
We all know that, to be able to log in to a website, online application, etc. That is, WebAuthn takes care of the connection and CTAP2 of the authenticator connection. That is, while WebAuth handles the connection between the user’s equipment and the website, the CTAP2 protocol is responsible for the connection between the user’s equipment and the website using the authenticator. CTAP2 is used together with WebAuthn, and what allows FIDO2 to work.

CTAP2 : The second version that was created of CTAP, is CTAP2.This version refers to the authentication of two factors, or as you will surely know many, two-step authentication that is so fashionable in recent years. U2F (Universal 2 nd Factor) : The first version that was created of CTAP, is also precisely the first version that was created of the protocol and is better known as U2F which means “Universal 2 nd Factor”.Once we have seen what CTAP is and how it works, it is important to know that there are currently two totally different versions of CTAP that we will see below: That is, CTAP would be the protocol that is responsible for secure communication between the two parties, so that they first communicate, second they authenticate and third, they can finally log in.

The CTAP in this previous case would be the protocol in charge of controlling the communication between the USB key and the authenticator token. Given this previous point, we want to explain how the CTAP works. Another option that also exists, and is increasingly used in companies, is a device that connects to our computer as a USB key, where internally it incorporates a hardware to authenticate us and have a secure login.
