Passwordless login using FIDO2¶
MWARE IAM supports passwordless authentication using FIDO2, a phishing-proof passwordless authentication protocol developed as a joint effort between the FIDO Alliance and the World Wide Web Consortium (W3C).
The three major enablers of the FIDO2 flow are:
- The FIDO2 Authenticator
- The client or browser that operates as a mediator
- The WebAuthn Relying Party (MWARE IAM)
There are two types of authenticators, which you can use with MWARE IAM passwordless authentication.
- Platform authenticators (also known as internal authenticators): Authenticators like fingerprint scanners, TouchID, FaceID or Windows Hello which are bound to a particular device.
- Roaming authenticators (also known as cross-platform or external authenticators): Authenticators like hardware security keys which are external and not bound to any specific device.
You can configure FIDO2 passwordless login for your apps using two methods:
-
Security key/Biometrics: An application user uses a FIDO2-supported authenticator to log in without entering a username or a password.
-
MFA with Security key/Biometrics: An application user enters a username and password first. IS authenticates the user with credentials and prompts the user to use a FIDO2-supported authenticator to log in.
Does your browser support your Security Key/Biometrics (FIDO) devices?
You can use the Yubico site to check the browser support for FIDO devices.
Info
- MWARE IAM uses the WebAuthn API to enable FIDO-based authentication for browsers that no longer support the u2f extension.
- The following browser versions support the WebAuthn API by default:
- Chrome 67 and above
- Firefox 60 and above
- Edge 17723 and above
- FIDO2 passwordless login with platform authenticators will NOT work on the Firefox browser in macOS Catalina, Big Sur, and Monterey due to browser limitations.
- FIDO2 passwordless login with roaming authenticators will NOT work on the Firefox browser as the browser doesn't support CTAP2 (Client to Authenticator Protocol 2) with PIN.
Prerequisites¶
-
Add the following configurations to the
deployment.toml
file in the<IS_HOME>/repository/conf
directory to define the origin URLs where the MWARE IAM My Account will be hosted (e.g.,https://localhost:9443
).
- You need to set up the sample application. - You need to have a FIDO2 security key registered in IS. Learn how to register your FIDO security key.[fido.trusted] origins=["https://localhost:9443"]
Configure Security Key/Biometrics (FIDO) as an authenticator¶
To configure Security Key/Biometrics as an authenticator:
-
On the management console, go to Main > Identity > Service Providers > List.
-
Click Edit on the
saml2-web-app-pickup-dispatch.com
service provider. -
Expand the Local and Outbound Authentication Configuration section and click Local Authenticator.
-
Select
Security Key/Biometrics
from the list of local authenticators. -
Click Update to save your configurations.
Try it out¶
-
Access the following sample Pickup Dispatch application URL:
http://localhost.com:8080/saml2-web-app-pickup-dispatch.com
and click Login. -
Depending on the FIDO biometric method configured, you will be prompted to enter a code, use the security key or use your fingerprint scanner.
-
Add your security key or biometrics and click Continue.
You will now be logged into the application successfully.
Top