FIDO2 Protocol
Jump to navigation
Jump to search
A FIDO2 Protocol is an open industry-standard authentication protocol that enables passwordless authentication through public-key cryptography by the FIDO Alliance.
- AKA: Fast Identity Online 2 Protocol, FIDO2 Authentication Standard, WebAuthn/CTAP Protocol Suite.
- Context:
- It can typically provide FIDO2 Phishing Resistance through FIDO2 origin binding.
- It can typically enable FIDO2 User Verification through FIDO2 authenticator attestation.
- It can typically support FIDO2 Cross-Platform Compatibility through FIDO2 standard interfaces.
- It can typically implement FIDO2 Privacy Protection through FIDO2 unlinkable credentials.
- It can typically facilitate FIDO2 Account Recovery through FIDO2 backup authenticators.
- ...
- It can often integrate FIDO2 Biometric Authentication through FIDO2 biometric sensors.
- It can often provide FIDO2 Resident Credentials through FIDO2 discoverable credentials.
- It can often enable FIDO2 Extension Mechanisms through FIDO2 extension protocols.
- It can often support FIDO2 Transaction Confirmation through FIDO2 transaction authorization.
- ...
- It can range from being a Simple FIDO2 Protocol to being a Complex FIDO2 Protocol, depending on its FIDO2 implementation complexity.
- It can range from being a Platform FIDO2 Protocol to being a Roaming FIDO2 Protocol, depending on its FIDO2 authenticator type.
- It can range from being a Consumer FIDO2 Protocol to being an Enterprise FIDO2 Protocol, depending on its FIDO2 deployment scale.
- It can range from being a Basic FIDO2 Protocol to being an Advanced FIDO2 Protocol, depending on its FIDO2 feature sophistication.
- ...
- It can integrate with Web Browser for FIDO2 web authentication.
- It can connect to Operating System for FIDO2 platform authentication.
- It can interface with Identity Provider for FIDO2 identity federation.
- It can communicate with Relying Party Server for FIDO2 credential verification.
- It can synchronize with Authenticator Device for FIDO2 key management.
- ...
- Example(s):
- WebAuthn Protocol Components, such as:
- CTAP Protocol Components, such as:
- FIDO2 Implementations, such as:
- ...
- Counter-Example(s):
- OAuth Protocol, which handles authorization delegation rather than authentication verification.
- SAML Protocol, which uses XML assertions rather than cryptographic challenge-response.
- Traditional Password Protocol, which transmits shared secrets rather than cryptographic proofs.
- SMS OTP Protocol, which relies on telephone networks rather than cryptographic verification.
- See: Passkey, WebAuthn Standard, CTAP Protocol, Public Key Cryptography, Authentication Protocol, Secure Shell Protocol, OAuth Access Delegation Standard, Security Protocol, Encryption Key.