SlideShare a Scribd company logo
1
TECHNICAL
SPECIFICATIONS
OVERVIEW
REVISED SEPTEMBER 22ND 2017
All Rights Reserved | FIDO Alliance | Copyright 2017
All Rights Reserved | FIDO Alliance | Copyright 20172
HOW SECURE IS AUTHENTICATION?
All Rights Reserved | FIDO Alliance | Copyright 20173
CLOUD AUTHENTICATION
DeviceSomething Authentication
Risk Analytics
Internet
All Rights Reserved | FIDO Alliance | Copyright 20174
PASSWORD ISSUES
DeviceSomething Authentication
Internet
Password could be stolen
from the server
1Password might be entered
into untrusted App / Web-
site (“phishing”)
2
Too many passwords to
remember
(>re-use / cart Abandonment)
3
Inconvenient to type
password on phone
4
All Rights Reserved | FIDO Alliance | Copyright 20175
CLASSIFYING THREATS
Attacks not focused on the client system, e.g. steal data from servers for
impersonation, phishing pwds, or MITM attacks
Remotely attacking
lots of user devices
steal data for
impersonation
Remotely attacking
lots of user devices
misuse them for
impersonation
Remotely attacking
lots of user devices
misuse authenticated
sessions
Physically attacking user devices
steal data for impersonation
Physically attacking user devices
misuse them for impersonation
1
2 3 4
5 6
Physical attacks
possible on lost or
stolen devices
(3% in the US in 2013)
Scalable attacks
All Rights Reserved | FIDO Alliance | Copyright 20176
HOW DOES FIDO WORK?
All Rights Reserved | FIDO Alliance | Copyright 20177
HOW DOES FIDO WORK?
DeviceUser verification FIDO Authentication
Authenticator
All Rights Reserved | FIDO Alliance | Copyright 20178
HOW DOES FIDO WORK?
AuthenticatorUser verification FIDO Authentication
Require user gesture before
private key can be used
Challenge
(Signed) Response
Private key
dedicated to one
app Public key
All Rights Reserved | FIDO Alliance | Copyright 20179
HOW DOES FIDO WORK?
AuthenticatorUser verification FIDO Authentication
… …SE
All Rights Reserved | FIDO Alliance | Copyright 201710
HOW DOES FIDO WORK?
AuthenticatorUser verification FIDO Authentication
Same Authenticator
as registered before?
Same User as
enrolled before?
Can recognize the user (i.e.
user verification), but doesn’t
know its identity attributes.
All Rights Reserved | FIDO Alliance | Copyright 201711
HOW DOES FIDO WORK?
AuthenticatorUser verification FIDO Authentication
Same Authenticator
as registered before?
Same User as
enrolled before?
Can recognize the user (i.e.
user verification), but doesn’t
know its identity attributes.
Identity binding to be
done outside FIDO: This
this “John Doe with
customer ID X”.
All Rights Reserved | FIDO Alliance | Copyright 201712
HOW DOES FIDO WORK?
AuthenticatorUser verification FIDO Authentication
… …SE
How is the key protected
(TPM, SE, TEE, …)?
Which user verification
method is used?
All Rights Reserved | FIDO Alliance | Copyright 201713
ATTESTATION + METADATA
Private
attestation key
Signed Attestation Object
Metadata
Understand Authenticator
security characteristic by
looking into Metadata from
mds.fidoalliance.org
FIDO Registration
Verify using trust anchor
included in Metadata
All Rights Reserved | FIDO Alliance | Copyright 201714
FIDO AUTHENTICATOR CONCEPT
FIDO Authenticator
User
Verification /
Presence
Attestation Key
Authentication Key(s)
Injected at
manufacturing,
doesn’t change
Generated at
runtime (on
Registration)
Optional
Components
Transaction
Confirmation
Display
All Rights Reserved | FIDO Alliance | Copyright 201715
CLIENT SIDE BIOMETRICS
Trusted Execution Environment (TEE)
FIDO Authenticator as Trusted Application (TA)
User Verification / Presence
Attestation Key
Authentication Key(s)
Store at Enrollment
Compare at Authentication
Unlock after comparison
All Rights Reserved | FIDO Alliance | Copyright 201716
FIDO USE CASES
Passwordless Experience (UAF Standards)
Authenticated Online
3
Biometric User Verification*
21
?
Authentication Challenge Authenticated Online
3
Second Factor Challenge Insert Dongle* / Press Button
Second Factor Experience (U2F Standards)
*There are other types of authenticators
21
All Rights Reserved | FIDO Alliance | Copyright 201717
FIDO REGISTRATION
accountInfo, challenge, [cOpts]
rpId, ai, hash(clientData), cryptoP, [exts]
verify user
generate:
key kpub
key kpriv
credential c
c,kpub,clientData,ac,cdh,rpId,cntr,AAGUID[,exts],
signature(tbs)
c,kpub,clientData,ac,tbs, s
store:
key kpub
c
s
Authenticator
select Authenticator according to cOpts;
determine rpId, get tlsData;
clientData := {challenge, origin, rpId, hAlg, tlsData}
cOpts: crypto params, credential black list,
extensions
cdh
ai
tbs
ac: attestation certificate chain
All Rights Reserved | FIDO Alliance | Copyright 201718
FIDO AUTHENTICATION
Authenticator Relying Party
rpId, [c,] hash(clientData)
select Authenticator according to policy;
check rpId, get tlsData (i.e. channel id, etc.);
lookup key handle h;
clientData := {challenge, rpId, tlsData}
clientData,cntr,[exts],signature(cdh,cntr,exts)
clientData, cntr, exts, s
lookup kpub
from DB
check:
exts +
signature
using
key kpub
s
cdh
challenge, [aOpts]
verify user
find
key kpriv
cntr++;
process exts
All Rights Reserved | FIDO Alliance | Copyright 201719
FIDO BUILDING BLOCKS
(External)
Authenticator
FIDO USER DEVICE
FIDO Client
(Bound)
Authenticator
ASM
RP App FIDO Authentication
RP App Server
FIDO Server
Metadata
All Rights Reserved | FIDO Alliance | Copyright 201720
THE ROAD AHEAD
FIDO 2 PROJECT:
WEBAUTHN AND CTAP
All Rights Reserved | FIDO Alliance | Copyright 201721
WEB AUTHENTICATION
Supported In:
A new JavaScript API
that enables FIDO Authentication
in web browsers
All Rights Reserved | FIDO Alliance | Copyright 201722
RELYING PARTY APPLICATION
Browser “Application”:
A normal website - HTML, CSS,
JavaScript
Website, Inc. [US] https://www.acme.com
acme.com X
All Rights Reserved | FIDO Alliance | Copyright 201723
FIDO BUILDING BLOCKS
(Roaming)
Authenticator
User Device
Browser
(Bound)
Authenticator
Platform
RP App FIDO Authentication
RP App Server
FIDO Server
Metadata
Web
Authentication
JS API
CTAP
All Rights Reserved | FIDO Alliance | Copyright 201724
WEBAUTHN APIs: Create
User Device
Browser
Authenticator
Platform
RP AppWeb
Authentication
JS API
publicKeyCred = {
challenge, rp: {name=“Acme”},
user: { name=“john.smith@example.com”,
displayName = “John’s personal account”,
id: “1098237235409872”,
icon: "https://pics.acme.com/00/apqPb.png"
},
parameters: [ {
type: "public-key", algorithm: "ES256" }],
}
navigator.credentials.create( {publicKeyCred})
.then(function (newCredInfo) {
// Send new credential info to server for checking
// contains AuthenticatorAttestationResponse
})
);
John
All Rights Reserved | FIDO Alliance | Copyright 201725
WEBAUTHN APIs: Get
User Device
Browser
Authenticator
Platform
RP AppWeb
Authentication
JS API
var options = {
challenge: ValueFromServer,
timeout: 60000, // 1 minute
allowList: [{ type: "public-key" }]
};
navigator.credentials.get({ "publicKey": options })
.then(function (assertion) {
// Send assertion to server for verification
})
John
All Rights Reserved | FIDO Alliance | Copyright 201726
FIDO BUILDING BLOCKS
(External)
Authenticator
User Device
Browser
(Bound)
Authenticator
Platform
RP AppWeb
Authentication
JS API
authenticaorGetInfo()
authenticatorMakeCredential()
authenticatorGetAssertion()
authenticatorClientPIN()
authenticatorCancel()
Platform
specific
interface
FIDO CTAP
interface
All Rights Reserved | FIDO Alliance | Copyright 201727
FIDO AUTHENTICATION:
SECURITY & CONVENIENCE
All Rights Reserved | FIDO Alliance | Copyright 201728
CONVENIENCE & SECURITY
Security
Convenience
Password + OTP
Password
All Rights Reserved | FIDO Alliance | Copyright 201729
CONVENIENCE & SECURITY
Security
Convenience
Password + OTP
Password
FIDO
In FIDO
• Same user verification method
for all servers
In FIDO: Arbitrary user verification
methods are supported
(+ they are interoperable)
All Rights Reserved | FIDO Alliance | Copyright 201730
CONVENIENCE & SECURITY
Security
Convenience
Password + OTP
Password
FIDO
In FIDO: Scalable security
depending on Authenticator
implementation
In FIDO:
• Only public keys on server
• Not phishable
All Rights Reserved | FIDO Alliance | Copyright 201731
CONCLUSION
• Different authentication use-cases lead to different
authentication requirements
• FIDO separates user verification from authentication and
hence supports all user verification methods
• FIDO supports scalable convenience & security
• User verification data is known to Authenticator only
• FIDO complements federation
All Rights Reserved | FIDO Alliance | Copyright 201732
All Rights Reserved | FIDO Alliance | Copyright 201733
Please Silence All
Electronic Devices

More Related Content

PDF
Introduction to the FIDO Alliance
FIDO Alliance
 
PPTX
UAF Tutorial: Passwordless, Biometric Authentication for Native Apps
FIDO Alliance
 
PDF
FIDO Authentication Opportunities in Healthcare
FIDO Alliance
 
PDF
Google FIDO Authentication Case Study
FIDO Alliance
 
PDF
FIDO Technical Specifications Overview
FIDO Alliance
 
PDF
Introduction to the FIDO Alliance
FIDO Alliance
 
PDF
NIST 800-63 Guidance & FIDO Authentication
FIDO Alliance
 
PPTX
Getting to Know the FIDO Specifications - Technical Tutorial
FIDO Alliance
 
Introduction to the FIDO Alliance
FIDO Alliance
 
UAF Tutorial: Passwordless, Biometric Authentication for Native Apps
FIDO Alliance
 
FIDO Authentication Opportunities in Healthcare
FIDO Alliance
 
Google FIDO Authentication Case Study
FIDO Alliance
 
FIDO Technical Specifications Overview
FIDO Alliance
 
Introduction to the FIDO Alliance
FIDO Alliance
 
NIST 800-63 Guidance & FIDO Authentication
FIDO Alliance
 
Getting to Know the FIDO Specifications - Technical Tutorial
FIDO Alliance
 

What's hot (20)

PDF
Implementation Case Study by eWBM
FIDO Alliance
 
PPTX
Strong Authentication Trends in Government
FIDO Alliance
 
PDF
Becoming Unphishable
FIDO Alliance
 
PDF
Google & FIDO Authentication
FIDO Alliance
 
PDF
Google Case Study: Strong Authentication for Employees and Consumers
FIDO Alliance
 
PDF
FIDO Specifications Overview: UAF & U2F
FIDO Alliance
 
PDF
Javelin Research 2017 State of Authentication Report
FIDO Alliance
 
PDF
FIDO Workshop at the Cloud Identity Summit: FIDO Alliance Overview
FIDO Alliance
 
PDF
NTT DOCOMO Deployment Case Study
FIDO Alliance
 
PPTX
FIDO Authentication in Korea: Early Adoption & Rapid Innovation
FIDO Alliance
 
PDF
FIDO & PSD2: Solving the Strong Customer Authentication Challenge in Europe
FIDO Alliance
 
PDF
Authentication and ID Proofing in Education
FIDO Alliance
 
PDF
Google Case Study - Towards simpler, stronger authentication
FIDO Alliance
 
PDF
FIDO Based Consumer Authentication
FIDO Alliance
 
PDF
Web Authentication API
FIDO Alliance
 
PDF
The Future of Authentication for IoT
FIDO Alliance
 
PDF
Market Study on Mobile Authentication
FIDO Alliance
 
PPTX
FIDO Alliance: Year in Review Webinar slides from January 20 2016
FIDO Alliance
 
PDF
GDPR(一般データ保護規則)とFIDO標準について
FIDO Alliance
 
PDF
FIDO Authentication and GSMA Mobile Connect
FIDO Alliance
 
Implementation Case Study by eWBM
FIDO Alliance
 
Strong Authentication Trends in Government
FIDO Alliance
 
Becoming Unphishable
FIDO Alliance
 
Google & FIDO Authentication
FIDO Alliance
 
Google Case Study: Strong Authentication for Employees and Consumers
FIDO Alliance
 
FIDO Specifications Overview: UAF & U2F
FIDO Alliance
 
Javelin Research 2017 State of Authentication Report
FIDO Alliance
 
FIDO Workshop at the Cloud Identity Summit: FIDO Alliance Overview
FIDO Alliance
 
NTT DOCOMO Deployment Case Study
FIDO Alliance
 
FIDO Authentication in Korea: Early Adoption & Rapid Innovation
FIDO Alliance
 
FIDO & PSD2: Solving the Strong Customer Authentication Challenge in Europe
FIDO Alliance
 
Authentication and ID Proofing in Education
FIDO Alliance
 
Google Case Study - Towards simpler, stronger authentication
FIDO Alliance
 
FIDO Based Consumer Authentication
FIDO Alliance
 
Web Authentication API
FIDO Alliance
 
The Future of Authentication for IoT
FIDO Alliance
 
Market Study on Mobile Authentication
FIDO Alliance
 
FIDO Alliance: Year in Review Webinar slides from January 20 2016
FIDO Alliance
 
GDPR(一般データ保護規則)とFIDO標準について
FIDO Alliance
 
FIDO Authentication and GSMA Mobile Connect
FIDO Alliance
 
Ad

Similar to FIDO Technical Specifications Overview (20)

PDF
FIDO Authentication Technical Overview
FIDO Alliance
 
PDF
FIDO Authentication Technical Overview
FIDO Alliance
 
PPTX
Fido Technical Overview
FIDO Alliance
 
PPTX
FIDO Specifications Overview
FIDO Alliance
 
PDF
Technical Principles of FIDO Authentication
FIDO Alliance
 
PDF
Technical Principles of FIDO Authentication
FIDO Alliance
 
PDF
FIDO Specifications Tutorial
FIDO Alliance
 
PPTX
Technical Principles of FIDO Authentication
FIDO Alliance
 
PDF
Beyond Passwords: FIDO & the Future of Consumer Authentication
FIDO Alliance
 
PDF
CIS14: An Overview of FIDO's Universal Factor (UAF) Specifications
CloudIDSummit
 
PDF
FIDO And the Future of User Authentication
FIDO Alliance
 
PDF
FIDO UAF 1.0 Specs: Overview and Insights
FIDO Alliance
 
PPTX
Introduction to the FIDO Alliance: Vision & Status
FIDO Alliance
 
PDF
FIDO UAF Specifications: Overview & Tutorial
FIDO Alliance
 
PPTX
Technical Considerations for Deploying FIDO Authentication
FIDO Alliance
 
PPTX
FIDOAlliance
Sanjeev Verma, PhD
 
PPTX
Introduction to FIDO: A New Model for Authentication
FIDO Alliance
 
PPTX
New FIDO Specifications Overview -FIDO Alliance -Tokyo Seminar -Nadalin
FIDO Alliance
 
PDF
Introduction to FIDO Biometric Authentication
FIDO Alliance
 
PDF
FIDO Technical Overview at FIDO KWG Hackathon
Ki-Eun Shin
 
FIDO Authentication Technical Overview
FIDO Alliance
 
FIDO Authentication Technical Overview
FIDO Alliance
 
Fido Technical Overview
FIDO Alliance
 
FIDO Specifications Overview
FIDO Alliance
 
Technical Principles of FIDO Authentication
FIDO Alliance
 
Technical Principles of FIDO Authentication
FIDO Alliance
 
FIDO Specifications Tutorial
FIDO Alliance
 
Technical Principles of FIDO Authentication
FIDO Alliance
 
Beyond Passwords: FIDO & the Future of Consumer Authentication
FIDO Alliance
 
CIS14: An Overview of FIDO's Universal Factor (UAF) Specifications
CloudIDSummit
 
FIDO And the Future of User Authentication
FIDO Alliance
 
FIDO UAF 1.0 Specs: Overview and Insights
FIDO Alliance
 
Introduction to the FIDO Alliance: Vision & Status
FIDO Alliance
 
FIDO UAF Specifications: Overview & Tutorial
FIDO Alliance
 
Technical Considerations for Deploying FIDO Authentication
FIDO Alliance
 
FIDOAlliance
Sanjeev Verma, PhD
 
Introduction to FIDO: A New Model for Authentication
FIDO Alliance
 
New FIDO Specifications Overview -FIDO Alliance -Tokyo Seminar -Nadalin
FIDO Alliance
 
Introduction to FIDO Biometric Authentication
FIDO Alliance
 
FIDO Technical Overview at FIDO KWG Hackathon
Ki-Eun Shin
 
Ad

More from FIDO Alliance (20)

PPTX
Securing Account Lifecycles in the Age of Deepfakes.pptx
FIDO Alliance
 
PPTX
FIDO Seminar: Perspectives on Passkeys & Consumer Adoption.pptx
FIDO Alliance
 
PPTX
FIDO Seminar: Evolving Landscape of Post-Quantum Cryptography.pptx
FIDO Alliance
 
PPTX
FIDO Seminar: Targeting Trust: The Future of Identity in the Workforce.pptx
FIDO Alliance
 
PPTX
FIDO Seminar: New Data: Passkey Adoption in the Workforce.pptx
FIDO Alliance
 
PPTX
FIDO Seminar: Authentication for a Billion Consumers - Amazon.pptx
FIDO Alliance
 
PPTX
FIDO Alliance Seminar State of Passkeys.pptx
FIDO Alliance
 
PPTX
FIDO Munich Seminar: FIDO Tech Principles.pptx
FIDO Alliance
 
PPTX
FIDO Munich Seminar: Securing Smart Car.pptx
FIDO Alliance
 
PPTX
FIDO Munich Seminar: Strong Workforce Authn Push & Pull Factors.pptx
FIDO Alliance
 
PPTX
FIDO Munich Seminar: Biometrics and Passkeys for In-Vehicle Apps.pptx
FIDO Alliance
 
PPTX
FIDO Munich Seminar Workforce Authentication Case Study.pptx
FIDO Alliance
 
PPTX
FIDO Munich Seminar In-Vehicle Payment Trends.pptx
FIDO Alliance
 
PPTX
FIDO Munich Seminar FIDO Automotive Apps.pptx
FIDO Alliance
 
PPTX
FIDO Munich Seminar Blueprint for In-Vehicle Payment Standard.pptx
FIDO Alliance
 
PPTX
FIDO Munich Seminar Introduction to FIDO.pptx
FIDO Alliance
 
PPTX
UX Webinar Series: Essentials for Adopting Passkeys as the Foundation of your...
FIDO Alliance
 
PPTX
UX Webinar Series: Drive Revenue and Decrease Costs with Passkeys for Consume...
FIDO Alliance
 
PPTX
UX Webinar Series: Aligning Authentication Experiences with Business Goals
FIDO Alliance
 
PDF
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Securing Account Lifecycles in the Age of Deepfakes.pptx
FIDO Alliance
 
FIDO Seminar: Perspectives on Passkeys & Consumer Adoption.pptx
FIDO Alliance
 
FIDO Seminar: Evolving Landscape of Post-Quantum Cryptography.pptx
FIDO Alliance
 
FIDO Seminar: Targeting Trust: The Future of Identity in the Workforce.pptx
FIDO Alliance
 
FIDO Seminar: New Data: Passkey Adoption in the Workforce.pptx
FIDO Alliance
 
FIDO Seminar: Authentication for a Billion Consumers - Amazon.pptx
FIDO Alliance
 
FIDO Alliance Seminar State of Passkeys.pptx
FIDO Alliance
 
FIDO Munich Seminar: FIDO Tech Principles.pptx
FIDO Alliance
 
FIDO Munich Seminar: Securing Smart Car.pptx
FIDO Alliance
 
FIDO Munich Seminar: Strong Workforce Authn Push & Pull Factors.pptx
FIDO Alliance
 
FIDO Munich Seminar: Biometrics and Passkeys for In-Vehicle Apps.pptx
FIDO Alliance
 
FIDO Munich Seminar Workforce Authentication Case Study.pptx
FIDO Alliance
 
FIDO Munich Seminar In-Vehicle Payment Trends.pptx
FIDO Alliance
 
FIDO Munich Seminar FIDO Automotive Apps.pptx
FIDO Alliance
 
FIDO Munich Seminar Blueprint for In-Vehicle Payment Standard.pptx
FIDO Alliance
 
FIDO Munich Seminar Introduction to FIDO.pptx
FIDO Alliance
 
UX Webinar Series: Essentials for Adopting Passkeys as the Foundation of your...
FIDO Alliance
 
UX Webinar Series: Drive Revenue and Decrease Costs with Passkeys for Consume...
FIDO Alliance
 
UX Webinar Series: Aligning Authentication Experiences with Business Goals
FIDO Alliance
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 

Recently uploaded (20)

PPTX
cloud computing vai.pptx for the project
vaibhavdobariyal79
 
PPTX
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
PDF
NewMind AI Weekly Chronicles - July'25 - Week IV
NewMind AI
 
PPTX
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
sujalchauhan1305
 
PDF
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
PDF
Doc9.....................................
SofiaCollazos
 
PDF
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
PPTX
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
PDF
GDG Cloud Munich - Intro - Luiz Carneiro - #BuildWithAI - July - Abdel.pdf
Luiz Carneiro
 
PDF
Oracle AI Vector Search- Getting Started and what's new in 2025- AIOUG Yatra ...
Sandesh Rao
 
PDF
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
PDF
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
PPTX
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
PDF
Economic Impact of Data Centres to the Malaysian Economy
flintglobalapac
 
PDF
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
Principled Technologies
 
PDF
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
PDF
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
PPTX
Introduction to Flutter by Ayush Desai.pptx
ayushdesai204
 
PDF
Make GenAI investments go further with the Dell AI Factory
Principled Technologies
 
PDF
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 
cloud computing vai.pptx for the project
vaibhavdobariyal79
 
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
NewMind AI Weekly Chronicles - July'25 - Week IV
NewMind AI
 
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
sujalchauhan1305
 
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
Doc9.....................................
SofiaCollazos
 
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
GDG Cloud Munich - Intro - Luiz Carneiro - #BuildWithAI - July - Abdel.pdf
Luiz Carneiro
 
Oracle AI Vector Search- Getting Started and what's new in 2025- AIOUG Yatra ...
Sandesh Rao
 
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
Economic Impact of Data Centres to the Malaysian Economy
flintglobalapac
 
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
Principled Technologies
 
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
Introduction to Flutter by Ayush Desai.pptx
ayushdesai204
 
Make GenAI investments go further with the Dell AI Factory
Principled Technologies
 
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 

FIDO Technical Specifications Overview

  • 1. 1 TECHNICAL SPECIFICATIONS OVERVIEW REVISED SEPTEMBER 22ND 2017 All Rights Reserved | FIDO Alliance | Copyright 2017
  • 2. All Rights Reserved | FIDO Alliance | Copyright 20172 HOW SECURE IS AUTHENTICATION?
  • 3. All Rights Reserved | FIDO Alliance | Copyright 20173 CLOUD AUTHENTICATION DeviceSomething Authentication Risk Analytics Internet
  • 4. All Rights Reserved | FIDO Alliance | Copyright 20174 PASSWORD ISSUES DeviceSomething Authentication Internet Password could be stolen from the server 1Password might be entered into untrusted App / Web- site (“phishing”) 2 Too many passwords to remember (>re-use / cart Abandonment) 3 Inconvenient to type password on phone 4
  • 5. All Rights Reserved | FIDO Alliance | Copyright 20175 CLASSIFYING THREATS Attacks not focused on the client system, e.g. steal data from servers for impersonation, phishing pwds, or MITM attacks Remotely attacking lots of user devices steal data for impersonation Remotely attacking lots of user devices misuse them for impersonation Remotely attacking lots of user devices misuse authenticated sessions Physically attacking user devices steal data for impersonation Physically attacking user devices misuse them for impersonation 1 2 3 4 5 6 Physical attacks possible on lost or stolen devices (3% in the US in 2013) Scalable attacks
  • 6. All Rights Reserved | FIDO Alliance | Copyright 20176 HOW DOES FIDO WORK?
  • 7. All Rights Reserved | FIDO Alliance | Copyright 20177 HOW DOES FIDO WORK? DeviceUser verification FIDO Authentication Authenticator
  • 8. All Rights Reserved | FIDO Alliance | Copyright 20178 HOW DOES FIDO WORK? AuthenticatorUser verification FIDO Authentication Require user gesture before private key can be used Challenge (Signed) Response Private key dedicated to one app Public key
  • 9. All Rights Reserved | FIDO Alliance | Copyright 20179 HOW DOES FIDO WORK? AuthenticatorUser verification FIDO Authentication … …SE
  • 10. All Rights Reserved | FIDO Alliance | Copyright 201710 HOW DOES FIDO WORK? AuthenticatorUser verification FIDO Authentication Same Authenticator as registered before? Same User as enrolled before? Can recognize the user (i.e. user verification), but doesn’t know its identity attributes.
  • 11. All Rights Reserved | FIDO Alliance | Copyright 201711 HOW DOES FIDO WORK? AuthenticatorUser verification FIDO Authentication Same Authenticator as registered before? Same User as enrolled before? Can recognize the user (i.e. user verification), but doesn’t know its identity attributes. Identity binding to be done outside FIDO: This this “John Doe with customer ID X”.
  • 12. All Rights Reserved | FIDO Alliance | Copyright 201712 HOW DOES FIDO WORK? AuthenticatorUser verification FIDO Authentication … …SE How is the key protected (TPM, SE, TEE, …)? Which user verification method is used?
  • 13. All Rights Reserved | FIDO Alliance | Copyright 201713 ATTESTATION + METADATA Private attestation key Signed Attestation Object Metadata Understand Authenticator security characteristic by looking into Metadata from mds.fidoalliance.org FIDO Registration Verify using trust anchor included in Metadata
  • 14. All Rights Reserved | FIDO Alliance | Copyright 201714 FIDO AUTHENTICATOR CONCEPT FIDO Authenticator User Verification / Presence Attestation Key Authentication Key(s) Injected at manufacturing, doesn’t change Generated at runtime (on Registration) Optional Components Transaction Confirmation Display
  • 15. All Rights Reserved | FIDO Alliance | Copyright 201715 CLIENT SIDE BIOMETRICS Trusted Execution Environment (TEE) FIDO Authenticator as Trusted Application (TA) User Verification / Presence Attestation Key Authentication Key(s) Store at Enrollment Compare at Authentication Unlock after comparison
  • 16. All Rights Reserved | FIDO Alliance | Copyright 201716 FIDO USE CASES Passwordless Experience (UAF Standards) Authenticated Online 3 Biometric User Verification* 21 ? Authentication Challenge Authenticated Online 3 Second Factor Challenge Insert Dongle* / Press Button Second Factor Experience (U2F Standards) *There are other types of authenticators 21
  • 17. All Rights Reserved | FIDO Alliance | Copyright 201717 FIDO REGISTRATION accountInfo, challenge, [cOpts] rpId, ai, hash(clientData), cryptoP, [exts] verify user generate: key kpub key kpriv credential c c,kpub,clientData,ac,cdh,rpId,cntr,AAGUID[,exts], signature(tbs) c,kpub,clientData,ac,tbs, s store: key kpub c s Authenticator select Authenticator according to cOpts; determine rpId, get tlsData; clientData := {challenge, origin, rpId, hAlg, tlsData} cOpts: crypto params, credential black list, extensions cdh ai tbs ac: attestation certificate chain
  • 18. All Rights Reserved | FIDO Alliance | Copyright 201718 FIDO AUTHENTICATION Authenticator Relying Party rpId, [c,] hash(clientData) select Authenticator according to policy; check rpId, get tlsData (i.e. channel id, etc.); lookup key handle h; clientData := {challenge, rpId, tlsData} clientData,cntr,[exts],signature(cdh,cntr,exts) clientData, cntr, exts, s lookup kpub from DB check: exts + signature using key kpub s cdh challenge, [aOpts] verify user find key kpriv cntr++; process exts
  • 19. All Rights Reserved | FIDO Alliance | Copyright 201719 FIDO BUILDING BLOCKS (External) Authenticator FIDO USER DEVICE FIDO Client (Bound) Authenticator ASM RP App FIDO Authentication RP App Server FIDO Server Metadata
  • 20. All Rights Reserved | FIDO Alliance | Copyright 201720 THE ROAD AHEAD FIDO 2 PROJECT: WEBAUTHN AND CTAP
  • 21. All Rights Reserved | FIDO Alliance | Copyright 201721 WEB AUTHENTICATION Supported In: A new JavaScript API that enables FIDO Authentication in web browsers
  • 22. All Rights Reserved | FIDO Alliance | Copyright 201722 RELYING PARTY APPLICATION Browser “Application”: A normal website - HTML, CSS, JavaScript Website, Inc. [US] https://www.acme.com acme.com X
  • 23. All Rights Reserved | FIDO Alliance | Copyright 201723 FIDO BUILDING BLOCKS (Roaming) Authenticator User Device Browser (Bound) Authenticator Platform RP App FIDO Authentication RP App Server FIDO Server Metadata Web Authentication JS API CTAP
  • 24. All Rights Reserved | FIDO Alliance | Copyright 201724 WEBAUTHN APIs: Create User Device Browser Authenticator Platform RP AppWeb Authentication JS API publicKeyCred = { challenge, rp: {name=“Acme”}, user: { name=“[email protected]”, displayName = “John’s personal account”, id: “1098237235409872”, icon: "https://pics.acme.com/00/apqPb.png" }, parameters: [ { type: "public-key", algorithm: "ES256" }], } navigator.credentials.create( {publicKeyCred}) .then(function (newCredInfo) { // Send new credential info to server for checking // contains AuthenticatorAttestationResponse }) ); John
  • 25. All Rights Reserved | FIDO Alliance | Copyright 201725 WEBAUTHN APIs: Get User Device Browser Authenticator Platform RP AppWeb Authentication JS API var options = { challenge: ValueFromServer, timeout: 60000, // 1 minute allowList: [{ type: "public-key" }] }; navigator.credentials.get({ "publicKey": options }) .then(function (assertion) { // Send assertion to server for verification }) John
  • 26. All Rights Reserved | FIDO Alliance | Copyright 201726 FIDO BUILDING BLOCKS (External) Authenticator User Device Browser (Bound) Authenticator Platform RP AppWeb Authentication JS API authenticaorGetInfo() authenticatorMakeCredential() authenticatorGetAssertion() authenticatorClientPIN() authenticatorCancel() Platform specific interface FIDO CTAP interface
  • 27. All Rights Reserved | FIDO Alliance | Copyright 201727 FIDO AUTHENTICATION: SECURITY & CONVENIENCE
  • 28. All Rights Reserved | FIDO Alliance | Copyright 201728 CONVENIENCE & SECURITY Security Convenience Password + OTP Password
  • 29. All Rights Reserved | FIDO Alliance | Copyright 201729 CONVENIENCE & SECURITY Security Convenience Password + OTP Password FIDO In FIDO • Same user verification method for all servers In FIDO: Arbitrary user verification methods are supported (+ they are interoperable)
  • 30. All Rights Reserved | FIDO Alliance | Copyright 201730 CONVENIENCE & SECURITY Security Convenience Password + OTP Password FIDO In FIDO: Scalable security depending on Authenticator implementation In FIDO: • Only public keys on server • Not phishable
  • 31. All Rights Reserved | FIDO Alliance | Copyright 201731 CONCLUSION • Different authentication use-cases lead to different authentication requirements • FIDO separates user verification from authentication and hence supports all user verification methods • FIDO supports scalable convenience & security • User verification data is known to Authenticator only • FIDO complements federation
  • 32. All Rights Reserved | FIDO Alliance | Copyright 201732
  • 33. All Rights Reserved | FIDO Alliance | Copyright 201733 Please Silence All Electronic Devices