{"version":"1.0","provider_name":"UDS Enterprise","provider_url":"https:\/\/udsenterprise.com\/en\/","author_name":"UDS Enterprise Team","author_url":"https:\/\/udsenterprise.com\/en\/author\/uds-enterprise-team\/","title":"Google open sources tools to create security keys","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"djN8bvVO3F\"><a href=\"https:\/\/udsenterprise.com\/en\/google-open-sources-tools-create-security-keys\/\">Google open sources tools to create security keys<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/udsenterprise.com\/en\/google-open-sources-tools-create-security-keys\/embed\/#?secret=djN8bvVO3F\" width=\"600\" height=\"338\" title=\"&#8220;Google open sources tools to create security keys&#8221; &#8212; UDS Enterprise\" data-secret=\"djN8bvVO3F\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/udsenterprise.com\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/udsenterprise.com\/wp-content\/uploads\/2022\/11\/img-linea-blanca.gif","thumbnail_width":67,"thumbnail_height":4,"description":"Companies and users are increasingly aware of the need to be extremely cautious when surfing the Internet and to properly protect their connected devices. The FIDO security keys are a way to provide extra protection against practices such as phishing. These are physical devices with an appearance similar to USB that users can connect to their terminals and are responsible for carrying out the double factor authentication (2FA).With the aim of improving this technology and accelerating its adoption, Google has launched OpenSK, an Open Source project so that any organization or developer can create their own security keys compatible with FIDO U2F and FIDO2."}