ThinC AUTH FIDO2
ThinC-AUTH is FIDO2 certified biometric security key and is Microsoft compatible. The key is used for passwordless login to the latest version of Windows 10 operating system and numerous FIDO2 enabled web applications.
FIDO2 is a phishing proof, passwordless authentication protocol defined by the FIDO Alliance and the World Wide Web Consortium (W3C). ThinC-AUTH provides strong authentication for the web. In March 2019, W3C announced that WebAuthn is the official web standard for passwordless login.
Users can now sign in to Windows on both Azure AD and Hybrid Azure AD joined devices
With a biometric touch-to-authenticate, the multi protocol ThinC-AUTH protects
Strong biometric technology makes ThinC-AUTH Security Key one of the most secure hardware tokens.
The core functionalities of the embedded security chip of ThinC-AUTH is to encrypt,
AES, HMAC, ECDH achieves high-level security to User and Key.
Single key for
hundreds of services
Passwordless authentication to Windows 10 systems (connected to Azure AD);
FIDO2: The new standard for secure web log-in
- Logging onto a website using your username and password is no longer the best certification method for various reasons.On the one hand, submitting personal user information is becoming increasingly cumbersome due to the ever-increasing number of services an average person uses. On the other hand, the security of log-in data is increasingly at risk due to cybercriminals becoming sneakier and more technologically advanced.
- Targeted brute-force attacks or seemingly harmless email phishing attacks accumulate, and users often don’t even notice that their own login data has already been tapped. The FIDO2 security standard addresses this problem by enlisting the help of two-factor authentication that uses security keys (FIDO2 keys) and hardware tokens. Thanks to the integration of the W3C standard WebAuthn – this procedure not only allows encrypted and anonymous log-ins, but also completely password-free log-ins.
What is FIDO2?
- FIDO2 is the latest specification of the non-commercial FIDO Alliance (Fast IDentity Online), an open industry association with a focused mission: authentication standards to help reduce the world’s over-reliance on passwords. The FIDO Alliance was created with the aim of developing open and license-free standards for secure, worldwide authentication on the World Wide Web.
- First came FIDO Universal Second Factor (FIDO U2F), then FIDO Universal Authentication Framework (FIDO UAF), meaning that FIDO2 is the third standard to emerge from the alliance’s work. At its core, FIDO2 consists of the Client to Authenticator Protocol (CTAP) and the W3C standard WebAuthn, which together enable authentication where users identify themselves with cryptographic authenticators (such as biometrics or PINs) or external authenticators (such as FIDO keys, wearables or mobile devices) to a trusted WebAuthn remote peer (also known as a FIDO2 server aka XSense IAM/IdP Server) that typically belongs to a website or web app.
Why do you need security specifications like FIDO2?
- FIDO2 eliminates the risks of standard user login process with ‘username and password’, which isn’t considered the most secure, as well as simple two-factor authentications (email, mobile app, SMS). FIDO2 prevents cyber criminals using typical attack patterns such as man-in-the-middle attacks and phishing from succeeding and taking over the user’s account.
- Even if the log-in data is compromised, the FIDO2 login will only work with the respective hardware security key. Adding biometrics to the security key, such as ThinC-AUTH, protects from sharing the key with other users, and prevents from login with known or shared PIN. The fact that FIDO2 is an open standard makes it easier for software and hardware developers to implement the standard in their own products, so they are able to offer users this very secure login method.
How does FIDO2 work?
- The main goal of FIDO Alliance is to increasingly eliminate passwords on the web. In order to achieve this, the secure communication path between the client (browser) and the respective web services is first set up or registered in order to be permanently available for later logins. In this process, FIDO2 keys are generated and verified, which provide the basic encryption for the logon procedure.
- The user registers with an online service and generates a new key pair on the device used - consisting of a private key and a public FIDO2 key.
- While the private key is stored on the device and is only known on the client side, the public key is registered in the web service’s key database.
- Subsequent authentications are now only possible by verification with a private key, which must always be unlocked by a user action. There are various options such as entering a PIN (vulnerable as it can shared), pressing a button (vulnerable as it can accessed by unauthorized people), or authenticating with biometrics to the security key (secure as ThinC-AUTH) itself.
The procedure is as follows:
What are the requirements for using FIDO2 authentication?
- The FIDO2 specification defines all components that are required for the modern authentication procedure. First and foremost is the repeatedly mentioned W3C standard WebAuthn, which allows online services to enable FIDO authentication via a standard Web API that is also implemented in various updated versions of web browsers and operating systems.
- Applications that already support the standard declared in March 2019 include Windows, Android, and iOS (version 13 or higher) as well as the following browsers: Google Chrome, Mozilla Firefox, Microsoft Edge, and Apple Safari (version 13 or higher). The second critical component is the Client to Authenticator Protocol (CTAP). This protocol enables the various FIDO2 tokens to interact with the browsers and also to act as authenticators. Both the browser used, and the desired hardware token must therefore be able to communicate via CTAP in order to use this security feature (including password-free login).
The advantages of FIDO2 authentication at a glance:
|Higher security level
|FIDO2 encrypts the log-in by default with a key pair (private and public) that can only be unlocked with the registered security key.
|Higher user comfort
|Protection against phishing
|Using FIDO2, you don't have to worry about phishing even with the two-factor variant with password. Even if criminals obtain the password, they are denied access to the protected account.
|Unique Biometric authentication
|Biometric Security Key, such as ‘ThinC-AUTH’ provides unique authentication approach, and prevents from sharing the security key itself, while encrypting the fingerprint minutiae templates within the security key.
As enterprises procure large number of Biometric FIDO2 Security Keys, which are distributed to their Users & other stakeholders to ensure secure passwordless authentication, management of these Security Keys incur tedious burden on IT Admin teams.
Ensurity’s AMS (Asset Management System) solution efficiently manages the device management of ThinC-AUTH Biometric FIDO2 Security Keys. The AMS helps enterprises in managing the inventory of the Security Keys and assigning them with enterprise Users to fulfill their fingerprint enrollment process.
AMS provides controlled environment for the Users to enroll their fingerprints onto the ThinC-AUTH Security Keys. AMS securely stores the log reports for the audit purposes.
Features & Advantages
|Self-Lock of Security Key