SlideShare a Scribd company logo
1
TECHNICAL PRINCIPLES OF
FIDO AUTHENTICATION
Rolf Lindemann, Nok Nok Labs
All Rights Reserved | FIDO Alliance | Copyright 2019
2
HOW SECURE IS AUTHENTICATION?
All Rights Reserved | FIDO Alliance | Copyright 2019
All Rights Reserved | FIDO Alliance | Copyright 20193
HOW SECURE IS AUTHENTICATION?
Attacks require physical action โ†’ not scalable
Things are never 100% secure, so focus on adequate security.
Focus on the scalable attacks first.
Scalable Attacks
All Rights Reserved | FIDO Alliance | Copyright 20194
CLOUD AUTHENTICATION
DeviceSomething Authentication
Risk Analytics
Internet
All Rights Reserved | FIDO Alliance | Copyright 20195
HOW DOES FIDO WORK?
All Rights Reserved | FIDO Alliance | Copyright 20196
HOW DOES FIDO WORK?
DeviceUser verification FIDO Authentication
Authenticator
All Rights Reserved | FIDO Alliance | Copyright 20197
HOW DOES FIDO WORK?
AuthenticatorUser verification FIDO Authentication
Require user gesture before
private key can be used
Challenge
(Signed) Response
Private key
dedicated to one
app Public key
All Rights Reserved | FIDO Alliance | Copyright 20198
FIDO ECOSYSTEM
AuthenticatorUser verification FIDO Authentication
โ€ฆ โ€ฆSE
All Rights Reserved | FIDO Alliance | Copyright 20199
FIDO ECOSYSTEM
AuthenticatorUser verification FIDO Authentication
โ€ฆ โ€ฆSE
How is the key protected
(TPM, SE, TEE, โ€ฆ)?
Which user verification
method is used?
All Rights Reserved | FIDO Alliance | Copyright 201910
ATTESTATION + METADATA
Private
attestation key
Signed Attestation Object
Metadata
Understand Authenticator
security characteristic by
looking into Metadata from
mds.fidoalliance.org
FIDO Registration
Verify using trust anchor
included in Metadata
Relying parties can store
this for auditing purposes
All Rights Reserved | FIDO Alliance | Copyright 201911
FIDO AUTHENTICATORS
We see โ€œBoundโ€ Authenticators,
i.e. authenticators that are an
integral part of a smartphone or laptop.
We see โ€œRoamingโ€ Authenticators,
i.e. authenticators that can be connected to
different smartphones or laptops using
CTAP.
In both categories you find support for different modalities
Verify
User
Verify User
Presence
All Rights Reserved | FIDO Alliance | Copyright 201912
HOW DOES FIDO WORK?
AuthenticatorUser verification FIDO Authentication
Same Authenticator
as registered before?
Same User as
enrolled before?
Can recognize the user (i.e.
user verification), but doesnโ€™t
know its identity attributes.
All Rights Reserved | FIDO Alliance | Copyright 201913
HOW DOES FIDO WORK?
AuthenticatorUser verification FIDO Authentication
Same Authenticator
as registered before?
Same User as
enrolled before?
Can recognize the user (i.e.
user verification), but doesnโ€™t
know its identity attributes.
Identity binding to be
done outside FIDO:
This this โ€œJohn Doe
with customer ID Xโ€.
All Rights Reserved | FIDO Alliance | Copyright 201914
FIDO BUILDING BLOCKS
(Roaming)
Authenticator
USER DEVICE
FIDO Client
(Bound)
Authenticator
ASM
RP App FIDO Authentication
RP App
Server
FIDO Server
Metadata
All Rights Reserved | FIDO Alliance | Copyright 201915
FIDO BUILDING BLOCKS
(Roaming)
Authenticator
User Device
Browser
(Bound)
Authenticator
Platform
RP App FIDO Authentication
RP App
Server
FIDO Server
Metadata
Web
Authentication
JS API
CTAP
FIDO USER DEVICE
FIDO CLIENT
IdP
FIDO SERVER
FIDO
AUTHENTICATOR
FEDERATION SERVERBROWSER / APP FIDO Protocol
Service Provider
Federation
Id DB
Knows details about the
Authentication strength
Knows details about the
Identity and its
verification strength.
First Mile Second Mile
16
FIDO & FEDERATION
All Rights Reserved | FIDO Alliance | Copyright 2019
All Rights Reserved | FIDO Alliance | Copyright 201917
WEB AUTHENTICATION
Supported In:
JavaScript API that enables
FIDO Authentication directly in web browsers
All Rights Reserved | FIDO Alliance | Copyright 201918
FIDO AUTHENTICATION:
SECURITY & CONVENIENCE
All Rights Reserved | FIDO Alliance | Copyright 201919
CONVENIENCE & SECURITY
Security
Convenience
Password
All Rights Reserved | FIDO Alliance | Copyright 201920
CONVENIENCE & SECURITY
Security
Convenience
Password + OTP
Password
All Rights Reserved | FIDO Alliance | Copyright 201921
CONVENIENCE & SECURITY
Security
Convenience
Password + OTP
Password
FIDO
In FIDO
โ€ข Same user verification method
for all servers
In FIDO: Arbitrary user verification
methods are supported
(+ they are interoperable)
All Rights Reserved | FIDO Alliance | Copyright 201922
CONVENIENCE & SECURITY
Security
Convenience
Password + OTP
Password
FIDO
In FIDO: Scalable security
depending on Authenticator
implementation
In FIDO:
โ€ข Only public keys on server
โ€ข Not phishable
All Rights Reserved | FIDO Alliance | Copyright 201923
CONCLUSION
โ€ข Different authentication use-cases lead to different
authentication requirements
โ€ข FIDO separates user verification from authentication and
hence supports all user verification methods
โ€ข FIDO supports scalable convenience & security
โ€ข User verification data is known to Authenticator only
โ€ข FIDO complements federation
24
FIDO
TECHNICAL
OVERVIEW
Rolf Lindemann, Nok Nok Labs
Thank You
All Rights Reserved | FIDO Alliance | Copyright 2019
All Rights Reserved | FIDO Alliance | Copyright 201925
FIDO REGISTRATION
accountInfo, challenge, [cOpts]
rpId, ai, hash(clientData), cryptoP, [exts]
verify user
generate:
key kpub
key kpriv
credential c
c,kpub,clientData,ac,cdh,rpId,cntr,AAGUID[,exts],
signature(tbs)
c,kpub,clientData,ac,tbs, s
store:
key kpub
c
s
Authenticator
select Authenticator according to cOpts;
determine rpId, get tlsData;
clientData := {challenge, origin, rpId, hAlg, tlsData}
cOpts: crypto params, credential black list,
extensions
cdh
ai
tbs
ac: attestation certificate chain
All Rights Reserved | FIDO Alliance | Copyright 201926
FIDO AUTHENTICATION
Authenticator Relying Party
rpId, [c,] hash(clientData)
select Authenticator according to policy;
check rpId, get tlsData (i.e. channel id, etc.);
lookup key handle h;
clientData := {challenge, rpId, tlsData}
clientData,cntr,[exts],signature(cdh,cntr,exts)
clientData, cntr, exts, s
lookup kpub
from DB
check:
exts +
signature
using
key kpub
s
cdh
challenge, [aOpts]
verify user
find
key kpriv
cntr++;
process exts

More Related Content

PPTX
FIDO Alliance Vision and Updates
PDF
Strong Customer Authentication & Biometrics
PDF
Beyond Passwords: FIDO and the Future of User Authentication
PPTX
Fido Technical Overview
PDF
Lifecycle Consideration for Security Key Deployments
PDF
Using FIDO Authenticator for IoT Devices
PDF
FIDO & PSD2 โ€“ Achieving Strong Customer Authentication Compliance
PDF
Expected Use Cases of FIDO Authentication in Social Apps
FIDO Alliance Vision and Updates
Strong Customer Authentication & Biometrics
Beyond Passwords: FIDO and the Future of User Authentication
Fido Technical Overview
Lifecycle Consideration for Security Key Deployments
Using FIDO Authenticator for IoT Devices
FIDO & PSD2 โ€“ Achieving Strong Customer Authentication Compliance
Expected Use Cases of FIDO Authentication in Social Apps

What's hot (20)

PDF
Deployment Snapshot from Japan: NTT DOCOMO, Yahoo! Japan
PDF
FIDO and the Future of User Authentication
PDF
FIDO Biometric Certification Program
PDF
Technical Principles of FIDO Authentication
PDF
The Value of FIDO Certification
PDF
FIDO Support for the GDPR
PPTX
Going Passwordless with Microsoft
PDF
FIDO Authentication in the Shifting Regulatory Landscape
PDF
FIDO Authentication Technical Overview
PPTX
A First Step to a World without Passwords
PDF
Introduction to FIDO Biometric Authentication
PDF
FIDO2 & Microsoft
PDF
FIDO & Mobile Connect
PDF
Overview of FIDO Security Requirements and Certifications
PDF
FIDO Certified Program: The Value of Certification
PDF
FIDO Authentication in Hong Kong
PDF
Beyond Passwords: FIDO & the Future of Consumer Authentication
PDF
FIDO Alliance Vision and Status
PDF
FIDO Authentication Technical Overview
PPTX
Technical Principles of FIDO Authentication
Deployment Snapshot from Japan: NTT DOCOMO, Yahoo! Japan
FIDO and the Future of User Authentication
FIDO Biometric Certification Program
Technical Principles of FIDO Authentication
The Value of FIDO Certification
FIDO Support for the GDPR
Going Passwordless with Microsoft
FIDO Authentication in the Shifting Regulatory Landscape
FIDO Authentication Technical Overview
A First Step to a World without Passwords
Introduction to FIDO Biometric Authentication
FIDO2 & Microsoft
FIDO & Mobile Connect
Overview of FIDO Security Requirements and Certifications
FIDO Certified Program: The Value of Certification
FIDO Authentication in Hong Kong
Beyond Passwords: FIDO & the Future of Consumer Authentication
FIDO Alliance Vision and Status
FIDO Authentication Technical Overview
Technical Principles of FIDO Authentication
Ad

Similar to Technical Principles of FIDO Authentication (20)

PPTX
Getting to Know the FIDO Specifications - Technical Tutorial
PDF
Javelin Research's State of Strong Authentication 2019 Report Webinar
PPTX
Introduction to FIDO: A New Model for Authentication
PPTX
FIDO Authentication in Korea: Early Adoption & Rapid Innovation
PDF
Introduction to the FIDO Alliance
PDF
Beyond Passwords: FIDO and the Future of User Authentication
PPTX
Introduction to the FIDO Alliance: Vision & Status
PDF
FIDO, Federation and the Internet of Things
PPTX
UAF Tutorial: Passwordless, Biometric Authentication for Native Apps
PDF
Integrating FIDO & Federation Protocols
PDF
2018 12-07 tokyo-seminar Brett McDowell
PPTX
Introduction to FIDO's Identity Verification & Binding Initiative
PDF
FIDO UAF 1.0 Specs: Overview and Insights
PDF
The Future of Authentication for IoT
PPTX
FIDO Specifications Overview
PPTX
Technical Considerations for Deploying FIDO Authentication
PDF
Integrating FIDO Authentication & Federation Protocols
PPTX
FIDO Munich Seminar FIDO Automotive Apps.pptx
PDF
Introduction to FIDO Authentication
PDF
2019 FIDO Tokyo Seminar - Welcome Keynote Andrew Shikiar
Getting to Know the FIDO Specifications - Technical Tutorial
Javelin Research's State of Strong Authentication 2019 Report Webinar
Introduction to FIDO: A New Model for Authentication
FIDO Authentication in Korea: Early Adoption & Rapid Innovation
Introduction to the FIDO Alliance
Beyond Passwords: FIDO and the Future of User Authentication
Introduction to the FIDO Alliance: Vision & Status
FIDO, Federation and the Internet of Things
UAF Tutorial: Passwordless, Biometric Authentication for Native Apps
Integrating FIDO & Federation Protocols
2018 12-07 tokyo-seminar Brett McDowell
Introduction to FIDO's Identity Verification & Binding Initiative
FIDO UAF 1.0 Specs: Overview and Insights
The Future of Authentication for IoT
FIDO Specifications Overview
Technical Considerations for Deploying FIDO Authentication
Integrating FIDO Authentication & Federation Protocols
FIDO Munich Seminar FIDO Automotive Apps.pptx
Introduction to FIDO Authentication
2019 FIDO Tokyo Seminar - Welcome Keynote Andrew Shikiar
Ad

More from FIDO Alliance (20)

PPTX
Securing Account Lifecycles in the Age of Deepfakes.pptx
PPTX
FIDO Seminar: Perspectives on Passkeys & Consumer Adoption.pptx
PPTX
FIDO Seminar: Evolving Landscape of Post-Quantum Cryptography.pptx
PPTX
FIDO Seminar: Targeting Trust: The Future of Identity in the Workforce.pptx
PPTX
FIDO Seminar: New Data: Passkey Adoption in the Workforce.pptx
PPTX
FIDO Seminar: Authentication for a Billion Consumers - Amazon.pptx
PPTX
FIDO Alliance Seminar State of Passkeys.pptx
PPTX
FIDO Munich Seminar: FIDO Tech Principles.pptx
PPTX
FIDO Munich Seminar: Securing Smart Car.pptx
PPTX
FIDO Munich Seminar: Strong Workforce Authn Push & Pull Factors.pptx
PPTX
FIDO Munich Seminar: Biometrics and Passkeys for In-Vehicle Apps.pptx
PPTX
FIDO Munich Seminar Workforce Authentication Case Study.pptx
PPTX
FIDO Munich Seminar In-Vehicle Payment Trends.pptx
PPTX
FIDO Munich Seminar Blueprint for In-Vehicle Payment Standard.pptx
PPTX
FIDO Munich Seminar Introduction to FIDO.pptx
PPTX
UX Webinar Series: Essentials for Adopting Passkeys as the Foundation of your...
PPTX
UX Webinar Series: Drive Revenue and Decrease Costs with Passkeys for Consume...
PPTX
UX Webinar Series: Aligning Authentication Experiences with Business Goals
PDF
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
PDF
FIDO Alliance Osaka Seminar: LY-DOCOMO-KDDI-Mercari Panel.pdf
Securing Account Lifecycles in the Age of Deepfakes.pptx
FIDO Seminar: Perspectives on Passkeys & Consumer Adoption.pptx
FIDO Seminar: Evolving Landscape of Post-Quantum Cryptography.pptx
FIDO Seminar: Targeting Trust: The Future of Identity in the Workforce.pptx
FIDO Seminar: New Data: Passkey Adoption in the Workforce.pptx
FIDO Seminar: Authentication for a Billion Consumers - Amazon.pptx
FIDO Alliance Seminar State of Passkeys.pptx
FIDO Munich Seminar: FIDO Tech Principles.pptx
FIDO Munich Seminar: Securing Smart Car.pptx
FIDO Munich Seminar: Strong Workforce Authn Push & Pull Factors.pptx
FIDO Munich Seminar: Biometrics and Passkeys for In-Vehicle Apps.pptx
FIDO Munich Seminar Workforce Authentication Case Study.pptx
FIDO Munich Seminar In-Vehicle Payment Trends.pptx
FIDO Munich Seminar Blueprint for In-Vehicle Payment Standard.pptx
FIDO Munich Seminar Introduction to FIDO.pptx
UX Webinar Series: Essentials for Adopting Passkeys as the Foundation of your...
UX Webinar Series: Drive Revenue and Decrease Costs with Passkeys for Consume...
UX Webinar Series: Aligning Authentication Experiences with Business Goals
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: LY-DOCOMO-KDDI-Mercari Panel.pdf

Recently uploaded (20)

PDF
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
ย 
PDF
Cloud-Scale Log Monitoring _ Datadog.pdf
PDF
WebRTC in SignalWire - troubleshooting media negotiation
PPTX
Module 1 - Cyber Law and Ethics 101.pptx
PPT
isotopes_sddsadsaadasdasdasdasdsa1213.ppt
PDF
Vigrab.top โ€“ Online Tool for Downloading and Converting Social Media Videos a...
PPTX
Introuction about WHO-FIC in ICD-10.pptx
PDF
Unit-1 introduction to cyber security discuss about how to secure a system
PPTX
Digital Literacy And Online Safety on internet
PDF
Paper PDF World Game (s) Great Redesign.pdf
PDF
SASE Traffic Flow - ZTNA Connector-1.pdf
PPTX
522797556-Unit-2-Temperature-measurement-1-1.pptx
PDF
๐Ÿ’ฐ ๐”๐Š๐“๐ˆ ๐Š๐„๐Œ๐„๐๐€๐๐†๐€๐ ๐Š๐ˆ๐๐„๐‘๐Ÿ’๐ƒ ๐‡๐€๐‘๐ˆ ๐ˆ๐๐ˆ ๐Ÿ๐ŸŽ๐Ÿ๐Ÿ“ ๐Ÿ’ฐ
ย 
PPTX
E -tech empowerment technologies PowerPoint
PPTX
Introduction to Information and Communication Technology
PDF
Slides PDF The World Game (s) Eco Economic Epochs.pdf
PPT
tcp ip networks nd ip layering assotred slides
DOCX
Unit-3 cyber security network security of internet system
PDF
The Internet -By the Numbers, Sri Lanka Edition
ย 
PDF
An introduction to the IFRS (ISSB) Stndards.pdf
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
ย 
Cloud-Scale Log Monitoring _ Datadog.pdf
WebRTC in SignalWire - troubleshooting media negotiation
Module 1 - Cyber Law and Ethics 101.pptx
isotopes_sddsadsaadasdasdasdasdsa1213.ppt
Vigrab.top โ€“ Online Tool for Downloading and Converting Social Media Videos a...
Introuction about WHO-FIC in ICD-10.pptx
Unit-1 introduction to cyber security discuss about how to secure a system
Digital Literacy And Online Safety on internet
Paper PDF World Game (s) Great Redesign.pdf
SASE Traffic Flow - ZTNA Connector-1.pdf
522797556-Unit-2-Temperature-measurement-1-1.pptx
๐Ÿ’ฐ ๐”๐Š๐“๐ˆ ๐Š๐„๐Œ๐„๐๐€๐๐†๐€๐ ๐Š๐ˆ๐๐„๐‘๐Ÿ’๐ƒ ๐‡๐€๐‘๐ˆ ๐ˆ๐๐ˆ ๐Ÿ๐ŸŽ๐Ÿ๐Ÿ“ ๐Ÿ’ฐ
ย 
E -tech empowerment technologies PowerPoint
Introduction to Information and Communication Technology
Slides PDF The World Game (s) Eco Economic Epochs.pdf
tcp ip networks nd ip layering assotred slides
Unit-3 cyber security network security of internet system
The Internet -By the Numbers, Sri Lanka Edition
ย 
An introduction to the IFRS (ISSB) Stndards.pdf

Technical Principles of FIDO Authentication

  • 1. 1 TECHNICAL PRINCIPLES OF FIDO AUTHENTICATION Rolf Lindemann, Nok Nok Labs All Rights Reserved | FIDO Alliance | Copyright 2019
  • 2. 2 HOW SECURE IS AUTHENTICATION? All Rights Reserved | FIDO Alliance | Copyright 2019
  • 3. All Rights Reserved | FIDO Alliance | Copyright 20193 HOW SECURE IS AUTHENTICATION? Attacks require physical action โ†’ not scalable Things are never 100% secure, so focus on adequate security. Focus on the scalable attacks first. Scalable Attacks
  • 4. All Rights Reserved | FIDO Alliance | Copyright 20194 CLOUD AUTHENTICATION DeviceSomething Authentication Risk Analytics Internet
  • 5. All Rights Reserved | FIDO Alliance | Copyright 20195 HOW DOES FIDO WORK?
  • 6. All Rights Reserved | FIDO Alliance | Copyright 20196 HOW DOES FIDO WORK? DeviceUser verification FIDO Authentication Authenticator
  • 7. All Rights Reserved | FIDO Alliance | Copyright 20197 HOW DOES FIDO WORK? AuthenticatorUser verification FIDO Authentication Require user gesture before private key can be used Challenge (Signed) Response Private key dedicated to one app Public key
  • 8. All Rights Reserved | FIDO Alliance | Copyright 20198 FIDO ECOSYSTEM AuthenticatorUser verification FIDO Authentication โ€ฆ โ€ฆSE
  • 9. All Rights Reserved | FIDO Alliance | Copyright 20199 FIDO ECOSYSTEM AuthenticatorUser verification FIDO Authentication โ€ฆ โ€ฆSE How is the key protected (TPM, SE, TEE, โ€ฆ)? Which user verification method is used?
  • 10. All Rights Reserved | FIDO Alliance | Copyright 201910 ATTESTATION + METADATA Private attestation key Signed Attestation Object Metadata Understand Authenticator security characteristic by looking into Metadata from mds.fidoalliance.org FIDO Registration Verify using trust anchor included in Metadata Relying parties can store this for auditing purposes
  • 11. All Rights Reserved | FIDO Alliance | Copyright 201911 FIDO AUTHENTICATORS We see โ€œBoundโ€ Authenticators, i.e. authenticators that are an integral part of a smartphone or laptop. We see โ€œRoamingโ€ Authenticators, i.e. authenticators that can be connected to different smartphones or laptops using CTAP. In both categories you find support for different modalities Verify User Verify User Presence
  • 12. All Rights Reserved | FIDO Alliance | Copyright 201912 HOW DOES FIDO WORK? AuthenticatorUser verification FIDO Authentication Same Authenticator as registered before? Same User as enrolled before? Can recognize the user (i.e. user verification), but doesnโ€™t know its identity attributes.
  • 13. All Rights Reserved | FIDO Alliance | Copyright 201913 HOW DOES FIDO WORK? AuthenticatorUser verification FIDO Authentication Same Authenticator as registered before? Same User as enrolled before? Can recognize the user (i.e. user verification), but doesnโ€™t know its identity attributes. Identity binding to be done outside FIDO: This this โ€œJohn Doe with customer ID Xโ€.
  • 14. All Rights Reserved | FIDO Alliance | Copyright 201914 FIDO BUILDING BLOCKS (Roaming) Authenticator USER DEVICE FIDO Client (Bound) Authenticator ASM RP App FIDO Authentication RP App Server FIDO Server Metadata
  • 15. All Rights Reserved | FIDO Alliance | Copyright 201915 FIDO BUILDING BLOCKS (Roaming) Authenticator User Device Browser (Bound) Authenticator Platform RP App FIDO Authentication RP App Server FIDO Server Metadata Web Authentication JS API CTAP
  • 16. FIDO USER DEVICE FIDO CLIENT IdP FIDO SERVER FIDO AUTHENTICATOR FEDERATION SERVERBROWSER / APP FIDO Protocol Service Provider Federation Id DB Knows details about the Authentication strength Knows details about the Identity and its verification strength. First Mile Second Mile 16 FIDO & FEDERATION All Rights Reserved | FIDO Alliance | Copyright 2019
  • 17. All Rights Reserved | FIDO Alliance | Copyright 201917 WEB AUTHENTICATION Supported In: JavaScript API that enables FIDO Authentication directly in web browsers
  • 18. All Rights Reserved | FIDO Alliance | Copyright 201918 FIDO AUTHENTICATION: SECURITY & CONVENIENCE
  • 19. All Rights Reserved | FIDO Alliance | Copyright 201919 CONVENIENCE & SECURITY Security Convenience Password
  • 20. All Rights Reserved | FIDO Alliance | Copyright 201920 CONVENIENCE & SECURITY Security Convenience Password + OTP Password
  • 21. All Rights Reserved | FIDO Alliance | Copyright 201921 CONVENIENCE & SECURITY Security Convenience Password + OTP Password FIDO In FIDO โ€ข Same user verification method for all servers In FIDO: Arbitrary user verification methods are supported (+ they are interoperable)
  • 22. All Rights Reserved | FIDO Alliance | Copyright 201922 CONVENIENCE & SECURITY Security Convenience Password + OTP Password FIDO In FIDO: Scalable security depending on Authenticator implementation In FIDO: โ€ข Only public keys on server โ€ข Not phishable
  • 23. All Rights Reserved | FIDO Alliance | Copyright 201923 CONCLUSION โ€ข Different authentication use-cases lead to different authentication requirements โ€ข FIDO separates user verification from authentication and hence supports all user verification methods โ€ข FIDO supports scalable convenience & security โ€ข User verification data is known to Authenticator only โ€ข FIDO complements federation
  • 24. 24 FIDO TECHNICAL OVERVIEW Rolf Lindemann, Nok Nok Labs Thank You All Rights Reserved | FIDO Alliance | Copyright 2019
  • 25. All Rights Reserved | FIDO Alliance | Copyright 201925 FIDO REGISTRATION accountInfo, challenge, [cOpts] rpId, ai, hash(clientData), cryptoP, [exts] verify user generate: key kpub key kpriv credential c c,kpub,clientData,ac,cdh,rpId,cntr,AAGUID[,exts], signature(tbs) c,kpub,clientData,ac,tbs, s store: key kpub c s Authenticator select Authenticator according to cOpts; determine rpId, get tlsData; clientData := {challenge, origin, rpId, hAlg, tlsData} cOpts: crypto params, credential black list, extensions cdh ai tbs ac: attestation certificate chain
  • 26. All Rights Reserved | FIDO Alliance | Copyright 201926 FIDO AUTHENTICATION Authenticator Relying Party rpId, [c,] hash(clientData) select Authenticator according to policy; check rpId, get tlsData (i.e. channel id, etc.); lookup key handle h; clientData := {challenge, rpId, tlsData} clientData,cntr,[exts],signature(cdh,cntr,exts) clientData, cntr, exts, s lookup kpub from DB check: exts + signature using key kpub s cdh challenge, [aOpts] verify user find key kpriv cntr++; process exts