<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Passkey on 安橙的博客</title><link>https://blog.ans20xx.com/tags/passkey/</link><description>Recent content in Passkey on 安橙的博客</description><generator>Hugo -- 0.161.1</generator><language>zh</language><lastBuildDate>Sat, 23 May 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://blog.ans20xx.com/tags/passkey/index.xml" rel="self" type="application/rss+xml"/><item><title>Day 05 · 多因素认证 · TOTP · WebAuthn / Passkey</title><link>https://blog.ans20xx.com/posts/backend/authn-authz-day05/</link><pubDate>Sat, 23 May 2026 00:00:00 +0000</pubDate><guid>https://blog.ans20xx.com/posts/backend/authn-authz-day05/</guid><description>认证授权 30 天 Day 05：辨清 MFA 三要素与威胁模型，看懂 RFC 4226 / 6238 的 HOTP/TOTP 公式，理解 SMS OTP 为何被 NIST 弃用，用 Go 实现 TOTP 服务并跑通 WebAuthn / Passkey 登录。Phase 1 收官。</description></item></channel></rss>