/
Authentication Session Authentication Session

Authentication Session - PowerPoint Presentation

karlyn-bohler
karlyn-bohler . @karlyn-bohler
Follow
397 views
Uploaded On 2015-12-08

Authentication Session - PPT Presentation

Hannes Tschofenig Introduction Problem with passwords has been known for a long time Many attempts have been made to invent and standardize solutions for multifactor authentication strong passwordbased solutions ID: 218117

authenticator fido relying solutions fido authenticator solutions relying authentication party key api technology public user stakeholders browser usb web

Share:

Link:

Embed:

Download Presentation from below link

Download Presentation The PPT/PDF document "Authentication Session" is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.


Presentation Transcript

Slide1

Authentication SessionHannes TschofenigSlide2

Introduction

Problem with passwords has been known for a long time.

Many attempts have been made to invent and standardize solutions for multi-factor authentication, strong password-based solutions.

There is no shortage of solutions.

These efforts have been successful only to a certain extend.

Getting widespread deployment for any single mechanism has failed.

IMHO these failures are not been due to technology but due to misaligned incentives and competing business models.

Picked

FIDO as an example technology.Slide3

FIDO Overview

Assumption:

The Authenticator and the Relying Party have no keying material established.

Relying party and browser have no

out-of-band relationship

(which is typical on the Web).

Client

Browser/App

Relying Party

example.com

FIDO over

HTTP/JavaScript

Authenticator

FIDO over

USB/BLE

Procedure:

User goes to relying party website, such as example.com.

TLS server-side authentication: certificate has to match user-entered URI

Authenticator dynamically generates public / private key

pair

(

PK

example.com

& SK

example.com

)

Authenticator registers public key PK

example.com

with example.com

Authenticator

uses

PK

example.com

(and

SK

example.com

)

with example.comSlide4

FIDO Extension for Web Crypto API

Main goal of many JavaScript APIs is to find building blocks rather than standardizing point solutions.

Building blocks then used to craft solutions.

What is needed for FIDO?

Discovery of available hardware authenticators and their capabilities.

Privacy support so thatthe same PK/SK pair is not used across relying parties, and

the user provides consent. Relaying of the FIDO-specific public key crypto protocol to a selected Authenticator.Can we identify “abstract” functions that can then be used to build FIDO and all other authentication protocols? Slide5

Many Stakeholders Need to Cooperate

Authenticator

Identity

Providers

SAML

OpenID

Connect

USB,

wireless (BLE, etc.),

local APISlide6

My Questions to this Group

Is it possible to reflect on the mistakes made in the past to avoid repeating them?

How can be work with the wide range of stakeholders to reach a widespread deployment?

Or:

Can we design around some barriers?

Is there an abstract API that allows innovation by many different players?Read “innovation” as “I want to do whatever I want”. How do we collect experience with the end-to-end solutions?

How much to worry about limitations of deployed technology?(Almost) everyone wants to have privacy but what are the properties would we like to offer? (see RFC 6973)