{"id":1169,"date":"2023-06-09T23:53:00","date_gmt":"2023-06-09T23:53:00","guid":{"rendered":"https:\/\/share.242studio.com\/najnovija-dostignuca-za-jaku-autentifikaciju-bez-lozinke\/"},"modified":"2025-02-02T13:47:36","modified_gmt":"2025-02-02T13:47:36","slug":"what-are-the-latest-developments-for-a-strong-passwordless-authentication","status":"publish","type":"post","link":"https:\/\/sharefoundation.info\/en\/what-are-the-latest-developments-for-a-strong-passwordless-authentication\/","title":{"rendered":"What Are the Latest Developments for a Strong Passwordless Authentication?"},"content":{"rendered":"\n<p>Corporate and personal data are being stored in distributed cloud platforms at a growing rate due to the acceleration of digital transformation across all industries and sectors, increased adoption of cloud-based technologies, and hybrid work norms. Many entities, including apps, organizations, people, devices, etc., have access to this data.<\/p>\n\n\n\n<p>Traditional security measures are no longer sufficient to safeguard our data because traditional brick-and-mortar company borders have shrunk. Identity has become the new castle to guard, yet new security issues are associated with identity protection. To counter this tendency, businesses are investing in enhancing their access controls, switching to a zero-trust cybersecurity approach, and maximizing the effectiveness of multi-factor authentication (MFA).<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What is MFA?<\/h2>\n\n\n\n<p>A solid access management policy must include MFA as a critical component. MFA is essential in limiting attackers\u2019 ability to steal our digital identities and access our systems. MFA demands one or more extra verification elements in addition to a username and password, which lessens the possibility of a successful cyber-attack.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What is MFA fatigue?<\/h2>\n\n\n\n<p>There are crucial implementation elements that can affect the security and usability of an MFA deployment, and it is essential to remember that not all MFA solutions offer equal protection against authentication attacks. Due to flaws in the MFA implementation, we have seen numerous attacks over the previous two years when thieves could get around the MFA protection.<\/p>\n\n\n\n<p>In such attacks, also known as push bombing or MFA fatigue, cybercriminals bombard unsuspecting targets with mobile push alerts requesting them to accept attempts to enter their corporate accounts using stolen credentials. The victims often give in to the malicious MFA push requests sent repeatedly, either unintentionally or in an effort to stop receiving what seems like an endless stream of alerts, allowing the attackers to log into their accounts.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What are the latest developments in access control?<\/h2>\n\n\n\n<p>To mitigate the MFA attacks, tech giants Google and Microsoft have recently announced two initiatives that push toward a more secure and even passwordless future. Let\u2019s examine what these developments are.<\/p>\n\n\n\n<p><strong>Google takes a step toward a passwordless future<\/strong><\/p>\n\n\n\n<p>The tech giant&nbsp;<a href=\"https:\/\/blog.google\/technology\/safety-security\/the-beginning-of-the-end-of-the-password\/\" target=\"_blank\" rel=\"noreferrer noopener\">recently launched<\/a>&nbsp;passkeys, a type of digital credential, as an option to generate and use in place of passwords as a safer, more practical alternative.<\/p>\n\n\n\n<p>What are passkeys?<\/p>\n\n\n\n<p><a href=\"https:\/\/security.googleblog.com\/2023\/05\/so-long-passwords-thanks-for-all-phish.html\" target=\"_blank\" rel=\"noreferrer noopener\">Passkeys<\/a>&nbsp;are created using public-key cryptography, also known as asymmetric encryption, which uses a set of private and public keys. The private key, a crucial part of the passkey, is kept on the device, while the public key is held on the side of the app or website. The passkey\u2019s value is not accessible to websites. Google determines whether a website\u2019s public key corresponds to the passkey the user uses to log into their account.<\/p>\n\n\n\n<p>Unlike a password, this authentication approach dramatically increases the resilience of accounts because the key cannot be stolen from the website it is stored on, phished, or intercepted in transit. Additionally, the account cannot be attacked due to a weak password or password reuse since there is no password.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/sharefoundation.info\/wp-content\/uploads\/googlemfa.gif\" alt=\"\"\/><\/figure>\n\n\n\n<p><em>Figure 1: Google Passkeys (Source: Google)<\/em><\/p>\n\n\n\n<p>As Google noted in their announcement:<\/p>\n\n\n\n<p>\u201cUsing passwords puts a lot of responsibility on users. Choosing strong passwords and remembering them across various accounts can be hard. In addition, even the most savvy users are often misled into giving them up during phishing attempts. 2SV (2FA\/MFA) helps, but again puts strain on the user with additional, unwanted friction and still doesn\u2019t fully protect against phishing attacks and targeted attacks like \u2018SIM swaps\u2019 for SMS verification. Passkeys help address all these issues.\u201d<\/p>\n\n\n\n<p>Passkeys utilize the three forms of information that are used frequently in MFA: something you have (such as a smartphone), something you are (such as your biometrics), or something you know (such as a PIN or pattern). Although passkeys qualify as a type of MFA, the&nbsp;<a href=\"https:\/\/fidoalliance.org\/passkeys\/\" target=\"_blank\" rel=\"noreferrer noopener\">FIDO Alliance<\/a>&nbsp;claims that several regulatory organizations still need to acknowledge this, even though they are actively striving to do so.<\/p>\n\n\n\n<p>It would be best not to create a passkey on the shared computer at your place of business since passkeys should only be established on devices you individually control. Google stated that passkeys for employee sign-ins would be enabled by Workspace account managers \u201csoon.\u201d As anyone using the device could access your Google account, you shouldn\u2019t create one on shared devices like your family computer. Once a passkey is generated on that device, anyone who can unlock it can sign back into your account using the passkey, even if you have logged out.<\/p>\n\n\n\n<p><strong>Microsoft hardens MFA with number matching<\/strong><\/p>\n\n\n\n<p>Microsoft&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/active-directory\/authentication\/how-to-mfa-number-match\" target=\"_blank\" rel=\"noreferrer noopener\">announced<\/a>&nbsp;they would start enforcing number matching for Microsoft Authenticator MFA alerts to block MFA fatigue attack attempts.<\/p>\n\n\n\n<p>\u201cBeginning May 8, 2023, number matching is enabled for all Authenticator push notifications. As relevant services deploy, users worldwide who are enabled for Authenticator push notifications will begin to see number matching in their approval requests,\u201d reads the company\u2019s announcement.&nbsp;<\/p>\n\n\n\n<p>What is number matching?<\/p>\n\n\n\n<p>Number matching is a setting that forces the user to enter numbers displayed in the platform where they try to authenticate into their authenticator app to approve the request,&nbsp;<a href=\"https:\/\/www.cisa.gov\/sites\/default\/files\/publications\/fact-sheet-implement-number-matching-in-mfa-applications-508c.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">explains<\/a>&nbsp;the US Cybersecurity and Infrastructure Security Agency (CISA).<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/sharefoundation.info\/wp-content\/uploads\/msftmfa.jpg\" alt=\"\"\/><\/figure>\n\n\n\n<p><em>Figure 2: Number Matching. Source: Microsoft<\/em><\/p>\n\n\n\n<p>The number-matching requirement reduces MFA fatigue by needing access to the login screen to authorize requests. When users use Microsoft Authenticator to respond to an MFA push message, they will see a number. To complete the approval, they must enter that number into the app. Users cannot approve requests without the numbers being entered on the login screen.<\/p>\n\n\n\n<p>\u201cNumber matching is a key security upgrade to traditional second-factor notifications in Microsoft Authenticator. We will remove the admin controls and enforce the number match experience tenant-wide for all Microsoft Authenticator push notifications users starting May 8, 2023,\u201d Microsoft&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/active-directory\/authentication\/how-to-mfa-number-match\" target=\"_blank\" rel=\"noreferrer noopener\">says<\/a>.<\/p>\n\n\n\n<p>If you want to learn more about multi-factor authentication and how your organization can successfully and effectively deploy MFA, download our latest paper,&nbsp;<a href=\"https:\/\/sharefoundation.info\/wp-content\/uploads\/MFA-White-Paper.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">\u201cSelecting A Multi-Factor Authentication Solution: How to Address the Human and Technology Concerns\u201d<\/a>.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p><em>Anastasios Arampatzis is a Cybersecurity and Data Privacy enthusiast. He is a member of the&nbsp;<a href=\"https:\/\/homodigitalis.gr\/\" target=\"_blank\" rel=\"noreferrer noopener\">Homo Digitalis<\/a>&nbsp;collective and an author at&nbsp;<a href=\"https:\/\/www.welcometobora.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Bora<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Corporate and personal data are being stored in distributed cloud platforms at a growing rate due to the acceleration of digital transformation across all industries and sectors, increased adoption of cloud-based technologies, and hybrid work norms. Many entities, including apps, organizations, people, devices, etc., have access to this data. Traditional security measures are no longer [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":1043,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[26],"tags":[33],"class_list":["post-1169","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","tag-digital-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What Are the Latest Developments for a Strong Passwordless Authentication? - SHARE Fondacija<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sharefoundation.info\/najnovija-dostignuca-za-jaku-autentifikaciju-bez-lozinke\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What Are the Latest Developments for a Strong Passwordless Authentication? - SHARE Fondacija\" \/>\n<meta property=\"og:description\" content=\"Corporate and personal data are being stored in distributed cloud platforms at a growing rate due to the acceleration of digital transformation across all industries and sectors, increased adoption of cloud-based technologies, and hybrid work norms. Many entities, including apps, organizations, people, devices, etc., have access to this data. Traditional security measures are no longer [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sharefoundation.info\/najnovija-dostignuca-za-jaku-autentifikaciju-bez-lozinke\/\" \/>\n<meta property=\"og:site_name\" content=\"SHARE Fondacija\" \/>\n<meta property=\"article:published_time\" content=\"2023-06-09T23:53:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-02-02T13:47:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sharefoundation.info\/wp-content\/uploads\/2023\/06\/mfa-blog-1_SHARE-News-1200x550-Web-cover.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1201\" \/>\n\t<meta property=\"og:image:height\" content=\"551\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Aleksa Boric\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Aleksa Boric\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/sharefoundation.info\\\/najnovija-dostignuca-za-jaku-autentifikaciju-bez-lozinke\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sharefoundation.info\\\/najnovija-dostignuca-za-jaku-autentifikaciju-bez-lozinke\\\/\"},\"author\":{\"name\":\"Aleksa Boric\",\"@id\":\"https:\\\/\\\/sharefoundation.info\\\/#\\\/schema\\\/person\\\/855bab9a30b13d42de38ab5f43b68bfd\"},\"headline\":\"What Are the Latest Developments for a Strong Passwordless Authentication?\",\"datePublished\":\"2023-06-09T23:53:00+00:00\",\"dateModified\":\"2025-02-02T13:47:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sharefoundation.info\\\/najnovija-dostignuca-za-jaku-autentifikaciju-bez-lozinke\\\/\"},\"wordCount\":1042,\"publisher\":{\"@id\":\"https:\\\/\\\/sharefoundation.info\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/sharefoundation.info\\\/najnovija-dostignuca-za-jaku-autentifikaciju-bez-lozinke\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sharefoundation.info\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/mfa-blog-1_SHARE-News-1200x550-Web-cover.png\",\"keywords\":[\"digital security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sharefoundation.info\\\/najnovija-dostignuca-za-jaku-autentifikaciju-bez-lozinke\\\/\",\"url\":\"https:\\\/\\\/sharefoundation.info\\\/najnovija-dostignuca-za-jaku-autentifikaciju-bez-lozinke\\\/\",\"name\":\"What Are the Latest Developments for a Strong Passwordless Authentication? - SHARE Fondacija\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sharefoundation.info\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sharefoundation.info\\\/najnovija-dostignuca-za-jaku-autentifikaciju-bez-lozinke\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sharefoundation.info\\\/najnovija-dostignuca-za-jaku-autentifikaciju-bez-lozinke\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sharefoundation.info\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/mfa-blog-1_SHARE-News-1200x550-Web-cover.png\",\"datePublished\":\"2023-06-09T23:53:00+00:00\",\"dateModified\":\"2025-02-02T13:47:36+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sharefoundation.info\\\/najnovija-dostignuca-za-jaku-autentifikaciju-bez-lozinke\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sharefoundation.info\\\/najnovija-dostignuca-za-jaku-autentifikaciju-bez-lozinke\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sharefoundation.info\\\/najnovija-dostignuca-za-jaku-autentifikaciju-bez-lozinke\\\/#primaryimage\",\"url\":\"https:\\\/\\\/sharefoundation.info\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/mfa-blog-1_SHARE-News-1200x550-Web-cover.png\",\"contentUrl\":\"https:\\\/\\\/sharefoundation.info\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/mfa-blog-1_SHARE-News-1200x550-Web-cover.png\",\"width\":1201,\"height\":551},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sharefoundation.info\\\/najnovija-dostignuca-za-jaku-autentifikaciju-bez-lozinke\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sharefoundation.info\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What Are the Latest Developments for a Strong Passwordless Authentication?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sharefoundation.info\\\/#website\",\"url\":\"https:\\\/\\\/sharefoundation.info\\\/\",\"name\":\"Share Foundation\",\"description\":\"Dru\u0161tvo, tehnologija, sajberspejs\",\"publisher\":{\"@id\":\"https:\\\/\\\/sharefoundation.info\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sharefoundation.info\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/sharefoundation.info\\\/#organization\",\"name\":\"Share Foundation\",\"url\":\"https:\\\/\\\/sharefoundation.info\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sharefoundation.info\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/sharefoundation.info\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/share-favicon.png\",\"contentUrl\":\"https:\\\/\\\/sharefoundation.info\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/share-favicon.png\",\"width\":512,\"height\":512,\"caption\":\"Share Foundation\"},\"image\":{\"@id\":\"https:\\\/\\\/sharefoundation.info\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/sharefoundation.info\\\/#\\\/schema\\\/person\\\/855bab9a30b13d42de38ab5f43b68bfd\",\"name\":\"Aleksa Boric\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8a315c1bd01d5be2ae24fed0ba874eab6fb11d526ea2951006669df6b3ce36cc?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8a315c1bd01d5be2ae24fed0ba874eab6fb11d526ea2951006669df6b3ce36cc?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8a315c1bd01d5be2ae24fed0ba874eab6fb11d526ea2951006669df6b3ce36cc?s=96&d=mm&r=g\",\"caption\":\"Aleksa Boric\"},\"url\":\"https:\\\/\\\/sharefoundation.info\\\/en\\\/author\\\/aleksa-boric\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What Are the Latest Developments for a Strong Passwordless Authentication? - SHARE Fondacija","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sharefoundation.info\/najnovija-dostignuca-za-jaku-autentifikaciju-bez-lozinke\/","og_locale":"en_US","og_type":"article","og_title":"What Are the Latest Developments for a Strong Passwordless Authentication? - SHARE Fondacija","og_description":"Corporate and personal data are being stored in distributed cloud platforms at a growing rate due to the acceleration of digital transformation across all industries and sectors, increased adoption of cloud-based technologies, and hybrid work norms. Many entities, including apps, organizations, people, devices, etc., have access to this data. Traditional security measures are no longer [&hellip;]","og_url":"https:\/\/sharefoundation.info\/najnovija-dostignuca-za-jaku-autentifikaciju-bez-lozinke\/","og_site_name":"SHARE Fondacija","article_published_time":"2023-06-09T23:53:00+00:00","article_modified_time":"2025-02-02T13:47:36+00:00","og_image":[{"width":1201,"height":551,"url":"https:\/\/sharefoundation.info\/wp-content\/uploads\/2023\/06\/mfa-blog-1_SHARE-News-1200x550-Web-cover.png","type":"image\/png"}],"author":"Aleksa Boric","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Aleksa Boric","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sharefoundation.info\/najnovija-dostignuca-za-jaku-autentifikaciju-bez-lozinke\/#article","isPartOf":{"@id":"https:\/\/sharefoundation.info\/najnovija-dostignuca-za-jaku-autentifikaciju-bez-lozinke\/"},"author":{"name":"Aleksa Boric","@id":"https:\/\/sharefoundation.info\/#\/schema\/person\/855bab9a30b13d42de38ab5f43b68bfd"},"headline":"What Are the Latest Developments for a Strong Passwordless Authentication?","datePublished":"2023-06-09T23:53:00+00:00","dateModified":"2025-02-02T13:47:36+00:00","mainEntityOfPage":{"@id":"https:\/\/sharefoundation.info\/najnovija-dostignuca-za-jaku-autentifikaciju-bez-lozinke\/"},"wordCount":1042,"publisher":{"@id":"https:\/\/sharefoundation.info\/#organization"},"image":{"@id":"https:\/\/sharefoundation.info\/najnovija-dostignuca-za-jaku-autentifikaciju-bez-lozinke\/#primaryimage"},"thumbnailUrl":"https:\/\/sharefoundation.info\/wp-content\/uploads\/2023\/06\/mfa-blog-1_SHARE-News-1200x550-Web-cover.png","keywords":["digital security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/sharefoundation.info\/najnovija-dostignuca-za-jaku-autentifikaciju-bez-lozinke\/","url":"https:\/\/sharefoundation.info\/najnovija-dostignuca-za-jaku-autentifikaciju-bez-lozinke\/","name":"What Are the Latest Developments for a Strong Passwordless Authentication? - SHARE Fondacija","isPartOf":{"@id":"https:\/\/sharefoundation.info\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sharefoundation.info\/najnovija-dostignuca-za-jaku-autentifikaciju-bez-lozinke\/#primaryimage"},"image":{"@id":"https:\/\/sharefoundation.info\/najnovija-dostignuca-za-jaku-autentifikaciju-bez-lozinke\/#primaryimage"},"thumbnailUrl":"https:\/\/sharefoundation.info\/wp-content\/uploads\/2023\/06\/mfa-blog-1_SHARE-News-1200x550-Web-cover.png","datePublished":"2023-06-09T23:53:00+00:00","dateModified":"2025-02-02T13:47:36+00:00","breadcrumb":{"@id":"https:\/\/sharefoundation.info\/najnovija-dostignuca-za-jaku-autentifikaciju-bez-lozinke\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sharefoundation.info\/najnovija-dostignuca-za-jaku-autentifikaciju-bez-lozinke\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sharefoundation.info\/najnovija-dostignuca-za-jaku-autentifikaciju-bez-lozinke\/#primaryimage","url":"https:\/\/sharefoundation.info\/wp-content\/uploads\/2023\/06\/mfa-blog-1_SHARE-News-1200x550-Web-cover.png","contentUrl":"https:\/\/sharefoundation.info\/wp-content\/uploads\/2023\/06\/mfa-blog-1_SHARE-News-1200x550-Web-cover.png","width":1201,"height":551},{"@type":"BreadcrumbList","@id":"https:\/\/sharefoundation.info\/najnovija-dostignuca-za-jaku-autentifikaciju-bez-lozinke\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sharefoundation.info\/en\/"},{"@type":"ListItem","position":2,"name":"What Are the Latest Developments for a Strong Passwordless Authentication?"}]},{"@type":"WebSite","@id":"https:\/\/sharefoundation.info\/#website","url":"https:\/\/sharefoundation.info\/","name":"Share Foundation","description":"Dru\u0161tvo, tehnologija, sajberspejs","publisher":{"@id":"https:\/\/sharefoundation.info\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sharefoundation.info\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/sharefoundation.info\/#organization","name":"Share Foundation","url":"https:\/\/sharefoundation.info\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sharefoundation.info\/#\/schema\/logo\/image\/","url":"https:\/\/sharefoundation.info\/wp-content\/uploads\/2025\/02\/share-favicon.png","contentUrl":"https:\/\/sharefoundation.info\/wp-content\/uploads\/2025\/02\/share-favicon.png","width":512,"height":512,"caption":"Share Foundation"},"image":{"@id":"https:\/\/sharefoundation.info\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/sharefoundation.info\/#\/schema\/person\/855bab9a30b13d42de38ab5f43b68bfd","name":"Aleksa Boric","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/8a315c1bd01d5be2ae24fed0ba874eab6fb11d526ea2951006669df6b3ce36cc?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/8a315c1bd01d5be2ae24fed0ba874eab6fb11d526ea2951006669df6b3ce36cc?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8a315c1bd01d5be2ae24fed0ba874eab6fb11d526ea2951006669df6b3ce36cc?s=96&d=mm&r=g","caption":"Aleksa Boric"},"url":"https:\/\/sharefoundation.info\/en\/author\/aleksa-boric\/"}]}},"_links":{"self":[{"href":"https:\/\/sharefoundation.info\/en\/wp-json\/wp\/v2\/posts\/1169","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sharefoundation.info\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sharefoundation.info\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sharefoundation.info\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/sharefoundation.info\/en\/wp-json\/wp\/v2\/comments?post=1169"}],"version-history":[{"count":1,"href":"https:\/\/sharefoundation.info\/en\/wp-json\/wp\/v2\/posts\/1169\/revisions"}],"predecessor-version":[{"id":1170,"href":"https:\/\/sharefoundation.info\/en\/wp-json\/wp\/v2\/posts\/1169\/revisions\/1170"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sharefoundation.info\/en\/wp-json\/wp\/v2\/media\/1043"}],"wp:attachment":[{"href":"https:\/\/sharefoundation.info\/en\/wp-json\/wp\/v2\/media?parent=1169"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sharefoundation.info\/en\/wp-json\/wp\/v2\/categories?post=1169"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sharefoundation.info\/en\/wp-json\/wp\/v2\/tags?post=1169"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}