SlideShare una empresa de Scribd logo
1 de 9
Descargar para leer sin conexión
Identity Tech Talks #13
FIDO2 / WebAuthn
A W3C emerging standard
Cyril Grosjean
FIDO Alliance history
• February 2013: FIDO Alliance launched publicly
• December 2014: 1st specifications (FIDO 1.0, aka UAF / U2F) released
• November 2015: FIDO2 specifications submitted to the W3C for standardization
• February 2016: W3C starts work on WebAuthn, based on FIDO 2 Web APIs
• February 2017: UAF 1.1 released (Android attestation support, de-provisioning, ..)
• July 2017: U2F 1.2 releases (NFC and BLE support, ..)
• September 2017: FIDO 2 CTAP2 proposed draft
• August 2018: W3C WebAuthn candidate recommandation released
• September 2018: WebAuthn browsers adoption
FIDO 2.0
• FIDO 2.0 includes the W3C WebAuthn specs as well as CTAP (Client-to Authenticator
Protocol), which is still a draft
• FIDO 2.0 also includes UAF (passwordless authentication) and U2F (multi-factor
authentication)
• FIDO 2.0 introduces bound authenticators, in addition to roaming authenticators
• For bound authenticators, since the credentials reside on the device and can not be
exported, they can only be used by apps running on the device: a new device requires
new credentials. Usually speaking, credentials are linked to a (user,device,app) triplet.
• FIDO devices have metadata to make administrators aware of the specific device
features: it allows attestation, that is enterprise policy based device deployments
• The important pre-requisite is that the browser support WebauthN ! :
• https://webauthndemo.appspot.com ou https://webauthnsample.azurewebsites.net/
WebAuthn features
• Backed by Google, Microsoft, Paypal, Yubico, Mozilla .. But not Apple/Safari yet
• Strong authentication using PKI and challenge/response
• Credentials are unique to a user, service and device triplet
• Includes the registration or creation of credentials, with different types of attestation types
(Basic, Self, CA, Eliptic , None) and format ("packed", "FIDO U2F", "none ", "Androïd Key", ..)
• Includes the use of these credentials for strong authentication
• May require user identity verification, or just suggest it as preferred, or discourage it
• Supports token binding: allows proof of possession of the private key by the client to the web
server, preventing token export, replay or man in the middle attacks. Token binding is a
dedicated protocol (TLS extension) still in IETF draft status. It’s meant to be applicable to
OAUTH 2 bearer tokens too
• Protects against authenticator cloning thanks to signature counters
WebAuthn benefits
• For organizations: users and accounts can be secured using widely compatible, easy-to-use
multi-factor authentication
• For organizations: not need to provision authenticator hardware to its users. Instead, each
user can independently obtain any conforming authenticator and use it with any number
of relying parties
• Wide availability of authenticators: SmartPhone, TEE applet, TPM, device integrated SE
• For developers: allows easy integration of strong auth. in web applications: just call the APIs
exposed by the browsers ! No specific client required
• For CISO’s: credentials never leave the authenticator, which improves security, since it’s
resistant to man in the middle attacks
• For helpdesks: the reduction in password management headaches looks nice too
• For end users: frictionless experience is a must have for adoption
© 2018 ForgeRock. All rights reserved.
Registration
AM
User Store
1. User is strongly authenticated using
Authentication Trees
2. AM initiates Device Registration
a. AM can specify types of authenticators it will
accept
b. AM can also support attestation
3. The User Agent asks the Authenticator to
mint a new set of credentials (Public/Private
key pair)
4. The User Agent sends the Public Key to AM
5. AM stores the Public Key on the user profile
The Private Key never leaves the Authenticator
1. 2.
3.
4.
4.
5.
© 2018 ForgeRock. All rights reserved.
Authentication
AM
User Store
1. User is identified by AM using
Authentication Trees
2. AM looks up User’s authenticators
3. AM sends a challenge to User Agent
4. The User Agent requests the Authenticator
use the Private Key to sign the challenge
a. This usually involves a biometric
5. The User Agent returns the response
6. AM checks for correct response using the
Public Key of the user
User is authenticated. Credentials never leave
Authenticator.
1. 3.
4.
5.
2.
© 2018 ForgeRock. All rights reserved.
Demo
Thank You

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

The State of FIDO
The State of FIDOThe State of FIDO
The State of FIDO
 
FIDO2 & Microsoft
FIDO2 & MicrosoftFIDO2 & Microsoft
FIDO2 & Microsoft
 
FIDO in Action: Real World Development Case Studies
FIDO in Action: Real World Development Case StudiesFIDO in Action: Real World Development Case Studies
FIDO in Action: Real World Development Case Studies
 
Fido U2F Protocol by Ather Ali
Fido U2F Protocol by Ather Ali Fido U2F Protocol by Ather Ali
Fido U2F Protocol by Ather Ali
 
Webinar: Considerations for Deploying FIDO in the Enterprise
Webinar: Considerations for Deploying FIDO in the EnterpriseWebinar: Considerations for Deploying FIDO in the Enterprise
Webinar: Considerations for Deploying FIDO in the Enterprise
 
FIDO Authentication in Korea: Early Adoption & Rapid Innovation
FIDO Authentication in Korea: Early Adoption & Rapid InnovationFIDO Authentication in Korea: Early Adoption & Rapid Innovation
FIDO Authentication in Korea: Early Adoption & Rapid Innovation
 
Implementation Case Study by eWBM
Implementation Case Study by eWBMImplementation Case Study by eWBM
Implementation Case Study by eWBM
 
Webinar: Securing IoT with FIDO Authentication
Webinar: Securing IoT with FIDO AuthenticationWebinar: Securing IoT with FIDO Authentication
Webinar: Securing IoT with FIDO Authentication
 
Web Authentication API
Web Authentication APIWeb Authentication API
Web Authentication API
 
FIDO Alliance Today: Status and News
FIDO Alliance Today: Status and NewsFIDO Alliance Today: Status and News
FIDO Alliance Today: Status and News
 
Fido Security Key
Fido Security KeyFido Security Key
Fido Security Key
 
FIDO & PSD2: Solving the Strong Customer Authentication Challenge in Europe
FIDO & PSD2: Solving the Strong Customer Authentication Challenge in EuropeFIDO & PSD2: Solving the Strong Customer Authentication Challenge in Europe
FIDO & PSD2: Solving the Strong Customer Authentication Challenge in Europe
 
FIDO Authentication Technical Overview
FIDO Authentication Technical OverviewFIDO Authentication Technical Overview
FIDO Authentication Technical Overview
 
FIDO Privacy Principles and Approach
FIDO Privacy Principles and ApproachFIDO Privacy Principles and Approach
FIDO Privacy Principles and Approach
 
UAF Tutorial: Passwordless, Biometric Authentication for Native Apps
UAF Tutorial: Passwordless, Biometric Authentication for Native AppsUAF Tutorial: Passwordless, Biometric Authentication for Native Apps
UAF Tutorial: Passwordless, Biometric Authentication for Native Apps
 
Market Study on Mobile Authentication
Market Study on Mobile AuthenticationMarket Study on Mobile Authentication
Market Study on Mobile Authentication
 
FIDO UAF and PKI in Asia: A Case Study and Recommendations
FIDO UAF and PKI in Asia: A Case Study and RecommendationsFIDO UAF and PKI in Asia: A Case Study and Recommendations
FIDO UAF and PKI in Asia: A Case Study and Recommendations
 
2018 12-07 tokyo-seminar Brett McDowell
2018 12-07 tokyo-seminar Brett McDowell2018 12-07 tokyo-seminar Brett McDowell
2018 12-07 tokyo-seminar Brett McDowell
 
FIDO: The Value of Certification
FIDO: The Value of CertificationFIDO: The Value of Certification
FIDO: The Value of Certification
 
Overview of FIDO Security Requirements and Certifications
Overview of FIDO Security Requirements and CertificationsOverview of FIDO Security Requirements and Certifications
Overview of FIDO Security Requirements and Certifications
 

Similar a WebAuthn & FIDO2

Twofactorauthentication 120625115723-phpapp01
Twofactorauthentication 120625115723-phpapp01Twofactorauthentication 120625115723-phpapp01
Twofactorauthentication 120625115723-phpapp01
Hai Nguyen
 
OAuth - Don’t Throw the Baby Out with the Bathwater
OAuth - Don’t Throw the Baby Out with the Bathwater OAuth - Don’t Throw the Baby Out with the Bathwater
OAuth - Don’t Throw the Baby Out with the Bathwater
Apigee | Google Cloud
 

Similar a WebAuthn & FIDO2 (20)

FIDO Technical Overview at FIDO KWG Hackathon
FIDO Technical Overview at FIDO KWG HackathonFIDO Technical Overview at FIDO KWG Hackathon
FIDO Technical Overview at FIDO KWG Hackathon
 
FIWARE Tech Summit - Complete Framework for Identity, Access Control and API ...
FIWARE Tech Summit - Complete Framework for Identity, Access Control and API ...FIWARE Tech Summit - Complete Framework for Identity, Access Control and API ...
FIWARE Tech Summit - Complete Framework for Identity, Access Control and API ...
 
DevConf.CZ 2020 @ Brno, Czech Republic : WebAuthn support for keycloak
DevConf.CZ 2020 @ Brno, Czech Republic : WebAuthn support for keycloakDevConf.CZ 2020 @ Brno, Czech Republic : WebAuthn support for keycloak
DevConf.CZ 2020 @ Brno, Czech Republic : WebAuthn support for keycloak
 
KubeConRecap_nakamura.pdf
KubeConRecap_nakamura.pdfKubeConRecap_nakamura.pdf
KubeConRecap_nakamura.pdf
 
Two-factor Authentication
Two-factor AuthenticationTwo-factor Authentication
Two-factor Authentication
 
Passwords are passé. WebAuthn is simpler, stronger and ready to go
Passwords are passé. WebAuthn is simpler, stronger and ready to goPasswords are passé. WebAuthn is simpler, stronger and ready to go
Passwords are passé. WebAuthn is simpler, stronger and ready to go
 
OpenId Connect Protocol
OpenId Connect ProtocolOpenId Connect Protocol
OpenId Connect Protocol
 
ACDKOCHI19 - Enterprise grade security for web and mobile applications on AWS
ACDKOCHI19 - Enterprise grade security for web and mobile applications on AWSACDKOCHI19 - Enterprise grade security for web and mobile applications on AWS
ACDKOCHI19 - Enterprise grade security for web and mobile applications on AWS
 
How to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
How to Make Your IoT Devices Secure, Act Autonomously & Trusted SubjectsHow to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
How to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
 
FIDO2 : vers la fin des mots de passe ? - Par Arnaud Jumelet
FIDO2 : vers la fin des mots de passe ? - Par Arnaud JumeletFIDO2 : vers la fin des mots de passe ? - Par Arnaud Jumelet
FIDO2 : vers la fin des mots de passe ? - Par Arnaud Jumelet
 
Twofactorauthentication 120625115723-phpapp01
Twofactorauthentication 120625115723-phpapp01Twofactorauthentication 120625115723-phpapp01
Twofactorauthentication 120625115723-phpapp01
 
An Authentication and Authorization Architecture for a Microservices World
An Authentication and Authorization Architecture for a Microservices WorldAn Authentication and Authorization Architecture for a Microservices World
An Authentication and Authorization Architecture for a Microservices World
 
Adding identity management and access control to your app
Adding identity management and access control to your appAdding identity management and access control to your app
Adding identity management and access control to your app
 
Guide of authentication and authorization for cloud native applications with ...
Guide of authentication and authorization for cloud native applications with ...Guide of authentication and authorization for cloud native applications with ...
Guide of authentication and authorization for cloud native applications with ...
 
ConFoo 2015 - Securing RESTful resources with OAuth2
ConFoo 2015 - Securing RESTful resources with OAuth2ConFoo 2015 - Securing RESTful resources with OAuth2
ConFoo 2015 - Securing RESTful resources with OAuth2
 
ForgeRock Platform Release - Summer 2016
ForgeRock Platform Release - Summer 2016  ForgeRock Platform Release - Summer 2016
ForgeRock Platform Release - Summer 2016
 
Mobile Authentication - Onboarding, best practices & anti-patterns
Mobile Authentication - Onboarding, best practices & anti-patternsMobile Authentication - Onboarding, best practices & anti-patterns
Mobile Authentication - Onboarding, best practices & anti-patterns
 
FIDOAlliance
FIDOAllianceFIDOAlliance
FIDOAlliance
 
Application Security in ASP.NET Core
Application Security in ASP.NET CoreApplication Security in ASP.NET Core
Application Security in ASP.NET Core
 
OAuth - Don’t Throw the Baby Out with the Bathwater
OAuth - Don’t Throw the Baby Out with the Bathwater OAuth - Don’t Throw the Baby Out with the Bathwater
OAuth - Don’t Throw the Baby Out with the Bathwater
 

Más de Leonard Moustacchis

Más de Leonard Moustacchis (20)

Identity verification and AI
Identity verification and AIIdentity verification and AI
Identity verification and AI
 
De la bonne utilisation de OAuth2
De la bonne utilisation de OAuth2 De la bonne utilisation de OAuth2
De la bonne utilisation de OAuth2
 
Facebook data breach and OAuth2
   Facebook data breach and OAuth2   Facebook data breach and OAuth2
Facebook data breach and OAuth2
 
Identity techtalk orange
Identity techtalk orangeIdentity techtalk orange
Identity techtalk orange
 
Intelligent authentication Identity tech talks
Intelligent authentication Identity  tech talksIntelligent authentication Identity  tech talks
Intelligent authentication Identity tech talks
 
Blockchain et ses cas d'usages - Identity Tech Talk#10
Blockchain et ses cas d'usages - Identity Tech Talk#10 Blockchain et ses cas d'usages - Identity Tech Talk#10
Blockchain et ses cas d'usages - Identity Tech Talk#10
 
iProov et Biométrie Identity Tech Talk #10
iProov et Biométrie Identity Tech Talk #10iProov et Biométrie Identity Tech Talk #10
iProov et Biométrie Identity Tech Talk #10
 
Microservice et identité
Microservice et identitéMicroservice et identité
Microservice et identité
 
Évènement 01 Business - GDPR, confiance et confidentialité des données, défi ...
Évènement 01 Business - GDPR, confiance et confidentialité des données, défi ...Évènement 01 Business - GDPR, confiance et confidentialité des données, défi ...
Évènement 01 Business - GDPR, confiance et confidentialité des données, défi ...
 
201707 dsp2 standards, sécurité, quels impacts - wavestone
201707   dsp2 standards, sécurité, quels impacts - wavestone201707   dsp2 standards, sécurité, quels impacts - wavestone
201707 dsp2 standards, sécurité, quels impacts - wavestone
 
Identité et Automobile
Identité et AutomobileIdentité et Automobile
Identité et Automobile
 
Meetup devops
Meetup devopsMeetup devops
Meetup devops
 
Quels sont les enjeux de la réglementation GDPR
Quels sont les enjeux de la réglementation GDPRQuels sont les enjeux de la réglementation GDPR
Quels sont les enjeux de la réglementation GDPR
 
Présentation de UMA (User Managed Access)
Présentation de UMA (User Managed Access)Présentation de UMA (User Managed Access)
Présentation de UMA (User Managed Access)
 
Identity Tech Talks #3 FIDO futur of authentication
Identity Tech Talks #3 FIDO futur of authenticationIdentity Tech Talks #3 FIDO futur of authentication
Identity Tech Talks #3 FIDO futur of authentication
 
Mon Raspberry PI a une identité !
Mon Raspberry PI a une identité !  Mon Raspberry PI a une identité !
Mon Raspberry PI a une identité !
 
Comment ça marche: OpenID Connect fournisseur d’identité universel de Google ...
Comment ça marche: OpenID Connect fournisseur d’identité universel de Google ...Comment ça marche: OpenID Connect fournisseur d’identité universel de Google ...
Comment ça marche: OpenID Connect fournisseur d’identité universel de Google ...
 
Pas d'IoT sans Identité!
Pas d'IoT sans Identité!Pas d'IoT sans Identité!
Pas d'IoT sans Identité!
 
Valorisez votre écosystème d'identités
Valorisez votre écosystème d'identitésValorisez votre écosystème d'identités
Valorisez votre écosystème d'identités
 
L’identité numérique : un atout incontournable pour construire une relation c...
L’identité numérique : un atout incontournable pour construire une relation c...L’identité numérique : un atout incontournable pour construire une relation c...
L’identité numérique : un atout incontournable pour construire une relation c...
 

Último

introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdfintroduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
VishalKumarJha10
 
The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is inside
shinachiaurasa2
 

Último (20)

%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand
 
8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verified
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verifiedSector 18, Noida Call girls :8448380779 Model Escorts | 100% verified
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verified
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdfAzure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
 
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdfintroduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdfPayment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
 
The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is inside
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionIntroducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
 
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
 
10 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 202410 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 2024
 

WebAuthn & FIDO2

  • 1. Identity Tech Talks #13 FIDO2 / WebAuthn A W3C emerging standard Cyril Grosjean
  • 2. FIDO Alliance history • February 2013: FIDO Alliance launched publicly • December 2014: 1st specifications (FIDO 1.0, aka UAF / U2F) released • November 2015: FIDO2 specifications submitted to the W3C for standardization • February 2016: W3C starts work on WebAuthn, based on FIDO 2 Web APIs • February 2017: UAF 1.1 released (Android attestation support, de-provisioning, ..) • July 2017: U2F 1.2 releases (NFC and BLE support, ..) • September 2017: FIDO 2 CTAP2 proposed draft • August 2018: W3C WebAuthn candidate recommandation released • September 2018: WebAuthn browsers adoption
  • 3. FIDO 2.0 • FIDO 2.0 includes the W3C WebAuthn specs as well as CTAP (Client-to Authenticator Protocol), which is still a draft • FIDO 2.0 also includes UAF (passwordless authentication) and U2F (multi-factor authentication) • FIDO 2.0 introduces bound authenticators, in addition to roaming authenticators • For bound authenticators, since the credentials reside on the device and can not be exported, they can only be used by apps running on the device: a new device requires new credentials. Usually speaking, credentials are linked to a (user,device,app) triplet. • FIDO devices have metadata to make administrators aware of the specific device features: it allows attestation, that is enterprise policy based device deployments • The important pre-requisite is that the browser support WebauthN ! : • https://webauthndemo.appspot.com ou https://webauthnsample.azurewebsites.net/
  • 4. WebAuthn features • Backed by Google, Microsoft, Paypal, Yubico, Mozilla .. But not Apple/Safari yet • Strong authentication using PKI and challenge/response • Credentials are unique to a user, service and device triplet • Includes the registration or creation of credentials, with different types of attestation types (Basic, Self, CA, Eliptic , None) and format ("packed", "FIDO U2F", "none ", "Androïd Key", ..) • Includes the use of these credentials for strong authentication • May require user identity verification, or just suggest it as preferred, or discourage it • Supports token binding: allows proof of possession of the private key by the client to the web server, preventing token export, replay or man in the middle attacks. Token binding is a dedicated protocol (TLS extension) still in IETF draft status. It’s meant to be applicable to OAUTH 2 bearer tokens too • Protects against authenticator cloning thanks to signature counters
  • 5. WebAuthn benefits • For organizations: users and accounts can be secured using widely compatible, easy-to-use multi-factor authentication • For organizations: not need to provision authenticator hardware to its users. Instead, each user can independently obtain any conforming authenticator and use it with any number of relying parties • Wide availability of authenticators: SmartPhone, TEE applet, TPM, device integrated SE • For developers: allows easy integration of strong auth. in web applications: just call the APIs exposed by the browsers ! No specific client required • For CISO’s: credentials never leave the authenticator, which improves security, since it’s resistant to man in the middle attacks • For helpdesks: the reduction in password management headaches looks nice too • For end users: frictionless experience is a must have for adoption
  • 6. © 2018 ForgeRock. All rights reserved. Registration AM User Store 1. User is strongly authenticated using Authentication Trees 2. AM initiates Device Registration a. AM can specify types of authenticators it will accept b. AM can also support attestation 3. The User Agent asks the Authenticator to mint a new set of credentials (Public/Private key pair) 4. The User Agent sends the Public Key to AM 5. AM stores the Public Key on the user profile The Private Key never leaves the Authenticator 1. 2. 3. 4. 4. 5.
  • 7. © 2018 ForgeRock. All rights reserved. Authentication AM User Store 1. User is identified by AM using Authentication Trees 2. AM looks up User’s authenticators 3. AM sends a challenge to User Agent 4. The User Agent requests the Authenticator use the Private Key to sign the challenge a. This usually involves a biometric 5. The User Agent returns the response 6. AM checks for correct response using the Public Key of the user User is authenticated. Credentials never leave Authenticator. 1. 3. 4. 5. 2.
  • 8. © 2018 ForgeRock. All rights reserved. Demo