SlideShare a Scribd company logo
1
FIDO AUTHENTICATION
TECHNICAL OVERVIEW
All Rights Reserved | FIDO Alliance | Copyright 2018
All Rights Reserved | FIDO Alliance | Copyright 20182
HOW SECURE IS AUTHENTICATION?
All Rights Reserved | FIDO Alliance | Copyright 20183
CLOUD AUTHENTICATION
DeviceSomething Authentication
Risk Analytics
Internet
All Rights Reserved | FIDO Alliance | Copyright 20184
PASSWORD ISSUES
DeviceSomething Authentication
Internet
Password could be stolen
from the server
1Password might be entered
into untrusted App / Web-
site (“phishing”)
2
Too many passwords to
remember
(>re-use / cart
Abandonment)
3
Inconvenient to type
password on phone
4
All Rights Reserved | FIDO Alliance | Copyright 20175
OTP ISSUES
DeviceSomething Authentication
Internet
OTP vulnerable to real-
time MITM and MITB
attacks
1
SMS security questionable,
especially when Device is
the phone
2
OTP HW tokens are
expensive and people don’t
want another device
3
Inconvenient to type
OTP into phone
4
All Rights Reserved | FIDO Alliance | Copyright 20186
HOW SECURE IS AUTHENTICATION?
All Rights Reserved | FIDO Alliance | Copyright 20187
HOW SECURE IS AUTHENTICATION?
Attacks require physical action → not scalable
Things are never 100% secure, so focus on adequate security.
Focus on the scalable attacks first.
Scalable Attacks
All Rights Reserved | FIDO Alliance | Copyright 20188
HOW DOES FIDO WORK?
All Rights Reserved | FIDO Alliance | Copyright 20189
HOW DOES FIDO WORK?
DeviceUser verification FIDO Authentication
Authenticator
All Rights Reserved | FIDO Alliance | Copyright 201810
FIDO AUTHENTICATORS
We see “Bound” Authenticators,
i.e. authenticators that are an
integral part of a smartphone or laptop.
We see “Roaming” Authenticators,
i.e. authenticators that can be connected to
different smartphones or laptops using
CTAP.
In both categories you find support for different modalities
Verify
User
Verify User
Presence
All Rights Reserved | FIDO Alliance | Copyright 201811
HOW DOES FIDO WORK?
AuthenticatorUser verification FIDO Authentication
Require user gesture before
private key can be used
Challenge
(Signed) Response
Private key
dedicated to one
app Public key
All Rights Reserved | FIDO Alliance | Copyright 201812
HOW DOES FIDO WORK?
AuthenticatorUser verification FIDO Authentication
Same Authenticator
as registered before?
Same User as
enrolled before?
Can recognize the user (i.e.
user verification), but doesn’t
know its identity attributes.
All Rights Reserved | FIDO Alliance | Copyright 201813
HOW DOES FIDO WORK?
AuthenticatorUser verification FIDO Authentication
Same Authenticator
as registered before?
Same User as
enrolled before?
Can recognize the user (i.e.
user verification), but doesn’t
know its identity attributes.
Identity binding to be
done outside FIDO:
This this “John Doe
with customer ID X”.
FIDO & Federation
FIDO USER DEVICE
FIDO CLIENT
IdP
FIDO SERVER
FIDO
AUTHENTICATOR
FEDERATION SERVERBROWSER / APP FIDO Protocol
Service Provider
Federation
Id DB
Knows details about the
Authentication strength
Knows details about the
Identity and its
verification strength.
First Mile Second Mile
14
All Rights Reserved | FIDO Alliance | Copyright 201815
FIDO ECOSYSTEM
AuthenticatorUser verification FIDO Authentication
… …SE
All Rights Reserved | FIDO Alliance | Copyright 201816
FIDO ECOSYSTEM
AuthenticatorUser verification FIDO Authentication
… …SE
How is the key protected
(TPM, SE, TEE, …)?
Which user verification
method is used?
All Rights Reserved | FIDO Alliance | Copyright 201817
ATTESTATION + METADATA
Private
attestation key
Signed Attestation Object
Metadata
Understand Authenticator
security characteristic by
looking into Metadata from
mds.fidoalliance.org
FIDO Registration
Verify using trust anchor
included in Metadata
Relying parties can store
this for auditing purposes
All Rights Reserved | FIDO Alliance | Copyright 201818
BINDING KEYS TO RELYING PARTIES
Use A-corp.com key
Use B-corp.com key
A
calc
A
docs
B
One Account – All
Applications
As Mobile App & Web App
A
calc
A
docs
B
Platform determines the
“caller” and passes it to the
Authenticator for selecting the
correct key.
FIDO Client determines the
“caller” (AppID/RP ID) and
passes it to the Authenticator
for selecting the correct key.
b-corp
a-corp
All Rights Reserved | FIDO Alliance | Copyright 201819
FIDO AUTHENTICATORS
FIDO has an Authenticator Certification program.
Different certification levels address the
needs to protect against scalable and physical attacks.
See https://fidoalliance.org/certification/authenticator-certification-levels/
User Environment
All Rights Reserved | FIDO Alliance | Copyright 201820
HOW DOES FIDO WORK?
Authenticator
User gesture before
private key can be used
(Touch, PIN entry,
Biometric)
PSD2: (no equivalent)
FIDO: Challenge
PSD2: Authentication Code
FIDO: (Signed) Response
PSD2: Personalized
Security Credential
FIDO: Private key
PSD2: (no equivalent)
FIDO: Public key
PSD2: PSU
FIDO: User
PSD2: ASPSP
FIDO: Relying Party
Local user verification step On-line authentication step
All Rights Reserved | FIDO Alliance | Copyright 201821
FIDO AUTHENTICATOR CONCEPT
FIDO Authenticator
User
Verification /
Presence
Attestation Key
Authentication Key(s)
Injected at
manufacturing,
doesn’t change
Generated at
runtime (on
Registration)
Optional
Components
Transaction
Confirmation
Display
All Rights Reserved | FIDO Alliance | Copyright 201822
FIDO BUILDING BLOCKS
(External)
Authenticator
USER DEVICE
FIDO Client
(Bound)
Authenticator
ASM
RP App FIDO Authentication
RP App
Server
FIDO Server
Metadata
All Rights Reserved | FIDO Alliance | Copyright 201823
FIDO USE CASES
Passwordless Experience
Authenticated Online
3
Biometric User Verification*
21
?
Authentication Challenge Authenticated Online
3
Second Factor Challenge Insert Dongle* / Press Button
Second Factor Experience
*There are other types of authenticators (e.g. PIN)
21
All Rights Reserved | FIDO Alliance | Copyright 201824
FIDO BUILDING BLOCKS
(Roaming)
Authenticator
User Device
Browser
(Bound)
Authenticator
Platform
RP App FIDO Authentication
RP App
Server
FIDO Server
Metadata
Web
Authentication
JS API
CTA
P
All Rights Reserved | FIDO Alliance | Copyright 201825
WEB AUTHENTICATION
Supported In:
JavaScript API that enables
FIDO Authentication directly in web browsers
All Rights Reserved | FIDO Alliance | Copyright 201826
FIDO AUTHENTICATION:
SECURITY & CONVENIENCE
All Rights Reserved | FIDO Alliance | Copyright 201827
CONVENIENCE & SECURITY
Security
Convenience
Password
All Rights Reserved | FIDO Alliance | Copyright 201828
CONVENIENCE & SECURITY
Security
Convenience
Password + OTP
Password
All Rights Reserved | FIDO Alliance | Copyright 201829
CONVENIENCE & SECURITY
Security
Convenience
Password + OTP
Password
FIDO
In FIDO
• Same user verification method
for all servers
In FIDO: Arbitrary user verification
methods are supported
(+ they are interoperable)
All Rights Reserved | FIDO Alliance | Copyright 201830
CONVENIENCE & SECURITY
Security
Convenience
Password + OTP
Password
FIDO
In FIDO: Scalable security
depending on Authenticator
implementation
In FIDO:
• Only public keys on server
• Not phishable
All Rights Reserved | FIDO Alliance | Copyright 201831
CONCLUSION
• Different authentication use-cases lead to different
authentication requirements
• FIDO separates user verification from authentication and
hence supports all user verification methods
• FIDO supports scalable convenience & security
• User verification data is known to Authenticator only
• FIDO complements federation
All Rights Reserved | FIDO Alliance | Copyright 201832
FIDO REGISTRATION
accountInfo, challenge, [cOpts]
rpId, ai, hash(clientData), cryptoP, [exts]
verify user
generate:
key kpub
key kpriv
credential c
c,kpub,clientData,ac,cdh,rpId,cntr,AAGUID[,exts],
signature(tbs)
c,kpub,clientData,ac,tbs, s
store:
key kpub
c
s
Authenticator
select Authenticator according to cOpts;
determine rpId, get tlsData;
clientData := {challenge, origin, rpId, hAlg, tlsData}
cOpts: crypto params, credential black list,
extensions
cdh
ai
tbs
ac: attestation certificate chain
All Rights Reserved | FIDO Alliance | Copyright 201833
FIDO AUTHENTICATION
Authenticator Relying Party
rpId, [c,] hash(clientData)
select Authenticator according to policy;
check rpId, get tlsData (i.e. channel id, etc.);
lookup key handle h;
clientData := {challenge, rpId, tlsData}
clientData,cntr,[exts],signature(cdh,cntr,exts)
clientData, cntr, exts, s
lookup kpub
from DB
check:
exts +
signature
using
key kpub
s
cdh
challenge, [aOpts]
verify user
find
key kpriv
cntr++;
process exts

More Related Content

PDF
Getting Started with FIDO2
PDF
FIDO2 ~ パスワードのいらない世界へ
PPTX
Fido Technical Overview
PPTX
IBM: Hey FIDO, Meet Passkey!.pptx
PPTX
Idcon25 FIDO2 の概要と YubiKey の実装
PDF
Fido認証概要説明
PDF
FIDO and the Future of User Authentication
PDF
FIDO Specifications Overview: UAF & U2F
Getting Started with FIDO2
FIDO2 ~ パスワードのいらない世界へ
Fido Technical Overview
IBM: Hey FIDO, Meet Passkey!.pptx
Idcon25 FIDO2 の概要と YubiKey の実装
Fido認証概要説明
FIDO and the Future of User Authentication
FIDO Specifications Overview: UAF & U2F

What's hot (20)

PPTX
FIDO Alliance: Welcome and FIDO Update.pptx
PPTX
FIDO Workshop-Demo Breakdown.pptx
PDF
俺が考えた最強のID連携デザインパターン
PDF
FIDO UAF Specifications: Overview & Tutorial
PDF
FIDO2 Specifications Overview
PDF
Google & FIDO Authentication
PPT
Ip Spoofing
PDF
Future-proofing Authentication with Passkeys
PDF
FIDO2 Specifications Overview
PDF
FIDO Authentication Technical Overview
PDF
OpenID Connect Explained
PDF
ID & IT 2013 - OpenID Connect Hands-on
PDF
Webauthn Tutorial
PDF
新しい認証技術FIDOの最新動向
PDF
Integrating FIDO Authentication & Federation Protocols
PDF
Dos and don'ts in AWS
PDF
MicrosoftのDID/VC実装概要
PPTX
Technical Considerations for Deploying FIDO Authentication
PDF
エンタープライズITでのOpenID Connect利用ガイドライン
PPTX
FIDO Authentication: Unphishable MFA for All
FIDO Alliance: Welcome and FIDO Update.pptx
FIDO Workshop-Demo Breakdown.pptx
俺が考えた最強のID連携デザインパターン
FIDO UAF Specifications: Overview & Tutorial
FIDO2 Specifications Overview
Google & FIDO Authentication
Ip Spoofing
Future-proofing Authentication with Passkeys
FIDO2 Specifications Overview
FIDO Authentication Technical Overview
OpenID Connect Explained
ID & IT 2013 - OpenID Connect Hands-on
Webauthn Tutorial
新しい認証技術FIDOの最新動向
Integrating FIDO Authentication & Federation Protocols
Dos and don'ts in AWS
MicrosoftのDID/VC実装概要
Technical Considerations for Deploying FIDO Authentication
エンタープライズITでのOpenID Connect利用ガイドライン
FIDO Authentication: Unphishable MFA for All
Ad

Similar to FIDO Authentication Technical Overview (20)

PDF
Technical Principles of FIDO Authentication
PDF
Technical Principles of FIDO Authentication
PPTX
Technical Principles of FIDO Authentication
PPTX
Getting to Know the FIDO Specifications - Technical Tutorial
PPTX
Introduction to FIDO: A New Model for Authentication
PDF
FIDO & PSD2 – Achieving Strong Customer Authentication Compliance
PPTX
UAF Tutorial: Passwordless, Biometric Authentication for Native Apps
PDF
Beyond Passwords: FIDO & the Future of Consumer Authentication
PPTX
FIDO Specifications Overview
PPTX
Introduction to the FIDO Alliance: Vision & Status
PPTX
FIDO Authentication in Korea: Early Adoption & Rapid Innovation
PDF
2018 12-07 tokyo-seminar Brett McDowell
PPTX
FIDO Alliance Vision and Updates
PDF
Javelin Research's State of Strong Authentication 2019 Report Webinar
PDF
Introduction to the FIDO Alliance
PDF
FIDO Specifications Tutorial
PDF
Overview of FIDO Security Requirements and Certifications
PDF
FIDO UAF 1.0 Specs: Overview and Insights
PDF
Using FIDO Authenticator for IoT Devices
PDF
Beyond Passwords: FIDO and the Future of User Authentication
Technical Principles of FIDO Authentication
Technical Principles of FIDO Authentication
Technical Principles of FIDO Authentication
Getting to Know the FIDO Specifications - Technical Tutorial
Introduction to FIDO: A New Model for Authentication
FIDO & PSD2 – Achieving Strong Customer Authentication Compliance
UAF Tutorial: Passwordless, Biometric Authentication for Native Apps
Beyond Passwords: FIDO & the Future of Consumer Authentication
FIDO Specifications Overview
Introduction to the FIDO Alliance: Vision & Status
FIDO Authentication in Korea: Early Adoption & Rapid Innovation
2018 12-07 tokyo-seminar Brett McDowell
FIDO Alliance Vision and Updates
Javelin Research's State of Strong Authentication 2019 Report Webinar
Introduction to the FIDO Alliance
FIDO Specifications Tutorial
Overview of FIDO Security Requirements and Certifications
FIDO UAF 1.0 Specs: Overview and Insights
Using FIDO Authenticator for IoT Devices
Beyond Passwords: FIDO and the Future of User Authentication
Ad

More from FIDO Alliance (20)

PPTX
Securing Account Lifecycles in the Age of Deepfakes.pptx
PPTX
FIDO Seminar: Perspectives on Passkeys & Consumer Adoption.pptx
PPTX
FIDO Seminar: Evolving Landscape of Post-Quantum Cryptography.pptx
PPTX
FIDO Seminar: Targeting Trust: The Future of Identity in the Workforce.pptx
PPTX
FIDO Seminar: New Data: Passkey Adoption in the Workforce.pptx
PPTX
FIDO Seminar: Authentication for a Billion Consumers - Amazon.pptx
PPTX
FIDO Alliance Seminar State of Passkeys.pptx
PPTX
FIDO Munich Seminar: FIDO Tech Principles.pptx
PPTX
FIDO Munich Seminar: Securing Smart Car.pptx
PPTX
FIDO Munich Seminar: Strong Workforce Authn Push & Pull Factors.pptx
PPTX
FIDO Munich Seminar: Biometrics and Passkeys for In-Vehicle Apps.pptx
PPTX
FIDO Munich Seminar Workforce Authentication Case Study.pptx
PPTX
FIDO Munich Seminar In-Vehicle Payment Trends.pptx
PPTX
FIDO Munich Seminar FIDO Automotive Apps.pptx
PPTX
FIDO Munich Seminar Blueprint for In-Vehicle Payment Standard.pptx
PPTX
FIDO Munich Seminar Introduction to FIDO.pptx
PPTX
UX Webinar Series: Essentials for Adopting Passkeys as the Foundation of your...
PPTX
UX Webinar Series: Drive Revenue and Decrease Costs with Passkeys for Consume...
PPTX
UX Webinar Series: Aligning Authentication Experiences with Business Goals
PDF
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
Securing Account Lifecycles in the Age of Deepfakes.pptx
FIDO Seminar: Perspectives on Passkeys & Consumer Adoption.pptx
FIDO Seminar: Evolving Landscape of Post-Quantum Cryptography.pptx
FIDO Seminar: Targeting Trust: The Future of Identity in the Workforce.pptx
FIDO Seminar: New Data: Passkey Adoption in the Workforce.pptx
FIDO Seminar: Authentication for a Billion Consumers - Amazon.pptx
FIDO Alliance Seminar State of Passkeys.pptx
FIDO Munich Seminar: FIDO Tech Principles.pptx
FIDO Munich Seminar: Securing Smart Car.pptx
FIDO Munich Seminar: Strong Workforce Authn Push & Pull Factors.pptx
FIDO Munich Seminar: Biometrics and Passkeys for In-Vehicle Apps.pptx
FIDO Munich Seminar Workforce Authentication Case Study.pptx
FIDO Munich Seminar In-Vehicle Payment Trends.pptx
FIDO Munich Seminar FIDO Automotive Apps.pptx
FIDO Munich Seminar Blueprint for In-Vehicle Payment Standard.pptx
FIDO Munich Seminar Introduction to FIDO.pptx
UX Webinar Series: Essentials for Adopting Passkeys as the Foundation of your...
UX Webinar Series: Drive Revenue and Decrease Costs with Passkeys for Consume...
UX Webinar Series: Aligning Authentication Experiences with Business Goals
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf

Recently uploaded (20)

DOCX
Unit-3 cyber security network security of internet system
PDF
An introduction to the IFRS (ISSB) Stndards.pdf
PPTX
artificial intelligence overview of it and more
PPTX
Job_Card_System_Styled_lorem_ipsum_.pptx
PDF
The New Creative Director: How AI Tools for Social Media Content Creation Are...
PDF
SASE Traffic Flow - ZTNA Connector-1.pdf
PPTX
Introduction to Information and Communication Technology
PDF
Sims 4 Historia para lo sims 4 para jugar
PDF
WebRTC in SignalWire - troubleshooting media negotiation
PPTX
Internet___Basics___Styled_ presentation
PDF
Cloud-Scale Log Monitoring _ Datadog.pdf
PPT
Design_with_Watersergyerge45hrbgre4top (1).ppt
PPTX
introduction about ICD -10 & ICD-11 ppt.pptx
PPTX
international classification of diseases ICD-10 review PPT.pptx
PPTX
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
PDF
Vigrab.top – Online Tool for Downloading and Converting Social Media Videos a...
PPTX
Digital Literacy And Online Safety on internet
PDF
Tenda Login Guide: Access Your Router in 5 Easy Steps
PPTX
522797556-Unit-2-Temperature-measurement-1-1.pptx
PDF
Introduction to the IoT system, how the IoT system works
Unit-3 cyber security network security of internet system
An introduction to the IFRS (ISSB) Stndards.pdf
artificial intelligence overview of it and more
Job_Card_System_Styled_lorem_ipsum_.pptx
The New Creative Director: How AI Tools for Social Media Content Creation Are...
SASE Traffic Flow - ZTNA Connector-1.pdf
Introduction to Information and Communication Technology
Sims 4 Historia para lo sims 4 para jugar
WebRTC in SignalWire - troubleshooting media negotiation
Internet___Basics___Styled_ presentation
Cloud-Scale Log Monitoring _ Datadog.pdf
Design_with_Watersergyerge45hrbgre4top (1).ppt
introduction about ICD -10 & ICD-11 ppt.pptx
international classification of diseases ICD-10 review PPT.pptx
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
Vigrab.top – Online Tool for Downloading and Converting Social Media Videos a...
Digital Literacy And Online Safety on internet
Tenda Login Guide: Access Your Router in 5 Easy Steps
522797556-Unit-2-Temperature-measurement-1-1.pptx
Introduction to the IoT system, how the IoT system works

FIDO Authentication Technical Overview

  • 1. 1 FIDO AUTHENTICATION TECHNICAL OVERVIEW All Rights Reserved | FIDO Alliance | Copyright 2018
  • 2. All Rights Reserved | FIDO Alliance | Copyright 20182 HOW SECURE IS AUTHENTICATION?
  • 3. All Rights Reserved | FIDO Alliance | Copyright 20183 CLOUD AUTHENTICATION DeviceSomething Authentication Risk Analytics Internet
  • 4. All Rights Reserved | FIDO Alliance | Copyright 20184 PASSWORD ISSUES DeviceSomething Authentication Internet Password could be stolen from the server 1Password might be entered into untrusted App / Web- site (“phishing”) 2 Too many passwords to remember (>re-use / cart Abandonment) 3 Inconvenient to type password on phone 4
  • 5. All Rights Reserved | FIDO Alliance | Copyright 20175 OTP ISSUES DeviceSomething Authentication Internet OTP vulnerable to real- time MITM and MITB attacks 1 SMS security questionable, especially when Device is the phone 2 OTP HW tokens are expensive and people don’t want another device 3 Inconvenient to type OTP into phone 4
  • 6. All Rights Reserved | FIDO Alliance | Copyright 20186 HOW SECURE IS AUTHENTICATION?
  • 7. All Rights Reserved | FIDO Alliance | Copyright 20187 HOW SECURE IS AUTHENTICATION? Attacks require physical action → not scalable Things are never 100% secure, so focus on adequate security. Focus on the scalable attacks first. Scalable Attacks
  • 8. All Rights Reserved | FIDO Alliance | Copyright 20188 HOW DOES FIDO WORK?
  • 9. All Rights Reserved | FIDO Alliance | Copyright 20189 HOW DOES FIDO WORK? DeviceUser verification FIDO Authentication Authenticator
  • 10. All Rights Reserved | FIDO Alliance | Copyright 201810 FIDO AUTHENTICATORS We see “Bound” Authenticators, i.e. authenticators that are an integral part of a smartphone or laptop. We see “Roaming” Authenticators, i.e. authenticators that can be connected to different smartphones or laptops using CTAP. In both categories you find support for different modalities Verify User Verify User Presence
  • 11. All Rights Reserved | FIDO Alliance | Copyright 201811 HOW DOES FIDO WORK? AuthenticatorUser verification FIDO Authentication Require user gesture before private key can be used Challenge (Signed) Response Private key dedicated to one app Public key
  • 12. All Rights Reserved | FIDO Alliance | Copyright 201812 HOW DOES FIDO WORK? AuthenticatorUser verification FIDO Authentication Same Authenticator as registered before? Same User as enrolled before? Can recognize the user (i.e. user verification), but doesn’t know its identity attributes.
  • 13. All Rights Reserved | FIDO Alliance | Copyright 201813 HOW DOES FIDO WORK? AuthenticatorUser verification FIDO Authentication Same Authenticator as registered before? Same User as enrolled before? Can recognize the user (i.e. user verification), but doesn’t know its identity attributes. Identity binding to be done outside FIDO: This this “John Doe with customer ID X”.
  • 14. FIDO & Federation FIDO USER DEVICE FIDO CLIENT IdP FIDO SERVER FIDO AUTHENTICATOR FEDERATION SERVERBROWSER / APP FIDO Protocol Service Provider Federation Id DB Knows details about the Authentication strength Knows details about the Identity and its verification strength. First Mile Second Mile 14
  • 15. All Rights Reserved | FIDO Alliance | Copyright 201815 FIDO ECOSYSTEM AuthenticatorUser verification FIDO Authentication … …SE
  • 16. All Rights Reserved | FIDO Alliance | Copyright 201816 FIDO ECOSYSTEM AuthenticatorUser verification FIDO Authentication … …SE How is the key protected (TPM, SE, TEE, …)? Which user verification method is used?
  • 17. All Rights Reserved | FIDO Alliance | Copyright 201817 ATTESTATION + METADATA Private attestation key Signed Attestation Object Metadata Understand Authenticator security characteristic by looking into Metadata from mds.fidoalliance.org FIDO Registration Verify using trust anchor included in Metadata Relying parties can store this for auditing purposes
  • 18. All Rights Reserved | FIDO Alliance | Copyright 201818 BINDING KEYS TO RELYING PARTIES Use A-corp.com key Use B-corp.com key A calc A docs B One Account – All Applications As Mobile App & Web App A calc A docs B Platform determines the “caller” and passes it to the Authenticator for selecting the correct key. FIDO Client determines the “caller” (AppID/RP ID) and passes it to the Authenticator for selecting the correct key. b-corp a-corp
  • 19. All Rights Reserved | FIDO Alliance | Copyright 201819 FIDO AUTHENTICATORS FIDO has an Authenticator Certification program. Different certification levels address the needs to protect against scalable and physical attacks. See https://fidoalliance.org/certification/authenticator-certification-levels/
  • 20. User Environment All Rights Reserved | FIDO Alliance | Copyright 201820 HOW DOES FIDO WORK? Authenticator User gesture before private key can be used (Touch, PIN entry, Biometric) PSD2: (no equivalent) FIDO: Challenge PSD2: Authentication Code FIDO: (Signed) Response PSD2: Personalized Security Credential FIDO: Private key PSD2: (no equivalent) FIDO: Public key PSD2: PSU FIDO: User PSD2: ASPSP FIDO: Relying Party Local user verification step On-line authentication step
  • 21. All Rights Reserved | FIDO Alliance | Copyright 201821 FIDO AUTHENTICATOR CONCEPT FIDO Authenticator User Verification / Presence Attestation Key Authentication Key(s) Injected at manufacturing, doesn’t change Generated at runtime (on Registration) Optional Components Transaction Confirmation Display
  • 22. All Rights Reserved | FIDO Alliance | Copyright 201822 FIDO BUILDING BLOCKS (External) Authenticator USER DEVICE FIDO Client (Bound) Authenticator ASM RP App FIDO Authentication RP App Server FIDO Server Metadata
  • 23. All Rights Reserved | FIDO Alliance | Copyright 201823 FIDO USE CASES Passwordless Experience Authenticated Online 3 Biometric User Verification* 21 ? Authentication Challenge Authenticated Online 3 Second Factor Challenge Insert Dongle* / Press Button Second Factor Experience *There are other types of authenticators (e.g. PIN) 21
  • 24. All Rights Reserved | FIDO Alliance | Copyright 201824 FIDO BUILDING BLOCKS (Roaming) Authenticator User Device Browser (Bound) Authenticator Platform RP App FIDO Authentication RP App Server FIDO Server Metadata Web Authentication JS API CTA P
  • 25. All Rights Reserved | FIDO Alliance | Copyright 201825 WEB AUTHENTICATION Supported In: JavaScript API that enables FIDO Authentication directly in web browsers
  • 26. All Rights Reserved | FIDO Alliance | Copyright 201826 FIDO AUTHENTICATION: SECURITY & CONVENIENCE
  • 27. All Rights Reserved | FIDO Alliance | Copyright 201827 CONVENIENCE & SECURITY Security Convenience Password
  • 28. All Rights Reserved | FIDO Alliance | Copyright 201828 CONVENIENCE & SECURITY Security Convenience Password + OTP Password
  • 29. All Rights Reserved | FIDO Alliance | Copyright 201829 CONVENIENCE & SECURITY Security Convenience Password + OTP Password FIDO In FIDO • Same user verification method for all servers In FIDO: Arbitrary user verification methods are supported (+ they are interoperable)
  • 30. All Rights Reserved | FIDO Alliance | Copyright 201830 CONVENIENCE & SECURITY Security Convenience Password + OTP Password FIDO In FIDO: Scalable security depending on Authenticator implementation In FIDO: • Only public keys on server • Not phishable
  • 31. All Rights Reserved | FIDO Alliance | Copyright 201831 CONCLUSION • Different authentication use-cases lead to different authentication requirements • FIDO separates user verification from authentication and hence supports all user verification methods • FIDO supports scalable convenience & security • User verification data is known to Authenticator only • FIDO complements federation
  • 32. All Rights Reserved | FIDO Alliance | Copyright 201832 FIDO REGISTRATION accountInfo, challenge, [cOpts] rpId, ai, hash(clientData), cryptoP, [exts] verify user generate: key kpub key kpriv credential c c,kpub,clientData,ac,cdh,rpId,cntr,AAGUID[,exts], signature(tbs) c,kpub,clientData,ac,tbs, s store: key kpub c s Authenticator select Authenticator according to cOpts; determine rpId, get tlsData; clientData := {challenge, origin, rpId, hAlg, tlsData} cOpts: crypto params, credential black list, extensions cdh ai tbs ac: attestation certificate chain
  • 33. All Rights Reserved | FIDO Alliance | Copyright 201833 FIDO AUTHENTICATION Authenticator Relying Party rpId, [c,] hash(clientData) select Authenticator according to policy; check rpId, get tlsData (i.e. channel id, etc.); lookup key handle h; clientData := {challenge, rpId, tlsData} clientData,cntr,[exts],signature(cdh,cntr,exts) clientData, cntr, exts, s lookup kpub from DB check: exts + signature using key kpub s cdh challenge, [aOpts] verify user find key kpriv cntr++; process exts