How FIDO Works

How FIDO Works

Fast Identity Online (FIDO) authentication is an alternative to password-only logins that provides a more secure and faster login experience across various websites and apps. It is based on free and open standards developed by the FIDO Alliance. Conventional public-key cryptography is used to provide robust authentication while leaving zero data at rest. FIDO U2F is an open standard that helps to simplify Universal 2-Factor Authentication while still providing an increased level of security.

Symbol of FIDO2 Certification FIDO2 is the name given to the most recent specifications developed by the FIDO Alliance. Users can leverage common devices and easily authenticate to online services in mobile and desktop contexts, thanks to FIDO2 Passwordless Authentication. The Web Authentication (WebAuthn) definition developed by the World Wide Web Consortium (W3C) and the associated Client-to-Authenticator Protocol developed by the FIDO Alliance are part of the FIDO2 specifications (CTAP).

How it Works

The FIDO protocols use conventional public key cryptography algorithms to provide more reliable authentication. A new key pair is generated on the user’s device whenever they register for a new account with an online service. It will keep the private key, but it will register the public key with the internet service. The client device must demonstrate to the service that it has the private key to complete the authentication process by signing a challenge.

After being unlocked locally on the device by the user, the client’s private keys can only be used after they have been unlocked for usage. Swiping a finger across a sensor, entering a personal identification number (PIN), speaking into a microphone, inserting a second-factor device or hitting a button are all user-friendly and secure actions that can be used to unlock a device locally. The user’s right to privacy was a primary consideration in developing the FIDO protocols from the beginning.

These protocols do not supply information that can be utilized by many online services to interact and track a user across several services. As a result, the protocols do not provide the information. If it is used, the user’s biometric information is never transmitted outside their device.

Registration Windows

  • The user is given the option to select a FIDO authenticator that complies with the acceptance criteria of the online service within a short time.
  • The user unlocks the FIDO authenticator using a fingerprint reader, a button on a second – factor device, a securely typed PIN or another mechanism.
  • The server generates a new public/private key pair exclusive to their accounts, online service and local device.
  • The user’s account is connected to the public key sent to the online service. Never leave the local device without the private key and any data about the local authentication mechanism (such as biometric measurements or templates).

Google Login

  • The user of an online service must log in with a device that has already been registered and satisfies the service’s acceptance policy requirements.
  • The FIDO authenticator is unlocked by the user using the same technique used during the registration process.
  • The service provides the user’s account identifier, and the device utilizes this information to select the right key and sign the challenge presented by the service.
  • The client device is responsible for transmitting the signed challenge back to the service. This is where it is checked against the saved public key before the user is logged in.

FIDO 2

FIDO2 is the next generation of FIDO U2F, eliminating the need for a password. The elimination of the need for passwords in various login processes is the primary motivator for the development of FIDO2, which has as its overarching goal the provision of an expanded feature set to support more use-cases. The U2F paradigm continues to serve as the foundation for FIDO2, and compatibility with already-established U2F implementations is included in the FIDO2 specifications.

What exactly does it mean to hold a FIDO2 Certification?

FIDO’s certification processes are essential to providing an interoperable ecosystem of goods and services that businesses can access to deploy FIDO Authentication solutions worldwide. This ecosystem includes products and services from a wide variety of vendors. The FIDO Alliance manages the functional certification processes for its different specifications (such as FIDO2 and U2F), which are used to validate the conformity and interoperability of products.

A FIDO2-certified device, such as a security key from the YubiKey 5 Series, has been put through the rigors of the FIDO certification process and proven to satisfy all standards.

FIDO2 and FIDO U2F

FIDO2 and FIDO U2F provide the same high-security level because they are both based on public key cryptography. FIDO2 is an expansion of FIDO U2F. Expanded authentication options are available with FIDO2, such as strong single-factor authentication (passwordless), strong two-factor authentication and multi-factor authentication.