Identity protection is an essential component of enterprise security in the current era. With phishing, credential theft, and adversary-in-the-middle (AiTM) attacks persisting and morphing, traditional authentication methods like passwords and omnipresent multi-factor authentication (SMS, OTP, push notification, etc.) are proving increasingly inadequate. This article provides an in-depth examination of two modern and popular authentication protocols, namely FIDO2/WebAuthn and Certificate-Based Authentication (CBA). FIDO2 facilitates passwordless authentication with the assistance of cryptographic credentials securely bound to a person's device, offering improved usability and phishing resistance. CBA, rooted in public key infrastructure (PKI), remains a necessary requirement in compliance-focused environments and is crucial for safeguarding human and machine identities. This study explores how these technologies operate across diverse contexts, from enterprise-owned notebooks to personal mobile devices and non-human account systems. Using internationally accepted standards and frameworks—such as NIST SP 800-63-3, the CISA Zero Trust Maturity Model, and eIDAS—the document provides implementation considerations that incorporate policy and identity credential lifecycle approach techniques. It also evaluates operational recovery and fallback processes in cases of credential loss or compromise. A structured framework is provided to enable organizations to achieve identity assurance at scale and support evolving technology and regulatory demands. Future trends such as passkeys, derived credentials, quantum computing, and modular authentication systems are also considered, which will introduce flexibility and strength in the identity assurance landscape.
Building similarity graph...
Analyzing shared references across papers
Loading...
B. Bhushan
International journal of data science and machine learning.
Building similarity graph...
Analyzing shared references across papers
Loading...
B. Bhushan (Thu,) studied this question.
www.synapsesocial.com/papers/68a35efb0a429f7973328840 — DOI: https://doi.org/10.55640/ijdsml-05-02-02