Pricing  Get Quote
 
 
  • Home
  • What is MFA?
  • FIDO2 authenticators: Platform authenticator vs. roaming authenticator
Blog

FIDO2 authenticators: Platform authenticator
vs. roaming authenticator

Written by Selina WilliamMFA3 min read

On this page
  • What is a FIDO2 authenticator?
  • FIDO2 authenticator types
  • Platform FIDO2 authenticators
  • Advantages of platform FIDO2 authenticators
  • Roaming FIDO2 authenticators
  • Advantages of roaming FIDO2 authenticators
  • Platform vs. roaming FIDO2 authenticators: Which one is right for your organization?
  • Enhance user experiences with ADSelfService Plus' FIDO2 authentication
  • People also ask

What is a FIDO2 authenticator?

A FIDO2 authenticator is a software or hardware component that users interact with to verify their identities using the FIDO2 authentication standard. These authenticators generate passkeys (i.e., cryptographic key pairs) during user enrollment in FIDO2 MFA, protect the generated key details, and sign digital certificates for attestation during authentication. To effectively implement passwordless FIDO2 authentication, organizations must carefully select the right type of FIDO2 authenticator based on their business needs, their workforce's ability to adapt during rollout, and the long-term management requirements of the authenticator.

FIDO2 authenticator types

FIDO2 authenticators are classified into two types: platform authenticators and roaming authenticators.

Platform FIDO2 authenticators

Platform FIDO2 authenticators, also referred to as built-in, internal, or bound authenticators, are integrated into and inseparable from a user device—typically a laptop, desktop, or smartphone—that serves as the FIDO2 client . This device carrying the platform authenticator has a built-in Trusted Platform Module (TPM), which is often a biometric data collection mechanism such as a fingerprint or facial scanner.

The TPM securely stores the private key generated when the user enrolls in FIDO2 MFA. During authentication, the TPM shares the key with the service requesting the user's identity. When the device has no provision for biometric data collection, other identity verification methods, such as PINs, can be used. However, biometric authentication is more secure than traditional PIN-based authentication.

Examples of platform FIDO2 authenticators

  • Windows Hello
  • Apple Touch ID
  • Apple Face ID
  • Android biometrics
  • Other common fingerprint and facial scanners found on laptops

Advantages of platform FIDO2 authenticators

  • Seamless integrations: Since they are built directly into user devices (like smartphones, laptops, or tablets), platform FIDO2 authenticators provide a smooth, intuitive authentication experience without requiring additional hardware.
  • Enhanced security: These authenticators leverage the device's secure hardware components, such as TPMs, to protect cryptographic keys and sensitive information.
  • User convenience: Users do not need to carry extra devices like USB keys or smart cards, making the authentication process more convenient and reducing the risk of losing an external authenticator.
  • Widespread availability: Many modern devices come with built-in platform authenticators, making it easier for organizations to deploy FIDO2 authentication without needing to invest in additional hardware.
  • Lower costs: Many modern devices come with built-in platform authenticators, making it easier for organizations to deploy FIDO2 authentication without needing to invest in additional hardware.
  • Lower costs: Since platform authenticators are already part of devices, organizations can reduce the costs associated with purchasing and distributing external authenticators.
  • Improved user adoption: The ease of use and familiarity of personal devices can lead to higher user adoption rates as employees are more likely to embrace technology that integrates seamlessly with their everyday tools.

Roaming FIDO2 authenticators

Roaming FIDO2 authenticators, also referred to as cross-platform or external authenticators, are devices that are separate from the FIDO2 client device (i.e., they are not built into the same platform or OS as the FIDO2 client device). Using near-field communication (NFC), USB, or Bluetooth, a roaming authenticator connects with the client device to present the user's identity claims to it. These authenticators store the cryptographic key details required for FIDO2 authentication, allowing users to carry their credentials and authenticate across multiple client devices.

Examples of roaming FIDO2 authenticators

  • Security keys like the YubiKey, Google Titan Security Key, and Precision InnaITKey
  • Smartphones (when logging in to a laptop or desktop device)
  • Other external devices that can be connected via Bluetooth, USB, or NFC

Advantages of roaming FIDO2 authenticators

  • Portability: Roaming FIDO2 authenticators can be used across multiple devices, offering flexibility for users who work on different platforms.
  • Device independence: These authenticators function independently of devices, making them useful for accessing accounts on any compatible device.
  • span security: Roaming FIDO2 authenticators often come with robust security features, like hardware-based key storage, enhancing protection against attacks.
Passwordless, phishing-resistant FIDO2 authentication with ADSelfService Plus

Platform vs. roaming FIDO2 authenticators: Which one is right for your organization?

Choosing between platform and roaming FIDO2 authenticators depends on your organization's needs. If your organization primarily has a stable workforce using consistent devices, then platform FIDO2 authenticators will suit you better. These platform authenticators are beneficial because they require no additional hardware, provide seamless integrations, and are convenient for users. Since they don't require additional hardware, they are also cost-effective to implement. The only drawback of platform authenticators is that they are confined to the device they are built into and thus are not user-friendly for users who switch devices frequently.

If your employees work in diverse settings or need flexibility across devices, roaming authenticators are likely the better choice. Roaming authenticators are portable, independent of devices, and have robust security features. Two drawbacks of roaming authenticators are that users must carry them securely and that they cost more because you need to purchase external devices.

Enhance user experiences with ADSelfService Plus' FIDO2 authentication

ADSelfService Plus, an identity security solution with MFA, SSO, and password management capabilities, supports passwordless, phishing-resistant FIDO2 authentication to secure access to cloud applications, Outlook on the web logins, and more. It uses the WebAuthn API to provide secure, customizable FIDO2 authentication, supporting both platform and roaming authenticators:

  • Platform authenticators: Built-in, OS-controlled authenticators like Windows Hello, Apple Touch ID, and Android biometrics
  • Roaming authenticators: FIDO2- and U2F-compliant security keys like the YubiKey, Google Titan Security Key, and Precision InnaITKey

People also ask

What is the difference between FIDO and FIDO2?

FIDO2 is one of three protocols established by the Fast Identity Online (FIDO) Alliance for span authentication in web and non-web applications. The other two are Universal 2nd Factor (U2F) and Universal Authentication Framework (UAF). While all three use a common public-key-based framework, each is tailored to different use cases and user experiences.

Is FIDO2 passwordless?

Yes, FIDO2 eliminates passwords and authenticates users with stronger identity verification methods, such as biometrics and security keys. It employs public-key cryptography and authenticates users with the help of passkeys in the back end.

To learn more about the differences between passkeys and passwords, click here.

Are passkeys FIDO2?

Yes, passkeys work using the FIDO2 authentication standard. To understand what passkeys are and how they work, click here.

How many keys can you have on FIDO2?

FIDO2 supports the registration of multiple keys for a single account. While the standard itself doesn’t impose a strict limit, the number of keys you can register may depend on the platform or service. Typically, you can have several keys, like a hardware key, a biometric authenticator, and a backup key, to provide redundancy and convenience.

FIDO2 MFA in ADSelfService Plus allows users to enroll in up to three FIDO2 credentials for authentication.

Is a smartphone a platform or roaming FIDO2 authenticator?

A smartphone can function as both a platform and a roaming FIDO2 authenticator, depending on how it is used:

  • A platform FIDO2 authenticator: When the smartphone's built-in authentication methods—like biometric sensors and PINs—are used to authenticate the user directly on the device itself, it acts as a platform authenticator.
  • A roaming FIDO2 authenticator: If the smartphone is used as a mobile authenticator to authenticate a user on other devices via protocols like Bluetooth, NFC, or USB using a FIDO2 app, it acts as a roaming authenticator.
 

ADSelfService Plus trusted by

Embark on a journey towards identity security and Zero Trust
Email Download Link