Hi [[ session.user.profile.firstName ]]

Technical Overview: FIDO2 WebAuthn Server Validation

Watch this webinar for a technical overview of WebAuthn for Relying Parties. This session is led by Emil Lundberg, a key contributor and one of the nine editors of the W3C WebAuthn specification.

Join us for a deep dive of how to integrate WebAuthn relying party operations into an authentication server.


Key topics include:
- FIDO Authentication, CTAP, and WebAuthn
- Getting started with java-webauthn-server
- Application structure
- Data storage
- Registering credentials
- Authenticating credentials
- Best Practices

This webinar is intended for software engineers, developers, software architects, and product managers, though it is open to anyone interested on the topic.
Recorded Jun 28 2018 75 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Emil Lundberg, Luke Walker
Presentation preview: Technical Overview: FIDO2 WebAuthn Server Validation

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Yubico Mobile Series: Introduction to the Yubico iOS SDK 4.0 Dec 10 2020 5:00 pm UTC 60 mins
    Luke Walker, Director, Developer Program, Dennis Hills, Solutions Architect, Jens Utbult, iOS Developer
    Companies today face the challenge of balancing security with user experience when it comes to authentication. To solve for this, Yubico SDKs enable enterprise developers to provide a secure way to authenticate in-app while not losing their employee or customer experience.
    In this webinar, we will dive deep into how you can leverage the Yubico iOS SDK for a seamless authentication experience for your enterprise employee and customer apps.

    You’ll learn:
    -Yubico iOS SDK overview and supported transports, interfaces and connections
    -A hands-on coding demo

    *This webinar is intended for Product managers and developers, though it is open to anyone interested.

    Confidentiality and Data Processing:
    The information you provide in this form will be held in confidence by Yubico, Inc. and its Affiliates. Any personal information submitted in this form will be used by Yubico, Inc. and its Affiliates, for their performance of this webinar, and as such, you agree to being contacted and receiving relevant marketing materials. “Affiliate” means an entity that, directly or indirectly, controls, is controlled by, or is under common control with Yubico, Inc.

    Your personal data is retained only as needed in accordance with Yubico data retention practices. The Yubico Privacy Notice offers more information about Yubico privacy practices, including the lawful basis for processing of personal data, how to lodge a complaint with the supervisory authority, and how to contact Yubico to exercise your data subject rights.
  • Modern Authentication to Secure Enterprises: AWS SSO with WebAuthn and YubiKeys Dec 8 2020 9:00 pm UTC 60 mins
    Karen Larsen, Director, Integrations Program, (Yubico), Ron Cully, Sr. Product Manager Technical, (AWS)
    Addressing the new norm of working from home, organizations have accelerated the adoption of cloud infrastructures by enabling access to critical business applications, stretching the security perimeter of their network. Zero trust is top of mind for security professionals. How do you ensure that the right people have access to the organization’s business critical applications while reducing the surface area of attacks?

    With AWS SSO support for WebAuthn, organizations have additional security options for authenticating users. Users can now use FIDO2 enabled security keys - such as a YubiKey - with AWS SSO for secure and easy single sign-on access to mission critical applications. In today’s presentation, Karen Larson, Director of Integrations at Yubico and Ron Cully, Sr. Product Manager at AWS will take you through what WebAuthn is and what the launch of AWS SSO WebAuthn unlocks for its customers and cloud administrators.

    In this webinar you will learn:
    -The role definition of WebAuthn, FIDO2, CTAP
    -Security key benefits of YubiKey to secure online identities
    -Capabilities of AWS SSO
    -New features unlocked with AWS SSO WebAuthn
    -Benefits to using AWS SSO WebAuthn and YubiKeys
  • Yubico Mobile Series: Introduction to the Yubico Android SDK 2.0 Dec 8 2020 5:00 pm UTC 60 mins
    Dennis Hills, Solutions Architect, Dain Nilsson, Director of Engineering, Luke Walker Director, Developer Program
    Companies today face the challenge of balancing security with user experience when it comes to authentication. To solve for this, Yubico SDKs enable enterprise developers to provide a secure way to authenticate in-app while not losing their employee or customer experience.
    In this webinar, we will dive deep into how you can leverage the Yubico Android SDK for a seamless authentication experience for your enterprise employee and customer apps.

    You’ll learn:
    -Yubico Android SDK overview and supported transports, interfaces and connections
    -A hands-on coding demo

    *This webinar is intended for Product managers and developers, though it is open to anyone interested.

    Confidentiality and Data Processing:
    The information you provide in this form will be held in confidence by Yubico, Inc. and its Affiliates. Any personal information submitted in this form will be used by Yubico, Inc. and its Affiliates, for their performance of this webinar, and as such, you agree to being contacted and receiving relevant marketing materials. “Affiliate” means an entity that, directly or indirectly, controls, is controlled by, or is under common control with Yubico, Inc.

    Your personal data is retained only as needed in accordance with Yubico data retention practices. The Yubico Privacy Notice offers more information about Yubico privacy practices, including the lawful basis for processing of personal data, how to lodge a complaint with the supervisory authority, and how to contact Yubico to exercise your data subject rights.
  • Benefits of alternate modern passwordless in federal govt and how they co-exist Dec 2 2020 5:00 pm UTC 60 mins
    Danelle Barrett (former US Navy), Joe Brendler (former US Army), Jeremy Grant (Venable)
    Modern passwordless login offers federal agencies the opportunity to augment smart cards with future-proofed authentication because it opens the door for remote identity proofing, a key requirement driven by COVID-19. It also helps reduce administrative overheads of PIV and CAC, and eliminates support costs related to issuing and managing username and passwords for non PIV/CAC eligible workers. With passwordless, federal agencies can deploy quick and easy authentication to Windows AD, Azure AD and other government applications across desktops, laptops, mobile devices and BYOAD/BYOD, expediting Department of Defense and civilian missions.

    In this webinar you will learn:
    * What going passwordless for user authentication really means to the federal government
    * Department of Defense strategies to implement alternate modern passwordless scenarios
    * Key steps federal agencies can take today to go passwordless

    Confidentiality and Data Processing:
    The information you provide in this form will be held in confidence by Yubico, Inc. and its Affiliates. Any personal information submitted in this form will be used by Yubico, Inc. and its Affiliates, for their performance of this webinar, and as such, you agree to being contacted and receiving relevant marketing materials. “Affiliate” means an entity that, directly or indirectly, controls, is controlled by, or is under common control with Yubico, Inc.

    Your personal data is retained only as needed in accordance with Yubico data retention practices. The Yubico Privacy Notice offers more information about Yubico privacy practices, including the lawful basis for processing of personal data, how to lodge a complaint with the supervisory authority, and how to contact Yubico to exercise your data subject rights.
  • Docaposte, ILEX & Yubico - Webinar Cybersécurité Recorded: Oct 30 2020 56 mins
    Laurent Nezot (Yubico), Serge Carpentier (Docaposte), Guillaume Guerrin et Fabrice Bérose (Ilex International)
    Docaposte, filiale numérique du Groupe La Poste, sécurise l'accès à ses applicatifs et infrastructures en s'appuyant sur la plateforme de gestion des accès d'Ilex International et sur les YubiKeys.

    Au cours de cette session, nos intervenants vous présenteront :
    Le retour d’expérience du COSC de Docaposte illustrant comment le groupe a mis en place un véritable hub d’authentification et de fédération d’identité pour s’adapter au contexte des utilisateurs, limiter le risque de failles de sécurité et capitaliser sur les moyens d’authentification existants.
    L'interopérabilité des solutions Ilex International et Yubico pour répondre aux besoins du groupe de concilier ergonomie et sécurité.
  • Key Steps To Prevent Cybercrime & Account Takeover Fraud in Financial Services Recorded: Oct 29 2020 63 mins
    Michael Osterman, President (Osterman Research Inc), Chris Streeks, Solutions Engineer (Yuico)
    Whether you’re a bank, a crypto currency exchange or provider, a credit union, an insurance firm or a brokerage house, the financial services industry is subjected to the highest rates of cyberattacks such as phishing attacks and account takeovers. It’s also the source of one-third of all data breaches. Strong authentication is the need of the hour for financial services institutions because passwords and mobile-based authentication don't protect against account takeovers.
    Join Osterman Research and Yubico for a best practices webinar on preventing cybercrime and account takeover related fraud in the financial services industry.

    In this webinar you will learn:
    -The latest cyber attacks faced by financial services institutions, and the evolving threat dynamics for the next 12-24 months
    -What strong authentication really is, and the key steps you can take to prevent account takeover related fraud

    Confidentiality and Data Processing:
    The information you provide in this form will be held in confidence by Yubico, Inc. and its Affiliates. Any personal information submitted in this form will be used by Yubico, Inc. and its Affiliates, for their performance of this webinar, and as such, you agree to being contacted and receiving relevant marketing materials. “Affiliate” means an entity that, directly or indirectly, controls, is controlled by, or is under common control with Yubico, Inc.

    Your personal data is retained only as needed in accordance with Yubico data retention practices. The Yubico Privacy Notice offers more information about Yubico privacy practices, including the lawful basis for processing of personal data, how to lodge a complaint with the supervisory authority, and how to contact Yubico to exercise your data subject rights.
  • The Evolution of Cybersecurity: A Protocol Event Panel Discussion Recorded: Oct 15 2020 65 mins
    Tammy Wincup (Protocol), Jerrod Chong (Yubico), Michael K Hamilton (CI Security), Danny Allan (Veeam),Joy Chik (Microsoft)
    Companies have had employees working from home some five months now, and for many organizations, the 'end' of this pandemic-facilitated remote reality is still a year away, if at all.  So far, we've seen companies put into place new cybersecurity protocols with varying degrees of success, but as companies now grapple with the close of a previous fiscal year or the start of a new one, it's clear that cybersecurity is the focus du jour across nearly every business.

    The cybersecurity playing field is always evolving, and in this new era of work, how should business leaders play their cards to ensure that their cybersecurity solutions outnumber their vulnerabilities?

    Watch this Yubico sponsored panel with Tammy Wincup, President, Protocol, and Jerrod Chong, Chief Solutions Officer, Yubico, along with Michael K Hamilton, Founder & CISO, CI Security, Danny Allan, CTO, Veeam, and Joy Chik, Corporate VP, Microsoft
  • Five steps to stronger MFA for the new work-from-anywhere reality Recorded: Oct 15 2020 48 mins
    Jerome Becquart (Axiad), Percy Wadia (Yubico)
    Remote work became the new normal in 2020. Looking ahead to 2021, organizations need better, more efficient ways to adapt to this new reality and secure teams working remotely and at the office. Enabling multi-factor authentication (MFA) across all business apps is a proven security best practice. However, getting the gold standard of authentication in the form of hardware authentication keys out to widely dispersed global teams presents new challenges.
    YubiEnterprise Delivery, Yubico’s new service for distributing YubiKeys globally to end-users, combined with Axiad Cloud, the smart, secure and simple access management platform, helps organizations easily manage YubiKeys to enhance security for the entire workforce.

    Learn five actionable steps to:
    -Improve your security posture, so you can effectively protect users, applications, machines, and systems throughout your entire digital ecosystem at scale
    -Streamline your operational processes, so you can focus more on your core business and less on the end-to-end distribution and deployment of hardware security keys

    Confidentiality and Data Processing:
    The information you provide in this form will be held in accordance with applicable privacy laws by Yubico, Inc., its Affiliates, and Axiad, Inc. for their performance of this webinar, and as such, you agree to being contacted and receiving relevant marketing materials. “Affiliate” means an entity that, directly or indirectly, controls, is controlled by, or is under common control with Yubico, Inc.

    Your personal data is retained by Yubico only as needed in accordance with Yubico data retention practices. The Yubico Privacy Notice offers more information about Yubico privacy practices, including the lawful basis for processing of personal data, how to lodge a complaint with the supervisory authority, and how to contact Yubico to exercise your data subject rights.

    Please refer to Axiad Inc’s own privacy policy for more information about their privacy practices.
  • CMMC: Recommendations to navigate the new Cyber Certification requirements Recorded: Sep 30 2020 60 mins
    Jeff Phillips(Yubico) Gregory Abrenio(Cyber Armed) Jeremy Haynes(ID.me) Dr. Chris Edwards(Intercede)
    Join Cyber Armed, ID.me, Intercede, and Yubico for a roundtable on key recommendations to navigate and get started with Cybersecurity Maturity Model Certification (CMMC).

    Defense Industrial Base (DIB) partners and contractors need to meet the Department of Defense’s (DOD) new CMMC to bid on future procurement, but what does CMMC compliance entail?

    The roundtable will focus on:
    1. CMMC levels and domains to pay attention to in relation to Identity and Access Management, including Access Controls and Privileged Access
    2. Steps to take to adapt current projects and practices to meet specific CMMC level compliance

    Confidentiality and Data Processing:
    The information you provide in this form will be held in accordance with applicable privacy laws by Yubico, Inc., its Affiliates, and its Works with YubiKey partners: Cyber Armed Security, ID.me, Inc., and Intercede Ltd. Any personal information submitted in this form will be used by Yubico, Inc., its Affiliates, Cyber Armed Security, ID.me, Inc., and Intercede Ltd for their performance of this webinar, and as such, you agree to being contacted and receiving relevant marketing materials. “Affiliate” means an entity that, directly or indirectly, controls, is controlled by, or is under common control with Yubico, Inc.

    Your personal data is retained by Yubico only as needed in accordance with Yubico data retention practices. Works with YubiKey partners will retain your personal data only as needed and in accordance with the respective data retention practices of each Works with YubiKey partner. The Yubico Privacy Notice offers more information about Yubico privacy practices, including the lawful basis for processing of personal data, how to lodge a complaint with the supervisory authority, and how to contact Yubico to exercise your data subject rights.

    Please refer to the respective privacy policies of the listed companies for more information about their privacy practices.
  • Protect Remote Workers Against Account Takeovers Recorded: Sep 23 2020 49 mins
    Abby Guha, Sr. Director, Product Marketing, Yubico
    Securing cloud applications and services with strong authentication

    Covid-19 quickly, and in many instances, drastically changed the way your employees work—creating a dependence on the cloud like never before. While workloads are much easier to scale and manage in the cloud than more traditional on-premises solutions, it introduces additional risks.

    With the rapid expansion of remote workers, across all types of organizations and industries, comes the requirement to secure their overall environments and workflows. Sensitive data that may have been accessed securely in tightly controlled office environments is now likely being accessed via less secure and shared home networks and devices.

    While employees may not be as diligent about security while from home, the sophistication of phishing attacks and other forms of account takeovers continues to rise. With data being stored and transmitted outside corporate networks, strong authentication should be considered essential to verify user identities before they can access sensitive information in the cloud.

    Attend this webinar to learn:
    - How to secure remote workers as they navigate work in the cloud
    - Why MFA should be a top requirement for supporting a distributed workforce
    - Best practices for securing remote workers against phishing and other cyber attacks
  • Meet the YubiKey 5C NFC Recorded: Sep 22 2020 47 mins
    Yubico team
    Join us for an interactive session on the new YubiKey 5C NFC. Learn about the new features and benefits of our latest device in the YubiKey 5 Series. We will cover how the YubiKey 5C NFC protects your most important business applications on modern phones and computers using multi-protocol authentication, how it's different from our other devices, and our competitive advantages. We'll also help you identify who in your organization should use the YubiKey 5C NFC, as well as critical use cases to ensure you're getting the most value out of your YubiKey subscription.
  • Extending YubiKey FIDO2 Hardware Token to Systems and Interfaces with Silverfort Recorded: Sep 22 2020 40 mins
    Jonathan Nativ, Silverfort, and David Treece, Yubico
    Now more than ever, organizations need a holistic authentication solution to maximize security without disrupting productivity. An efficient way to do so is to strengthen weak static username/password credentials with strong FIDO2 hardware-backed public/private-key credentials.

    In this session with Silverfort and Yubico experts, we’ll review the integrated solutions, discuss key customer use cases and explain how you can now:
    o Extend FIDO2 hardware-backed Multi-Factor Authentication to any system or interface
    o Enforce strong authentication without implementing software agents, changing application code, or using proxies
    o Take advantage of the integrated solutions to address various use cases
  • Säkra upp inloggning i er organisation - YubiKey är lösningen Recorded: Sep 16 2020 53 mins
    Per Erngård (Yubico), Fredrik Åström, Anders Ihs & Emil Vidmark (Arctic Group)
    Arbete hemifrån öppnar upp för nya möjligheter och med det tillkommer även fler risker och utmaningar. Arctic Group och Yubico bjuder in till webinar den 16 september för att lära dig använda säker inloggning.

    81 % av alla intrång kan kopplas till stulna eller svaga lösenord och genom att stjäla identiteter och lösenord kan hackare enkelt komma åt era IT-miljöer utan att väcka någon större misstanke.

    Genom att tillföra fler lager säkerhet vid autentisering, s.k. multifaktorautentisering (MFA), krävs inte bara användarnamn och lösenord utan även en ytterligare verifiering. Arctic Group arbetar tillsammans med Yubico, skaparna av branschens ledande säkerhetsnyckel YubiKey, för dig som vill använda säkra er organisation och minska arbetet i er verksamhet med hjälp av modern autentisering. Du behöver ingen teknisk kompetens utan detta är för dig som vill effektivisera inloggning och samtidigt ha hög säkerhet i er organisation.

    Confidentiality and Data Processing:
    The information you provide in this form will be held in confidence by Yubico AB, its Affiliates, and its partner, Arctic Group. Any personal information submitted in this form will be used by Yubico AB., its Affiliates, and Arctic Group for their performance of this webinar, and as such, you agree to being contacted and receiving relevant marketing materials from Yubico AB., its Affiliates, and Arctic Group. “Affiliate” means an entity that, directly or indirectly, controls, is controlled by, or is under common control with Yubico AB.
  • FCW Digital Transformation Workshop - Yubico Presentation Recorded: Sep 15 2020 24 mins
    Jeff Frederick, Sr. Solutions Engineer - Federal
    How the future of remote work, BYOD, and cloud services are transforming the need for strong, modern authentication

    Digital transformation has taken on new meaning in the time of COVID-19, causing government agencies to drastically change the way they operate. It forced a majority of the workforce to telework, accelerated adoption of cloud services, and necessitated allowances for BYOD. But this quick adoption of modern processes and technology opened up new security gaps that cybercriminals are actively exploiting. So how should government agencies transform cybersecurity to ensure mission-continuity for this new future of remote work, BYOD and cloud services?

    Attend this session to learn why modernizing authentication should be a key consideration in your digital transformation strategy, and best practices to get started right now.
  • The Future of Federal Identity Panel- SNG Live IT Modernization Recorded: Sep 15 2020 17 mins
    Jeff Fredrick, Sr. Solutions Engineer (Yubico)
    Federal agencies have made demonstrable progress modernizing their IT in recent years. With the outbreak of the coronavirus and the displacement of the federal workforce, leaders face even greater urgency to accelerate the modernization of their legacy systems.

    Listen to CW5 Will Robinson, CTO & Senior Technical Advisor, CIO/G-6, U.S. Army and Jeff Frederick, Sr. Solutions Engineer, Yubico discuss the future of federal identity with Billy Mitchell, Editor-in-Chief of FedScoop.
  • Advancing Digital Transformation in Healthcare Recorded: Sep 8 2020 63 mins
    Alex Hilton - CEO, Cloud Industry Forum | Andy Winiarski - Yubico | David McLeman - Ancoris | Max Faun - Okta
    To say Digital Transformation can be tricky for the healthcare industry is an understatement. Copious streams of data, numerous IT systems that require interoperability, hundreds of vendors and the need for better employee and patient experience has seen the healthcare sector fall short of the progress being made in banking, retail and manufacturing.

    But powered by the global health crisis of Covid-19, the importance of technology in the future of healthcare has never been more in the spotlight. Join us for episode 11 of Digital Transformation in Action, where we put DX and healthcare under the lens and discuss:

    - How to push forward Digital Transformation in healthcare with the right AI, RPA, data transformation and cyber security strategies
    - How emerging technologies are pushing a patient-first approach
    - Why the barriers to implementing a digital-first reality in healthcare are often not technological - but embracing a change of culture

    Host:
    Alex Hilton - CEO, Cloud Industry Forum

    Guests:
    Andy Winiarski - Solutions Engineer, Yubico
    David McLeman - CEO, Ancoris
  • Deploy Strong Authentication in Microsoft Azure Environments with Yubico Recorded: Aug 27 2020 42 mins
    Jason Edgewater, Enterprise Sales, Central (Yubico), Jeet Shah, Solutions Engineer (Yubico)
    Passwords are broken. And basic 2FA, like mobile, email, and SMS, are not enough to prevent today's sophisticated threats. Yubico, a member of the Microsoft Intelligent Security Association, is the leading provider of hardware-based strong authentication security keys — the most effective way to combat account takeovers.

    Join us to learn about YubiKeys can improve authentication security and usability, at a lower total cost of ownership. In this webinar, we will cover:
    -How organizations can use YubiKeys in Microsoft environments
    -How to deploy, integrate, and scale YubiKeys — even with a remote workforce
    -The password less future for Yubico and Microsoft

    A recording of the webinar will be shared with all registrants, so please reserve your seat today!


    Confidentiality and Data Processing:
    The information you provide in this form will be held in confidence by Yubico, Inc. and its Affiliates. Any personal information submitted in this form will be used by Yubico, Inc. and its Affiliates, for their performance of this webinar, and as such, you agree to being contacted and receiving relevant marketing materials. “Affiliate” means an entity that, directly or indirectly, controls, is controlled by, or is under common control with Yubico, Inc.

    Your personal data is retained only as needed in accordance with Yubico data retention practices. The Yubico Privacy Notice offers more information about Yubico privacy practices, including the lawful basis for processing of personal data, how to lodge a complaint with the supervisory authority, and how to contact Yubico to exercise your data subject rights.
  • Hacking The Election: The Human Side [Part 1] Recorded: Aug 20 2020 55 mins
    David Morris | Lee Imrey | Midori Connolly | Lance James
    In the age of data collection and targeting by the campaigns, what can we learn from Gen Z? When it comes to data sharing, privacy and security awareness, what has changed in the population mindset since 2016? Are the lessons from the Cambridge Analytica scandal still applicable today? A soft preview of what's to come in the November election.

    Moderator: David Morris, Executive Director at Digital Risk Management Institute

    This episode is part of the Election Hacking Original series examining the threats to democratic elections, the technologies used to power and hijack elections, and what's needed to educate and empower voters before Election Day.
  • Supply Chain Security Recorded: Aug 18 2020 56 mins
    Diana Kelley | Kiersten Todt | Nick Charpentier
    According to new research from Risk Ledger, 60% of security breaches originate in the organization's supply chain; including third party vendors and applications. No matter what business an organization is in, supply chain security and resilience must be factored into business planning to ensure secure, ongoing operations even during times of crisis and disruption.

    Join this panel to learn more about:
    - Types of supply chains (hardware, software, services)
    - Common vulnerabilities in the supply chain
    - Assessing where your security gaps lie and addressing the risk
    - Impact of the COVID-19 pandemic on supply chain security
    - Recommendations for improving security in your supply chain and your risk management program
    - Benefits of Supply Chain Risk Management (SCRM)
    - What is the Cybersecurity Maturity Model (CMM), and how it can improve supply chain security
    - Solutions and approaches that can improve supply chain security

    This episode is part of The (Security) Balancing Act original series with Diana Kelley. We welcome viewer participation and questions during this interactive panel session.
  • Securing remote workers: The critical role of strong authentication Recorded: Aug 17 2020 51 mins
    Abby Guha, Senior Director, Product Marketing, Yubico
    The need to support remote workers and provide them with secure and easy access to business systems and applications is critical as ever. As many organizations plan for the "new normal," which may involve continued support for a large remote workforce post-pandemic, they need to ask, “Can employees access systems remotely without introducing new risks and vulnerabilities?”

    Hackers are continuing to take advantage of this current state of uncertainty with targeted phishing attacks. As legacy and mobile-based authentication solutions are especially vulnerable to hacking, enterprises should make it an imperative to modernize multi-factor authentication.

    Attend this webinar to learn:
    - How to secure remote workers while accelerating business productivity
    - Why MFA should be a top requirement for supporting a distributed workforce
    - Best practices for securing remote workers against phishing and other cyber attacks
Your Key to Trust
Yubico was founded in 2007 with the mission to make secure login easy and available for everyone. In close collaboration with leading internet companies and thought leaders, Yubico co-created the FIDO U2F and FIDO2/WebAuthn open authentication standards, which have been adopted in major online platforms and browsers, enabling two-factor, multi-factor, and passwordless login and a safer internet for billions of people.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Technical Overview: FIDO2 WebAuthn Server Validation
  • Live at: Jun 28 2018 6:00 pm
  • Presented by: Emil Lundberg, Luke Walker
  • From:
Your email has been sent.
or close