{"id":4127,"date":"2023-08-25T13:38:44","date_gmt":"2023-08-25T11:38:44","guid":{"rendered":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/?p=4127"},"modified":"2023-08-25T13:40:09","modified_gmt":"2023-08-25T11:40:09","slug":"passwordless","status":"publish","type":"post","link":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/passwordless","title":{"rendered":"Autenticaci\u00f3n passwordless: qu\u00e9 es, beneficios y m\u00e1s"},"content":{"rendered":"\n<p>En la actualidad, en la era digital que nos encontramos, la seguridad en l\u00ednea es fundamental, la <strong>autenticaci\u00f3n<\/strong> sin contrase\u00f1a emerge como un enfoque prometedor para garantizar la protecci\u00f3n, ya sea de cuentas o datos sensibles. La <strong>autenticaci\u00f3n passwordless<\/strong>, tambi\u00e9n conocida como autenticaci\u00f3n multifactor sin contrase\u00f1a, est\u00e1 revolucionando la forma en que iniciamos sesi\u00f3n en nuestras cuentas en l\u00ednea.<\/p>\n<p>En este art\u00edculo, exploraremos <strong>qu\u00e9 es la autenticaci\u00f3n passwordless<\/strong>, sus beneficios, c\u00f3mo difiere de las contrase\u00f1as tradicionales y c\u00f3mo aborda problemas de seguridad comunes.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_72 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/passwordless\/#%C2%BFQue_es_Autenticacion_Passwordless\" title=\"\u00bfQu\u00e9 es Autenticaci\u00f3n Passwordless?\">\u00bfQu\u00e9 es Autenticaci\u00f3n Passwordless?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/passwordless\/#Beneficios_de_su_uso\" title=\"Beneficios de su uso\">Beneficios de su uso<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/passwordless\/#Diferencia_entre_Contrasena_y_PIN\" title=\"Diferencia entre Contrase\u00f1a y PIN\">Diferencia entre Contrase\u00f1a y PIN<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/passwordless\/#Soluciones_que_ofrece\" title=\"Soluciones que ofrece\">Soluciones que ofrece<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/passwordless\/#Conclusion\" title=\"Conclusi\u00f3n\">Conclusi\u00f3n<\/a><\/li><\/ul><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"%C2%BFQue_es_Autenticacion_Passwordless\"><\/span><strong>\u00bfQu\u00e9 es Autenticaci\u00f3n Passwordless?<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>La autenticaci\u00f3n <a href=\"https:\/\/www.incibe.es\/empresas\/blog\/passwordless-el-comienzo-del-fin-las-contrasenas\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">passwordless<\/a> se refiere a un m\u00e9todo de autenticaci\u00f3n en el que los usuarios pueden acceder a sus cuentas en l\u00ednea sin la necesidad de introducir contrase\u00f1as. En lugar de eso, se utilizan otros factores de autenticaci\u00f3n, como <strong>huellas dactilares, reconocimiento facial, c\u00f3digos PIN y llaves de seguridad<\/strong>, para verificar la identidad del usuario. Este m\u00e9todo proporciona una forma segura y conveniente de acceder a cuentas y servicios en l\u00ednea, eliminando la necesidad de recordar contrase\u00f1as complejas.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Beneficios_de_su_uso\"><\/span><strong>Beneficios de su uso<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>La <strong>autenticaci\u00f3n passwordless<\/strong> ofrece numerosos beneficios en t\u00e9rminos de seguridad y experiencia del usuario. En primer lugar, elimina la vulnerabilidad asociada con las contrase\u00f1as d\u00e9biles o reutilizadas, que son puntos de entrada comunes para los piratas inform\u00e1ticos. Al requerir <strong>factores de autenticaci\u00f3n \u00fanicos, como huellas dactilares o reconocimiento facial,<\/strong> la autenticaci\u00f3n sin contrase\u00f1a garantiza un nivel m\u00e1s alto de seguridad.<\/p>\n<p>Adem\u00e1s, la <strong>autenticaci\u00f3n passwordless<\/strong> simplifica la experiencia del usuario. Los usuarios ya no necesitan recordar y administrar m\u00faltiples contrase\u00f1as, lo que reduce la frustraci\u00f3n y el riesgo de olvidar credenciales. Los m\u00e9todos de autenticaci\u00f3n sin contrase\u00f1a, como el uso de huellas dactilares en un dispositivo m\u00f3vil,<strong> agilizan el proceso de inicio de sesi\u00f3n<\/strong> <strong><a href=\"https:\/\/www.inesem.es\/Curso-Gestion-Seguridad-Redes-Area-Local\" target=\"_blank\" rel=\"noopener\">en redes de \u00e1rea local o remota<\/a><\/strong> y brindan una experiencia m\u00e1s fluida.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Diferencia_entre_Contrasena_y_PIN\"><\/span><strong>Diferencia entre Contrase\u00f1a y PIN<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>La principal diferencia entre una <strong>contrase\u00f1a y un PIN<\/strong> radica en su naturaleza y uso. Una contrase\u00f1a es una secuencia de caracteres alfanum\u00e9ricos que el usuario debe recordar y escribir para autenticarse. En cambio, un PIN es un c\u00f3digo num\u00e9rico m\u00e1s corto, que a menudo consta de cuatro a seis d\u00edgitos. Aunque ambos se utilizan para autenticar la identidad del usuario, los PIN suelen ser m\u00e1s simples y r\u00e1pidos de ingresar.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Soluciones_que_ofrece\"><\/span><strong>Soluciones que ofrece<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>La<strong> autenticaci\u00f3n passwordless<\/strong> aborda varios desaf\u00edos relacionados con la seguridad y la experiencia del usuario. En primer lugar, aborda la vulnerabilidad de las contrase\u00f1as d\u00e9biles o reutilizadas al eliminar la necesidad de utilizar contrase\u00f1as en absoluto. Esto reduce dr\u00e1sticamente la posibilidad de que los ciberdelincuentes accedan a cuentas utilizando m\u00e9todos de fuerza bruta.<\/p>\n<p>Adem\u00e1s, la autenticaci\u00f3n<strong> passwordless tambi\u00e9n resuelve el problema de olvidar contrase\u00f1as<\/strong>. Los usuarios a menudo se enfrentan a la frustraci\u00f3n de no poder acceder a sus cuentas debido a la p\u00e9rdida de contrase\u00f1as. Con la autenticaci\u00f3n sin contrase\u00f1a, este problema se elimina por completo, ya que los usuarios pueden utilizar factores de <strong>autenticaci\u00f3n m\u00e1s confiables y f\u00e1ciles de recordar<\/strong>, como sus huellas dactilares o reconocimiento facial.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Conclusion\"><\/span><strong>Conclusi\u00f3n<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>En resumen, la autenticaci\u00f3n <strong>passwordless<\/strong> est\u00e1 revolucionando la forma en que garantizamos la<strong> seguridad en l\u00ednea<\/strong>. Al eliminar la necesidad de contrase\u00f1as y utilizar m\u00e9todos de autenticaci\u00f3n m\u00e1s seguros y convenientes, este enfoque est\u00e1 <strong>transformando la experiencia del usuario<\/strong> y proporcionando una capa adicional de <strong>protecci\u00f3n<\/strong>. En un mundo digital cada vez m\u00e1s complejo, la autenticaci\u00f3n sin contrase\u00f1a es una soluci\u00f3n bienvenida para mejorar tanto la <a href=\"https:\/\/www.inesem.es\/Master-Seguridad-Informacion-Comunicaciones\" target=\"_blank\" rel=\"noopener\">seguridad inform\u00e1tica<\/a> como la comodidad en l\u00ednea.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>En la actualidad, la seguridad en l\u00ednea es fundamental. La autenticaci\u00f3n passwordless revoluciona la forma en que iniciamos sesi\u00f3n.<\/p>\n","protected":false},"author":91968,"featured_media":4128,"comment_status":"open","ping_status":"open","sticky":true,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5],"class_list":["post-4127","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-desarrollo-de-aplicaciones"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Autenticaci\u00f3n passwordless: qu\u00e9 es, beneficios y m\u00e1s<\/title>\n<meta name=\"description\" content=\"En la actualidad, la seguridad en l\u00ednea es fundamental. La autenticaci\u00f3n passwordless revoluciona la forma en que iniciamos sesi\u00f3n.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/passwordless\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Autenticaci\u00f3n passwordless: qu\u00e9 es, beneficios y m\u00e1s\" \/>\n<meta property=\"og:description\" content=\"En la actualidad, la seguridad en l\u00ednea es fundamental. La autenticaci\u00f3n passwordless revoluciona la forma en que iniciamos sesi\u00f3n.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/passwordless\" \/>\n<meta property=\"og:site_name\" content=\"Canal Inform\u00e1tica y TICS\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/InesemBusinessSchool\/\" \/>\n<meta property=\"article:published_time\" content=\"2023-08-25T11:38:44+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-08-25T11:40:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2023\/08\/passwordless-1020x656.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1020\" \/>\n\t<meta property=\"og:image:height\" content=\"656\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"jefferson.mera\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@inesem\" \/>\n<meta name=\"twitter:site\" content=\"@inesem\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"jefferson.mera\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/passwordless#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/passwordless\"},\"author\":{\"name\":\"jefferson.mera\",\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#\/schema\/person\/191b07216f6896be60fc0b8b75c14342\"},\"headline\":\"Autenticaci\u00f3n passwordless: qu\u00e9 es, beneficios y m\u00e1s\",\"datePublished\":\"2023-08-25T11:38:44+00:00\",\"dateModified\":\"2023-08-25T11:40:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/passwordless\"},\"wordCount\":665,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/passwordless#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2023\/08\/passwordless.png\",\"articleSection\":[\"Desarrollo de Aplicaciones\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/passwordless#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/passwordless\",\"url\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/passwordless\",\"name\":\"Autenticaci\u00f3n passwordless: qu\u00e9 es, beneficios y m\u00e1s\",\"isPartOf\":{\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/passwordless#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/passwordless#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2023\/08\/passwordless.png\",\"datePublished\":\"2023-08-25T11:38:44+00:00\",\"dateModified\":\"2023-08-25T11:40:09+00:00\",\"description\":\"En la actualidad, la seguridad en l\u00ednea es fundamental. La autenticaci\u00f3n passwordless revoluciona la forma en que iniciamos sesi\u00f3n.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/passwordless#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/passwordless\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/passwordless#primaryimage\",\"url\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2023\/08\/passwordless.png\",\"contentUrl\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2023\/08\/passwordless.png\",\"width\":1680,\"height\":1080,\"caption\":\"passwordless\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/passwordless#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Desarrollo de Aplicaciones\",\"item\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/categorias\/desarrollo-de-aplicaciones\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Autenticaci\u00f3n passwordless: qu\u00e9 es, beneficios y m\u00e1s\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#website\",\"url\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/\",\"name\":\"Canal Inform\u00e1tica y TICS\",\"description\":\"Canal de Noticias gestionado por el Departamento Docente de Inform\u00e1tica y TICS de INESEM\",\"publisher\":{\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#organization\",\"name\":\"Canal Inform\u00e1tica y TICS\",\"url\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#\/schema\/logo\/image\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Canal Inform\u00e1tica y TICS\"},\"image\":{\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/InesemBusinessSchool\/\",\"https:\/\/x.com\/inesem\",\"http:\/\/www.linkedin.com\/company\/2370697\",\"https:\/\/www.youtube.com\/user\/inesembusinesschool\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#\/schema\/person\/191b07216f6896be60fc0b8b75c14342\",\"name\":\"jefferson.mera\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/3ff3f1ac95ff609e4a442c4de0742907?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/3ff3f1ac95ff609e4a442c4de0742907?s=96&d=mm&r=g\",\"caption\":\"jefferson.mera\"},\"url\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/autores\/jefferson-mera\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Autenticaci\u00f3n passwordless: qu\u00e9 es, beneficios y m\u00e1s","description":"En la actualidad, la seguridad en l\u00ednea es fundamental. La autenticaci\u00f3n passwordless revoluciona la forma en que iniciamos sesi\u00f3n.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/passwordless","og_locale":"es_ES","og_type":"article","og_title":"Autenticaci\u00f3n passwordless: qu\u00e9 es, beneficios y m\u00e1s","og_description":"En la actualidad, la seguridad en l\u00ednea es fundamental. La autenticaci\u00f3n passwordless revoluciona la forma en que iniciamos sesi\u00f3n.","og_url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/passwordless","og_site_name":"Canal Inform\u00e1tica y TICS","article_publisher":"https:\/\/www.facebook.com\/InesemBusinessSchool\/","article_published_time":"2023-08-25T11:38:44+00:00","article_modified_time":"2023-08-25T11:40:09+00:00","og_image":[{"width":1020,"height":656,"url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2023\/08\/passwordless-1020x656.png","type":"image\/png"}],"author":"jefferson.mera","twitter_card":"summary_large_image","twitter_creator":"@inesem","twitter_site":"@inesem","twitter_misc":{"Escrito por":"jefferson.mera","Tiempo de lectura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/passwordless#article","isPartOf":{"@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/passwordless"},"author":{"name":"jefferson.mera","@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#\/schema\/person\/191b07216f6896be60fc0b8b75c14342"},"headline":"Autenticaci\u00f3n passwordless: qu\u00e9 es, beneficios y m\u00e1s","datePublished":"2023-08-25T11:38:44+00:00","dateModified":"2023-08-25T11:40:09+00:00","mainEntityOfPage":{"@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/passwordless"},"wordCount":665,"commentCount":0,"publisher":{"@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#organization"},"image":{"@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/passwordless#primaryimage"},"thumbnailUrl":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2023\/08\/passwordless.png","articleSection":["Desarrollo de Aplicaciones"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/passwordless#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/passwordless","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/passwordless","name":"Autenticaci\u00f3n passwordless: qu\u00e9 es, beneficios y m\u00e1s","isPartOf":{"@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/passwordless#primaryimage"},"image":{"@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/passwordless#primaryimage"},"thumbnailUrl":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2023\/08\/passwordless.png","datePublished":"2023-08-25T11:38:44+00:00","dateModified":"2023-08-25T11:40:09+00:00","description":"En la actualidad, la seguridad en l\u00ednea es fundamental. La autenticaci\u00f3n passwordless revoluciona la forma en que iniciamos sesi\u00f3n.","breadcrumb":{"@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/passwordless#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/passwordless"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/passwordless#primaryimage","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2023\/08\/passwordless.png","contentUrl":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2023\/08\/passwordless.png","width":1680,"height":1080,"caption":"passwordless"},{"@type":"BreadcrumbList","@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/passwordless#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/"},{"@type":"ListItem","position":2,"name":"Desarrollo de Aplicaciones","item":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/categorias\/desarrollo-de-aplicaciones"},{"@type":"ListItem","position":3,"name":"Autenticaci\u00f3n passwordless: qu\u00e9 es, beneficios y m\u00e1s"}]},{"@type":"WebSite","@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#website","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/","name":"Canal Inform\u00e1tica y TICS","description":"Canal de Noticias gestionado por el Departamento Docente de Inform\u00e1tica y TICS de INESEM","publisher":{"@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#organization","name":"Canal Inform\u00e1tica y TICS","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Canal Inform\u00e1tica y TICS"},"image":{"@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/InesemBusinessSchool\/","https:\/\/x.com\/inesem","http:\/\/www.linkedin.com\/company\/2370697","https:\/\/www.youtube.com\/user\/inesembusinesschool\/"]},{"@type":"Person","@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#\/schema\/person\/191b07216f6896be60fc0b8b75c14342","name":"jefferson.mera","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/3ff3f1ac95ff609e4a442c4de0742907?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3ff3f1ac95ff609e4a442c4de0742907?s=96&d=mm&r=g","caption":"jefferson.mera"},"url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/autores\/jefferson-mera"}]}},"autor_name":{"name":"jefferson.mera"},"featured_image":{"attachment_meta":{"width":1680,"height":1080,"file":"2023\/08\/passwordless.png","sizes":{"medium":{"file":"passwordless-175x113.png","width":175,"height":113,"mime_type":"image\/png","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2023\/08\/passwordless-175x113.png"},"large":{"file":"passwordless-1020x656.png","width":1020,"height":656,"mime_type":"image\/png","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2023\/08\/passwordless-1020x656.png"},"thumbnail":{"file":"passwordless-345x180.png","width":345,"height":180,"mime_type":"image\/png","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2023\/08\/passwordless-345x180.png"},"medium_large":{"file":"passwordless-768x494.png","width":768,"height":494,"mime_type":"image\/png","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2023\/08\/passwordless-768x494.png"},"wysija-newsletters-max":{"file":"passwordless-600x386.png","width":600,"height":386,"mime_type":"image\/png","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2023\/08\/passwordless-600x386.png"},"1536x1536":{"file":"passwordless-1536x987.png","width":1536,"height":987,"mime_type":"image\/png","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2023\/08\/passwordless-1536x987.png"},"thumb-small":{"file":"passwordless-80x80.png","width":80,"height":80,"mime_type":"image\/png","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2023\/08\/passwordless-80x80.png"},"thumb-standard":{"file":"passwordless-320x320.png","width":320,"height":320,"mime_type":"image\/png","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2023\/08\/passwordless-320x320.png"},"thumb-medium":{"file":"passwordless-520x245.png","width":520,"height":245,"mime_type":"image\/png","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2023\/08\/passwordless-520x245.png"},"thumb-large":{"file":"passwordless-720x340.png","width":720,"height":340,"mime_type":"image\/png","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2023\/08\/passwordless-720x340.png"},"thumb-anteriores":{"file":"passwordless-230x163.png","width":230,"height":163,"mime_type":"image\/png","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2023\/08\/passwordless-230x163.png"},"thumb-inverso":{"file":"passwordless-369x261.png","width":369,"height":261,"mime_type":"image\/png","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2023\/08\/passwordless-369x261.png"},"thumb-cercano":{"file":"passwordless-650x200.png","width":650,"height":200,"mime_type":"image\/png","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2023\/08\/passwordless-650x200.png"},"thumb-slider":{"file":"passwordless-574x430.png","width":574,"height":430,"mime_type":"image\/png","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2023\/08\/passwordless-574x430.png"},"thumb-busqueda":{"file":"passwordless-580x375.png","width":580,"height":375,"mime_type":"image\/png","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2023\/08\/passwordless-580x375.png"},"thumb-formacion-continua":{"file":"passwordless-440x336.png","width":440,"height":336,"mime_type":"image\/png","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2023\/08\/passwordless-440x336.png"},"thumb-xlarge":{"file":"passwordless-980x450.png","width":980,"height":450,"mime_type":"image\/png","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2023\/08\/passwordless-980x450.png"},"thumb-xxlarge":{"file":"passwordless-1320x500.png","width":1320,"height":500,"mime_type":"image\/png","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2023\/08\/passwordless-1320x500.png"}},"image_meta":{"aperture":"0","credit":"","camera":"","caption":"","created_timestamp":"0","copyright":"","focal_length":"0","iso":"0","shutter_speed":"0","title":"","orientation":"0","keywords":[]}}},"_links":{"self":[{"href":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/wp-json\/wp\/v2\/posts\/4127"}],"collection":[{"href":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/wp-json\/wp\/v2\/users\/91968"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/wp-json\/wp\/v2\/comments?post=4127"}],"version-history":[{"count":0,"href":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/wp-json\/wp\/v2\/posts\/4127\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/wp-json\/wp\/v2\/media\/4128"}],"wp:attachment":[{"href":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/wp-json\/wp\/v2\/media?parent=4127"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/wp-json\/wp\/v2\/categories?post=4127"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}