TU Darmstadt / ULB / TUbiblio

Future-Proof Web Authentication: Bring Your Own FIDO2 Extensions

Putz, Florentin ; Schön, Steffen ; Hollick, Matthias (2021):
Future-Proof Web Authentication: Bring Your Own FIDO2 Extensions.
In: Lecture Notes in Computer Science, 13136, In: Emerging Technologies for Authorization and Authentication, pp. 17-32,
Springer, 4th International Workshop on Emerging Technologies for Authorization and Authentication, Darmstadt, Germany, 08.10.2021, ISBN 978-3-030-93746-1,
DOI: 10.1007/978-3-030-93747-8_2,
[Conference or Workshop Item]

Abstract

The FIDO2 standards for strong authentication on the Internet define an extension interface, which allows them to flexibly adapt to future use cases. The domain of establishing new FIDO2 extensions, however, is currently limited to web browser developers and members of the FIDO alliance. We show how researchers and developers can design and implement their own extensions for using FIDO2 as a well-established and secure foundation to demonstrate innovative authentication concepts or to support custom deployments. Our open-source implementation targets the full FIDO2 stack, such as the Chromium web browser and hardware tokens, to enable tailor-made authentication based on the power of the existing FIDO2 ecosystem. To give an overview of existing extensions, we survey all published FIDO2 extensions by manually inspecting the source code of major web browsers and authenticators. Their current design, however, hinders the implementation of custom extensions, and they only support a limited number of extensions out of the box. We discuss weaknesses of current implementations and identify the lack of extension pass-through as a major limitation in current FIDO2 clients.

Item Type: Conference or Workshop Item
Erschienen: 2021
Creators: Putz, Florentin ; Schön, Steffen ; Hollick, Matthias
Title: Future-Proof Web Authentication: Bring Your Own FIDO2 Extensions
Language: English
Abstract:

The FIDO2 standards for strong authentication on the Internet define an extension interface, which allows them to flexibly adapt to future use cases. The domain of establishing new FIDO2 extensions, however, is currently limited to web browser developers and members of the FIDO alliance. We show how researchers and developers can design and implement their own extensions for using FIDO2 as a well-established and secure foundation to demonstrate innovative authentication concepts or to support custom deployments. Our open-source implementation targets the full FIDO2 stack, such as the Chromium web browser and hardware tokens, to enable tailor-made authentication based on the power of the existing FIDO2 ecosystem. To give an overview of existing extensions, we survey all published FIDO2 extensions by manually inspecting the source code of major web browsers and authenticators. Their current design, however, hinders the implementation of custom extensions, and they only support a limited number of extensions out of the box. We discuss weaknesses of current implementations and identify the lack of extension pass-through as a major limitation in current FIDO2 clients.

Book Title: Emerging Technologies for Authorization and Authentication
Series: Lecture Notes in Computer Science
Series Volume: 13136
Publisher: Springer
ISBN: 978-3-030-93746-1
Uncontrolled Keywords: Security, Authentication, Key Management, Hardware Token, Passwordless, WebAuthn, FIDO2, emergenCITY_KOM
Divisions: 20 Department of Computer Science
20 Department of Computer Science > Sichere Mobile Netze
LOEWE
LOEWE > LOEWE-Zentren
LOEWE > LOEWE-Zentren > emergenCITY
TU-Projects: HMWK|III L6-519/03/05.001-(0016)|emergenCity TP Bock
Event Title: 4th International Workshop on Emerging Technologies for Authorization and Authentication
Event Location: Darmstadt, Germany
Event Dates: 08.10.2021
Date Deposited: 24 Jan 2022 08:54
DOI: 10.1007/978-3-030-93747-8_2
URL / URN: https://link.springer.com/chapter/10.1007/978-3-030-93747-8_...
PPN:
Export:
Suche nach Titel in: TUfind oder in Google
Send an inquiry Send an inquiry

Options (only for editors)
Show editorial Details Show editorial Details