Using the IC
How Internet Identity works
Let’s explore how Internet Identity utilizes Web Authentication (WebAuthn) to power anonymous blockchain authentication
How does Internet Identity work?
Internet Identity makes usernames and passwords obsolete. Let’s have a look at how Internet Identity works.
Functionality of Internet Identity
Modern operating systems and web browsers support Web Authentication (WebAuthn), which is utilized to power a key function of Internet Identity. Another integral part of Internet Identity is the Internet Computer’s “chain key cryptography” framework.
Elements of Internet Identity
dApps integrating with Internet Identity can be accessed by users who authenticate themselves by using an identity anchor. For each new device a user adds to their identity anchor, a new pair of cryptographic keys is generated. This includes both private and public keys.
How is the generated pair of cryptographic keys stored?
By creating multiple identity anchors (i.e. by adding multiple authentication devices), Internet Identity users can seamlessly log into dApps across all of their devices.
The process of logging into a dApp via Internet Identity
Once access to the dApp is authorized, the user’s browser downloads the authorization and redirects to the dApp. The downloaded authorization is verified by the dApp before pseudonymous access (i.e. as an application-specific anonymous identity) is granted.
How are pseudonyms utilized?
Devices just represent different methods of authenticating to a dApp via Internet Identity anchor.
The number of identity anchors that can be registered is not limited, giving users the option to create various anchors for different purposes. For example, a user might want to create an identity anchor for DeFi via facial recognition and a different anchor via HSM devices such as Ledger wallets or YubiKeys for GameFi.