Scalable Authentication



Similar documents
How Secure is Authentication?

How Secure is Authentication?

FIDO Modern Authentication Rolf Lindemann, Nok Nok Labs

NOK NOK LABS AUTHENTICATION & OTT SERVICES

Device-Centric Authentication and WebCrypto

UAF Architectural Overview

Mobile Connect & FIDO

Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands. Ian Wills Country Manager, Entrust Datacard

Applying Cryptography as a Service to Mobile Applications

TECHNICAL WHITE PAPER NOK NOK LABS MULTIFACTOR AUTHENTICATION. Any device. Any application. Any authenticator.

Enhancing Web Application Security

Standards for Identity & Authentication. Catherine J. Tilton 17 September 2014

FIDO Trust Requirements

Entrust IdentityGuard

Glossary of Key Terms

Case Study: SSO for All: SSOCircle Makes Single Sign-On Available to Everyone

CRYPTOGRAPHY AS A SERVICE

Information Security Basic Concepts

OpenID & Strong Authentication

esign Online Digital Signature Service

Improving Online Security with Strong, Personalized User Authentication

FIDO: Fast Identity Online Alliance Privacy Principles Whitepaper vfeb2014

Implementing Identity Provider on Mobile Phone

TrustedX: eidas Platform

Can We Reconstruct How Identity is Managed on the Internet?

Implementing two-factor authentication: Google s experiences. Cem Paya (cemp@google.com) Information Security Team Google Inc.

FIDO Security Reference

The Password Problem Will Only Get Worse

managing SSO with shared credentials

Secure Your Enterprise with Usher Mobile Identity

MOBILE VOICE BIOMETRICS MEETING THE NEEDS FOR CONVENIENT USER AUTHENTICATION. A Goode Intelligence white paper sponsored by AGNITiO

Authentication Scenarios India. Ramachandran

Safewhere*Identify 3.4. Release Notes

Apache Milagro (incubating) An Introduction ApacheCon North America

Authentication Solutions. Versatile And Innovative Authentication Solutions To Secure And Enable Your Business

Leveraging SAML for Federated Single Sign-on:

MOBILITY. Transforming the mobile device from a security liability into a business asset. pingidentity.com

Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates. September 2006

Google Identity Services for work

Copyright Pivotal Software Inc, of 10

Out-Of-Band Authentication Using a Real-time, Multi-factor Service Model

Copyright FIDO Alliance All Rights Reserved.

HOL9449 Access Management: Secure web, mobile and cloud access

Customer Identity and Access Management (CIAM) Buyer s Guide

Enhanced Privacy ID (EPID) Ernie Brickell and Jiangtao Li Intel Corporation

SAP Single Sign-On 2.0 Overview Presentation

Chapter 1: Introduction

One-Time Password Contingency Access Process

SAML for EPCS (Electronic Prescription of Controlled Substances)

Copyright: WhosOnLocation Limited

Authentication Solutions VERSATILE AND INNOVATIVE AUTHENTICATION SOLUTIONS TO SECURE AND ENABLE YOUR BUSINESS

The PortalGuard All-In-One Authentication Solution-set: A Comparison Guide of Two-Factor Capabilities vs. the Competition

TIB 2.0 Administration Functions Overview

White Paper: Multi-Factor Authentication Platform

True Identity solution

The Convergence of IT Security and Physical Access Control

Security+ Guide to Network Security Fundamentals, Third Edition Chapter 8 Authentication

CSC Network Security. User Authentication Basics. Authentication and Identity. What is identity? Authentication: verify a user s identity

Hormuzd Khosravi, Principal Engineer, Intel Corporation

Multi-factor authentication

KEYSTROKE DYNAMIC BIOMETRIC AUTHENTICATION FOR WEB PORTALS

SEC100 Secure Authentication and Data Transfer with SAP Single Sign-On. Public

Attestation and Authentication Protocols Using the TPM

NISTIC Pilot - Attribute Exchange Network. Biometric Consortium Conference

OPENIAM ACCESS MANAGER. Web Access Management made Easy

WHITE PAPER AUGUST Preventing Security Breaches by Eliminating the Need to Transmit and Store Passwords

Agenda. How to configure

What s wrong with FIDO?

2013 AWS Worldwide Public Sector Summit Washington, D.C.

RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards

Blending Embedded Hardware OTP, SSO, and Out of Band Auth for Secure Cloud Access

Securing WebFOCUS A Primer. Bob Hoffman Information Builders

Computer Systems Security 2013/2014. Single Sign-On. Bruno Maia Pedro Borges

Strong authentication. NetIQ - All Rights Reserved

Flexible Identity Federation

NIST Test Personal Identity Verification (PIV) Cards

Mobile Security. Policies, Standards, Frameworks, Guidelines

WHITE PAPER. Smart Card Authentication for J2EE Applications Using Vintela SSO for Java (VSJ)

Two Factor Authentication for VPN Access

How To Use Salesforce Identity Features

Security in an Increasingly Threatened World. SMS: A better way of doing Two Factor Authentication (2FA)

Entrust IdentityGuard Comprehensive

Modern Multi-factor and Remote Access Technologies

Designing federated identity management architectures for addressing the recent attacks against online financial transactions.

Transcription:

Scalable Authentication Rolf Lindemann Nok Nok Labs, Inc. Session ID: ARCH R07 Session Classification: Intermediate

IT Has Scaled Technological capabilities: (1971 2013) Clock speed x4700 #transistors x608k Structure size /450 Price: (1980 2013) HDD $/MB /12k NV RAM $/MB /1.3m $$$ Social media: (2013) >10% of all people ww active Ubiquity: More than 7bn mobile connected devices by end of 2013 Relevance: (2012) $1 trillion ecommerce Connectivity: (2013) 34% of all people ww have internet access

Authentication Hasn t

Passwords Too many to remember, difficult to type, and not secure REUSED PHISHED KEYLOGGED

One Time Passcodes Improve security, but not easy to use SMS USABILITY DEVICE USABILITY USER EXPERIENCE STILL PHISHABLE Coverage Delay Cost One per site Fragile User confusion Social engineering

There are alternatives

Implementation is the Challenge Silos by Vendor X Vendor A Vendor B Silos by Technology Technology A X Technology B Each new authentication solution requires new HW, SW, and Infrastructure. We re building Silos of authentication

FIDO Goals Support for a broad range of authentication methods, leverage existing hardware capabilities. Support for a broad range of assurance levels, let relying party know the authentication method. Built-in privacy.

Abstract View FIDO Authenticators Mapping FIDO SERVER

FIDO Functionality Discover supported authenticators on the client Register authenticators to a relying party (and bind it to an existing identity) Authenticate (a session) Transaction confirmation

Registration FIDO CLIENT Send Registration Request: - Policy - Random Challenge FIDO SERVER FIDO AUTHENTICATOR Start registration Authenticate user Generate key pair Sign attestation object: Public key AAID Random Challenge Name of relying party Signed by attestation key Verify signature Check AAID against policy Store public key AAID = Authenticator Attestation ID, i.e. model

Regarding AAIDs FIDO Authenticator Using HW based crypto AAID 1 Based on FP Sensor X Attestation Key 1 FIDO Authenticator Pure SW based implementation Based on Face Recognition alg. Y AAID 2 Attestation Key 2

Privacy & Attestation FIDO SERVER RP1 Model A Bob s FIDO Authenticator Using HW based crypto Based on FP Sensor X Model A Serial # Model A FIDO SERVER RP2

Authenticator Meta-Data File available to FIDO Server with Authenticator descriptions AAID as an index Attestation trust anchor Implements Secure Display Key Protection

Binding Authenticator to User Case A: Existing User 1 2 User A Login with legacy credential Perform FIDO Register function Cloud Service User A Authenticator 1 Authenticator 1 Cloud Service

Binding Authenticator to User Case B: New User 1 User B 2 Create new account Perform FIDO Register function Cloud Service Opt.: verify attrs. with 3rd party User B Authenticator 2 Authenticator 2 Cloud Service

Authentication FIDO CLIENT Send Authentication Request: - Policy - Random Challenge FIDO SERVER FIDO AUTHENTICATOR Start authentication Verify signature check AAID against policy Authenticate user Sign authentication object: Random Challenge Name of relying party Signed by authentication key for this relying party

Transaction Confirmation Like Authentication, but Authenticator displays Transaction Text FIDO CLIENT FIDO SERVER FIDO AUTHENTICATOR Authenticate user Sign transaction object: Random Challenge Name of relying party Transaction Text Hash Signed by authentication key for this relying party Verify Transaction Text Hash Verify signature check AAID against policy Transfer $10000 to John Doe s account 1234567

FIDO Building Blocks FIDO USER DEVICE TLS Server Key RELYING PARTY BROWSER / APP UAF Protocol WEB SERVER FIDO CLIENT Cryptographic authentication key reference DB FIDO SERVER FIDO AUTHENTICATOR Authentication keys Attestation key Authenticator attestation trust store + meta data Update FIDO Repository

The Authenticator Concept Injected at manufacturing, doesn t change FIDO Authenticator User Verification / Presence Attestation Key Secure Display Authentication Key(s) User Generated at runtime (on Registration)

Scalability of Authentication Scalable for Users Scalable User Verification Methods Scalable Assurance Level

Scalable for Users Overall complexity doesn t grow with the number of relying parties: Choosing & remembering one password per RP is not scalable Carrying one (dedicated) OTP token or smart card per RP is not scalable In FIDO, the Authenticator maintains one key per RP. This scales & avoid a global correlation handle.

Scalable User Verification Methods Various User Verification Methods can be implemented without updating server software Various cryptographic hardware, e.g. smart cards, USB tokens, All kinds of biometrics Fingerprints Face recognition Typing behavior Gait Cardiac rhythm recognition and more Gadget presence, e.g. smart watch,

Client Side Biometrics Various User Verification Methods can be implemented without updating server software FIDO Authenticator User Verification / Presence Store Attestation Key Authentication Key(s) Compare Unlock

Scalable Security Broad range of assurance levels Login to online account Low Change shipping address Transfer $10,000 to Account 1234 High

Scalable Security (2) Authenticator User Verification Normal HW Crypto Layer Authenticator User Verification Secure HW Crypto Layer Authenticator User Verification Crypto Layer

Scalable Security (3) Scale the accuracy of the user verification algorithm, e.g. better finger print sensor/algorithm, longer PINs Source: NIST Interagency Report 7477

Scalable Security (4) Scale security by adding enhanced anti spoofing methods, e.g. enhanced liveness detection for face recognition. Or by requiring PIN entry. Source: Liveness Detection for Face Recognition Source: Live Face Detection Based on the Analysis of Fourier Spectra

FIDO and IAM Single Sign-On Federation Passwords Modern Authentication Strong Risk-Based Authentication User Management Physical-to-digital identity

Complementary EXPLICIT AUTHENTICATION IMPLICIT AUTHENTICATION

FIDO and Federation PASSWORDS SSO/FEDERATION SAML FIDO OpenID First Mile Second Mile

FIDO and Federation FIDO USER DEVICE IdP Service Provider BROWSER / APP OSTP FEDERATION SERVER Federation FIDO CLIENT Id DB FIDO AUTHENTICATOR FIDO SERVER Knows details about the Authentication strength Knows details about the Identity and its verification strength.

FIDO Today Technical Working Groups active o Public Spec Drafts early 2014 o Early Pilots late 2013 o Complement existing standards & efforts NSTIC/Federation: OpenID, SAML etc. FIDO Alliance membership is growing o Members set requirements and design the technology o Internet Services o Client Platform Owners o Device & Component Vendors info@fidoalliance.org www.fidoalliance.org

FIDO Alliance Members FOUNDERS AFTER FEB. 2013

What s the benefit For Users For Internet Services Easy to use local auth options No more worrying about passwords Feel safer on the Internet Greatly improved security, Increased user engagement User brings own device Build server once: leverage all auth methods For Vendors Standardization ignites market Solve fragmentation issues with unified framework

Backup

Summary Passwords don t work Current alternatives don t scale FIDO Alliance works on an open specification separating user verification method from cryptographic authentication protocol With that protocol relying parties can define policy for risk appropriate authentication relying parties know the authenticator model and its characteristics through attestation adoption of new authentication methods will be significantly easier

Thank you! Rolf Lindemann Nok Nok Labs, Inc. rolf@noknok.com www.noknok.com www.fidoalliance.org info@fidoalliance.org