I'm calling it now: if/when this really takes off, this will absolutely be used as a way to lock users into the platform (OS and/or browser). Even the vendors that have committed to being open about 3rd party integration will close that loophole. It will be done 'in the name of security', because, ostensibly, Microsoft/Apple can ensure the keys are stored 'more securely' or the sync is easier.<p>Having the keys in your PW manager of choice is worthless if your browser/OS won't play ball. Keeping all those logins locked inside Apple/Google/MS's garden is just too juicy of a 'sticky' platform lock-in to ignore. Besides, only nerds care about integration of other key storage platforms; 98% of users will just keep them in iCloud/Hello/Google, so maintaining the APIs to enable that integration will be on the chopping block of every Product Manager.<p>e.g. look at Google's Authenticator app. Once you add a TOTP secret, you can't get it back out. Only recently did they add the ability to sync, but only to other Android devices you own. Those keys are hidden forever, for your protection.
This article is from April 2020, over three years ago.<p>Since then, both Apple and Google have implemented WebAuthn for passwordless account signin. Best Buy does too.<p>edit: eBay does too, I remembered right according to the list posted below. Some notable ones are DocuSign, PayPal, Shopify, Adobe, and CVS.
Can anyone explain to me why we couldn't just use client SSL certs everywhere? Before the first time you connect to a website, your browser asks if you want to generate a new cert or reuse an existing one, you make a choice, and from then on you interact with that site as an identity tied to that cert and you're done. From the servers point of view, the user's identity is a key fingerprint, which is just a property of the connection. Why is it more complicated than that?<p>Oh right, the benevolent overlords, in their wisdom, discerned that mere mortals can't be trusted with private key material.<p>Nevermind, move along.
Little question on that topic<p>Maybe it’s that all this stuff is still new but whenever something offers PassKey support I now add 3:<p>- one on android<p>- one on iOS<p>- one in 1Password<p>Even more fun when it’s mixed with yubikeys, add primary key and secondary key to that list<p>I now have a spreadsheet to write down which website has which keys added to keep track. Hopefully something like 1Password will handle that soon, but I don’t want to risk losing access to my iCloud or Google and getting locked out. Even more confusing when browsers like chrome offer to save a passkey into the browser which is synced only within that browser (I think, exception being Safari)<p>How are you all handling that?
It will fail, like all attempts to replace passwords have failed, because it doesn't address the problem that all the orhers didn't address: users don't understand it.<p>Users understand passwords. They even understand entering a 6-digit number that was texted to their phone. That's about it. It has to be that easy, or it will fail. If you have to start talking about public key cryptography, you're doomed.
> Using WebAuthn, you're able to use a single authenticator (like a Yubikey, for example) on any site that supports the standard. This way, as a user, you don't need to have passwords<p>Security people are literally delusional.
This article is from 2020, I can definitely testify things have changed for the better.
We started Descope.com in 2022 and WebAuthN was one of the first things we implemented, it was easy to integrate with the rest of our system and it’s becoming the primary MFA option for our customers
3 years old, as other folks have noted.<p>We (FusionAuth, my employer) implemented it last year and things have improved a lot, though there are still issues.<p>We put together a vendor neutral site discussing all things WebAuthn here: <a href="https://webauthn.wtf/" rel="nofollow noreferrer">https://webauthn.wtf/</a>
When industry creates the standards, they make it work for themselves. Everybody else in the world is on their own. Doesn't work for you? Nobody else supports it? It's really complicated? Everyone seems to implement it differently? Not their problem! They got the standard they wanted.<p>If it doesn't work for you, that's your fault for not being part of the standards body when this was being proposed. Or, even if you were part of the standards body, if you don't agree to whatever the giant incumbents want, they'll go implement their own thing, defeating the purpose of the standard; so you have to agree anyway