Related Posts
小型企业选择门禁控制系统的 7 大标准
中小企业访问系统评估详解, 从成本和安全性,到支持和扩展性。
Passwords are annoying — and insecure. According to Microsoft, hackers launch an average of 50 million password attacks every day, or 579 per second. Meanwhile, Verizon research suggests that compromised credentials were responsible for more than 80% of last year’s security incidents.
The rise of passwordless authentication represents a major step toward combatting this risk, strengthening trust with resistant security. And with the rise of FIDO (Fast Identity Online) authentication standards, it’s never been easier to go passwordless.
In the decade since the formation of the FIDO Alliance — an open industry association whose mission is to reduce “the world’s overreliance on passwords” — those standards have come to power the most widely available passwordless authentication solutions for both consumers and enterprises.
In this article, we’ll review how passwordless authentication works, explore six reasons why FIDO is key to passwordless authentication and explain what makes it so effective in both consumer and workforce applications.
FIDO shifts authentication from something you know — which, if it is simple enough to remember, is also easy to guess or steal — to cryptographic devices that you have. These devices can be further protected through biometric verification, which relies on what you are.
FIDO leverages asymmetric public key cryptography, which starts with a pair of mathematically related keys. These keys are said to be “scoped,” as each FIDO key pair is unique to an individual website or service/user pair. One key is private and is stored on a user’s individual device. The other key is public and is kept by the website or service.
When users want to authenticate, they use their private key to generate a cryptogram that can be verified with the corresponding public key.
Until recently, private FIDO keys were typically stored on dedicated hardware tokens known as keys — like HID’s Crescendo® keys and cards, for example — which users plug into a computer or phone in order to authenticate themselves. Because security keys can be embedded into a cryptographic module for exclusive use on a specific device, they provide high levels of security.
Since the end of 2022 — thanks to increased support from providers like Apple, Google and Microsoft — FIDO keys can also be stored on Android and iOS devices. That means users can authenticate themselves using devices they already have on hand, or on nearby desktop computers. This new type of FIDO key is known as a passkey. Devices containing FIDO keys can offer additional protection via device-specific biometrics like fingerprints or face scans.
At the enterprise level, FIDO is one of the most accessible technologies for going passwordless, greatly reducing the risk of social engineering attacks.
6 Advantages of FIDO Include:
FIDO is an open standard, and it’s supported by most major tech manufacturers. That’s great for interoperability, but because FIDO is a newer standard focused on authentication, there may be cases where it’s less appropriate than other passwordless mechanisms like PKI. Some limitations of FIDO to consider include:
The first step in any FIDO deployment is to think through solution design. Where will you use FIDO? Will the protocol power your service’s primary log-in or provide secondary multi-factor authentication (MFA)? Will you rely on dedicated hardware tokens or individual user devices?
To build a passwordless authentication system, you’ll need:
Deciding where to store private FIDO keys — whether on individual devices or dedicated hardware tokens — often depends on the use case. For most consumer applications, hardware tokens are impractical, and storing keys in user devices represents the best blend of security and convenience. Workforce authentication teams, on the other hand, may prefer to strengthen security with the use of dedicated tokens, which offer an extra layer of cryptographic protection and are less prone to hacking and compromise.
For web-based authentication, the FIDO Alliance offers standardized APIs that organizations can rely on — as well as protocols that facilitate communication between user devices and servers.
Microsoft founder Bill Gates predicted the end of passwords back in 2004, explaining that they “just don’t meet the challenge for anything you really want to secure.”
Two decades later, FIDO is powering passwordless solutions that are safe, convenient and easy to implement. So we can all stop gawking at top-ten lists of common passwords and start getting serious about security.
This blog is part 2 of HID’s "Path to Passwordless"series. Explore the differences between PKI and FIDO authentication in part 1, or take a deep dive into PKI authentication in part 3.
Or discover how HID can support you on your passwordless journey.