The era of passwords is going to end. They are ineffective in keeping the data protected from the current generation of hackers, which is way too advanced and smart. Cybercriminals of the present day know almost every trick to decode a password. Even if you have a strong password, you canât sit back and relax. So, whatâs going to protect the data then?
Welcome FIDO. A highly advanced security approach, FIDO is the new kid on the block that is making high waves because of its outstanding security strategy. Letâs find out more about FIDO meaning and its process.
Letâs start with the basic FIDO meaning.
FIDO stands for Fast Identity Online and is an upcoming data and API security approach. Itâs an open-source and standard security strategy emphasizing the use of public-key cryptography for credibility-verification in place of passwords, which seems inefficient for protecting organizational data.
Managed by FIDO Alliance, the FIDO protocol combines public-key cryptography and multifactor authentication to create a highly robust data and API security verification system that isnât easy to bypass.Â
In recent times, we witnessed very severe cyber-attacks. Many of these even happened when a highly strong password was in place. But, only a password was used. No other security measures were adopted. This made industry experts wonder whether having a strong password is enough from a security point of view.
Well, the truth is, a password is no longer capable of protecting sensitive data. Have a look at a few statistics to understand this.
Out of all the data breaches happening today, 80% are happening because of poor passwords. Â
FIDO Alliance aims to make people and organizations understand that they are not safe with a password alone. Hence, FIDO came into being. This strong website and application security protocol combine MFA and public key cryptography that is practically unbreakable.
What makes FIDO way ahead of passwords is its information storage process. Passwords are saved on a website or application server, which makes them more prone to attacks and breaches.
But, FIDO stores identity-check related details or personal information on the userâs device only. This way, the user has full control over the login and identity-verification data. As it comes with API integration, itâs easy to generate multiple FIDO login credentials for different devices and hardware.
Both U2F and UAF are supported by this process of authenticating users, which adds up to its efficacy. UAF integration permits end-users to generate entirely new FIDO security key pairs at the time of registration.Â
The user will have access to the private key, while the public key will be with the website/application user is trying to use. When the user will access the website/application, authenticity-check of the private key will take place in the form of PIN, fingerprints, voice confirmation, or selfie upload. Â
The use of the U2F protocol allows FIDO to use a robust second factor for authenticity-checking. This 2nd factor could be a USB security token, or a device within 4.5 cm (via Near Field Communication). Login is only possible when the user injects or touches the U2F devices. Â
â
FIDO adoption may have accelerated in recent times, but the FIDO Alliance has existed for a very long time. It was 2007 when PayPal started looking for an advanced MFA for its services. Even though login with OTP was introduced, very few people showed interest in this. Hence, further research started.Â
Ramesh Kesanupalli, who was the CTO of Validity Sensors at the time, presented the idea of fingerprint scanning into PayPal services. The then-CISO of PayPal, Michael Barrett, liked the idea and emphasized on the introduction of an industry standard that can mentor website/application authentication hardware approaches.Â
Kesanupalli started working on it. His efforts paid off well in 2013 when FIDO Alliance came into being. Slowly, the group grew, and some top players in the IT industry like Google, Master Card, ARM, Dell, Microsoft Corporation, Samsung, and many more became a part of it.
â
Now that youâre aware of the FIDO meaning and the history of the FIDO Alliance, itâs time to understand how this identity-verification method works.Â
If youâre trying to access a website that uses FIDO authentication, this is how registration or login will go:
Content for Picture:
UAF is used by FIDO for digital device user authentication. Itâs applicable only on tablets, smartphones, PCs, and laptops. In case a user wants to access a website/application that deploys UAF standard, s/he has to register the account first with the help of the device. The device will prompt users to use supportive user identity verification methods. Â
After that, the user device will generate a new key pair that is device and service-specific. Upon successful initiation of the identity-checking process, the end-user device and service provider will only exchange cryptographic keys.Â
The same authentication techniques will be used each time a user accesses the linked account. The private key remains with the end-user while the public key is shared with the service provider.
The attention-worthy feature of UAF is that the service provider remains ignorant of the authentication data used. But, the technique of authenticating users used is known. Also, they are allowed to choose which auth type to accept and which to reject. This grants great flexibility to the services provider.
Also, the entire communication remains utterly encrypted and secured as biometric details and private keys remain saved on the user's device. Hence, the odds of security breaches are very less.
â
Content for Picture:
We already provided a gist of U2F at the beginning of the post. Letâs learn more about it as it plays a crucial role in FIDO authentication. U2F stands for Universal Second Factor, and the protocol urges end-users to introduce a second factor at the time of login. It involves using a hardware device as 2nd login factor.Â
After the password is provided, users have to access that second factor, which could be a USB security token or NFC. The role of the second factor here is to store the private security key and provide it as and when required.
It was developed by Google as a result of its anti-phishing strategy. After successful internal usage, it was offered to FIDO Alliance. Whatâs worth noting here is that U2F doesnât eliminate passwords completely. But, it makes use of simple passwords safe. When combined with a 4-digit PIN password, U2F can provide substantial security.
As far as its operations are concerned, a specific cryptographic key is exchanged with the service provider so that 2FA is done. Fob must be offered after multiple authentication attempts. Fob deploys the private key to ensure the authenticity of the website. This way, it prevents cyber threats like phishing and MITMA. Like UAF, U2F is also end-to-end encrypted and highly secured.
â
Content for Picture:
Just like any other security approach, FIDO also goes through changes and upgrades to remain relevant. The latest version, FIDO 2, is advanced and claims to fix the primary yet prominent FIDO glitches. Yes, there are flaws in FIDO. Even if itâs far better than its contemporaries, itâs not perfect. The concerning loopholes of FIDO are
The inability of UAF to work on PCs. It can only work on mobile.
Mandatory requirement to own and carry another device to use U2F. Even if the device/gadget is small, FIDO U2F users are forced to carry it everywhere they go.
These two shortcomings of FIDO forced FIDO Alliance to proffer an improved version. Hence, FIDO came into being. Itâs based on FIDO and works towards promoting the practice of going passwordless, more secure, and easy to implement. Like FIDO, FIDO 2 also has two standards that support each other.
The first aspect of FIDO 2 is WebAuthn. It came into being in 2019 at the hands of W3C and promotes the usage of the public key for authentication. Itâs like FIDO only. But, itâs not only mobile-device compatible.Â
Any data-driven device or PC â using JavaScript API-based browser â is compatible with WebAuthn. Practically speaking, all the devices meet this requirement. Hence, you can use FIDO 2 on almost every device.
The second specification of FIDO 2 is CTAP or Client to Authenticator Protocols. The role of CTAP is to permit any WebAuthn service provider to be seamlessly paired with the end user's PC and allow the use of a distinct authentication device. The specification is further divided into two categories, CTAP 1 and CTAP 2.Â
On a structural level, CTAP 1 is updated or refurbished U2F. Hence, itâs possible to use U2F key fobs with a WebAuth device so that 2FA is easily implemented. Â
CTAP2 is the extended form of its version 1. It permits data-driven devices, wearables, and smartphones to pair seamlessly with a PC to promote password-free login. The pairing generally takes place using a Wi-Fi connection, USB, or Bluetooth.
If you need a crisp comparison between FIDO and FIDO 2, have a look at the below-mentioned table.
FIDO Alliance is keeping an eye on the industry trends and improving the authentication procedure accordingly.
â
Considering the efficacy and effectiveness of FIDO, many organizations are trying to be FIDO certified. If youâre a company offering software or a device, being FIDO certified will pay off well, as the certification will help your audience to know that youâre a security-conscious business and are creating safe products. The best part is that FIDO specs are freely available, and anyone can use them.
Android became FIDO certified in 2019, while Safari earned this credibility much later. In 2020, Safari will become FIDO certified. Â
Presently, all the leading browsers are FIDO certified. Becoming FIDO certified is not an effort and a time-consuming job. There is a whole list of resources that will help you to become a FIDO-compliant business. Understand that there are different compliance procedures for hardware and interoperability. Play wise and adhere with the relevant procedure for both these aspects.
Subscribe for the latest news