for both 2 party and 3 party authentication schemes
A highly secure, comprehensive, easy-to-use replacement
for usernames, passwords, reminders, one-time-code
authenticators … and everything else.
Created by: Steve Gibson
Twitter: @SGgrc
*There have been claims that the authentication
method SQRL uses is patented, but Steve Gibson has
addressed this and claims the methods described in the
patent work completely differently than SQRL
and so do not apply.
(cue groans)
With SQRL you either tap, snap, or click a login page's QR code and YOU are securely logged in.
SQRL requires a client installed on either the same device or on the user's smartphone
The SQRL client registers the SQRL protocol on the machine, and when the SQRL link is clicked, it responds to the SQRL link to authenticate the user
Using the SQRL client on their smartphone, a user can scan the QR code which will provide the data to the client to authenticate the user
Need the SQRL client installed before you can use SQRL
User DOES need to authenticate to their SQRL client
No 3rd party so no external recourse
SQRL Rescue Code
Bad guys who gained control of an identity can not lock users out of their own accounts, but users can use the Identity Lock (and Rescue Code) to change their identity and take back their identity
Reference libraries are functional, other implementations are in progress: some a proof of concept and others are fully-functional implementations
Client Support
Server Support