SlideShare a Scribd company logo
©2019Yubico
© 2019 Yubico
Lifecycle Considerations for
Security Key Deployments
Jerrod Chong
SVP Product, Yubico
FIDO Authentication Seminar Austin, Texas - Jan 28, 2019
©2019Yubico
Account Lifecycle
2
©2018Yubico
Most common recovery method
1. Install App
2. Sign in with Username/Password (fingerprint won’t be
registered)
3. Wait for SMS OTP code
4. Enter OTP code (switch between text app and Mobile App)
5. (Menu popup) Select to add this device as trusted
6. (Menu popup) Register Touch ID
7. (Menu popup) Accept/Decline Touch ID warning*
8. Set Touch ID / Acknowledge addition
9. (Menu popup) Respond to notification request
10. Exit new user walkthrough
11. Open menu
12. Select Profile/Settings
13. Select manage devices
14. Click All devices
15. Find old device in list click remove
16. Acknowledge removal
Why Security Keys?
©2019Yubico
Security Keys Strengthen Account Lifecycle
● Roaming authenticator bootstraps devices
● Security keys eliminates the need for weaker recovery options like
passwords and OTP codes
● Multiple roaming authenticators allow for self-recovery
○ Recommend to have 2 (or more) roaming authenticators
(car, house, etc.)
● Easily integrates into an existing recovery framework
4
©2019Yubico
5
Account Registration
Device Registration
Account Recovery
Security Key Deployment
©2019Yubico
6
Account
Registration
Security Key Deployment
Administrator
Enrolls User
Consistent, managed
experience
Use Self-Enrolls
Ease-of-use reduces
pitfalls
Device
Registration
Initial enrollment
Start with enrolling 1st
security key
Platform
Authenticators Enroll
built-in Platform
Authenticators
Backup
Enroll backup security keys
Account
Recovery
Recover using backup
security keys
Self-service
Maintain authenticator assurance level
FIDO recommendation
Re-run identity proofing /
user onboarding mechanisms
Self-service or Assisted
FIDO recommendation
©2019Yubico
7
Account
Registration
Security Key Deployment
Administrator
Enrolls User
Consistent, managed
experience
Use Self-Enrolls
Ease-of-use reduces
pitfalls
Device
Registration
Initial enrollment
Start with enrolling 1st
security key
Platform
Authenticators Enroll
built-in Platform
Authenticators
Backup
Enroll backup security keys
Account
Recovery
Recover using backup
security keys
Self-service
Maintain authenticator assurance level
FIDO recommendation
Re-run identity proofing /
user onboarding mechanisms
Self-service or Assisted
FIDO recommendation
©2019Yubico
8
Account
Registration
Security Key Deployment
Administrator
Enrolls User
Consistent, managed
experience
Use Self-Enrolls
Ease-of-use reduces
pitfalls
Device
Registration
Initial enrollment
Start with enrolling 1st
security key
Platform
Authenticators Enroll
built-in Platform
Authenticators
Backup
Enroll backup security keys
Recover using backup
security keys
Self-service
Maintain authenticator assurance level
FIDO recommendation
Re-run identity proofing /
user onboarding mechanisms
Self-service or Assisted
FIDO recommendation
Account
Recovery
©2019Yubico
● Vendor specific
○ Expensive to maintain and not consistent across services
● Account Recovery using email link or SMS or OTP codes
○ Prone to phishing attacks
● Account Recovery using Automated Remote Identity Proofing
○ NIST identifies identity proofing mechanisms in its 800-63A Digital Identity
Guidelines
○ ID Proofing varies greatly from region to region, country to country
9
Self-Service Account Recovery
©2019Yubico
● Enterprise / B2B / B2B2B
○ Account Recovery with In-Person Agent
○ Account Recovery via phone/video call to IT support with
visual ID check/manager approval
● B2C / Consumer
○ Delegated recovery (Dial a friend)
○ Account Recovery with Logistics Based Solutions after in-person
verification or remote agent proofing
10
Assisted Account Recovery
©2019Yubico
● Register Multiple Security Keys
○ Allow users to enroll as many security keys as possible
○ Maintain assurance level, minimize complexity, reduce recovery
time and help desk costs
● Expand existing identity proofing / user onboarding
mechanisms for recovery
○ Have Specific Recovery Flows based on who, when, how user
was on-boarded and type of device enrollment
11
Security Key Deployment Summary
©2018Yubico
12
Resources
FIDO Recommendations
Account Recovery Best Practices
whitepaper
Coming Soon!
Guidelines
NIST 800-63A Digital Identity
Guidelines
https://pages.nist.gov/800-63-3
©2019Yubico
© 2017 Yubico 13

More Related Content

PDF
FIDO and the Future of User Authentication
PDF
Strong Customer Authentication & Biometrics
PDF
Technical Principles of FIDO Authentication
PDF
FIDO Authentication in the Shifting Regulatory Landscape
PPTX
FIDO Alliance Vision and Updates
PDF
FIDO & PSD2 – Achieving Strong Customer Authentication Compliance
PDF
Beyond Passwords: FIDO and the Future of User Authentication
PDF
FIDO & Mobile Connect
FIDO and the Future of User Authentication
Strong Customer Authentication & Biometrics
Technical Principles of FIDO Authentication
FIDO Authentication in the Shifting Regulatory Landscape
FIDO Alliance Vision and Updates
FIDO & PSD2 – Achieving Strong Customer Authentication Compliance
Beyond Passwords: FIDO and the Future of User Authentication
FIDO & Mobile Connect

What's hot (20)

PDF
FIDO Biometric Certification Program
PDF
Javelin Research's State of Strong Authentication 2019 Report Webinar
PPTX
Fido Technical Overview
PDF
FIDO Support for the GDPR
PDF
Using FIDO Authenticator for IoT Devices
PDF
The Value of FIDO Certification
PPTX
A First Step to a World without Passwords
PDF
Introduction to FIDO Biometric Authentication
PDF
Expected Use Cases of FIDO Authentication in Social Apps
PDF
FIDO Certified Program: The Value of Certification
PDF
Technical Principles of FIDO Authentication
PPTX
FIDO Case Study: Performance Comparison of Mulitmodal Biometrics
PPTX
Going Passwordless with Microsoft
PDF
FIDO and Adaptive Authentication
PDF
FIDO2 & Microsoft
PDF
FIDO Authentication Technical Overview
PDF
FIDO Authentication and GDPR
PDF
FIDO UAF and PKI in Asia: A Case Study and Recommendations
PDF
FIDO Alliance Vision and Status
PPTX
FIDO in Action: Real World Development Case Studies
FIDO Biometric Certification Program
Javelin Research's State of Strong Authentication 2019 Report Webinar
Fido Technical Overview
FIDO Support for the GDPR
Using FIDO Authenticator for IoT Devices
The Value of FIDO Certification
A First Step to a World without Passwords
Introduction to FIDO Biometric Authentication
Expected Use Cases of FIDO Authentication in Social Apps
FIDO Certified Program: The Value of Certification
Technical Principles of FIDO Authentication
FIDO Case Study: Performance Comparison of Mulitmodal Biometrics
Going Passwordless with Microsoft
FIDO and Adaptive Authentication
FIDO2 & Microsoft
FIDO Authentication Technical Overview
FIDO Authentication and GDPR
FIDO UAF and PKI in Asia: A Case Study and Recommendations
FIDO Alliance Vision and Status
FIDO in Action: Real World Development Case Studies
Ad

Similar to Lifecycle Consideration for Security Key Deployments (20)

PDF
How to Test Biometric Authentication on Mobile Apps.pdf
PPTX
DUO-CSC-Information Technology Presentation-Solution.pptx
PDF
Securing a Web App with Passwordless Web Authentication
PPTX
Tatyana-Arnaudova - English
PPT
How to Activate Bitdefender key.ppt
PDF
Biometrics and 2FA Authentication_ A Detailed Analysis of Security Approaches...
PDF
Biometrics and 2FA Authentication_ A Detailed Analysis of Security Approaches...
PDF
Webinar: Case Study: FIDO, Federation, ID Proofing
PPTX
How to Simplify and Accelerate Passkey Adoption.pptx
PDF
How LoginRadius Secures Smart and IoT Authentication
PDF
WSO2 Telco MCX
PPTX
Making FIDO Deployments Accessible to Users with Disabilities_slides.pptx
PDF
FIDO UAF Specifications: Overview & Tutorial
PPTX
FIDO Alliance Webinar: Intuit's Journey with FIDO Authentication
PDF
Normalization of Security Key User Experience
PPTX
FIDO Munich Seminar FIDO Automotive Apps.pptx
PDF
Microsoft Authenticator on Mac MicrosofMicrosoft
PPTX
E-Lock AdaptAuth.pptx
PDF
Step up authentication
PDF
Make mobile booking six times faster
How to Test Biometric Authentication on Mobile Apps.pdf
DUO-CSC-Information Technology Presentation-Solution.pptx
Securing a Web App with Passwordless Web Authentication
Tatyana-Arnaudova - English
How to Activate Bitdefender key.ppt
Biometrics and 2FA Authentication_ A Detailed Analysis of Security Approaches...
Biometrics and 2FA Authentication_ A Detailed Analysis of Security Approaches...
Webinar: Case Study: FIDO, Federation, ID Proofing
How to Simplify and Accelerate Passkey Adoption.pptx
How LoginRadius Secures Smart and IoT Authentication
WSO2 Telco MCX
Making FIDO Deployments Accessible to Users with Disabilities_slides.pptx
FIDO UAF Specifications: Overview & Tutorial
FIDO Alliance Webinar: Intuit's Journey with FIDO Authentication
Normalization of Security Key User Experience
FIDO Munich Seminar FIDO Automotive Apps.pptx
Microsoft Authenticator on Mac MicrosofMicrosoft
E-Lock AdaptAuth.pptx
Step up authentication
Make mobile booking six times faster
Ad

More from FIDO Alliance (20)

PPTX
Securing Account Lifecycles in the Age of Deepfakes.pptx
PPTX
FIDO Seminar: Perspectives on Passkeys & Consumer Adoption.pptx
PPTX
FIDO Seminar: Evolving Landscape of Post-Quantum Cryptography.pptx
PPTX
FIDO Seminar: Targeting Trust: The Future of Identity in the Workforce.pptx
PPTX
FIDO Seminar: New Data: Passkey Adoption in the Workforce.pptx
PPTX
FIDO Seminar: Authentication for a Billion Consumers - Amazon.pptx
PPTX
FIDO Alliance Seminar State of Passkeys.pptx
PPTX
FIDO Munich Seminar: FIDO Tech Principles.pptx
PPTX
FIDO Munich Seminar: Securing Smart Car.pptx
PPTX
FIDO Munich Seminar: Strong Workforce Authn Push & Pull Factors.pptx
PPTX
FIDO Munich Seminar: Biometrics and Passkeys for In-Vehicle Apps.pptx
PPTX
FIDO Munich Seminar Workforce Authentication Case Study.pptx
PPTX
FIDO Munich Seminar In-Vehicle Payment Trends.pptx
PPTX
FIDO Munich Seminar Blueprint for In-Vehicle Payment Standard.pptx
PPTX
FIDO Munich Seminar Introduction to FIDO.pptx
PPTX
UX Webinar Series: Essentials for Adopting Passkeys as the Foundation of your...
PPTX
UX Webinar Series: Drive Revenue and Decrease Costs with Passkeys for Consume...
PPTX
UX Webinar Series: Aligning Authentication Experiences with Business Goals
PDF
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
PDF
FIDO Alliance Osaka Seminar: LY-DOCOMO-KDDI-Mercari Panel.pdf
Securing Account Lifecycles in the Age of Deepfakes.pptx
FIDO Seminar: Perspectives on Passkeys & Consumer Adoption.pptx
FIDO Seminar: Evolving Landscape of Post-Quantum Cryptography.pptx
FIDO Seminar: Targeting Trust: The Future of Identity in the Workforce.pptx
FIDO Seminar: New Data: Passkey Adoption in the Workforce.pptx
FIDO Seminar: Authentication for a Billion Consumers - Amazon.pptx
FIDO Alliance Seminar State of Passkeys.pptx
FIDO Munich Seminar: FIDO Tech Principles.pptx
FIDO Munich Seminar: Securing Smart Car.pptx
FIDO Munich Seminar: Strong Workforce Authn Push & Pull Factors.pptx
FIDO Munich Seminar: Biometrics and Passkeys for In-Vehicle Apps.pptx
FIDO Munich Seminar Workforce Authentication Case Study.pptx
FIDO Munich Seminar In-Vehicle Payment Trends.pptx
FIDO Munich Seminar Blueprint for In-Vehicle Payment Standard.pptx
FIDO Munich Seminar Introduction to FIDO.pptx
UX Webinar Series: Essentials for Adopting Passkeys as the Foundation of your...
UX Webinar Series: Drive Revenue and Decrease Costs with Passkeys for Consume...
UX Webinar Series: Aligning Authentication Experiences with Business Goals
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: LY-DOCOMO-KDDI-Mercari Panel.pdf

Recently uploaded (20)

PPTX
Cloud computing and distributed systems.
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Encapsulation theory and applications.pdf
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Empathic Computing: Creating Shared Understanding
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Machine learning based COVID-19 study performance prediction
PDF
KodekX | Application Modernization Development
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPT
Teaching material agriculture food technology
Cloud computing and distributed systems.
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Encapsulation theory and applications.pdf
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Mobile App Security Testing_ A Comprehensive Guide.pdf
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
The AUB Centre for AI in Media Proposal.docx
NewMind AI Weekly Chronicles - August'25 Week I
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Digital-Transformation-Roadmap-for-Companies.pptx
Spectral efficient network and resource selection model in 5G networks
20250228 LYD VKU AI Blended-Learning.pptx
Empathic Computing: Creating Shared Understanding
Chapter 3 Spatial Domain Image Processing.pdf
Dropbox Q2 2025 Financial Results & Investor Presentation
Machine learning based COVID-19 study performance prediction
KodekX | Application Modernization Development
“AI and Expert System Decision Support & Business Intelligence Systems”
Teaching material agriculture food technology

Lifecycle Consideration for Security Key Deployments

  • 1. ©2019Yubico © 2019 Yubico Lifecycle Considerations for Security Key Deployments Jerrod Chong SVP Product, Yubico FIDO Authentication Seminar Austin, Texas - Jan 28, 2019
  • 3. ©2018Yubico Most common recovery method 1. Install App 2. Sign in with Username/Password (fingerprint won’t be registered) 3. Wait for SMS OTP code 4. Enter OTP code (switch between text app and Mobile App) 5. (Menu popup) Select to add this device as trusted 6. (Menu popup) Register Touch ID 7. (Menu popup) Accept/Decline Touch ID warning* 8. Set Touch ID / Acknowledge addition 9. (Menu popup) Respond to notification request 10. Exit new user walkthrough 11. Open menu 12. Select Profile/Settings 13. Select manage devices 14. Click All devices 15. Find old device in list click remove 16. Acknowledge removal Why Security Keys?
  • 4. ©2019Yubico Security Keys Strengthen Account Lifecycle ● Roaming authenticator bootstraps devices ● Security keys eliminates the need for weaker recovery options like passwords and OTP codes ● Multiple roaming authenticators allow for self-recovery ○ Recommend to have 2 (or more) roaming authenticators (car, house, etc.) ● Easily integrates into an existing recovery framework 4
  • 6. ©2019Yubico 6 Account Registration Security Key Deployment Administrator Enrolls User Consistent, managed experience Use Self-Enrolls Ease-of-use reduces pitfalls Device Registration Initial enrollment Start with enrolling 1st security key Platform Authenticators Enroll built-in Platform Authenticators Backup Enroll backup security keys Account Recovery Recover using backup security keys Self-service Maintain authenticator assurance level FIDO recommendation Re-run identity proofing / user onboarding mechanisms Self-service or Assisted FIDO recommendation
  • 7. ©2019Yubico 7 Account Registration Security Key Deployment Administrator Enrolls User Consistent, managed experience Use Self-Enrolls Ease-of-use reduces pitfalls Device Registration Initial enrollment Start with enrolling 1st security key Platform Authenticators Enroll built-in Platform Authenticators Backup Enroll backup security keys Account Recovery Recover using backup security keys Self-service Maintain authenticator assurance level FIDO recommendation Re-run identity proofing / user onboarding mechanisms Self-service or Assisted FIDO recommendation
  • 8. ©2019Yubico 8 Account Registration Security Key Deployment Administrator Enrolls User Consistent, managed experience Use Self-Enrolls Ease-of-use reduces pitfalls Device Registration Initial enrollment Start with enrolling 1st security key Platform Authenticators Enroll built-in Platform Authenticators Backup Enroll backup security keys Recover using backup security keys Self-service Maintain authenticator assurance level FIDO recommendation Re-run identity proofing / user onboarding mechanisms Self-service or Assisted FIDO recommendation Account Recovery
  • 9. ©2019Yubico ● Vendor specific ○ Expensive to maintain and not consistent across services ● Account Recovery using email link or SMS or OTP codes ○ Prone to phishing attacks ● Account Recovery using Automated Remote Identity Proofing ○ NIST identifies identity proofing mechanisms in its 800-63A Digital Identity Guidelines ○ ID Proofing varies greatly from region to region, country to country 9 Self-Service Account Recovery
  • 10. ©2019Yubico ● Enterprise / B2B / B2B2B ○ Account Recovery with In-Person Agent ○ Account Recovery via phone/video call to IT support with visual ID check/manager approval ● B2C / Consumer ○ Delegated recovery (Dial a friend) ○ Account Recovery with Logistics Based Solutions after in-person verification or remote agent proofing 10 Assisted Account Recovery
  • 11. ©2019Yubico ● Register Multiple Security Keys ○ Allow users to enroll as many security keys as possible ○ Maintain assurance level, minimize complexity, reduce recovery time and help desk costs ● Expand existing identity proofing / user onboarding mechanisms for recovery ○ Have Specific Recovery Flows based on who, when, how user was on-boarded and type of device enrollment 11 Security Key Deployment Summary
  • 12. ©2018Yubico 12 Resources FIDO Recommendations Account Recovery Best Practices whitepaper Coming Soon! Guidelines NIST 800-63A Digital Identity Guidelines https://pages.nist.gov/800-63-3