Anthropic-Cybersecurity-Skills implementing-passwordless-authentication-with-fido2

Deploy FIDO2/WebAuthn passwordless authentication using security keys and platform authenticators. Covers WebAuthn

install
source · Clone the upstream repo
git clone https://github.com/mukul975/Anthropic-Cybersecurity-Skills
Claude Code · Install into ~/.claude/skills/
T=$(mktemp -d) && git clone --depth=1 https://github.com/mukul975/Anthropic-Cybersecurity-Skills "$T" && mkdir -p ~/.claude/skills && cp -r "$T/skills/implementing-passwordless-authentication-with-fido2" ~/.claude/skills/mukul975-anthropic-cybersecurity-skills-implementing-passwordless-authentication && rm -rf "$T"
manifest: skills/implementing-passwordless-authentication-with-fido2/SKILL.md
source content

Implementing Passwordless Authentication with FIDO2

Overview

Deploy FIDO2/WebAuthn passwordless authentication using security keys and platform authenticators. Covers WebAuthn API integration, FIDO2 server configuration, passkey enrollment, biometric authentication, and migration from password-based systems aligned with NIST SP 800-63B AAL3.

When to Use

  • When deploying or configuring implementing passwordless authentication with fido2 capabilities in your environment
  • When establishing security controls aligned to compliance requirements
  • When building or improving security architecture for this domain
  • When conducting security assessments that require this implementation

Prerequisites

  • Familiarity with identity access management concepts and tools
  • Access to a test or lab environment for safe execution
  • Python 3.8+ with required dependencies installed
  • Appropriate authorization for any testing activities

Objectives

  • Implement comprehensive implementing passwordless authentication with fido2 capability
  • Establish automated discovery and monitoring processes
  • Integrate with enterprise IAM and security tools
  • Generate compliance-ready documentation and reports
  • Align with NIST 800-53 access control requirements

Security Controls

ControlNIST 800-53Description
Account ManagementAC-2Lifecycle management
Access EnforcementAC-3Policy-based access control
Least PrivilegeAC-6Minimum necessary permissions
Audit LoggingAU-3Authentication and access events
IdentificationIA-2User and service identification

Verification

  • Implementation tested in non-production environment
  • Security policies configured and enforced
  • Audit logging enabled and forwarding to SIEM
  • Documentation and runbooks complete
  • Compliance evidence generated