SlideShare a Scribd company logo
1
FIDO AUTHENTICATION
TECHNICAL OVERVIEW
All Rights Reserved | FIDO Alliance | Copyright 2018
All Rights Reserved | FIDO Alliance | Copyright 20182
HOW SECURE IS AUTHENTICATION?
All Rights Reserved | FIDO Alliance | Copyright 20183
CLOUD AUTHENTICATION
DeviceSomething Authentication
Risk Analytics
Internet
All Rights Reserved | FIDO Alliance | Copyright 20184
PASSWORD ISSUES
DeviceSomething Authentication
Internet
Password could be stolen
from the server
1Password might be entered
into untrusted App / Web-
site (“phishing”)
2
Too many passwords to
remember
(>re-use / cart
Abandonment)
3
Inconvenient to type
password on phone
4
All Rights Reserved | FIDO Alliance | Copyright 20175
OTP ISSUES
DeviceSomething Authentication
Internet
OTP vulnerable to real-
time MITM and MITB
attacks
1
SMS security questionable,
especially when Device is
the phone
2
OTP HW tokens are
expensive and people don’t
want another device
3
Inconvenient to type
OTP into phone
4
All Rights Reserved | FIDO Alliance | Copyright 20186
HOW SECURE IS AUTHENTICATION?
All Rights Reserved | FIDO Alliance | Copyright 20187
HOW SECURE IS AUTHENTICATION?
Attacks require physical action → not scalable
Things are never 100% secure, so focus on adequate security.
Focus on the scalable attacks first.
Scalable Attacks
All Rights Reserved | FIDO Alliance | Copyright 20188
HOW DOES FIDO WORK?
All Rights Reserved | FIDO Alliance | Copyright 20189
HOW DOES FIDO WORK?
DeviceUser verification FIDO Authentication
Authenticator
All Rights Reserved | FIDO Alliance | Copyright 201810
FIDO AUTHENTICATORS
We see “Bound” Authenticators,
i.e. authenticators that are an
integral part of a smartphone or laptop.
We see “Roaming” Authenticators,
i.e. authenticators that can be connected to
different smartphones or laptops using
CTAP.
In both categories you find support for different modalities
Verify
User
Verify User
Presence
All Rights Reserved | FIDO Alliance | Copyright 201811
HOW DOES FIDO WORK?
AuthenticatorUser verification FIDO Authentication
Require user gesture before
private key can be used
Challenge
(Signed) Response
Private key
dedicated to one
app Public key
All Rights Reserved | FIDO Alliance | Copyright 201812
HOW DOES FIDO WORK?
AuthenticatorUser verification FIDO Authentication
Same Authenticator
as registered before?
Same User as
enrolled before?
Can recognize the user (i.e.
user verification), but doesn’t
know its identity attributes.
All Rights Reserved | FIDO Alliance | Copyright 201813
HOW DOES FIDO WORK?
AuthenticatorUser verification FIDO Authentication
Same Authenticator
as registered before?
Same User as
enrolled before?
Can recognize the user (i.e.
user verification), but doesn’t
know its identity attributes.
Identity binding to be
done outside FIDO:
This this “John Doe
with customer ID X”.
FIDO & Federation
FIDO USER DEVICE
FIDO CLIENT
IdP
FIDO SERVER
FIDO
AUTHENTICATOR
FEDERATION SERVERBROWSER / APP FIDO Protocol
Service Provider
Federation
Id DB
Knows details about the
Authentication strength
Knows details about the
Identity and its
verification strength.
First Mile Second Mile
14
All Rights Reserved | FIDO Alliance | Copyright 201815
FIDO ECOSYSTEM
AuthenticatorUser verification FIDO Authentication
… …SE
All Rights Reserved | FIDO Alliance | Copyright 201816
FIDO ECOSYSTEM
AuthenticatorUser verification FIDO Authentication
… …SE
How is the key protected
(TPM, SE, TEE, …)?
Which user verification
method is used?
All Rights Reserved | FIDO Alliance | Copyright 201817
ATTESTATION + METADATA
Private
attestation key
Signed Attestation Object
Metadata
Understand Authenticator
security characteristic by
looking into Metadata from
mds.fidoalliance.org
FIDO Registration
Verify using trust anchor
included in Metadata
Relying parties can store
this for auditing purposes
All Rights Reserved | FIDO Alliance | Copyright 201818
BINDING KEYS TO RELYING PARTIES
Use A-corp.com key
Use B-corp.com key
A
calc
A
docs
B
One Account – All
Applications
As Mobile App & Web App
A
calc
A
docs
B
Platform determines the
“caller” and passes it to the
Authenticator for selecting the
correct key.
FIDO Client determines the
“caller” (AppID/RP ID) and
passes it to the Authenticator
for selecting the correct key.
b-corp
a-corp
All Rights Reserved | FIDO Alliance | Copyright 201819
FIDO AUTHENTICATORS
FIDO has an Authenticator Certification program.
Different certification levels address the
needs to protect against scalable and physical attacks.
See https://fidoalliance.org/certification/authenticator-certification-levels/
User Environment
All Rights Reserved | FIDO Alliance | Copyright 201820
HOW DOES FIDO WORK?
Authenticator
User gesture before
private key can be used
(Touch, PIN entry,
Biometric)
PSD2: (no equivalent)
FIDO: Challenge
PSD2: Authentication Code
FIDO: (Signed) Response
PSD2: Personalized
Security Credential
FIDO: Private key
PSD2: (no equivalent)
FIDO: Public key
PSD2: PSU
FIDO: User
PSD2: ASPSP
FIDO: Relying Party
Local user verification step On-line authentication step
All Rights Reserved | FIDO Alliance | Copyright 201821
FIDO AUTHENTICATOR CONCEPT
FIDO Authenticator
User
Verification /
Presence
Attestation Key
Authentication Key(s)
Injected at
manufacturing,
doesn’t change
Generated at
runtime (on
Registration)
Optional
Components
Transaction
Confirmation
Display
All Rights Reserved | FIDO Alliance | Copyright 201822
FIDO BUILDING BLOCKS
(External)
Authenticator
USER DEVICE
FIDO Client
(Bound)
Authenticator
ASM
RP App FIDO Authentication
RP App
Server
FIDO Server
Metadata
All Rights Reserved | FIDO Alliance | Copyright 201823
FIDO USE CASES
Passwordless Experience
Authenticated Online
3
Biometric User Verification*
21
?
Authentication Challenge Authenticated Online
3
Second Factor Challenge Insert Dongle* / Press Button
Second Factor Experience
*There are other types of authenticators (e.g. PIN)
21
All Rights Reserved | FIDO Alliance | Copyright 201824
FIDO BUILDING BLOCKS
(Roaming)
Authenticator
User Device
Browser
(Bound)
Authenticator
Platform
RP App FIDO Authentication
RP App
Server
FIDO Server
Metadata
Web
Authentication
JS API
CTA
P
All Rights Reserved | FIDO Alliance | Copyright 201825
WEB AUTHENTICATION
Supported In:
JavaScript API that enables
FIDO Authentication directly in web browsers
All Rights Reserved | FIDO Alliance | Copyright 201826
FIDO AUTHENTICATION:
SECURITY & CONVENIENCE
All Rights Reserved | FIDO Alliance | Copyright 201827
CONVENIENCE & SECURITY
Security
Convenience
Password
All Rights Reserved | FIDO Alliance | Copyright 201828
CONVENIENCE & SECURITY
Security
Convenience
Password + OTP
Password
All Rights Reserved | FIDO Alliance | Copyright 201829
CONVENIENCE & SECURITY
Security
Convenience
Password + OTP
Password
FIDO
In FIDO
• Same user verification method
for all servers
In FIDO: Arbitrary user verification
methods are supported
(+ they are interoperable)
All Rights Reserved | FIDO Alliance | Copyright 201830
CONVENIENCE & SECURITY
Security
Convenience
Password + OTP
Password
FIDO
In FIDO: Scalable security
depending on Authenticator
implementation
In FIDO:
• Only public keys on server
• Not phishable
All Rights Reserved | FIDO Alliance | Copyright 201831
CONCLUSION
• Different authentication use-cases lead to different
authentication requirements
• FIDO separates user verification from authentication and
hence supports all user verification methods
• FIDO supports scalable convenience & security
• User verification data is known to Authenticator only
• FIDO complements federation
All Rights Reserved | FIDO Alliance | Copyright 201832
FIDO REGISTRATION
accountInfo, challenge, [cOpts]
rpId, ai, hash(clientData), cryptoP, [exts]
verify user
generate:
key kpub
key kpriv
credential c
c,kpub,clientData,ac,cdh,rpId,cntr,AAGUID[,exts],
signature(tbs)
c,kpub,clientData,ac,tbs, s
store:
key kpub
c
s
Authenticator
select Authenticator according to cOpts;
determine rpId, get tlsData;
clientData := {challenge, origin, rpId, hAlg, tlsData}
cOpts: crypto params, credential black list,
extensions
cdh
ai
tbs
ac: attestation certificate chain
All Rights Reserved | FIDO Alliance | Copyright 201833
FIDO AUTHENTICATION
Authenticator Relying Party
rpId, [c,] hash(clientData)
select Authenticator according to policy;
check rpId, get tlsData (i.e. channel id, etc.);
lookup key handle h;
clientData := {challenge, rpId, tlsData}
clientData,cntr,[exts],signature(cdh,cntr,exts)
clientData, cntr, exts, s
lookup kpub
from DB
check:
exts +
signature
using
key kpub
s
cdh
challenge, [aOpts]
verify user
find
key kpriv
cntr++;
process exts

More Related Content

PDF
FIDO2 Specifications Overview
PDF
FIDO and the Future of User Authentication
PDF
FIDO UAF Specifications: Overview & Tutorial
PDF
FIDO2 Specifications Overview
PPTX
Going Passwordless with Microsoft
PDF
FIDO認証によるパスワードレスログイン実装入門
PPTX
Fido Technical Overview
PDF
FIDO2 & Microsoft
FIDO2 Specifications Overview
FIDO and the Future of User Authentication
FIDO UAF Specifications: Overview & Tutorial
FIDO2 Specifications Overview
Going Passwordless with Microsoft
FIDO認証によるパスワードレスログイン実装入門
Fido Technical Overview
FIDO2 & Microsoft

What's hot (20)

PDF
Fido認証概要説明
PDF
MicrosoftのDID/VC実装概要
PPTX
FIDO Alliance: Welcome and FIDO Update.pptx
PPTX
Introduction to FIDO Alliance
PDF
Google & FIDO Authentication
PDF
Getting Started with FIDO2
PDF
LINE Login総復習
PDF
VPNはもう卒業!FIDO2認証で次世代リモートアクセス
PDF
FIDO Specifications Overview: UAF & U2F
PPTX
IBM: Hey FIDO, Meet Passkey!.pptx
PDF
分散型IDと検証可能なアイデンティティ技術概要
PDF
Webauthn Tutorial
PPTX
OpenID Connectと身元確認/KYCのトレンド - 法人 KYCの現状 - OpenID BizDay #14
PDF
「DID ・デジタル通貨の社会実装」 Digital Platformer 株式会社
PDF
Web Authentication API
PDF
エンタープライズIT環境での OpenID Connect / SCIM の具体的実装方法 idit2014
PDF
OAuth / OpenID Connectを中心とするAPIセキュリティについて #yuzawaws
PDF
OAuth認証再考からのOpenID Connect #devlove
PPTX
Technical Considerations for Deploying FIDO Authentication
Fido認証概要説明
MicrosoftのDID/VC実装概要
FIDO Alliance: Welcome and FIDO Update.pptx
Introduction to FIDO Alliance
Google & FIDO Authentication
Getting Started with FIDO2
LINE Login総復習
VPNはもう卒業!FIDO2認証で次世代リモートアクセス
FIDO Specifications Overview: UAF & U2F
IBM: Hey FIDO, Meet Passkey!.pptx
分散型IDと検証可能なアイデンティティ技術概要
Webauthn Tutorial
OpenID Connectと身元確認/KYCのトレンド - 法人 KYCの現状 - OpenID BizDay #14
「DID ・デジタル通貨の社会実装」 Digital Platformer 株式会社
Web Authentication API
エンタープライズIT環境での OpenID Connect / SCIM の具体的実装方法 idit2014
OAuth / OpenID Connectを中心とするAPIセキュリティについて #yuzawaws
OAuth認証再考からのOpenID Connect #devlove
Technical Considerations for Deploying FIDO Authentication
Ad

Similar to FIDO Authentication Technical Overview (20)

PDF
FIDO Technical Specifications Overview
PDF
FIDO Technical Specifications Overview
PDF
Technical Principles of FIDO Authentication
PDF
Technical Principles of FIDO Authentication
PPTX
FIDO Specifications Overview
PDF
FIDO Specifications Tutorial
PPTX
Getting to Know the FIDO Specifications - Technical Tutorial
PPTX
Technical Principles of FIDO Authentication
PPTX
UAF Tutorial: Passwordless, Biometric Authentication for Native Apps
PDF
FIDO UAF 1.0 Specs: Overview and Insights
PDF
CIS14: An Overview of FIDO's Universal Factor (UAF) Specifications
PDF
Beyond Passwords: FIDO & the Future of Consumer Authentication
PDF
Introduction to the FIDO Alliance
PDF
Introduction to FIDO Biometric Authentication
PDF
FIDO UAF 1.0 Specs: Overview and Insights
PDF
FIDO And the Future of User Authentication
PPTX
Introduction to the FIDO Alliance: Vision & Status
PPTX
Introduction to FIDO: A New Model for Authentication
PDF
FIDO & PSD2 – Achieving Strong Customer Authentication Compliance
PDF
FIDO Workshop at the Cloud Identity Summit: FIDO Alliance Overview
FIDO Technical Specifications Overview
FIDO Technical Specifications Overview
Technical Principles of FIDO Authentication
Technical Principles of FIDO Authentication
FIDO Specifications Overview
FIDO Specifications Tutorial
Getting to Know the FIDO Specifications - Technical Tutorial
Technical Principles of FIDO Authentication
UAF Tutorial: Passwordless, Biometric Authentication for Native Apps
FIDO UAF 1.0 Specs: Overview and Insights
CIS14: An Overview of FIDO's Universal Factor (UAF) Specifications
Beyond Passwords: FIDO & the Future of Consumer Authentication
Introduction to the FIDO Alliance
Introduction to FIDO Biometric Authentication
FIDO UAF 1.0 Specs: Overview and Insights
FIDO And the Future of User Authentication
Introduction to the FIDO Alliance: Vision & Status
Introduction to FIDO: A New Model for Authentication
FIDO & PSD2 – Achieving Strong Customer Authentication Compliance
FIDO Workshop at the Cloud Identity Summit: FIDO Alliance Overview
Ad

More from FIDO Alliance (20)

PPTX
Securing Account Lifecycles in the Age of Deepfakes.pptx
PPTX
FIDO Seminar: Perspectives on Passkeys & Consumer Adoption.pptx
PPTX
FIDO Seminar: Evolving Landscape of Post-Quantum Cryptography.pptx
PPTX
FIDO Seminar: Targeting Trust: The Future of Identity in the Workforce.pptx
PPTX
FIDO Seminar: New Data: Passkey Adoption in the Workforce.pptx
PPTX
FIDO Seminar: Authentication for a Billion Consumers - Amazon.pptx
PPTX
FIDO Alliance Seminar State of Passkeys.pptx
PPTX
FIDO Munich Seminar: FIDO Tech Principles.pptx
PPTX
FIDO Munich Seminar: Securing Smart Car.pptx
PPTX
FIDO Munich Seminar: Strong Workforce Authn Push & Pull Factors.pptx
PPTX
FIDO Munich Seminar: Biometrics and Passkeys for In-Vehicle Apps.pptx
PPTX
FIDO Munich Seminar Workforce Authentication Case Study.pptx
PPTX
FIDO Munich Seminar In-Vehicle Payment Trends.pptx
PPTX
FIDO Munich Seminar FIDO Automotive Apps.pptx
PPTX
FIDO Munich Seminar Blueprint for In-Vehicle Payment Standard.pptx
PPTX
FIDO Munich Seminar Introduction to FIDO.pptx
PPTX
UX Webinar Series: Essentials for Adopting Passkeys as the Foundation of your...
PPTX
UX Webinar Series: Drive Revenue and Decrease Costs with Passkeys for Consume...
PPTX
UX Webinar Series: Aligning Authentication Experiences with Business Goals
PDF
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
Securing Account Lifecycles in the Age of Deepfakes.pptx
FIDO Seminar: Perspectives on Passkeys & Consumer Adoption.pptx
FIDO Seminar: Evolving Landscape of Post-Quantum Cryptography.pptx
FIDO Seminar: Targeting Trust: The Future of Identity in the Workforce.pptx
FIDO Seminar: New Data: Passkey Adoption in the Workforce.pptx
FIDO Seminar: Authentication for a Billion Consumers - Amazon.pptx
FIDO Alliance Seminar State of Passkeys.pptx
FIDO Munich Seminar: FIDO Tech Principles.pptx
FIDO Munich Seminar: Securing Smart Car.pptx
FIDO Munich Seminar: Strong Workforce Authn Push & Pull Factors.pptx
FIDO Munich Seminar: Biometrics and Passkeys for In-Vehicle Apps.pptx
FIDO Munich Seminar Workforce Authentication Case Study.pptx
FIDO Munich Seminar In-Vehicle Payment Trends.pptx
FIDO Munich Seminar FIDO Automotive Apps.pptx
FIDO Munich Seminar Blueprint for In-Vehicle Payment Standard.pptx
FIDO Munich Seminar Introduction to FIDO.pptx
UX Webinar Series: Essentials for Adopting Passkeys as the Foundation of your...
UX Webinar Series: Drive Revenue and Decrease Costs with Passkeys for Consume...
UX Webinar Series: Aligning Authentication Experiences with Business Goals
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf

Recently uploaded (20)

PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
Programs and apps: productivity, graphics, security and other tools
PPT
Teaching material agriculture food technology
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
Spectroscopy.pptx food analysis technology
The Rise and Fall of 3GPP – Time for a Sabbatical?
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
“AI and Expert System Decision Support & Business Intelligence Systems”
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
The AUB Centre for AI in Media Proposal.docx
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Programs and apps: productivity, graphics, security and other tools
Teaching material agriculture food technology
Diabetes mellitus diagnosis method based random forest with bat algorithm
Per capita expenditure prediction using model stacking based on satellite ima...
NewMind AI Weekly Chronicles - August'25 Week I
Mobile App Security Testing_ A Comprehensive Guide.pdf
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Review of recent advances in non-invasive hemoglobin estimation
Spectroscopy.pptx food analysis technology

FIDO Authentication Technical Overview

  • 1. 1 FIDO AUTHENTICATION TECHNICAL OVERVIEW All Rights Reserved | FIDO Alliance | Copyright 2018
  • 2. All Rights Reserved | FIDO Alliance | Copyright 20182 HOW SECURE IS AUTHENTICATION?
  • 3. All Rights Reserved | FIDO Alliance | Copyright 20183 CLOUD AUTHENTICATION DeviceSomething Authentication Risk Analytics Internet
  • 4. All Rights Reserved | FIDO Alliance | Copyright 20184 PASSWORD ISSUES DeviceSomething Authentication Internet Password could be stolen from the server 1Password might be entered into untrusted App / Web- site (“phishing”) 2 Too many passwords to remember (>re-use / cart Abandonment) 3 Inconvenient to type password on phone 4
  • 5. All Rights Reserved | FIDO Alliance | Copyright 20175 OTP ISSUES DeviceSomething Authentication Internet OTP vulnerable to real- time MITM and MITB attacks 1 SMS security questionable, especially when Device is the phone 2 OTP HW tokens are expensive and people don’t want another device 3 Inconvenient to type OTP into phone 4
  • 6. All Rights Reserved | FIDO Alliance | Copyright 20186 HOW SECURE IS AUTHENTICATION?
  • 7. All Rights Reserved | FIDO Alliance | Copyright 20187 HOW SECURE IS AUTHENTICATION? Attacks require physical action → not scalable Things are never 100% secure, so focus on adequate security. Focus on the scalable attacks first. Scalable Attacks
  • 8. All Rights Reserved | FIDO Alliance | Copyright 20188 HOW DOES FIDO WORK?
  • 9. All Rights Reserved | FIDO Alliance | Copyright 20189 HOW DOES FIDO WORK? DeviceUser verification FIDO Authentication Authenticator
  • 10. All Rights Reserved | FIDO Alliance | Copyright 201810 FIDO AUTHENTICATORS We see “Bound” Authenticators, i.e. authenticators that are an integral part of a smartphone or laptop. We see “Roaming” Authenticators, i.e. authenticators that can be connected to different smartphones or laptops using CTAP. In both categories you find support for different modalities Verify User Verify User Presence
  • 11. All Rights Reserved | FIDO Alliance | Copyright 201811 HOW DOES FIDO WORK? AuthenticatorUser verification FIDO Authentication Require user gesture before private key can be used Challenge (Signed) Response Private key dedicated to one app Public key
  • 12. All Rights Reserved | FIDO Alliance | Copyright 201812 HOW DOES FIDO WORK? AuthenticatorUser verification FIDO Authentication Same Authenticator as registered before? Same User as enrolled before? Can recognize the user (i.e. user verification), but doesn’t know its identity attributes.
  • 13. All Rights Reserved | FIDO Alliance | Copyright 201813 HOW DOES FIDO WORK? AuthenticatorUser verification FIDO Authentication Same Authenticator as registered before? Same User as enrolled before? Can recognize the user (i.e. user verification), but doesn’t know its identity attributes. Identity binding to be done outside FIDO: This this “John Doe with customer ID X”.
  • 14. FIDO & Federation FIDO USER DEVICE FIDO CLIENT IdP FIDO SERVER FIDO AUTHENTICATOR FEDERATION SERVERBROWSER / APP FIDO Protocol Service Provider Federation Id DB Knows details about the Authentication strength Knows details about the Identity and its verification strength. First Mile Second Mile 14
  • 15. All Rights Reserved | FIDO Alliance | Copyright 201815 FIDO ECOSYSTEM AuthenticatorUser verification FIDO Authentication … …SE
  • 16. All Rights Reserved | FIDO Alliance | Copyright 201816 FIDO ECOSYSTEM AuthenticatorUser verification FIDO Authentication … …SE How is the key protected (TPM, SE, TEE, …)? Which user verification method is used?
  • 17. All Rights Reserved | FIDO Alliance | Copyright 201817 ATTESTATION + METADATA Private attestation key Signed Attestation Object Metadata Understand Authenticator security characteristic by looking into Metadata from mds.fidoalliance.org FIDO Registration Verify using trust anchor included in Metadata Relying parties can store this for auditing purposes
  • 18. All Rights Reserved | FIDO Alliance | Copyright 201818 BINDING KEYS TO RELYING PARTIES Use A-corp.com key Use B-corp.com key A calc A docs B One Account – All Applications As Mobile App & Web App A calc A docs B Platform determines the “caller” and passes it to the Authenticator for selecting the correct key. FIDO Client determines the “caller” (AppID/RP ID) and passes it to the Authenticator for selecting the correct key. b-corp a-corp
  • 19. All Rights Reserved | FIDO Alliance | Copyright 201819 FIDO AUTHENTICATORS FIDO has an Authenticator Certification program. Different certification levels address the needs to protect against scalable and physical attacks. See https://fidoalliance.org/certification/authenticator-certification-levels/
  • 20. User Environment All Rights Reserved | FIDO Alliance | Copyright 201820 HOW DOES FIDO WORK? Authenticator User gesture before private key can be used (Touch, PIN entry, Biometric) PSD2: (no equivalent) FIDO: Challenge PSD2: Authentication Code FIDO: (Signed) Response PSD2: Personalized Security Credential FIDO: Private key PSD2: (no equivalent) FIDO: Public key PSD2: PSU FIDO: User PSD2: ASPSP FIDO: Relying Party Local user verification step On-line authentication step
  • 21. All Rights Reserved | FIDO Alliance | Copyright 201821 FIDO AUTHENTICATOR CONCEPT FIDO Authenticator User Verification / Presence Attestation Key Authentication Key(s) Injected at manufacturing, doesn’t change Generated at runtime (on Registration) Optional Components Transaction Confirmation Display
  • 22. All Rights Reserved | FIDO Alliance | Copyright 201822 FIDO BUILDING BLOCKS (External) Authenticator USER DEVICE FIDO Client (Bound) Authenticator ASM RP App FIDO Authentication RP App Server FIDO Server Metadata
  • 23. All Rights Reserved | FIDO Alliance | Copyright 201823 FIDO USE CASES Passwordless Experience Authenticated Online 3 Biometric User Verification* 21 ? Authentication Challenge Authenticated Online 3 Second Factor Challenge Insert Dongle* / Press Button Second Factor Experience *There are other types of authenticators (e.g. PIN) 21
  • 24. All Rights Reserved | FIDO Alliance | Copyright 201824 FIDO BUILDING BLOCKS (Roaming) Authenticator User Device Browser (Bound) Authenticator Platform RP App FIDO Authentication RP App Server FIDO Server Metadata Web Authentication JS API CTA P
  • 25. All Rights Reserved | FIDO Alliance | Copyright 201825 WEB AUTHENTICATION Supported In: JavaScript API that enables FIDO Authentication directly in web browsers
  • 26. All Rights Reserved | FIDO Alliance | Copyright 201826 FIDO AUTHENTICATION: SECURITY & CONVENIENCE
  • 27. All Rights Reserved | FIDO Alliance | Copyright 201827 CONVENIENCE & SECURITY Security Convenience Password
  • 28. All Rights Reserved | FIDO Alliance | Copyright 201828 CONVENIENCE & SECURITY Security Convenience Password + OTP Password
  • 29. All Rights Reserved | FIDO Alliance | Copyright 201829 CONVENIENCE & SECURITY Security Convenience Password + OTP Password FIDO In FIDO • Same user verification method for all servers In FIDO: Arbitrary user verification methods are supported (+ they are interoperable)
  • 30. All Rights Reserved | FIDO Alliance | Copyright 201830 CONVENIENCE & SECURITY Security Convenience Password + OTP Password FIDO In FIDO: Scalable security depending on Authenticator implementation In FIDO: • Only public keys on server • Not phishable
  • 31. All Rights Reserved | FIDO Alliance | Copyright 201831 CONCLUSION • Different authentication use-cases lead to different authentication requirements • FIDO separates user verification from authentication and hence supports all user verification methods • FIDO supports scalable convenience & security • User verification data is known to Authenticator only • FIDO complements federation
  • 32. All Rights Reserved | FIDO Alliance | Copyright 201832 FIDO REGISTRATION accountInfo, challenge, [cOpts] rpId, ai, hash(clientData), cryptoP, [exts] verify user generate: key kpub key kpriv credential c c,kpub,clientData,ac,cdh,rpId,cntr,AAGUID[,exts], signature(tbs) c,kpub,clientData,ac,tbs, s store: key kpub c s Authenticator select Authenticator according to cOpts; determine rpId, get tlsData; clientData := {challenge, origin, rpId, hAlg, tlsData} cOpts: crypto params, credential black list, extensions cdh ai tbs ac: attestation certificate chain
  • 33. All Rights Reserved | FIDO Alliance | Copyright 201833 FIDO AUTHENTICATION Authenticator Relying Party rpId, [c,] hash(clientData) select Authenticator according to policy; check rpId, get tlsData (i.e. channel id, etc.); lookup key handle h; clientData := {challenge, rpId, tlsData} clientData,cntr,[exts],signature(cdh,cntr,exts) clientData, cntr, exts, s lookup kpub from DB check: exts + signature using key kpub s cdh challenge, [aOpts] verify user find key kpriv cntr++; process exts