

So, at this point, you’re probably really excited to add magic links to your application. Pretty easy, though, right? Fewer than 10 steps, and odds are, it’s very similar to your current workflow for when user’s forget and need to reset their passwords, except without the added step of setting a password. How? There are arguments that error messages are a way to give hackers clues into who has and doesn’t have an account in your system. This is a step to help stop hackers in their tracks. If a user is not found, we wouldn't authenticate, and nothing further would happen.

The application receives the query at the magic link end point.The user opens the email and clicks on the magic link.The application sends the magic link URL to the user’s email.The application generates a token for the magic link and forms the magic link.The website requests the user’s email address.A user visits an application or website.Slack leans into the “magic” aspect, adorning the action with a magic wand, as seen below. One of the most well-known magic link flows is Slack’s. On a high level, it goes like this: A user gives an application an email address and then clicks the magic link that is sent to their email-and, voilà, they’re logged in. Magic links are similar to the set up of a one-time password (OTP) for authentication, and they go through the same flow as a “Forgot Password” workflow. We’ll take a deep dive into how magic links work, on a technical level review the security implications of using them and look into how they improve the customer’s experience. The whole process of authentication with a magic link involves the user providing their email, then clicking said “magical link” to log in. Magic links provide a way for users to authenticate without a password.

With passwordless authentication you can avoid password fatigue by authenticating without-you guessed it-a password. With a password manager, you have to remember only a single password to access a vault of your other passwords. Two of the most popular are password managers, like 1Password and Dashlane, and passwordless authentication. Humans just can’t remember hundreds of strong passwords. Over 60% of survey respondents admitted to reusing passwords in some capacity. Assuming the average American practices good account security hygiene, each of those accounts should have a unique, hard-to-guess password. The average American’s email address is associated with upwards of 130 online accounts (according to this Digital Guardian survey).
