Information Security 12 min read

Evolution of Web Authentication: From Passwords to WebAuthn

This article reviews the historical development, current practices, and future direction of web authentication, covering traditional password login, third‑party protocols like OpenID and OAuth2.0, two‑factor authentication methods, and the emerging password‑less WebAuthn standard.

Sohu Tech Products
Sohu Tech Products
Sohu Tech Products
Evolution of Web Authentication: From Passwords to WebAuthn

Traditional Authentication Methods

The classic approach involves a user filling out a registration form with a username and password, which the backend encrypts and stores in a database; login then compares the submitted credentials against the stored hash.

Common Issues

Passwords can be intercepted in insecure environments.

Credentials may be hijacked during transmission.

Database breaches expose large numbers of passwords.

Users often reuse a single password across many services, creating a single point of failure.

Third‑Party Login Methods

Many sites now support third‑party authentication, reducing reliance on passwords. Two main protocols are used:

OpenID (Open Authentication)

OpenID is a decentralized identity system that lets users log in using an identity provider (e.g., Google). The site receives a unique identifier without needing to handle passwords.

Advantages

Low entry barrier; no registration flow needed.

Users avoid entering passwords, reducing client‑side risk.

Disadvantages

Reliance on the provider’s security; a breach affects all dependent sites.

Service instability of the provider can disrupt login.

Potential loss of direct relationship with the user.

OAuth2.0 (Open Authorization)

OAuth authorizes third‑party applications to access user resources without exposing credentials. Unlike OpenID (authentication), OAuth focuses on delegated access.

Advantages

Same usability benefits as OpenID.

Fine‑grained permission scopes allow varying trust levels.

Disadvantages

Same provider‑dependency risks as OpenID.

Potential security hazards if a site misuses granted permissions.

Two‑Factor Authentication (2FA)

2FA adds a second verification factor beyond username/password, such as SMS codes, authenticator‑app TOTP, or login confirmations using public‑key cryptography.

Common Methods

SMS verification – a one‑time code sent to a mobile device.

Authenticator apps – generate a 6‑digit code every 30 seconds based on a shared secret.

Login confirmation – a push notification or cryptographic challenge that requires user approval.

Pros and Cons

Pros: Higher security by requiring two independent factors.

Cons: Adds friction to the login flow; does not guarantee absolute safety; recovery can be cumbersome if a factor is lost.

Future of Web Authentication: WebAuthn

WebAuthn, a W3C standard backed by the FIDO2 project, enables password‑less login using device‑based authenticators such as fingerprint, facial, iris, voice, or hardware security keys (USB, Bluetooth, NFC).

Experience

Users can try WebAuthn via demo sites (e.g., https://demo.yubico.com/webauthn-technical/registration ) with supported hardware like YubiKey 5 NFC, Touch Bar‑enabled MacBooks, iPhones, or Android devices with Google Play Services.

Advantages

High security without passwords.

Simplified login using built‑in biometrics or hardware keys, facilitating broader adoption.

Disadvantages

Limited support in many domestic websites; the ecosystem is still maturing.

Learning Resources

PPT: https://ppt.baomitu.com/d/129a784a

Demo source: https://github.com/hanyonggang/WebAuthnDemo

Official W3C and MDN documentation for detailed usage.

Conclusion

WebAuthn offers a highly secure and user‑friendly password‑less experience and is expected to become the mainstream web authentication method in the near future.

securityWeb authentication2FAOAuth2.0OpenIDWebAuthn
Sohu Tech Products
Written by

Sohu Tech Products

A knowledge-sharing platform for Sohu's technology products. As a leading Chinese internet brand with media, video, search, and gaming services and over 700 million users, Sohu continuously drives tech innovation and practice. We’ll share practical insights and tech news here.

0 followers
Reader feedback

How this landed with the community

login Sign in to like

Rate this article

Was this worth your time?

Sign in to rate
Discussion

0 Comments

Thoughtful readers leave field notes, pushback, and hard-won operational detail here.