SlideShare una empresa de Scribd logo
1 de 38
Descargar para leer sin conexión
FIDO	
  Universal	
  Second	
  Factor	
  
(U2F)	
  for	
  WSO2	
  Identity	
  Server
Ishara  Karunarathna,  Senior  Software  Engineer,  WSO2
Jerrod  Chong,  Solutions  Team  leader,  Yubico
Rob  Blaauboer,  Integration    Consultant  Yenlo
December	
  	
  8th 2015
About	
  the	
  presenters	
  
2
Ishara	
  Karunarathna
Senior	
  Software	
  Engineer,	
  WSO2
Ishara	
  is	
  a	
  Senior	
  Software	
  Engineer	
  at	
  WSO2	
  and	
  a	
  key	
  member	
  of	
  WSO2	
  Identity	
  server	
  team,	
  
contributing	
  towards	
  the	
  Identity	
  Server	
  and	
  WSO2's	
  platform	
  security.	
  He	
  has	
  participated	
   in	
  several	
  
customer	
  engagements	
   helping	
  them	
  to	
  realize	
  enterprise	
  use	
  cases	
  and	
  to	
  build	
  solutions	
  On	
  top	
  of	
  
WSO2	
  platform.
Jerrod	
  Chong
Solutions	
  Team	
  leader,	
  Yubico
Jerrod	
  leads	
  the	
  Solutions	
  team	
  at	
  Yubico	
  with	
  over	
  fifteen	
  years	
  of	
  experience	
   specializing	
  in	
  enterprise	
  
security	
  solutions.	
  He	
  works	
  with	
  small,	
  medium	
  and	
  enterprise	
  	
  customers	
  to	
  consult	
  and	
  build	
  open	
  
scalable	
   security	
  solutions.	
  Jerrod	
  is	
  also	
  an	
  active	
  contributor	
  in	
  the	
  FIDO	
  Alliance	
  U2F	
  technical	
   working	
  
group	
  and	
  security	
  certification	
   development	
  committee.	
  
Rob	
  Blaauboer
Senior	
  Consultant,	
  Yenlo
Rob	
  is	
  a	
  Senior	
  Business	
  Consultant	
  and	
  Solution	
  Architect	
  with	
  more	
  than	
  twenty	
   years	
  experience.	
  In	
  
addition	
  to	
  his	
  work	
  he	
  is	
  an	
  active	
  blogger	
  working	
  on	
  a	
  number	
  of	
  articles	
   on	
  the	
  'Internet	
  of	
  Things'	
  
and	
  a	
  WSO2	
  'Getting	
   Started	
  with	
  ...'	
  series	
  in	
  which	
  he	
  talks	
  about	
  WSO2	
  components	
  and	
  their	
  
purpose	
  especially	
  aimed	
  at	
  non	
  technical	
  readers.
3
• Global	
  enterprise,	
  founded	
  in	
  2007	
  
with	
  an	
  international	
  focus	
  on	
  
delivering	
  integration	
  solutions	
  based	
  
on	
  Java	
  open	
  source	
  
• #1	
  in	
  the	
  field	
  of	
  Integration	
  Solutions
• #1	
  in	
  Managed	
  Services	
  for	
  middleware	
  
environments
• #1	
  Global	
  Strategic	
  Alliance	
  partner	
  of	
  
WSO2
• WSO2	
  Product	
  Support
• WSO2	
  Development
• WSO2	
  QuickStarts
• WSO2	
  Training	
  &	
  Certifications
• WSO2	
  24/7	
  Managed	
  Services
• WSO2	
  Events
About Yenlo
What	
  Yenlo	
  delivers
4
Enterprise	
  Architecture Software	
  Development Managed	
  Services
WSO2	
  Product	
  Support WSO2	
  Development	
   Support WSO2	
  QuickStart
WSO2	
  Training	
  &	
  Certifications WSO2	
  Managed	
  Services WSO2	
  Events
Agenda
5
Making	
  WSO2	
  Identity	
  Server	
  more	
  secure	
  with	
  FIDO	
  UAF	
  &	
  U2F
• Our security is at risk
• introduction to FIDO and Why FIDO U2F
•Introduction WSO2 IS
• Demo
• Benefits of the solution
• Q&A
Our security is at risk
Making it more secure
Starts  at  the  basis!
Access  to  a  mail  service  enables  a  hacker  to  
access  many  more  systems  
Gmail  supports  Fido  and  other  2nd factors
Sensitive  information  should  be  secured
What is a factor?
o Something  you  know  is  for  instance  as  password  
or  even  a  username
o Something  you  have  is  a  smartcard,  token  or  
smartphone
o Something  you  are  is  your  face,  voice  and  
fingerprint  (and  many  more,  even  the  way  you  
type)
o The  more  factors  the  better
Depending on the use case the level of security
needs to be higher
o Logging  in  to  a  news  website:  userId  and  
password
o Logging  in  to  an  eCommerce  website  like  
Amazon:  userId  and  password  and  the  option  to  
increase  the  level  of  security
o Logging  into  your  internet  banking  or  
government  services:  userId  and  password  and  
a  challenge  /  response
10
FIDO  Universal  2nd Factor
Simple,  secure,  open  and  scalable  2FA
11
Benefits  of  U2F  Over  Other  2FA
One  device,  many  sites,  
with  no  shared  secrets
Open  standard,  platform/  
browser  support
(no  client,  no  driver)
Protection  against
phishing  and  MitM  
12
Stats  from  Google  Deployment    
U2F  vs  Google  Authenticator  
● 4x  faster  to  login
● Support  reduced  by  40%  
● Significant  fraud  reduction
13
Online  services
Chip  providers
Device  providers
Biometrics  technology  
Enterprise  servers
Open  source  sw/servers
Mobile  apps  &  clients
Browsers
FIDO  U2F  Ecosystem
250+ Members
1414
Server	
  sends	
  challenge1
Server	
  receives	
  and	
  verifies	
  device	
  signature	
  
using	
  attestation	
  cert5
Key	
  handle	
  and	
  public	
  key	
  are	
  stored	
  in	
  database6
Device	
  generates	
  key	
  pair2
Device	
  creates	
  key	
  handle3
Device	
  signs	
  challenge	
  +	
  client	
  info4
Server	
  sends	
  challenge	
  +	
  key	
  handle	
  1
Server	
  receives	
  and	
  verifies	
  using	
  stored	
  public	
  key	
  4
Device	
  unwraps/derives	
  private	
  key	
  
from	
  key	
  handle	
  2
Device	
  signs	
  challenge	
  +	
  client	
  info	
  3
Authentication
Individual  with  U2F  Device
Relying	
  Party
Registration
15
Relying  Party
User  Side
U2F  Code
USB  (HID)  API
U2F  JS  APISecure  U2F  
Element  (optional)
Transport
USB  (HID)
Web  Application
U2F  Library
Public  Keys  +  
Key  Handles  +  
Certificates
User  Action
FIDO  Client  
Browser
U2F  Authenticator
U2F  Entities
NFC  API
Bluetooth  API
NFC
Bluetooth
16
Protocol  Design
Step-­By-­Step
17
U2F  
Device Client
Relying  
Party
challenge
challenge
Sign  
with  
kpriv signature(challenge)
s
Check
signature  (s)
using  kpub
s
Lookup
kpub
Authentication
18
U2F  
Device Client
Relying  
Party
challenge
challenge,  origin,  channel  id
Sign  
with  kpriv
signature(c)
c,  s
Check  s
using  kpub
Verify  origin  &  
channel  id
s
Lookup
kpub
Phishing/MitM  Protection
19
U2F  
Device Client
Relying  
Party
handle,  app  id,  challenge
h,  a;;  challenge,  origin,  channel  id,  etc.
c
a
Check
app  id
Lookup
the  kpriv
associated  
with  h
Sign  
with  kpriv
signature(a,c)
c,  s
Check  s
using  kpub
Verify  origin  &  
channel  id
s
h
Lookup  
the  kpub
associate
d  with  h
Application-­Specific  Keys
20
U2F  
Device Client
Relying  
Party
app  id,  challenge
a;;  challenge,  origin,  channel  id,  etc.
c
a
Check
app  id
Generate:
kpub
kpriv
handle  h kpub,  h,  attestation  cert,  signature(a,c,kpub,h)
c,  kpub,  h, attestation  cert,  s
Associate  
kpub with  
handle  h
for  user
s
Registration  +  Device  Attestation
21
Original DB
Original  Database
user_id Password#
JohnDoe
4^hfd;;`gpo
U2F  Database
U2F DB
Relation
Relying Party
user_id Meta U2F  Data
JohnDoe
Yubico,  Security  
Key,  USB
Key  handle,  public  
key,  certificate
JohnDoe
Yubico,  YubiKey  
NEO,  USB  +  NFC
Key  handle,  public  
key,  certificate
Adding  U2F  Support
Yubico  -­ inventors  of  the  YubiKey
Find  out  more  at  yubi.co
Introduction	
  WSO2	
  Identity	
  Server
What is WSO2 Identity Server
An  open  source  Identity  &  Entitlement  management  
server
o 100%  free  and  open  source  with  commercial  
support  
o Lightweight  and  high  performance
o Highly  modular  and  extensible
o User  friendly  with  minimal  learning  curve
o Based  on  open  standards
Authentication framework
o No  more  federation  silos  or  spaghetti  identity  
anti-­patterns
o Multi-­option  and  multi-­step  authentication
o Authentication  Bridge        
o Provisioning  Bridge
Authentication framework
Local and federated authentication
FIDO U2F implementation in Identity server
o Implements  the  U2F  authentication  via  local  
authenticator
FIDO U2F implementation in Identity server
oImplements  the  U2F  registration  via  user  
dashboard
ADDING	
  FIDO	
  TO	
  A	
  LOGIN	
  SEQUENCE
Demo scenario
o Prerequisites  for  the  demo  
o Start  WSO2  Identity  Server  5.1.0
o Log  in  on  User  Dashboard
o Add  U2F  device  (Yubico)
Secure Single Sign-On solution
Demo …….
FIDO	
  AND	
  WSO2	
  IDENTITY	
  SERVER:	
  
WHAT	
  ARE	
  THE	
  BENEFITS?
Making it more secure
Fido  is  an  open  standard
One  key  can  be  used  for  multiple  applications
+
WSO2  is  an  open  platform
Integration  is  easy
=
Level  of  security  increases
Cost  is  relatively  low
Questions	
  &	
  Answers
http://www.slideshare.net/YenloBV
Download	
  the	
  webinar	
  presentation	
  on	
  slideshare:
30
Contact  us  !

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

FIDO Alliance Today: Status and News
FIDO Alliance Today: Status and NewsFIDO Alliance Today: Status and News
FIDO Alliance Today: Status and News
 
Becoming Unphishable
Becoming UnphishableBecoming Unphishable
Becoming Unphishable
 
Business Considerations for Deploying FIDO Authentication
Business Considerations for Deploying FIDO AuthenticationBusiness Considerations for Deploying FIDO Authentication
Business Considerations for Deploying FIDO Authentication
 
FIDO U2F Specifications: Overview & Tutorial
FIDO U2F Specifications: Overview & TutorialFIDO U2F Specifications: Overview & Tutorial
FIDO U2F Specifications: Overview & Tutorial
 
NIST 800-63 Guidance & FIDO Authentication
NIST 800-63 Guidance & FIDO AuthenticationNIST 800-63 Guidance & FIDO Authentication
NIST 800-63 Guidance & FIDO Authentication
 
Go passwordless with fido2
Go passwordless with fido2Go passwordless with fido2
Go passwordless with fido2
 
Authentication and ID Proofing in Education
Authentication and ID Proofing in EducationAuthentication and ID Proofing in Education
Authentication and ID Proofing in Education
 
Identity Tech Talks #3 FIDO futur of authentication
Identity Tech Talks #3 FIDO futur of authenticationIdentity Tech Talks #3 FIDO futur of authentication
Identity Tech Talks #3 FIDO futur of authentication
 
FIDO Authentication: Unphishable MFA for All
FIDO Authentication: Unphishable MFA for AllFIDO Authentication: Unphishable MFA for All
FIDO Authentication: Unphishable MFA for All
 
FIDO Certification
FIDO CertificationFIDO Certification
FIDO Certification
 
Javelin Research 2017 State of Authentication Report
Javelin Research 2017 State of Authentication ReportJavelin Research 2017 State of Authentication Report
Javelin Research 2017 State of Authentication Report
 
Market Study on Mobile Authentication
Market Study on Mobile AuthenticationMarket Study on Mobile Authentication
Market Study on Mobile Authentication
 
Webinar: Securing IoT with FIDO Authentication
Webinar: Securing IoT with FIDO AuthenticationWebinar: Securing IoT with FIDO Authentication
Webinar: Securing IoT with FIDO Authentication
 
Mii Oracle Biz Map 2009
Mii Oracle Biz Map 2009Mii Oracle Biz Map 2009
Mii Oracle Biz Map 2009
 
Global Regulatory Landscape for Strong Authentication
Global Regulatory Landscape for Strong AuthenticationGlobal Regulatory Landscape for Strong Authentication
Global Regulatory Landscape for Strong Authentication
 
New FIDO Specifications Overview -FIDO Alliance -Tokyo Seminar -Nadalin
New FIDO Specifications Overview -FIDO Alliance -Tokyo Seminar -NadalinNew FIDO Specifications Overview -FIDO Alliance -Tokyo Seminar -Nadalin
New FIDO Specifications Overview -FIDO Alliance -Tokyo Seminar -Nadalin
 
WebAuthn & FIDO2
WebAuthn & FIDO2WebAuthn & FIDO2
WebAuthn & FIDO2
 
Google Case Sudy: Becoming Unphishable: Towards Simpler, Stronger Authenticaton
Google Case Sudy: Becoming Unphishable: Towards Simpler, Stronger AuthenticatonGoogle Case Sudy: Becoming Unphishable: Towards Simpler, Stronger Authenticaton
Google Case Sudy: Becoming Unphishable: Towards Simpler, Stronger Authenticaton
 
Introduction to the FIDO Alliance: Vision & Status
Introduction to the FIDO Alliance: Vision & StatusIntroduction to the FIDO Alliance: Vision & Status
Introduction to the FIDO Alliance: Vision & Status
 
FIDO Authentication & Blockchain
FIDO Authentication & BlockchainFIDO Authentication & Blockchain
FIDO Authentication & Blockchain
 

Similar a WSO2 Guest Webinar: FIDO Universal Second Factor (U2F) for WSO2 Identity Server

Similar a WSO2 Guest Webinar: FIDO Universal Second Factor (U2F) for WSO2 Identity Server (20)

WSO2 Guest Webinar: FIDO Universal Second Factor (U2F) for WSO2 Identity Server
WSO2 Guest Webinar: FIDO Universal Second Factor (U2F) for WSO2 Identity ServerWSO2 Guest Webinar: FIDO Universal Second Factor (U2F) for WSO2 Identity Server
WSO2 Guest Webinar: FIDO Universal Second Factor (U2F) for WSO2 Identity Server
 
FIDO Alliance: Year in Review Webinar slides from January 20 2016
FIDO Alliance: Year in Review Webinar slides from January 20 2016FIDO Alliance: Year in Review Webinar slides from January 20 2016
FIDO Alliance: Year in Review Webinar slides from January 20 2016
 
CIS14: FIDO 101 (What, Why and Wherefore of FIDO)
CIS14: FIDO 101 (What, Why and Wherefore of FIDO)CIS14: FIDO 101 (What, Why and Wherefore of FIDO)
CIS14: FIDO 101 (What, Why and Wherefore of FIDO)
 
Easy public-private-keys-strong-authentication-using-u2 f
Easy public-private-keys-strong-authentication-using-u2 fEasy public-private-keys-strong-authentication-using-u2 f
Easy public-private-keys-strong-authentication-using-u2 f
 
Fido Overview: Status and Future
Fido Overview: Status and FutureFido Overview: Status and Future
Fido Overview: Status and Future
 
FIDO & PSD2 – Achieving Strong Customer Authentication Compliance
FIDO & PSD2 – Achieving Strong Customer Authentication ComplianceFIDO & PSD2 – Achieving Strong Customer Authentication Compliance
FIDO & PSD2 – Achieving Strong Customer Authentication Compliance
 
CIS14: An Overview of FIDO's Universal Factor (UAF) Specifications
CIS14: An Overview of FIDO's Universal Factor (UAF) SpecificationsCIS14: An Overview of FIDO's Universal Factor (UAF) Specifications
CIS14: An Overview of FIDO's Universal Factor (UAF) Specifications
 
Introduction to FIDO Alliance
Introduction to FIDO AllianceIntroduction to FIDO Alliance
Introduction to FIDO Alliance
 
Security Keys Presentation.pptx
Security Keys Presentation.pptxSecurity Keys Presentation.pptx
Security Keys Presentation.pptx
 
Getting to Know the FIDO Specifications - Technical Tutorial
Getting to Know the FIDO Specifications - Technical TutorialGetting to Know the FIDO Specifications - Technical Tutorial
Getting to Know the FIDO Specifications - Technical Tutorial
 
Overview of FIDO Security Requirements and Certifications
Overview of FIDO Security Requirements and CertificationsOverview of FIDO Security Requirements and Certifications
Overview of FIDO Security Requirements and Certifications
 
OSS has taken over the enterprise: The top five OSS trends of 2015
OSS has taken over the enterprise: The top five OSS trends of 2015OSS has taken over the enterprise: The top five OSS trends of 2015
OSS has taken over the enterprise: The top five OSS trends of 2015
 
Webinar: Case Study: FIDO, Federation, ID Proofing
Webinar: Case Study: FIDO, Federation, ID ProofingWebinar: Case Study: FIDO, Federation, ID Proofing
Webinar: Case Study: FIDO, Federation, ID Proofing
 
U2F Case Study: Examining the U2F Paradox
U2F Case Study: Examining the U2F ParadoxU2F Case Study: Examining the U2F Paradox
U2F Case Study: Examining the U2F Paradox
 
Fido U2F PROTOCOL
Fido U2F PROTOCOLFido U2F PROTOCOL
Fido U2F PROTOCOL
 
U2F in Dashlane
U2F in DashlaneU2F in Dashlane
U2F in Dashlane
 
Kerberos-PKI-Federated identity
Kerberos-PKI-Federated identityKerberos-PKI-Federated identity
Kerberos-PKI-Federated identity
 
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver Presentation
 
Lyra Infosystems Services and Consulting Portfolio 2020
Lyra Infosystems Services and Consulting Portfolio 2020Lyra Infosystems Services and Consulting Portfolio 2020
Lyra Infosystems Services and Consulting Portfolio 2020
 
Introduction to FIDO Alliance
Introduction to FIDO AllianceIntroduction to FIDO Alliance
Introduction to FIDO Alliance
 

Más de Yenlo

WSO2 - Yenlo Integration Summit Stuttgart 15 May 2019 - Soft Integration - Ha...
WSO2 - Yenlo Integration Summit Stuttgart 15 May 2019 - Soft Integration - Ha...WSO2 - Yenlo Integration Summit Stuttgart 15 May 2019 - Soft Integration - Ha...
WSO2 - Yenlo Integration Summit Stuttgart 15 May 2019 - Soft Integration - Ha...
Yenlo
 

Más de Yenlo (20)

API Adoption API Conference Berlin - Hans Bot
API Adoption API Conference Berlin - Hans BotAPI Adoption API Conference Berlin - Hans Bot
API Adoption API Conference Berlin - Hans Bot
 
The Composable Enterprise | Yenlo - WSO2 Integration Summit 2019, San Francisco
The Composable Enterprise | Yenlo - WSO2 Integration Summit 2019, San FranciscoThe Composable Enterprise | Yenlo - WSO2 Integration Summit 2019, San Francisco
The Composable Enterprise | Yenlo - WSO2 Integration Summit 2019, San Francisco
 
Powering an API-driven world | Yenlo - WSO2 Integration Summit 2019, San Fran...
Powering an API-driven world | Yenlo - WSO2 Integration Summit 2019, San Fran...Powering an API-driven world | Yenlo - WSO2 Integration Summit 2019, San Fran...
Powering an API-driven world | Yenlo - WSO2 Integration Summit 2019, San Fran...
 
Internet payment protocols and the API economy | Yenlo - WSO2 Integration Sum...
Internet payment protocols and the API economy | Yenlo - WSO2 Integration Sum...Internet payment protocols and the API economy | Yenlo - WSO2 Integration Sum...
Internet payment protocols and the API economy | Yenlo - WSO2 Integration Sum...
 
Emerging architecture patterns: API-centric cell-based | Yenlo - WSO2 Integra...
Emerging architecture patterns: API-centric cell-based | Yenlo - WSO2 Integra...Emerging architecture patterns: API-centric cell-based | Yenlo - WSO2 Integra...
Emerging architecture patterns: API-centric cell-based | Yenlo - WSO2 Integra...
 
Ballerina cloud native middleware as a programming language | Yenlo - WSO2 In...
Ballerina cloud native middleware as a programming language | Yenlo - WSO2 In...Ballerina cloud native middleware as a programming language | Yenlo - WSO2 In...
Ballerina cloud native middleware as a programming language | Yenlo - WSO2 In...
 
WSO2 - Yenlo Integration Summit Stuttgart May 15 2019 - Open Banking APIs and...
WSO2 - Yenlo Integration Summit Stuttgart May 15 2019 - Open Banking APIs and...WSO2 - Yenlo Integration Summit Stuttgart May 15 2019 - Open Banking APIs and...
WSO2 - Yenlo Integration Summit Stuttgart May 15 2019 - Open Banking APIs and...
 
WSO2 - Yenlo Integration Summit Stuttgart 15 May 2019 - Soft Integration - Ha...
WSO2 - Yenlo Integration Summit Stuttgart 15 May 2019 - Soft Integration - Ha...WSO2 - Yenlo Integration Summit Stuttgart 15 May 2019 - Soft Integration - Ha...
WSO2 - Yenlo Integration Summit Stuttgart 15 May 2019 - Soft Integration - Ha...
 
WSO2 - Yenlo Integration Summit Stuttgart 15 May 2019 - IAM in an API Driven ...
WSO2 - Yenlo Integration Summit Stuttgart 15 May 2019 - IAM in an API Driven ...WSO2 - Yenlo Integration Summit Stuttgart 15 May 2019 - IAM in an API Driven ...
WSO2 - Yenlo Integration Summit Stuttgart 15 May 2019 - IAM in an API Driven ...
 
WSO2 - Yenlo Integration Summit Stuttgart 15 May 2019 - Role of Integration i...
WSO2 - Yenlo Integration Summit Stuttgart 15 May 2019 - Role of Integration i...WSO2 - Yenlo Integration Summit Stuttgart 15 May 2019 - Role of Integration i...
WSO2 - Yenlo Integration Summit Stuttgart 15 May 2019 - Role of Integration i...
 
WSO2 - Yenlo Integration Summit Stuttgart 15 May 2019 - API and Cell-based Ar...
WSO2 - Yenlo Integration Summit Stuttgart 15 May 2019 - API and Cell-based Ar...WSO2 - Yenlo Integration Summit Stuttgart 15 May 2019 - API and Cell-based Ar...
WSO2 - Yenlo Integration Summit Stuttgart 15 May 2019 - API and Cell-based Ar...
 
WSO2 - Yenlo Integration Summit Stuttgart 15 May 2019 - Enabling Enterprise I...
WSO2 - Yenlo Integration Summit Stuttgart 15 May 2019 - Enabling Enterprise I...WSO2 - Yenlo Integration Summit Stuttgart 15 May 2019 - Enabling Enterprise I...
WSO2 - Yenlo Integration Summit Stuttgart 15 May 2019 - Enabling Enterprise I...
 
WSO2 - Yenlo Integration Summit Stuttgart 15 May 2019 - Decentralizing APIs f...
WSO2 - Yenlo Integration Summit Stuttgart 15 May 2019 - Decentralizing APIs f...WSO2 - Yenlo Integration Summit Stuttgart 15 May 2019 - Decentralizing APIs f...
WSO2 - Yenlo Integration Summit Stuttgart 15 May 2019 - Decentralizing APIs f...
 
WSO2 - Yenlo Integration Summit Stuttgart 15 May 2019 - Introduction - Ruben ...
WSO2 - Yenlo Integration Summit Stuttgart 15 May 2019 - Introduction - Ruben ...WSO2 - Yenlo Integration Summit Stuttgart 15 May 2019 - Introduction - Ruben ...
WSO2 - Yenlo Integration Summit Stuttgart 15 May 2019 - Introduction - Ruben ...
 
WSO2-Yenlo Integration Summit Stuttgart 15 may 2019
WSO2-Yenlo Integration Summit Stuttgart 15 may 2019WSO2-Yenlo Integration Summit Stuttgart 15 may 2019
WSO2-Yenlo Integration Summit Stuttgart 15 may 2019
 
Lets dance- Dutch Architecture Conference (LAC) 2018
Lets dance- Dutch Architecture Conference (LAC) 2018Lets dance- Dutch Architecture Conference (LAC) 2018
Lets dance- Dutch Architecture Conference (LAC) 2018
 
Overview of online services
Overview of online servicesOverview of online services
Overview of online services
 
Stripe startup survey results
Stripe startup survey resultsStripe startup survey results
Stripe startup survey results
 
Webinar - Managed File Transfer: backbone of your operations
Webinar - Managed File Transfer: backbone of your operationsWebinar - Managed File Transfer: backbone of your operations
Webinar - Managed File Transfer: backbone of your operations
 
Building the world’s biggest iBeacon living lab with WSO2
Building the world’s biggest iBeacon living lab with WSO2Building the world’s biggest iBeacon living lab with WSO2
Building the world’s biggest iBeacon living lab with WSO2
 

Último

%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
masabamasaba
 
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Medical / Health Care (+971588192166) Mifepristone and Misoprostol tablets 200mg
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
masabamasaba
 
The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is inside
shinachiaurasa2
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
VictorSzoltysek
 

Último (20)

%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
 
Announcing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareAnnouncing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK Software
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learn
 
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
 
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
 
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
 
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdfPayment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation Template
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
 
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
 
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park %in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
 
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
 
The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is inside
 
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionIntroducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
 
8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
 

WSO2 Guest Webinar: FIDO Universal Second Factor (U2F) for WSO2 Identity Server

  • 1. FIDO  Universal  Second  Factor   (U2F)  for  WSO2  Identity  Server Ishara  Karunarathna,  Senior  Software  Engineer,  WSO2 Jerrod  Chong,  Solutions  Team  leader,  Yubico Rob  Blaauboer,  Integration    Consultant  Yenlo December    8th 2015
  • 2. About  the  presenters   2 Ishara  Karunarathna Senior  Software  Engineer,  WSO2 Ishara  is  a  Senior  Software  Engineer  at  WSO2  and  a  key  member  of  WSO2  Identity  server  team,   contributing  towards  the  Identity  Server  and  WSO2's  platform  security.  He  has  participated   in  several   customer  engagements   helping  them  to  realize  enterprise  use  cases  and  to  build  solutions  On  top  of   WSO2  platform. Jerrod  Chong Solutions  Team  leader,  Yubico Jerrod  leads  the  Solutions  team  at  Yubico  with  over  fifteen  years  of  experience   specializing  in  enterprise   security  solutions.  He  works  with  small,  medium  and  enterprise    customers  to  consult  and  build  open   scalable   security  solutions.  Jerrod  is  also  an  active  contributor  in  the  FIDO  Alliance  U2F  technical   working   group  and  security  certification   development  committee.   Rob  Blaauboer Senior  Consultant,  Yenlo Rob  is  a  Senior  Business  Consultant  and  Solution  Architect  with  more  than  twenty   years  experience.  In   addition  to  his  work  he  is  an  active  blogger  working  on  a  number  of  articles   on  the  'Internet  of  Things'   and  a  WSO2  'Getting   Started  with  ...'  series  in  which  he  talks  about  WSO2  components  and  their   purpose  especially  aimed  at  non  technical  readers.
  • 3. 3 • Global  enterprise,  founded  in  2007   with  an  international  focus  on   delivering  integration  solutions  based   on  Java  open  source   • #1  in  the  field  of  Integration  Solutions • #1  in  Managed  Services  for  middleware   environments • #1  Global  Strategic  Alliance  partner  of   WSO2 • WSO2  Product  Support • WSO2  Development • WSO2  QuickStarts • WSO2  Training  &  Certifications • WSO2  24/7  Managed  Services • WSO2  Events About Yenlo
  • 4. What  Yenlo  delivers 4 Enterprise  Architecture Software  Development Managed  Services WSO2  Product  Support WSO2  Development   Support WSO2  QuickStart WSO2  Training  &  Certifications WSO2  Managed  Services WSO2  Events
  • 5. Agenda 5 Making  WSO2  Identity  Server  more  secure  with  FIDO  UAF  &  U2F • Our security is at risk • introduction to FIDO and Why FIDO U2F •Introduction WSO2 IS • Demo • Benefits of the solution • Q&A
  • 6. Our security is at risk
  • 7. Making it more secure Starts  at  the  basis! Access  to  a  mail  service  enables  a  hacker  to   access  many  more  systems   Gmail  supports  Fido  and  other  2nd factors Sensitive  information  should  be  secured
  • 8. What is a factor? o Something  you  know  is  for  instance  as  password   or  even  a  username o Something  you  have  is  a  smartcard,  token  or   smartphone o Something  you  are  is  your  face,  voice  and   fingerprint  (and  many  more,  even  the  way  you   type) o The  more  factors  the  better
  • 9. Depending on the use case the level of security needs to be higher o Logging  in  to  a  news  website:  userId  and   password o Logging  in  to  an  eCommerce  website  like   Amazon:  userId  and  password  and  the  option  to   increase  the  level  of  security o Logging  into  your  internet  banking  or   government  services:  userId  and  password  and   a  challenge  /  response
  • 10. 10 FIDO  Universal  2nd Factor Simple,  secure,  open  and  scalable  2FA
  • 11. 11 Benefits  of  U2F  Over  Other  2FA One  device,  many  sites,   with  no  shared  secrets Open  standard,  platform/   browser  support (no  client,  no  driver) Protection  against phishing  and  MitM  
  • 12. 12 Stats  from  Google  Deployment     U2F  vs  Google  Authenticator   ● 4x  faster  to  login ● Support  reduced  by  40%   ● Significant  fraud  reduction
  • 13. 13 Online  services Chip  providers Device  providers Biometrics  technology   Enterprise  servers Open  source  sw/servers Mobile  apps  &  clients Browsers FIDO  U2F  Ecosystem 250+ Members
  • 14. 1414 Server  sends  challenge1 Server  receives  and  verifies  device  signature   using  attestation  cert5 Key  handle  and  public  key  are  stored  in  database6 Device  generates  key  pair2 Device  creates  key  handle3 Device  signs  challenge  +  client  info4 Server  sends  challenge  +  key  handle  1 Server  receives  and  verifies  using  stored  public  key  4 Device  unwraps/derives  private  key   from  key  handle  2 Device  signs  challenge  +  client  info  3 Authentication Individual  with  U2F  Device Relying  Party Registration
  • 15. 15 Relying  Party User  Side U2F  Code USB  (HID)  API U2F  JS  APISecure  U2F   Element  (optional) Transport USB  (HID) Web  Application U2F  Library Public  Keys  +   Key  Handles  +   Certificates User  Action FIDO  Client   Browser U2F  Authenticator U2F  Entities NFC  API Bluetooth  API NFC Bluetooth
  • 17. 17 U2F   Device Client Relying   Party challenge challenge Sign   with   kpriv signature(challenge) s Check signature  (s) using  kpub s Lookup kpub Authentication
  • 18. 18 U2F   Device Client Relying   Party challenge challenge,  origin,  channel  id Sign   with  kpriv signature(c) c,  s Check  s using  kpub Verify  origin  &   channel  id s Lookup kpub Phishing/MitM  Protection
  • 19. 19 U2F   Device Client Relying   Party handle,  app  id,  challenge h,  a;;  challenge,  origin,  channel  id,  etc. c a Check app  id Lookup the  kpriv associated   with  h Sign   with  kpriv signature(a,c) c,  s Check  s using  kpub Verify  origin  &   channel  id s h Lookup   the  kpub associate d  with  h Application-­Specific  Keys
  • 20. 20 U2F   Device Client Relying   Party app  id,  challenge a;;  challenge,  origin,  channel  id,  etc. c a Check app  id Generate: kpub kpriv handle  h kpub,  h,  attestation  cert,  signature(a,c,kpub,h) c,  kpub,  h, attestation  cert,  s Associate   kpub with   handle  h for  user s Registration  +  Device  Attestation
  • 21. 21 Original DB Original  Database user_id Password# JohnDoe 4^hfd;;`gpo U2F  Database U2F DB Relation Relying Party user_id Meta U2F  Data JohnDoe Yubico,  Security   Key,  USB Key  handle,  public   key,  certificate JohnDoe Yubico,  YubiKey   NEO,  USB  +  NFC Key  handle,  public   key,  certificate Adding  U2F  Support
  • 22. Yubico  -­ inventors  of  the  YubiKey Find  out  more  at  yubi.co
  • 24. What is WSO2 Identity Server An  open  source  Identity  &  Entitlement  management   server o 100%  free  and  open  source  with  commercial   support   o Lightweight  and  high  performance o Highly  modular  and  extensible o User  friendly  with  minimal  learning  curve o Based  on  open  standards
  • 25. Authentication framework o No  more  federation  silos  or  spaghetti  identity   anti-­patterns o Multi-­option  and  multi-­step  authentication o Authentication  Bridge         o Provisioning  Bridge
  • 27. Local and federated authentication
  • 28. FIDO U2F implementation in Identity server o Implements  the  U2F  authentication  via  local   authenticator
  • 29. FIDO U2F implementation in Identity server oImplements  the  U2F  registration  via  user   dashboard
  • 30. ADDING  FIDO  TO  A  LOGIN  SEQUENCE
  • 31. Demo scenario o Prerequisites  for  the  demo   o Start  WSO2  Identity  Server  5.1.0 o Log  in  on  User  Dashboard o Add  U2F  device  (Yubico)
  • 34. FIDO  AND  WSO2  IDENTITY  SERVER:   WHAT  ARE  THE  BENEFITS?
  • 35. Making it more secure Fido  is  an  open  standard One  key  can  be  used  for  multiple  applications + WSO2  is  an  open  platform Integration  is  easy = Level  of  security  increases Cost  is  relatively  low
  • 37. http://www.slideshare.net/YenloBV Download  the  webinar  presentation  on  slideshare: 30