We all know that we should use FIDO2 key as its a Phish-Resistant MFA Auth method, etc. etc. But i was looking for some Ach diagram which illustrates the whole process. We all know there's a cryptographic operation involved, but i couldn't find anything relevant. (Sorry not demeaning). After doing multiple research, i came across this article by cloudbuild.co.uk, not sure of the Author name, but kudos to whoever authored that. I made some minor changes in the context. This is what i love to do. I find great fascination in the process of creating architectural diagrams, as it allows me to visually express complex structures and ideas. https://lnkd.in/gtEYnBgt
I remember a video with a transparent ‘whiteboard’ where Tarek Dawoud explained it very detailed. Can’t find it anymore. I believe it was Ignite content. Can you please share that recoding Tarek?
Thanks for sharing
Jan, Thanks for Sharing it. Yeah i really admire John Savill’s tutorials, will go through it. I was looking for a quick , short , pocket friendly guide 🙂. Hope you are getting what i mean.