Skip to main content
Version: v1

Overview

In this page we cover how as a developer, you can implement the Beyond Identity solution to authenticate your application's users by placing trust on the devices they control.

How to establish Device Trust

Which OSes and Platforms do we support?

We can support:

  • Web applications via our Web SDK
  • iOS applications via our iOS SDK
  • Android Applications via our Android SDK

[maybe this is just a row of icons and we link to each SDK]

How are Passkeys used

How do we create Passkeys

How do users authenticate with Passkeys

What does the user need to know about Passkeys

Here we briefly show the UI of using keys, we clarify that user have the ability to put passkeys on multiple devices. We briefly describe the mechanisms by whihch they do that and link to the specific articles that describe that in detail.

How does this integrate with my existing systems

  • Treat BI as an IDP. Here are the protocols we support.
  • Graphic showing the delegation process at a high level.

Does this use WebAuthn?

  • We do when it makes sense. In other cases we public private keys, with other mechanisms that are not WebAuthn.

Idea: link to comparisons to WebAUthn by itself.