FIDO-Based Authentication
  • 22 Oct 2024
  • 2 Minutes to read
  • Dark
    Light

FIDO-Based Authentication

  • Dark
    Light

Article summary

OneSpan Cloud Authentication allows you to integrate FIDO-based authentication in your solution. It supports the following FIDO protocols:

  • FIDO UAF (Universal Authentication Framework)

  • FIDO2

FIDO UAF

OneSpan Cloud Authentication (OCA) provides the functionality of a FIDO UAF Server as a service. It is exposed via a set of APIs that enables the relying parties to provide secure passwordless registration, authentication, and transaction signing capabilities.

FIDO UAF infrastructure — overview

OneSpan Cloud Authentication handles the following processes for the server-side implementation of the FIDO UAF protocol:

  • Communication of the FIDO UAF protocol messages to a FIDO user device (usually a mobile app).

  • Validation of the FIDO UAF authenticator attestations to ensure only trusted authenticators are registered for use (see FIDO Metadata Service).

  • Validation of the FIDO UAF authenticator attestations to ensure the characteristics of the authenticators are within the boundaries of the defined FIDO UAF policy. (see FIDO UAF policy).

  • Outline the scope of the generated credentials via the AppID URL (see AppID).

  • Link the registered FIDO UAF authenticator to a TID user account.

  • Evaluation of the user authentication and transaction confirmation responses to determine their validity.

AppID

During the FIDO UAF registration, a private/public key pair is generated on the authenticator side. The public key is passed from the client and stored on the FIDO UAF Server. As part of this process, each key is associated with an AppID. On the client side, a FIDO Client dereferences the AppID URL and process it by extracting the list of trusted facets, such as the mobile apps that are allowed to use the newly generated keys.

FIDO UAF policy

The UAF policies define the characteristics of authenticators used for UAF operations (registration and authentication). These policies are defined per relying party, and contain the following two fields:

  • accepted, type sequencesequence<MatchCriteria>

    The accepted field is a list of sets of match criteria.

    A valid policy must have at least one set of authenticators on the list of accepted match criteria.

  • disallowed, type sequenceMatchCriteria

    The disallowed field describes authenticators which are excluded from the operation, even if it overlaps with any authenticator on the accepted list (i.e. mandatory fields for both elements are equal).

FIDO2

OneSpan Cloud Authentication provides the functionality of a FIDO2 Server as a service. It is exposed via a set of APIs that allow the relying parties to provide secure passwordless registration and authentication capabilites. This is accomplished either through the use of authenticators that implement the Client-to-Authenticator Protocol (CTAP) and platforms, or browsers that implement the W3C WebAuthn specification.

FIDO2 infrastructure — overview

OneSpan Cloud Authentication (OCA) handles the following processes for the server-side implementation of the W3c WebAuthn Specification:

  • Validation of the FIDO2 authenticator attestations to ensure only trusted authenticators are registered for use (see FIDO Metadata Service).

  • Outline the scope of the generated credentials.

  • Link the registered FIDO2 authenticator to a user account.

  • Evaluation of the user authentication responses (assertions) to determine their validity.

FIDO Metadata Service

OneSpan Cloud Authentication validates the FIDO authenticator attestation against the FIDO Metadata Service, which provides a trusted source of information about the FIDO authenticator. OneSpan Cloud Authentication manages the metadata that it receives from the FIDO Alliance Metadata Service in its own metadata service. This is kept up-to-date to ensure it has the latest information about the new authenticators.

For more information about FIDO Alliance Metadata Service, refer to the FIDO Alliance documentation.

Next steps

For more information about how to configure the FIDO feature in OneSpan Cloud Authentication, refer to the following articles:

For information about the integration of FIDO-based authentication, see Integration of user login with FIDO-based authentication.


Was this article helpful?

Changing your password will log you out immediately. Use the new password to log back in.
First name must have atleast 2 characters. Numbers and special characters are not allowed.
Last name must have atleast 1 characters. Numbers and special characters are not allowed.
Enter a valid email
Enter a valid password
Your profile has been successfully updated.
ESC

Ozzy, our interactive help assistant