!!! Overview [{$pagename}] allows [Application] [Development Teams] to provide [Authentication] without the need to remember a [password]. [{$pagename}] allows [users] to enter their [Mobile Device] [Phone Number] or [Email Address] and receive a [One-Time password] (code) or [URL], which they can then use to [login]. [{$pagename}] the user is bound to the [connection] using an [Identity Provider (IDP)]. Since you can't force users to use the same mobile phone number or email address every time they [authenticate], users [MAY] end up with multiple user profiles in the [IDP] [DataStore] but you may be able to perform [Identity Correlation]. Passwordless differs from [Multi-Factor Authentication] ([MFA]) in that only one [Authentication Factor] is used to authenticate a user—the one-time code or link received by the user. !! [{$pagename}] Benefits The benefits of enabling [{$pagename}]s include: * Improved [User Experience], particularly on mobile [applications], because users only need an [Email Address] or mobile [Phone Number] to [Registration], and the [credential] used for [authentication] is automatically validated after sign-up. * Enhanced [security] because users avoid [Password Reuse] * Less effort for you because you will not need to implement a [Password Recovery] procedure. !! [{$pagename}] [Implementation] Issues These are the primary [Implementation] Issues [{$applicationname}] is aware of: * [infrastructure]. [Implementation] need to use a [Cloud Service Provider] or [Third-party] service to manage the [SMS] with [Mobile Network Operators]. [Auth0], [Twilio], [okta], and [AWS Cognito] are just a few [Service Providers] to get started. * the additional cost of [SMS], especially global [SMS] and variable pricing. Even though these are one-time passcodes, the cost per [SMS] message is more expensive than the FREE options of federating [Social Identity Providers]. * [app] will most likely be running on [Mobile Devices] that do not have a [Phone Number] or cellular plan such as an iPad [Wi-Fi] edition. In this case, the user would need to have their [Mobile Device] nearby when they wanted to authenticate on a non-cellular device. Most of the time this is not a problem, however, in some families, children have a wifi iPad and no mobile SMS capable [Mobile Device]. So, in this case, the developer would need to offer additional [Authentication Factors] such as a basic username/password. Not too radical but does add an additional barrier and this is why most mobile developers will offer several ways for users to authenticate. !! [{$pagename}] [Privacy Considerations] [{$pagename}] supports [Privacy Enhancing Technologies] and supports [Law of Minimal Disclosure For A Constrained Use] where the [Relying Party] [Application] has no knowledge of the [user] other than their [Mobile Device] [Phone Number] or [Email Address] !! [{$pagename}] [Security Considerations] The obvious [risk] here is if someone gains access to the physical [Mobile Device] and bypasses the phone’s security to read [SMS] messages. Some others are paranoid over a possible [SIM Swap]. The Interception of the [Mobile TAN] might be another [Risk] but generally, not using full [Multi-Factor Authentication] for [Financial transaction] is "Silly" !! More Information There might be more information for this subject on one of the following: [{ReferringPagesPlugin before='*' after='\n' }] ---- * [#1] - [Passwordless Connections|https://auth0.com/docs/connections/passwordless|target='_blank'] - based on information obtained 2019-10-14 * [#2] - [Passwordless SMS Authentication: The Basics|https://itnext.io/passwordless-sms-authentication-the-basics-fdf9dbecab04|target='_blank'] - based on information obtained 2019-10-14 * [#2] - [Passwordless SMS Authentication: Backend|https://itnext.io/passwordless-sms-authentication-backend-9932391c49dc|target='_blank'] - based on information obtained 2019-10-14