Skip to content

Commit

Permalink
Apply Richard's corrections
Browse files Browse the repository at this point in the history
  • Loading branch information
bethh0rn committed Feb 28, 2025
1 parent a3892c4 commit 0e1de4c
Showing 1 changed file with 2 additions and 2 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -47,7 +47,7 @@ This section discusses how these protocols work in theory. Later, you'll see wha

### Passkeys (FIDO2/WebAuthn)

In 2013, the biggest USA software companies formed the FIDO (**F**ast **ID**entity **O**nline) Alliance to "*help reduce the world’s over-reliance on passwords*." The FIDO Alliance's standard, FIDO2, was submitted to the World Wide Web Consortium (W3C) and became the WebAuthn standard in 2016. WebAuthn is a protocol that describes how clients and servers can be authenticated using asymmetric cryptography (which this guide refers to as passkeys) instead of passwords.
In 2013, the biggest USA software companies formed the FIDO (**F**ast **ID**entity **O**nline) Alliance to "*help reduce the world’s over-reliance on passwords*." The FIDO Alliance's standard, FIDO2, was submitted to the World Wide Web Consortium (W3C) and became the WebAuthn standard in 2016. WebAuthn is a protocol that describes how clients and servers can be authenticated using asymmetric cryptography (commonly called passkeys) instead of passwords.

To summarize:
- **FIDO** is both a group of companies and the name of one of the group's standards.
Expand Down Expand Up @@ -249,7 +249,7 @@ More information on magic links in FusionAuth is available [in the magic links g

### Implementing OTPs

OTPs can be used in two ways: as an alternative to entering a password or for MFA. However, FusionAuth only supports the use of OTPs for MFA.
An OTP can be used in two ways: as an alternative to entering a password or for MFA. However, FusionAuth only supports the use of OTPs for MFA.. However, FusionAuth only supports the use of OTPs for MFA. FusionAuth supports the use of OTPs only for MFA, and doesn't support OTPs as an alternative to passwords.

To configure MFA, follow the [guide](/docs/lifecycle/authenticate-users/multi-factor-authentication). In brief, you need to enable email settings, then select the email template in your tenant <Breadcrumb>Multi-Factor</Breadcrumb> tab, and set the multi-factor <InlineField>On login policy</InlineField> to `Required` for your application.

Expand Down

0 comments on commit 0e1de4c

Please sign in to comment.