惯性聚合 高效追踪和阅读你感兴趣的博客、新闻、科技资讯
阅读原文 在惯性聚合中打开

推荐订阅源

The Register - Security
The Register - Security
美团技术团队
Recent Announcements
Recent Announcements
MongoDB | Blog
MongoDB | Blog
Jina AI
Jina AI
C
Check Point Blog
aimingoo的专栏
aimingoo的专栏
I
InfoQ
S
Securelist
T
Tor Project blog
GbyAI
GbyAI
L
LINUX DO - 热门话题
V
Visual Studio Blog
AWS News Blog
AWS News Blog
The Cloudflare Blog
腾讯CDC
K
Kaspersky official blog
OSCHINA 社区最新新闻
OSCHINA 社区最新新闻
Recorded Future
Recorded Future
李成银的技术随笔
W
WeLiveSecurity
Cyber Security Advisories - MS-ISAC
Cyber Security Advisories - MS-ISAC
Threat Intelligence Blog | Flashpoint
Threat Intelligence Blog | Flashpoint
M
Microsoft Research Blog - Microsoft Research
G
Google Developers Blog
酷 壳 – CoolShell
酷 壳 – CoolShell
Schneier on Security
Schneier on Security
B
Blog
IT之家
IT之家
爱范儿
爱范儿
H
Help Net Security
Simon Willison's Weblog
Simon Willison's Weblog
NISL@THU
NISL@THU
J
Java Code Geeks
博客园 - 聂微东
T
The Exploit Database - CXSecurity.com
Cyberwarzone
Cyberwarzone
博客园 - 叶小钗
MyScale Blog
MyScale Blog
Application and Cybersecurity Blog
Application and Cybersecurity Blog
奇客Solidot–传递最新科技情报
奇客Solidot–传递最新科技情报
Project Zero
Project Zero
F
Future of Privacy Forum
D
Darknet – Hacking Tools, Hacker News & Cyber Security
CTFtime.org: upcoming CTF events
CTFtime.org: upcoming CTF events
Hacker News: Ask HN
Hacker News: Ask HN
D
Docker
Apple Machine Learning Research
Apple Machine Learning Research
B
Blog RSS Feed
V
Vulnerabilities – Threatpost

DEV Community

How to Tailor Your Resume to a Job Description in 5 Minutes (A Method That Actually Works) Flutter vs React Native in 2026: I Built the Same App in Both JWT vs Session Tokens in Spring Boot: A Senior Dev's Decision Guide How to Choose an AI Gateway in 2026 How to Teach Source Evaluation When Your Students Use ChatGPT Rmux Review: Rust Terminal Multiplexer Built for AI Agents I realized I was only using half of what Claude Code has to offer DevOps & Deployment Essentials: Your Practical CI/CD Guide How next-generation captchas work and why it matters for automation Chat is Dead: How JSON Prompting Cut My AI Costs by 73% What if Everybody Were Suddenly... Better? OCI Web Application Firewall (WAF) Deep Dive: Architecture, Traffic Inspection, Threat Protection, and Enterprise Security Design Selling Digital Products in a Country PayPal Refuses to Touch PostgreSQL backup tool Databasus released backup verification in real database Docker containers We Connected an LLM to a 12-Year-Old Codebase. Here's What Broke. The Fallacy of Digital Platforms: Why Stripe Isn't Always King Sizce Google'ın 26 Mayıs tarihinde arama bölümünü tamamen yapay zekaya devredecek olması açık webin devamı için nasıl sonuçlanır? When Should You Use GraphRAG Instead of RAG? Big Data Is Not Just About “Huge Data” The Prefix Bubble MPP TestKit VSCode Extension - Inline HTTP 402 Payment Flow Hints The README Was a Protocol. The Entrypoint Was Still Optional. After AI Healthcare, Medical World Models May Be the Next Life-Science AI Platform Your AI Agent Doesn't Need an API Key: Entra Agent ID and Anthropic's Workload Identity Federation ECDSA - The Math That Only Goes One Way S3 Files Killed My Least Favorite Lambda Pattern BNB RPC Endpoints for Production Apps and Backend Workloads I Used to Get Excited About New Tools Now I Feel Tired. Google I/O 2026 — What I Hoped to See Beyond the Model Announcements Most 'AI agents' are just scripts with a marketing budget 🚀 Replicating the evasive VoidLink: My Journey Building Cortex C2 # new stuff dropped in duckkit 🦆 Paying the bills in a restricted country with cryptocurrency: the lie that almost killed our digital product Building Global Economies Through Better APIs: Lessons from PayPal vs Crypto for Crypto Payments in Developing Countries Verified or Not? Ep. 2 — Snyk's Own Test App Scanned With 9 Engines 17 SessionAuth Tools in OpenClaw: Integrate Any AI Framework with Wallet Infrastructure WebMCP and the Citation Paradox — What Agent-Ready Websites Actually Mean for GEO What Gemma 4 Doesn't Know About Cameroon — and What That Taught Me About Building AI for the Real World AI Can Generate Code — And Interactive Coding Playgrounds Are Becoming Essential Modern Web Guidance: Teaching AI Agents to Stop Coding Like It's 2019 The Discipline We Forgot We Had I Built a 3-Agent AI Research Crew in 250 Lines of Python (LangGraph + Free Gemini) PostgreSQL MCP: Let Claude query your databases in plain English Building digital products and Android apps under IteraTrail Fuel Price API for Fleet Cost Planning Linux File System Explained Simply Building a shot-detection worker for an upload pipeline with PySceneDetect 0.7 Wiring VMAF (and PSNR) into your encoder CI with FFmpeg 8.1 and ffmpeg-quality-metrics Bikin Chatbot Sendiri yang Bisa Jawab Pertanyaan dari Dokumen kamu Learning Arabic: Where to Start
为什么无密码B2C推广停滞在5%(以及如何达到60%)
vdelitz · 2026-05-21 · via DEV Community

vdelitz

Passwordless B2C at Scale in 2026

规模化面向B2C的无密码认证在2026年听起来很直接,因为现在每个主要的CIAM(客户身份与访问管理)都公开了WebAuthn API,并将密钥作为标准功能进行推广。但我在这里参考的指南特别关注了500万+月活跃用户部署,并提出了一个不那么令人舒适的观点:启用密钥并不等同于推动密钥的采用。

在生产环境中这个差距很快就会显现。团队开始部署密钥,但每日登录仍然通过密码或短信 OTP 进行。根据指南,原生 CIAM 的无密码部署通常在密钥登录率达到 5–10% 时停滞不前 结构原因很简单:CIAM 可以存储凭证并执行策略,但通常不控制提示逻辑、设备分割、恢复设计或客户端遥测,这些是让用户转向以密钥为首要行为所必需的。

这是密钥采用谬误的实际体现。“我们的平台支持密钥”是一个功能声明。“我们达到了 60%+ 的密钥登录率”是一个编排结果。

密钥采用阶梯比供应商更重要

指南中最有用的想法之一是 密钥采用阶梯。它将推广成熟度重新定义为旅程设计问题,而不是平台选择问题。

以下是500万MAU B2C环境中的进展描述:

推广形状 登记 使用 Passkey登录率
仅限设置可用 ~4% ~5% <1%
登录后简单提示 ~25% ~20% ~4–5%
优化注册 ~65% ~40% ~23%
密钥优先返回流程 ~80% ~95% >60%

这些阶段之间发生变化的不是底层的Auth0、Cognito、Ping或Clerk租户。发生变化的是顶层的登录入口体验:设备感知提示、条件创建密钥、一键返回流程以及标识符优先恢复。

这也是为什么大型企业通常需要一个WebAuthn编排层没有它,推广就会陷入基线,因为原生界面对于真实设备场景来说太平淡了。

设备碎片化才是真正的实施约束

指南在停止将“密钥”作为一项功能来讨论,并开始讨论生态系统时最为有力。初次尝试的网页密钥注册并不统一。文中引用的基准数据显示 49–83% 在 iOS 上,而仅 25–39% 在 Windows 上.

这种差距对产品有直接的影响:

  • iOS 通常是最适合自动和低摩擦注册的环境。
  • Android 是可行的,但受浏览器和凭证提供者行为的影响而碎片化。
  • macOS 在许多情况下是可行的,但不如 iOS 预测性强。
  • Windows 需要更谨慎的回退机制,并且通常需要跨设备处理。

这里就是条件创建密钥和标识符优先恢复变得操作上重要的地方。如果你在错误的堆栈上提示了错误的用户,你会创建死胡同仪式,而且你的后端日志甚至不会告诉你原因。

身份验证可观察性是缺失的一环

很多团队认为 IDP 日志足以衡量无密码身份认证 CIAM 的成功。该指南提出相反的观点。最昂贵的失败通常发生在后端看到任何有意义的信息之前。

这是“预识别盲点”问题:当浏览器覆盖层失效、自动填充被阻止,或者密码提示足够令人困惑以至于用户放弃流程时,用户仍然是匿名的。标准的CIAM日志、APM跟踪和SIEM数据都不是设计用来捕捉客户端仪式的。

可观测性部分给出了一个具体示例。服务器端密钥成功看起来几乎完美,而用户端完成度较低,首次建议交互是最大的流失点。如果你只检查后端指标,你的密钥推广KPI看起来比实际用户旅程更健康。

对于技术团队来说,这改变了推出顺序。先部署监控,再进行优化。Corbado 是面向大型 B2C 企业的密钥可观测性和采用平台.

购买还是自建,始于总拥有成本,而非许可费用

指南中关于总拥有成本的观点直白且有用:许可费用并非主要成本驱动因素。在 500 万月活跃用户规模下,原生将无密码功能集成到 CIAM 堆栈中,据估计需要 25–30 全职等效人月,加上每年大约1.5个全时当量用于持续维护.

这项工作涵盖了不仅仅是API集成。它还包括前端控制、设备分类、恢复逻辑、跨操作系统/浏览器变化的测试,以及对不回退到密码的备用路径的支持。

实际收获是,大规模无密码主要是一个编排和可观测性问题。如果你的推广卡在基准水平,最高ROI的做法通常是测量用户流失点,按设备堆栈进行细分,并在现有的CIAM(身份访问管理)基础上修复流程,而不是替换它.

阅读完整分析.