfill:#127db3;\nstroke:#127db3;\n}\n<\/style>\n<article  class='iconbox iconbox_top av-knsjtg72-9-e7d54fb628860253e6986e5c077c21d7  avia-builder-el-45  avia-builder-el-no-sibling  main_color'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"iconbox_content\"><header class=\"entry-content-header\" aria-label=\"Icon: WebAuthn\"><div class='iconbox_icon heading-color avia-iconfont avia-font-entypo-fontello' data-av_icon='\ue855' data-av_iconfont='entypo-fontello'  ><\/div><h4 class='iconbox_content_title'  itemprop=\"headline\" >WebAuthn<\/h4><\/header><div class='iconbox_content_container'  itemprop=\"text\" ><\/div><\/div><footer class=\"entry-footer\"><\/footer><\/article><\/div>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-2ixj3r-8-0f248486ad29e94cc5ffd94d8d3adae5\">\n.flex_column.av-2ixj3r-8-0f248486ad29e94cc5ffd94d8d3adae5{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-2ixj3r-8-0f248486ad29e94cc5ffd94d8d3adae5 av_one_third  avia-builder-el-46  el_after_av_one_third  el_before_av_one_full  flex_column_div av-zero-column-padding  column-top-margin'     ><\/div>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-knrs2sgb-61db6a6a5d0ee115d8f65afc1227ca41\">\n.flex_column.av-knrs2sgb-61db6a6a5d0ee115d8f65afc1227ca41{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  id=\"fido2\"  class='flex_column av-knrs2sgb-61db6a6a5d0ee115d8f65afc1227ca41 av_one_full  avia-builder-el-47  el_after_av_one_third  el_before_av_one_full  first flex_column_div av-zero-column-padding  column-top-margin'     ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-8no7cn-46bd82c639bcf3e63b67cfb05a46d439\">\n#top .av-special-heading.av-8no7cn-46bd82c639bcf3e63b67cfb05a46d439{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-8no7cn-46bd82c639bcf3e63b67cfb05a46d439 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-8no7cn-46bd82c639bcf3e63b67cfb05a46d439 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-8no7cn-46bd82c639bcf3e63b67cfb05a46d439 av-special-heading-h2 blockquote modern-quote  avia-builder-el-48  el_before_av_textblock  avia-builder-el-first'><h2 class='av-special-heading-tag'  itemprop=\"headline\"  >What is FIDO2?<\/h2><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-94kp7r-1eb2b728640a8bfe5071fa4949065c43'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p>The abbreviation FIDO2 stands for Fast IDentity Online and unites the joint work on a password successor by Google, Microsoft, Amazon, Paypal, Facebook, Visa and Mastercard. Since March 2019, the World Wide Web Consortium (W3C) has been working on a \"web standard for secure, passwordless logins\". This still quite young web standard is FIDO2 and is already used by browsers (Edge, Chrome, Firefox, Safari), operating systems (Android, Windows, iOS) and web services (Office 365).<\/p>\n<\/div><\/section><br \/>\n<div id='avia-messagebox-' class='avia_message_box av_notification av-knsi4914-22-663c360ab92b2b84cb6ee3dab2eb8076 avia-color-blue avia-size-large avia-icon_select-yes avia-border-  avia-builder-el-50  el_after_av_textblock  el_before_av_heading' ><span class='avia_message_box_title' >Info<\/span><div class=\"avia_message_box_content\"><span class='avia_message_box_icon avia-iconfont avia-font-entypo-fontello' data-av_icon='\ue81f' data-av_iconfont='entypo-fontello' ><\/span><p>The FIDO Alliance is a non-commercial association of many companies (PayPal, Google, etc.) and develops open and license-free standards for secure, worldwide authentication on the Internet, such as the FIDO2 standard.<\/p>\n<\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-s5dd3-11122ab567b812325e23613d7a8eefb2\">\n#top .av-special-heading.av-s5dd3-11122ab567b812325e23613d7a8eefb2{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-s5dd3-11122ab567b812325e23613d7a8eefb2 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-s5dd3-11122ab567b812325e23613d7a8eefb2 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  id=\"funktionsweise-fido2\"  class='av-special-heading av-s5dd3-11122ab567b812325e23613d7a8eefb2 av-special-heading-h3 blockquote modern-quote  avia-builder-el-51  el_after_av_notification  el_before_av_image'><h3 class='av-special-heading-tag'  itemprop=\"headline\"  >How does FIDO2 work?<\/h3><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-knszqd84-01c56f5413fadb555d5e8ad43a63e7d3\">\n.avia-image-container.av-knszqd84-01c56f5413fadb555d5e8ad43a63e7d3 img.avia_image{\nbox-shadow:none;\n}\n.avia-image-container.av-knszqd84-01c56f5413fadb555d5e8ad43a63e7d3 .av-image-caption-overlay-center{\ncolor:#ffffff;\n}\n<\/style>\n<div  class='avia-image-container av-knszqd84-01c56f5413fadb555d5e8ad43a63e7d3 av-styling- avia-align-center  avia-builder-el-52  el_after_av_heading  el_before_av_textblock'   itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" ><div class=\"avia-image-container-inner\"><div class=\"avia-image-overlay-wrap\"><img decoding=\"async\" fetchpriority=\"high\" class='wp-image-9913 avia-img-lazy-loading-not-9913 avia_image' src=\"https:\/\/media.robin-data.io\/2021\/04\/22163845\/Plattform_FIDO2.svg\" alt='An illustration of the FIDO2 procedure. This procedure is explained in the following paragraph.' title='Passwordless authentication via FIDO2, Webauthn and CTAP'  height=\"1030\" width=\"1030\"  itemprop=\"thumbnailUrl\"  \/><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-89cxyv-5cf4300aff49e5a3a14f80086ef5cf52'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p>The FIDO2 standard an authentication protocol and method for passwordless login, which aims to make login via passwordless authentication more secure and easier. For this purpose, FIDO2 uses a combination of the <a href=\"#ctap\">Client to Authenticator Protocol (CTAP)<\/a> developed by the FIDO Alliance and the <a href=\"#webauth\">WebAuthn API<\/a> developed by W3C.<\/p>\n<p>The FIDO2 method is a challenge-response method that uses cryptographic key pairings called \"credential\" and factors such as biometric characteristics or hardware tokens. A private key is stored locally on the user's device and associated with an authentication factor such as a fingerprint. A public key is sent to the application the user wants to access. If these two keys match, the login is successful.<\/p>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-5gq9av-1e88120a65d50bcebda4ca58307acfc7\">\n#top .av-special-heading.av-5gq9av-1e88120a65d50bcebda4ca58307acfc7{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-5gq9av-1e88120a65d50bcebda4ca58307acfc7 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-5gq9av-1e88120a65d50bcebda4ca58307acfc7 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  id=\"voraussetzungen-fido2\"  class='av-special-heading av-5gq9av-1e88120a65d50bcebda4ca58307acfc7 av-special-heading-h3 blockquote modern-quote  avia-builder-el-54  el_after_av_textblock  el_before_av_textblock'><h3 class='av-special-heading-tag'  itemprop=\"headline\"  >What are the requirements for using FIDO2 authentication?<\/h3><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-5axa5j-baa4fd4c6c073557ba2d78b8f84bcc14'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p>The FIDO2 specification essentially needs the following components:<\/p>\n<ul>\n<li>The W3C standard <a href=\"#webauthn\">WebAuthn<\/a><\/li>\n<li>The <a href=\"#ctap\">Client to Authenticator Protocol (CTAP)<\/a><\/li>\n<\/ul>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-knszui8t-253645c3f09ca596a9b79131714dc250\">\n#top .av-special-heading.av-knszui8t-253645c3f09ca596a9b79131714dc250{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-knszui8t-253645c3f09ca596a9b79131714dc250 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-knszui8t-253645c3f09ca596a9b79131714dc250 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  id=\"merkmale-fido2\"  class='av-special-heading av-knszui8t-253645c3f09ca596a9b79131714dc250 av-special-heading-h3 blockquote modern-quote  avia-builder-el-56  el_after_av_textblock  el_before_av_textblock'><h3 class='av-special-heading-tag'  itemprop=\"headline\"  >The most important features of FIDO2<\/h3><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-gz3b6v-a6b13b71e5945c6ebdfbcbf2a090afbf'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><ul class=\"inf-list\">\n<li>The use of passwords for login is not necessary<\/li>\n<li>Users log in using biometrics, FIDO security token or mobile devices<\/li>\n<li class=\"inf-list__item\">The private key never leaves the user's device<\/li>\n<li>Only the public key for login is sent to applications<\/li>\n<li>The encryption\/final key sequence is done via the WebAuthn API<\/li>\n<\/ul>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-3t1c6v-d0404a6d6fc6d91e6ee41eea3c67e72c\">\n#top .av-special-heading.av-3t1c6v-d0404a6d6fc6d91e6ee41eea3c67e72c{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-3t1c6v-d0404a6d6fc6d91e6ee41eea3c67e72c .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-3t1c6v-d0404a6d6fc6d91e6ee41eea3c67e72c .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  id=\"vorteile-fido2\"  class='av-special-heading av-3t1c6v-d0404a6d6fc6d91e6ee41eea3c67e72c av-special-heading-h3 blockquote modern-quote  avia-builder-el-58  el_after_av_textblock  el_before_av_textblock'><h3 class='av-special-heading-tag'  itemprop=\"headline\"  >The advantages of FIDO2 over password authentication?<\/h3><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-49d1lj-faaed72412ebd31483a8535b0953ec6e'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><ul>\n<li>Enables authentication without password and cannot be corrupted<\/li>\n<li>Protects the private key from access<\/li>\n<li>Is a hardware\n<ul>\n<li>Cannot be hacked<\/li>\n<li>Can be personalised<\/li>\n<li>Can be used for any number of applications with one key<\/li>\n<li>Works completely without login features<\/li>\n<li>Is inexpensive (e.g. in contrast to a smartphone)<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-330p1z-a9e809c05b08827c96bbc4397d0df704\">\n#top .av-special-heading.av-330p1z-a9e809c05b08827c96bbc4397d0df704{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-330p1z-a9e809c05b08827c96bbc4397d0df704 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-330p1z-a9e809c05b08827c96bbc4397d0df704 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  id=\"produkte-fido2\"  class='av-special-heading av-330p1z-a9e809c05b08827c96bbc4397d0df704 av-special-heading-h3 blockquote modern-quote  avia-builder-el-60  el_after_av_textblock  el_before_av_textblock'><h3 class='av-special-heading-tag'  itemprop=\"headline\"  >Products for the use of the FIDO 2 standard<\/h3><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-49d1lj-5-d9b7d1cc76319fac924edb220fdfc6f2'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><ul>\n<li>Use of Fido-certified products: <a href=\"https:\/\/fidoalliance.org\/certification\/fido-certified-products\/\" target=\"_blank\" rel=\"noopener\">https:\/\/fidoalliance.org\/certification\/fido-certified-products\/<\/a><\/li>\n<li>Sample Security Keys: Yubikey, SoloKey, NitroKey...<\/li>\n<li>Biometrics: Touch ID, Face ID<\/li>\n<\/ul>\n<\/div><\/section><\/p><\/div>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-knrs17pe-6c0ca3f4e55ab15618c29394c0ccaa36\">\n.flex_column.av-knrs17pe-6c0ca3f4e55ab15618c29394c0ccaa36{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  id=\"webauth\"  class='flex_column av-knrs17pe-6c0ca3f4e55ab15618c29394c0ccaa36 av_one_full  avia-builder-el-62  el_after_av_one_full  el_before_av_one_full  first flex_column_div av-zero-column-padding  column-top-margin'     ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-6k1q3b-880919f1aaacca8aa3903c4dbf3704e5\">\n#top .av-special-heading.av-6k1q3b-880919f1aaacca8aa3903c4dbf3704e5{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-6k1q3b-880919f1aaacca8aa3903c4dbf3704e5 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-6k1q3b-880919f1aaacca8aa3903c4dbf3704e5 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-6k1q3b-880919f1aaacca8aa3903c4dbf3704e5 av-special-heading-h2 blockquote modern-quote  avia-builder-el-63  el_before_av_textblock  avia-builder-el-first'><h2 class='av-special-heading-tag'  itemprop=\"headline\"  >What is WebAuthn?<\/h2><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-j528kn-dae20e6fd3f7ac892d93b12894b22c82'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p>The WebAuthn is the short form of the Web Authentication API written by the W3C and FIDO with participation from Google, Mozilla, Microsoft, Yubico and others. This API allows servers to register and authenticate users using public key cryptography instead of a password.<\/p>\n<p>WebAuthn enables servers to integrate strong authenticators, which are already standard especially for mobile devices and will become more and more present in the future. Probably the best-known example is Apple's Touch ID for unlocking the iPhone. Instead of a password, a private-public key pair (\"credential\") is created for an application. The private key is stored securely on the user's device; a public key and randomly generated credential ID are sent to the server for storage. The server can then use this public key to prove the user's identity.<\/p>\n<p>The public key is not secret because it is virtually useless without the associated private key. The fact that the server does not receive a secret has far-reaching implications for the security of users and organizations. Databases are no longer as attractive to hackers because the public keys are not usable to them.<\/p>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-3xvt1z-54ac964fa9a1f9c1367e373a5b23602d\">\n#top .av-special-heading.av-3xvt1z-54ac964fa9a1f9c1367e373a5b23602d{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-3xvt1z-54ac964fa9a1f9c1367e373a5b23602d .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-3xvt1z-54ac964fa9a1f9c1367e373a5b23602d .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  id=\"funktionsweise-webauthn\"  class='av-special-heading av-3xvt1z-54ac964fa9a1f9c1367e373a5b23602d av-special-heading-h3 blockquote modern-quote  avia-builder-el-65  el_after_av_textblock  el_before_av_textblock'><h3 class='av-special-heading-tag'  itemprop=\"headline\"  >How WebAuthn works<\/h3><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-fh1kw7-0f25f2ee5e381434caa8baf081ee8d4c'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p>Basically, the WebAuthn protocol is responsible for the communication between the server and the user's system. The user registers once with his identity via the WebAuthn authentication method, on a local device or the application. Through this one-time process, the user's identity is linked to the device or application. Consequently, verification via a password is no longer necessary. If users use an external authenticator, such as a hardware token, it is sufficient to connect to the computer via USB. This works analogously with internal authenticators, e.g. by having the user scan the fingerprint on the end device. Each device and each application to which the user logs on from this point onwards uses individual key pairs.<\/p>\n<\/div><\/section><\/p><\/div>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-knrs21kp-2d69e777a2617750f64c54634f6f9109\">\n.flex_column.av-knrs21kp-2d69e777a2617750f64c54634f6f9109{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  id=\"ctap\"  class='flex_column av-knrs21kp-2d69e777a2617750f64c54634f6f9109 av_one_full  avia-builder-el-67  el_after_av_one_full  el_before_av_one_full  first flex_column_div av-zero-column-padding  column-top-margin'     ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-248zbr-218029e7e8d4f2ad62075c64dadffae4\">\n#top .av-special-heading.av-248zbr-218029e7e8d4f2ad62075c64dadffae4{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-248zbr-218029e7e8d4f2ad62075c64dadffae4 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-248zbr-218029e7e8d4f2ad62075c64dadffae4 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-248zbr-218029e7e8d4f2ad62075c64dadffae4 av-special-heading-h2 blockquote modern-quote  avia-builder-el-68  el_before_av_textblock  avia-builder-el-first'><h2 class='av-special-heading-tag'  itemprop=\"headline\"  >What's CTAP?<\/h2><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-brx9qv-bf907cda1dde3c0d53b435df6136f42e'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p>Within the FIDO 2 standard, external authenticators can also be used for identification. For this purpose, hardware tokens (via USB) or smartphones (via NFC \/ Bluetooth) are usually connected to the user's terminal device.<\/p>\n<p>The Client to Authenticator Protocol (CTAP) is responsible for the communication between the hardware token and the user's system. The CTAP2 protocol is used specifically for communication with WebAuth.<\/p>\n<p>The user-to-authenticator protocol ensures that there is successful authentication between the authenticator (e.g., the hardware token) and the user's terminal device or the application to which the user wants to log in.<\/p>\n<p><a href=\"https:\/\/fidoalliance.org\/specs\/fido-v2.0-rd-20170927\/fido-client-to-authenticator-protocol-v2.0-rd-20170927.html\" target=\"_blank\" rel=\"noopener\">For more information on CTAP, please visit the Fido Alliance website.<\/a><\/p>\n<div><\/div>\n<\/div><\/section><br \/>\n<div id='avia-messagebox-' class='avia_message_box av_notification av-knsi4914-6-ddf9fe8f4449ba16150c8681ef975360 avia-color-blue avia-size-large avia-icon_select-yes avia-border-  avia-builder-el-70  el_after_av_textblock  el_before_av_notification' ><span class='avia_message_box_title' >Info<\/span><div class=\"avia_message_box_content\"><span class='avia_message_box_icon avia-iconfont avia-font-entypo-fontello' data-av_icon='\ue81f' data-av_iconfont='entypo-fontello' ><\/span><p>CTAP is also known as Universal 2nd Factor (U2F) and refers to two-factor authentication.<\/p>\n<\/div><\/div><br \/>\n<div id='avia-messagebox-' class='avia_message_box av_notification av-knsi4914-4-1ef8e7aceb63c096bede384b14980de7 avia-color-blue avia-size-large avia-icon_select-yes avia-border-  avia-builder-el-71  el_after_av_notification  avia-builder-el-last' ><span class='avia_message_box_title' >Info<\/span><div class=\"avia_message_box_content\"><span class='avia_message_box_icon avia-iconfont avia-font-entypo-fontello' data-av_icon='\ue81f' data-av_iconfont='entypo-fontello' ><\/span><p>CTAP2 in combination with WebAuthn makes FIDO 2 work<\/p>\n<\/div><\/div><\/p><\/div>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-knrs2sgb-7-83d4e9a8c33018f58be278267cf8fc6d\">\n.flex_column.av-knrs2sgb-7-83d4e9a8c33018f58be278267cf8fc6d{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  id=\"umsetzung-in-robin-data\"  class='flex_column av-knrs2sgb-7-83d4e9a8c33018f58be278267cf8fc6d av_one_full  avia-builder-el-72  el_after_av_one_full  el_before_av_hr  first flex_column_div av-zero-column-padding  column-top-margin'     ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-7r9w7-d7a1393dcc0cab06bb6f7a0461ccffac\">\n#top .av-special-heading.av-7r9w7-d7a1393dcc0cab06bb6f7a0461ccffac{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-7r9w7-d7a1393dcc0cab06bb6f7a0461ccffac .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-7r9w7-d7a1393dcc0cab06bb6f7a0461ccffac .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-7r9w7-d7a1393dcc0cab06bb6f7a0461ccffac av-special-heading-h2 blockquote modern-quote  avia-builder-el-73  el_before_av_textblock  avia-builder-el-first'><h2 class='av-special-heading-tag'  itemprop=\"headline\"  >Implementation of passwordless authentication in Robin Data software<\/h2><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-2fxxnb-f40d5489808072bde52fd654fcf990af'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p>Robin Data has implemented FIDO2 technology into Robin Data software because we believe it is secure, privacy protecting, easy to use for everyone, cost effective and forward thinking. This makes it possible to log in to the Robin Data app without using the insecure password and by using a security key.<\/p>\n<p>We show exactly how this works in the <a href=\"https:\/\/help.robin-data.io\/fido2-security-key-anmeldung-in-robin-data\" target=\"_blank\" rel=\"noopener\">Help Center<\/a> and in the following video:<\/p>\n<\/div><\/section><\/p><\/div>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-knst0a0l-cd7b77f656eb2ccea91a2b5c329b8b9d\">\n#top .hr.hr-invisible.av-knst0a0l-cd7b77f656eb2ccea91a2b5c329b8b9d{\nheight:15px;\n}\n<\/style>\n<div  class='hr av-knst0a0l-cd7b77f656eb2ccea91a2b5c329b8b9d hr-invisible  avia-builder-el-75  el_after_av_one_full  el_before_av_codeblock'><span class='hr-inner'><span class=\"hr-inner-style\"><\/span><\/span><\/div>\n\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-knst0a0l-1-066d1d2ec01e4df018a249537ed239ec\">\n#top .hr.hr-invisible.av-knst0a0l-1-066d1d2ec01e4df018a249537ed239ec{\nheight:50px;\n}\n<\/style>\n<div  class='hr av-knst0a0l-1-066d1d2ec01e4df018a249537ed239ec hr-invisible  avia-builder-el-77  el_after_av_codeblock  el_before_av_one_full'><span class='hr-inner'><span class=\"hr-inner-style\"><\/span><\/span><\/div>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-knrs2sgb-3-c3fdf6fa3561f35d16bce2b79e0170a2\">\n.flex_column.av-knrs2sgb-3-c3fdf6fa3561f35d16bce2b79e0170a2{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  id=\"fazit\"  class='flex_column av-knrs2sgb-3-c3fdf6fa3561f35d16bce2b79e0170a2 av_one_full  avia-builder-el-78  el_after_av_hr  el_before_av_one_full  first flex_column_div av-zero-column-padding'     ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-219tav-3758c18d7cdacb16a04c5a81d0f00281\">\n#top .av-special-heading.av-219tav-3758c18d7cdacb16a04c5a81d0f00281{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-219tav-3758c18d7cdacb16a04c5a81d0f00281 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-219tav-3758c18d7cdacb16a04c5a81d0f00281 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-219tav-3758c18d7cdacb16a04c5a81d0f00281 av-special-heading-h2 blockquote modern-quote  avia-builder-el-79  el_before_av_textblock  avia-builder-el-first'><h2 class='av-special-heading-tag'  itemprop=\"headline\"  >Conclusion: Passwordless authentication is a secure alternative and FIDO2 is the new standard for secure web log-in.<\/h2><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<section  class='av_textblock_section av-2fxxnb-2-4680e6fec18d258a77e5f30c7cc7ba67'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p>A data breach is a huge loss of trust for any business. If customers feel that their personal data is not being processed securely, the worst case scenario could be customer loss. Of all cyberattacks, 81 percent are due to corrupted passwords. However, this risk factor is completely unnecessary and can be easily eliminated. It's time to do away with password-based authentication. Passwordless authentication via FIDO2 is already an established standard among corporate giants like Google, Microsoft, and Apple. It is currently one of the most secure authentication methods that can be deployed cost-effectively.<\/p>\n<\/div><\/section><\/p><\/div>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-38irt4-a3265c4a84bbfe7bcd111a53bb63e885\">\n.flex_column.av-38irt4-a3265c4a84bbfe7bcd111a53bb63e885{\nborder-radius:10px 10px 10px 10px;\npadding:50 px 50 px 50 px 50 px;\nbackground-color:#f7f7f7;\n}\n<\/style>\n<div  class='flex_column av-38irt4-a3265c4a84bbfe7bcd111a53bb63e885 av_one_full  avia-builder-el-81  el_after_av_one_full  el_before_av_one_full  first flex_column_div  column-top-margin'     ><p><br \/>\n<div  class='av-social-sharing-box av-ka3jmz4x-5dcebd1f09db7c20daac0063288815c9 av-social-sharing-box-default  avia-builder-el-83  el_after_av_codeblock  avia-builder-el-last  av-social-sharing-box-fullwidth'><div class=\"av-share-box\"><h5 class='av-share-link-description av-no-toc'>Do you like the piece? Feel free to share it.<\/h5><ul class=\"av-share-box-list noLightbox\"><li class='av-share-link av-social-link-facebook avia_social_iconfont' ><a target=\"_blank\" aria-label=\"Share on Facebook\" href='https:\/\/www.facebook.com\/sharer.php?u=https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/passwordless-authentication-over-fido2&#038;t=Passwortlose%20Authentifizierung%20%C3%BCber%20FIDO2' data-av_icon='\ue8f3' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Share on Facebook'><span class='avia_hidden_link_text'>Share on Facebook<\/span><\/a><\/li><li class='av-share-link av-social-link-twitter avia_social_iconfont' ><a target=\"_blank\" aria-label=\"Share on X\" href='https:\/\/twitter.com\/share?text=Passwortlose%20Authentifizierung%20%C3%BCber%20FIDO2&#038;url=https:\/\/www.robin-data.io\/en\/?p=9847' data-av_icon='\ue932' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Share on X'><span class='avia_hidden_link_text'>Share on X<\/span><\/a><\/li><li class='av-share-link av-social-link-linkedin avia_social_iconfont' ><a target=\"_blank\" aria-label=\"Share on LinkedIn\" href='https:\/\/linkedin.com\/shareArticle?mini=true&#038;title=Passwortlose%20Authentifizierung%20%C3%BCber%20FIDO2&#038;url=https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/passwordless-authentication-over-fido2' data-av_icon='\ue8fc' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Share on LinkedIn'><span class='avia_hidden_link_text'>Share on LinkedIn<\/span><\/a><\/li><li class='av-share-link av-social-link-mail avia_social_iconfont' ><a  aria-label=\"Share by Mail\" href='mailto:?subject=Passwortlose%20Authentifizierung%20%C3%BCber%20FIDO2&#038;body=https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/passwordless-authentication-over-fido2' data-av_icon='\ue805' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Share by Mail'><span class='avia_hidden_link_text'>Share by Mail<\/span><\/a><\/li><\/ul><\/div><\/div><\/p><\/div>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-228ehv-1ea72c1e17300415ef12cb2b1a9f645d\">\n.flex_column.av-228ehv-1ea72c1e17300415ef12cb2b1a9f645d{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-228ehv-1ea72c1e17300415ef12cb2b1a9f645d av_one_full  avia-builder-el-84  el_after_av_one_full  avia-builder-el-last  first flex_column_div av-zero-column-padding  column-top-margin'     ><section  class='av_textblock_section av-kaqhth2e-c0ce0e9fc51ca4569850f4a16f47c8e1'   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><h3 style=\"text-align: center;\">This might interest you too:<\/h3>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kaqhpdsy-c149d804dc26de4da98e9603962fa194\">\n#top .hr.hr-invisible.av-kaqhpdsy-c149d804dc26de4da98e9603962fa194{\nheight:25px;\n}\n<\/style>\n<div  class='hr av-kaqhpdsy-c149d804dc26de4da98e9603962fa194 hr-invisible  avia-builder-el-86  el_after_av_textblock  el_before_av_blog'><span class='hr-inner'><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<div  data-slideshow-options=\"{&quot;animation&quot;:&quot;fade&quot;,&quot;autoplay&quot;:false,&quot;loop_autoplay&quot;:&quot;once&quot;,&quot;interval&quot;:5,&quot;loop_manual&quot;:&quot;manual-endless&quot;,&quot;autoplay_stopper&quot;:false,&quot;noNavigation&quot;:false,&quot;show_slide_delay&quot;:90}\" class='avia-content-slider avia-content-grid-active avia-content-slider1 avia-content-slider-odd  avia-builder-el-87  el_after_av_hr  avia-builder-el-last  av-slideshow-ui av-control-default   av-no-slider-navigation av-slideshow-manual av-loop-once av-loop-manual-endless'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Blog\" ><div class=\"avia-content-slider-inner\"><div class=\"slide-entry-wrap\"><article class='slide-entry flex_column  post-entry post-entry-16316 slide-entry-overview slide-loop-1 slide-parity-odd  av_one_third first real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/compliance-management-in-the-company-7' data-rel='slide-1' class='slide-image' title='TISAX requirements: Prepare certification step by step'><img decoding=\"async\" fetchpriority=\"high\" width=\"495\" height=\"343\" src=\"https:\/\/media.robin-data.io\/2022\/12\/07140455\/IT-Sicherheitsvorfall-495x343.png\" class=\"wp-image-15255 avia-img-lazy-loading-not-15255 attachment-portfolio size-portfolio wp-post-image\" alt=\"IT security incident\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: TISAX requirements: Prepare certification step by step\"><\/header><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >TISAX\u00ae requirements: Information on the question catalogue, maturity levels and certification. Prepare the assessment level and audit.<div class=\"read-more-link\"><a href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/compliance-management-in-the-company-7\" class=\"more-link\">Read more<span class='more-link-arrow avia-svg-icon avia-font-svg_entypo-fontello' data-av_svg_icon='right-open-big' data-av_iconset='svg_entypo-fontello'><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"15\" height=\"32\" viewbox=\"0 0 15 32\" preserveaspectratio=\"xMidYMid meet\" role=\"graphics-symbol\" aria-hidden=\"true\">\n<path d=\"M0.416 27.84l11.456-11.84-11.456-11.904q-0.832-0.832 0-1.536 0.832-0.832 1.536 0l12.544 12.608q0.768 0.832 0 1.6l-12.544 12.608q-0.704 0.832-1.536 0-0.832-0.704 0-1.536z\"><\/path>\n<\/svg><\/span><\/a><\/div><\/div><\/div><footer class=\"entry-footer\"><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2024-01-08T13:19:57+01:00\" >8 January 2024<\/time><div class=\"slide-meta-del\">\/<\/div><div class=\"slide-meta-comments\"><a href='https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/compliance-management-in-the-company-7#respond'>0 Comments<\/a><\/div><\/div><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/media.robin-data.io\/2022\/12\/07140455\/IT-Sicherheitsvorfall.png<\/span>\n\t\t\t\t\t\t<span itemprop='height'>343<\/span>\n\t\t\t\t\t\t<span itemprop='width'>685<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>Caroline Schwabe<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/media.robin-data.io\/2022\/07\/05140916\/Robin-Data_ComplianceOS_white_logo.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>Caroline Schwabe<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2021-04-26T15:00:36+02:00\" >2024-01-08 13:19:57<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2025-03-24 16:15:24<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>TISAX requirements: Prepare certification step by step<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-15168 slide-entry-overview slide-loop-2 slide-parity-even  av_one_third  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/what-to-do-it-security-incident' data-rel='slide-1' class='slide-image' title='What to do in the event of an IT security incident?'><img decoding=\"async\" fetchpriority=\"high\" width=\"495\" height=\"343\" src=\"https:\/\/media.robin-data.io\/2022\/12\/07140455\/IT-Sicherheitsvorfall-495x343.png\" class=\"wp-image-15255 avia-img-lazy-loading-not-15255 attachment-portfolio size-portfolio wp-post-image\" alt=\"IT security incident\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: What to do in the event of an IT security incident?\"><\/header><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >The most important facts about IT security incidents. Learn practical tips on recognising and dealing with IT emergencies in the article.<div class=\"read-more-link\"><a href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/what-to-do-it-security-incident\" class=\"more-link\">Read more<span class='more-link-arrow avia-svg-icon avia-font-svg_entypo-fontello' data-av_svg_icon='right-open-big' data-av_iconset='svg_entypo-fontello'><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"15\" height=\"32\" viewbox=\"0 0 15 32\" preserveaspectratio=\"xMidYMid meet\" role=\"graphics-symbol\" aria-hidden=\"true\">\n<path d=\"M0.416 27.84l11.456-11.84-11.456-11.904q-0.832-0.832 0-1.536 0.832-0.832 1.536 0l12.544 12.608q0.768 0.832 0 1.6l-12.544 12.608q-0.704 0.832-1.536 0-0.832-0.704 0-1.536z\"><\/path>\n<\/svg><\/span><\/a><\/div><\/div><\/div><footer class=\"entry-footer\"><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2022-12-07T13:52:45+01:00\" >7 December 2022<\/time><div class=\"slide-meta-del\">\/<\/div><div class=\"slide-meta-comments\"><a href='https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/what-to-do-it-security-incident#respond'>0 Comments<\/a><\/div><\/div><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/media.robin-data.io\/2022\/12\/07140455\/IT-Sicherheitsvorfall.png<\/span>\n\t\t\t\t\t\t<span itemprop='height'>343<\/span>\n\t\t\t\t\t\t<span itemprop='width'>685<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>Caroline Schwabe<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/media.robin-data.io\/2022\/07\/05140916\/Robin-Data_ComplianceOS_white_logo.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>Caroline Schwabe<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2021-04-26T15:00:36+02:00\" >2022-12-07 13:52:45<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2025-03-24 13:40:32<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>What to do in the event of an IT security incident?<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-12189 slide-entry-overview slide-loop-3 slide-parity-odd  post-entry-last  av_one_third  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/isms-definition-what-is-an-information-security-management-system' data-rel='slide-1' class='slide-image' title='ISMS: definition, implementation, standards'><img decoding=\"async\" fetchpriority=\"high\" width=\"495\" height=\"343\" src=\"https:\/\/media.robin-data.io\/2022\/05\/23150310\/Datenschutzpanne-495x343.jpg\" class=\"wp-image-14055 avia-img-lazy-loading-not-14055 attachment-portfolio size-portfolio wp-post-image\" alt=\"\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: ISMS: Definition, implementation, standards\"><\/header><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >All information on the information security management system: delimitation of DPMS, notes on implementation, norms and standards<div class=\"read-more-link\"><a href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/isms-definition-what-is-an-information-security-management-system\" class=\"more-link\">Read more<span class='more-link-arrow avia-svg-icon avia-font-svg_entypo-fontello' data-av_svg_icon='right-open-big' data-av_iconset='svg_entypo-fontello'><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"15\" height=\"32\" viewbox=\"0 0 15 32\" preserveaspectratio=\"xMidYMid meet\" role=\"graphics-symbol\" aria-hidden=\"true\">\n<path d=\"M0.416 27.84l11.456-11.84-11.456-11.904q-0.832-0.832 0-1.536 0.832-0.832 1.536 0l12.544 12.608q0.768 0.832 0 1.6l-12.544 12.608q-0.704 0.832-1.536 0-0.832-0.704 0-1.536z\"><\/path>\n<\/svg><\/span><\/a><\/div><\/div><\/div><footer class=\"entry-footer\"><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2021-10-26T14:56:51+02:00\" >26 October 2021<\/time><div class=\"slide-meta-del\">\/<\/div><div class=\"slide-meta-comments\"><a href='https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/isms-definition-what-is-an-information-security-management-system#respond'>0 Comments<\/a><\/div><\/div><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/media.robin-data.io\/2022\/05\/23150310\/Datenschutzpanne.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>343<\/span>\n\t\t\t\t\t\t<span itemprop='width'>685<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>Caroline Schwabe<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/media.robin-data.io\/2022\/07\/05140916\/Robin-Data_ComplianceOS_white_logo.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>Caroline Schwabe<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2021-04-26T15:00:36+02:00\" >2021-10-26 14:56:51<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2025-03-24 13:40:26<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>ISMS: definition, implementation, standards<\/span><\/span><\/span><\/article><\/div><\/div><\/div><\/p><\/div>","protected":false},"excerpt":{"rendered":"<p>What does passwordless authentication via FIDO2 mean? Why the password is obsolete and you should rely on the security standard!<\/p>","protected":false},"author":3,"featured_media":14055,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[71],"tags":[120,121],"class_list":["post-9847","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-wiki","tag-it-sicherheit","tag-spezielle-themen"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.8 (Yoast SEO v26.8) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Was ist passwortlose Authentifizierung \u00fcber FIDO2? | Wiki<\/title>\n<meta name=\"description\" content=\"Passwortlose Authentifizierung \u00fcber FIDO2, Webauthn &amp; CTAP. Warum das Passwort veraltet ist und welche Sicherheits-Standard g\u00e4ngig sind!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/passwordless-authentication-over-fido2\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Passwortlose Authentifizierung \u00fcber FIDO2\" \/>\n<meta property=\"og:description\" content=\"Passwortlose Authentifizierung \u00fcber FIDO2, Webauthn &amp; CTAP. Warum das Passwort veraltet ist und welche Sicherheits-Standard g\u00e4ngig sind!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/passwordless-authentication-over-fido2\" \/>\n<meta property=\"og:site_name\" content=\"Robin Data GmbH\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/robindatade\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-04-26T13:00:36+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-24T12:46:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/media.robin-data.io\/2022\/05\/23150310\/Datenschutzpanne.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"685\" \/>\n\t<meta property=\"og:image:height\" content=\"343\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Caroline Schwabe\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@RobinData_DE\" \/>\n<meta name=\"twitter:site\" content=\"@RobinData_DE\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Caroline Schwabe\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"13 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/passwortlose-authentifizierung-ueber-fido2#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/passwortlose-authentifizierung-ueber-fido2\"},\"author\":{\"name\":\"Caroline Schwabe\",\"@id\":\"https:\/\/www.robin-data.io\/#\/schema\/person\/83e2bd965d3e87f50c5da3c0b541dfe5\"},\"headline\":\"Passwortlose Authentifizierung \u00fcber FIDO2\",\"datePublished\":\"2021-04-26T13:00:36+00:00\",\"dateModified\":\"2025-03-24T12:46:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/passwortlose-authentifizierung-ueber-fido2\"},\"wordCount\":7294,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/passwortlose-authentifizierung-ueber-fido2#primaryimage\"},\"thumbnailUrl\":\"https:\/\/media.robin-data.io\/2022\/05\/23150310\/Datenschutzpanne.jpg\",\"keywords\":[\"IT-Sicherheit\",\"Spezielle Themen\"],\"articleSection\":[\"Wiki\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/passwortlose-authentifizierung-ueber-fido2#respond\"]}]},{\"@type\":[\"WebPage\",\"ItemPage\"],\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/passwortlose-authentifizierung-ueber-fido2\",\"url\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/passwortlose-authentifizierung-ueber-fido2\",\"name\":\"Was ist passwortlose Authentifizierung \u00fcber FIDO2? | Wiki\",\"isPartOf\":{\"@id\":\"https:\/\/www.robin-data.io\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/passwortlose-authentifizierung-ueber-fido2#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/passwortlose-authentifizierung-ueber-fido2#primaryimage\"},\"thumbnailUrl\":\"https:\/\/media.robin-data.io\/2022\/05\/23150310\/Datenschutzpanne.jpg\",\"datePublished\":\"2021-04-26T13:00:36+00:00\",\"dateModified\":\"2025-03-24T12:46:57+00:00\",\"author\":{\"@id\":\"https:\/\/www.robin-data.io\/#\/schema\/person\/83e2bd965d3e87f50c5da3c0b541dfe5\"},\"description\":\"Passwortlose Authentifizierung \u00fcber FIDO2, Webauthn & CTAP. Warum das Passwort veraltet ist und welche Sicherheits-Standard g\u00e4ngig sind!\",\"breadcrumb\":{\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/passwortlose-authentifizierung-ueber-fido2#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/passwortlose-authentifizierung-ueber-fido2\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/passwortlose-authentifizierung-ueber-fido2#primaryimage\",\"url\":\"https:\/\/media.robin-data.io\/2022\/05\/23150310\/Datenschutzpanne.jpg\",\"contentUrl\":\"https:\/\/media.robin-data.io\/2022\/05\/23150310\/Datenschutzpanne.jpg\",\"width\":685,\"height\":343},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/passwortlose-authentifizierung-ueber-fido2#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/www.robin-data.io\/startseite\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Passwortlose Authentifizierung \u00fcber FIDO2\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.robin-data.io\/#website\",\"url\":\"https:\/\/www.robin-data.io\/\",\"name\":\"Robin Data GmbH\",\"description\":\"Robin Data ComplianceOS\u00ae Das Compliance Operating System\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.robin-data.io\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.robin-data.io\/#\/schema\/person\/83e2bd965d3e87f50c5da3c0b541dfe5\",\"name\":\"Caroline Schwabe\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.robin-data.io\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4afcd09464d8c4418a7e62c3fdd2103c84addcb37103428b60586d9b32b79b3f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4afcd09464d8c4418a7e62c3fdd2103c84addcb37103428b60586d9b32b79b3f?s=96&d=mm&r=g\",\"caption\":\"Caroline Schwabe\"},\"description\":\"Frau Schwabe ist Informationsdesignerin und Datenschutzbeauftragte. Der Schwerpunkt ihrer Arbeit liegt darin, Kunden und Interessenten mit Beitr\u00e4gen in der Robin Data Datenschutz-Akademie weiterzuhelfen.\",\"url\":\"https:\/\/www.robin-data.io\/en\/author\/csc\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"What is passwordless authentication via FIDO2? | Wiki","description":"Passwordless authentication via FIDO2, Webauthn &amp; CTAP. Why the password is outdated and which security standards are common!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/passwordless-authentication-over-fido2","og_locale":"en_GB","og_type":"article","og_title":"Passwortlose Authentifizierung \u00fcber FIDO2","og_description":"Passwortlose Authentifizierung \u00fcber FIDO2, Webauthn & CTAP. Warum das Passwort veraltet ist und welche Sicherheits-Standard g\u00e4ngig sind!","og_url":"https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/passwordless-authentication-over-fido2","og_site_name":"Robin Data GmbH","article_publisher":"https:\/\/www.facebook.com\/robindatade\/","article_published_time":"2021-04-26T13:00:36+00:00","article_modified_time":"2025-03-24T12:46:57+00:00","og_image":[{"width":685,"height":343,"url":"https:\/\/media.robin-data.io\/2022\/05\/23150310\/Datenschutzpanne.jpg","type":"image\/jpeg"}],"author":"Caroline Schwabe","twitter_card":"summary_large_image","twitter_creator":"@RobinData_DE","twitter_site":"@RobinData_DE","twitter_misc":{"Written by":"Caroline Schwabe","Estimated reading time":"13 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/passwortlose-authentifizierung-ueber-fido2#article","isPartOf":{"@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/passwortlose-authentifizierung-ueber-fido2"},"author":{"name":"Caroline Schwabe","@id":"https:\/\/www.robin-data.io\/#\/schema\/person\/83e2bd965d3e87f50c5da3c0b541dfe5"},"headline":"Passwortlose Authentifizierung \u00fcber FIDO2","datePublished":"2021-04-26T13:00:36+00:00","dateModified":"2025-03-24T12:46:57+00:00","mainEntityOfPage":{"@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/passwortlose-authentifizierung-ueber-fido2"},"wordCount":7294,"commentCount":0,"image":{"@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/passwortlose-authentifizierung-ueber-fido2#primaryimage"},"thumbnailUrl":"https:\/\/media.robin-data.io\/2022\/05\/23150310\/Datenschutzpanne.jpg","keywords":["IT-Sicherheit","Spezielle Themen"],"articleSection":["Wiki"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/passwortlose-authentifizierung-ueber-fido2#respond"]}]},{"@type":["WebPage","ItemPage"],"@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/passwortlose-authentifizierung-ueber-fido2","url":"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/passwortlose-authentifizierung-ueber-fido2","name":"What is passwordless authentication via FIDO2? | Wiki","isPartOf":{"@id":"https:\/\/www.robin-data.io\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/passwortlose-authentifizierung-ueber-fido2#primaryimage"},"image":{"@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/passwortlose-authentifizierung-ueber-fido2#primaryimage"},"thumbnailUrl":"https:\/\/media.robin-data.io\/2022\/05\/23150310\/Datenschutzpanne.jpg","datePublished":"2021-04-26T13:00:36+00:00","dateModified":"2025-03-24T12:46:57+00:00","author":{"@id":"https:\/\/www.robin-data.io\/#\/schema\/person\/83e2bd965d3e87f50c5da3c0b541dfe5"},"description":"Passwordless authentication via FIDO2, Webauthn &amp; CTAP. Why the password is outdated and which security standards are common!","breadcrumb":{"@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/passwortlose-authentifizierung-ueber-fido2#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/passwortlose-authentifizierung-ueber-fido2"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/passwortlose-authentifizierung-ueber-fido2#primaryimage","url":"https:\/\/media.robin-data.io\/2022\/05\/23150310\/Datenschutzpanne.jpg","contentUrl":"https:\/\/media.robin-data.io\/2022\/05\/23150310\/Datenschutzpanne.jpg","width":685,"height":343},{"@type":"BreadcrumbList","@id":"https:\/\/www.robin-data.io\/datenschutz-akademie\/wiki\/passwortlose-authentifizierung-ueber-fido2#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/www.robin-data.io\/startseite"},{"@type":"ListItem","position":2,"name":"Passwortlose Authentifizierung \u00fcber FIDO2"}]},{"@type":"WebSite","@id":"https:\/\/www.robin-data.io\/#website","url":"https:\/\/www.robin-data.io\/","name":"Robin Data GmbH","description":"Robin Data ComplianceOS\u00ae The Compliance Operating System","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.robin-data.io\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/www.robin-data.io\/#\/schema\/person\/83e2bd965d3e87f50c5da3c0b541dfe5","name":"Caroline Schwabe","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.robin-data.io\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4afcd09464d8c4418a7e62c3fdd2103c84addcb37103428b60586d9b32b79b3f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4afcd09464d8c4418a7e62c3fdd2103c84addcb37103428b60586d9b32b79b3f?s=96&d=mm&r=g","caption":"Caroline Schwabe"},"description":"Ms. Schwabe is an information designer and Data Protection Officer. The focus of her work is to help customers and interested parties with contributions to the Robin Data Privacy Academy.","url":"https:\/\/www.robin-data.io\/en\/author\/csc"}]}},"_links":{"self":[{"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/posts\/9847","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/comments?post=9847"}],"version-history":[{"count":68,"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/posts\/9847\/revisions"}],"predecessor-version":[{"id":10504,"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/posts\/9847\/revisions\/10504"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/media\/14055"}],"wp:attachment":[{"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/media?parent=9847"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/categories?post=9847"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.robin-data.io\/en\/wp-json\/wp\/v2\/tags?post=9847"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}