{"version":"1.0","type":"rich","provider_name":"Acast","provider_url":"https://acast.com","height":250,"width":700,"html":"<iframe src=\"https://embed.acast.com/$/655148df2861630012a1d01b/6964b80cd87c2ca348863809?\" frameBorder=\"0\" width=\"700\" height=\"250\"></iframe>","title":"Passkeys: A Deep Dive into Authentication","thumbnail_width":200,"thumbnail_height":200,"thumbnail_url":"https://open-images.acast.com/shows/655148df2861630012a1d01b/1768207865202-cef96075-c42c-4c90-aa72-4b9f494aa1fd.jpeg?height=200","description":"<p>Links</p><p><br></p><p>- Codecrafters (sponsor): https://tej.as/codecrafters</p><p>- Clerk: https://clerk.com</p><p>- Auth0: https://auth0.com</p><p>- Arctic (OAuth Library): https://arctic.js.org</p><p>- Lucia (Session Library): https://lucia-auth.com</p><p><br></p><p>Why do we still use passwords in 2026? In this episode of ConTejas Code, we tear down the complex world of digital identity. From the horror story of getting hacked at a hookah bar to the mathematical elegance of public-key cryptography, we cover how the internet knows who you actually are.</p><p><br></p><p>Let's break down the history of web authentication, explain why \"logging in\" is so much harder than it looks, and demystify the new standard taking over the web: Passkeys (WebAuthn). Whether you are a developer looking for an implementation playbook or just curious why your banking app requires a fingerprint, this deep dive explains the difference between Identity, Identifiers, and Credentials—and why you should stop rolling your own auth immediately.</p><p><br></p><p>Chapters</p><p><br></p><p>00:00:00 Welcome to ConTejas Code</p><p>00:01:06 Sponsor: CodeCrafters</p><p>00:01:42 Why Authentication Matters (High Stakes vs. Low Stakes)</p><p>00:07:30 Storytime: Getting Hacked at a Shisha Bar</p><p>00:19:48 The Vocabulary: Identity, Identifiers, and Credentials</p><p>00:27:45 The Three Factors (Something You Know, Have, Are)</p><p>00:34:28 Real World Analogies: House Keys, Speak-easies, and Hotel Cards</p><p>00:41:10 A History of Web Auth: From Basic Auth to the \"Social Login\" Mess</p><p>00:49:15 Authentication vs. Authorization vs. Accounting</p><p>00:57:00 The Problem with Passwords &amp; MFA Fatigue</p><p>01:00:40 How Passkeys Work: Public Key Cryptography Explained</p><p>01:07:00 Under the Hood: WebAuthn, FIDO2, and The \"Ceremonies\"</p><p>01:13:40 Synced vs. Device-Bound Passkeys</p><p>01:16:30 The Playbook: How to Design Auth for SaaS, Mobile, and B2B</p><p>01:21:00 The Golden Rule: Don't Roll Your Own Crypto</p><p>01:23:00 Libraries &amp; Tools You Should Use (Clerk, Auth0, Arctic)</p><p>01:28:40 The Minimum Viable Security Checklist</p><p>01:32:30 The Future of Passwordless Identity</p>","author_name":"Tejas Kumar"}