FIDO Passkeys

FIDO2 is an open authentication standard developed by the FIDO Alliance, that offers an enhanced level of security based on public key cryptography. It uses built-in authenticators on devices or Security keys to log users into websites securely. ADSelfService Plus uses the WebAuthn API for FIDO passkey authentication to provide secure access to protected network resources.

FIDO Passkeys offers high assurance, phishing-resistant authentication.

ADSelfService Plus currently offers FIDO passkey authentication for resources protected by browser-based MFA, like

Note: This authenticator currently does not support MFA for VPN and machine logins, as well as password resets and account unlocks via the ADSelfService Plus mobile app or the GUI login screen of Windows, macOS or Linux machines.

The following information on this page will assist you in understanding and setting up FIDO Passkeys with ADSelfService Plus:

FIDO Passkey types

ADSelfService Plus supports FIDO authentication using platform authenticators and roaming authenticators. These can be single-device or multi-device FIDO passkeys.

Platform Authenticators

These authenticators are built into the device and are used by the platform (the OS) to verify the user's identity. Examples include Windows Hello, Android Biometrics, and Apple Touch ID/Face ID. Using ADSelfService Plus, users can utilize these authenticators to verify their identity for access to protected resources.

Platform authenticators can either be device-bound or synced across multiple devices via vendor's cloud.

Roaming Passkeys

Roaming passkeys are portable FIDO2-compliant Security keys like Yubikeys, Google Titan keys, etc., or the authenticator on smartphones which are not used to access ADSelfServices Plus.

Roaming authenticators can be used to verify the user's identity on any device.

Cross-Device Authentication (CDA) allows a roaming passkey on one device to be used to authenticate on another device. For example, you can use the roaming passkey on your phone to sign into ADSelfService Plus on your laptop.

Note: Security Keys do not support passkey syncing and cross-device authentication. Only a roaming smartphone can be used for CDA.

Configuring the FIDO Passkey authenticator

Prerequisites

Configuration steps

  1. Log into the ADSelfService Plus admin portal and navigate to Configuration > Self-Service > Multi-factor Authentication > FIDO Passkeys.
  2. Modify Configuration

  3. The Relying Party Identifier (RP ID) must either be the domain name or effective domain name (server name or the parent domain of the server name) used in the Access URL.
    For instance, if the Access URL is https://selfservice.example.com, only the following RP IDs are valid:
    • selfservice.example.com
    • example.com
  4. Security caution: Specifying a parent domain in the RP ID allows FIDO passkeys to be used across the domain's subdomain websites as well. So for instance, if example.com is chosen as the Relying Party ID, then FIDO passkeys registered on site1.example.com can also be used on site2.example.com or site3.example.com.

    To allow FIDO Passkeys enrolled with ADSelfService Plus to authenticate only with the product, you can define the authentication scope by specifying the access URL used in ADSelfService Plus as the RP ID.

  5. A Username Pattern helps prevent ambiguity by associating the user account with distinct attribute values in AD. It is an easily memorable and distinct username made in this pattern for the user account that will be registered with the FIDO passkey.
  6. Open Advanced Settings and select Platform from the Allowed Passkey Type(s) drop-down to permit users in your organization to enroll for the device's built-in passkeys such as the machine's biometric authentication. Select Roaming to permit users in your organization to enroll for roaming FIDO passkeys like YubiKeys, Google Titan keys, or smartphones not used to access ADSelfService Plus.
  7. If you would like to prevent passkey syncing for platform authenticators, deselect the Allow synced passkey enrollment checkbox.
  8. Note: If Allow synced passkeys is selected, the passkeys will be allowed to sync to the device's cloud service, allowing verification using the same passkey on the device being enrolled as well as it's synced devices.

    Administrators can uncheck the Allow Synced Passkeys checkbox to restrict FIDO enrollment data to only organizational devices and prevent it from being shared with any cloud services. The authenticator on devices which mandate syncing to the cloud, like Apple devices, will be prevented from being enrolled as a FIDO passkey.

  9. From the drop-down, choose if User verification is Required, Recommended or Discouraged for roaming authentication. User verification doubly ensures that the Security key is in the possession of authorized individuals, as misplaced keys can be exploited by unauthorized users who come across them.
    • Required: The user will be required to verify their identity using the in-built additional verification mechanism (a PIN or additional Biometrics) configured on the hardware authenticator, after inserting it.
    • Note: If admins set the User Verification on new or existing configurations to Required, users will be prompted to provide additional user verification, such as a PIN or biometrics, after inserting their device. They will be unable to complete MFA authentication and will be locked out if secondary authentication is not set up on their devices.

    • Preferred: If additional user verification like a PIN or Biometrics has been configured on the hardware authenticator, the user will be asked for further identification upon inserting it. If their authenticator does not have 2FA configured, users will not be prompted for additional verification.
    • Discouraged: If your organization uses U2F-based security keys that do not support additional user verification, admins can select the Discouraged option. Users will not be asked for additional verification upon inserting their FIDO Passkey. However, some security keys mandate additional verification on supported devices even when it is Discouraged. Please refer to the documentation received with your security key, to ascertain this.
  10. From the drop-down, select the maximum No. of credentials each user is allowed to enroll for. A user can enroll a maximum of 5 FIDO passkeys.
  11. Click Save.

Supported Devices

The OS and browsers that support each of the following types of passkeys are as follows:

Note: Please make sure that you are using the latest versions of browsers that are not specifically mentioned by their version numbers in the following tables.

Platform Authenticators

Platform authenticators can be used via either the enrolled device (device-bound passkeys) or its synced devices also (synced passkeys).

1. Device-bound passkeys:

  Windows 10+ (Windows Hello) macOS 11+ (Touch ID) Android 7+ (Android biometrics) iOS 14.5+ (Face ID)
Google Chrome Yes (73+) Yes (70+) Yes (95+) Yes (95)
Edge Yes (79+) Yes Yes Yes(95)
Safari N/A Yes (14+) N/A Yes (14.5)
Firefox Yes (66+) Yes Yes (68+) Yes (38)

2. Synced Passkeys

  Windows 10+ (Windows Hello) macOS 13+ (Touch ID) Android 9+ (Android biometrics) iOS 16.5+ (Face ID)
Google Chrome No Yes (70+) Yes Yes
Edge No No Yes Yes
Safari N/A Yes (14+) N/A Yes
Firefox No Yes Yes Yes

Roaming authenticators

Roaming authenticators can be Security keys like YubiKeys, Google Titan keys, etc., or smartphones used for cross-device authentication (CDA).

1. Security Keys

  Windows 10+ macOS 11+ Linux Android 7+ iOS 14.5+
Google Chrome Yes Yes Yes Yes Yes
Edge Yes Yes Yes Yes Yes
Safari N/A Yes N/A N/A Yes
Firefox Yes Yes Yes Yes Yes

2. Cross-Device Authentication (CDA) for Roaming Passkeys

CDA Client: The CDA client in a cross-device authentication flow is the device on which ADSelfService Plus is being accessed.

CDA Authenticator: The CDA authenticator in a cross-device authentication flow is the device on which the user is verifying their identity.

The supported CDA Clients and Authenticators are as follows:

  Windows 10+ (Windows Hello) macOS 13+ (Touch ID) Android 9+ (Android biometrics) iOS 17+ (Face ID)
  CDA Client support CDA Authenticator support CDA Client support CDA Authenticator support CDA Client support CDA Authenticator support CDA Authenticator support CDA Authenticator support
Google Chrome Yes (108+) No Yes (70+) No No Yes Yes Yes
Edge Yes (108+) No Yes No No Yes Yes Yes
Safari N/A N/A Yes (14+) No N/A N/A Yes Yes
Firefox No No Yes No No Yes Yes Yes

Enrolling for FIDO Passkeys

To enroll for FIDO Passkeys, the user needs to access the self-service user portal, click Enrollment > FIDO Passkeys and follow the applicable steps. The same procedure should be followed for all devices or platforms that the user wants to enroll as a passkey.

You can find the detailed enrollment steps here.

Note: Enrollment for FIDO Passkeys is not possible in bulk by importing data from a CSV file or an external database, or via a login script.

Enrollment for FIDO Passkeys is not possible from AD360's Apps Pane. Users will need to directly access the ADSelfService Plus url to enroll for FIDO Passkeys.

Verification using FIDO Passkeys

Platform Authenticators: Platform authenticators (Device's Built-in Passkeys) can be used for MFA only on the enrolled device. If the user tries to authenticate with a platform authenticator on a non-enrolled device, MFA will fail and the user will not be able to access the resource unless backup codes are enabled in your organization, and they have backup codes for their account.

Synced passkeys: Enabling synced passkeys enables the sharing of a single enrollment across all devices that are synced to the cloud; i.e., when passkey syncing has been enabled, users can authenticate using the same passkey on the enrolled device or any of its synced devices.

Note: The FIDO Passkeys Report will only show the enrollment on the specific device that was enrolled, and not on its synced devices.

Roaming passkeys: Security keys can be enrolled by accessing the ADSelfService Plus web portal from a device on which the key can be plugged in, or connected via NFC or BLE.

Authenticators like Android Biometrics or Apple Touch ID/Face ID on smartphones which are not used to access the ADSelfService Plus portal, can also be enrolled as Roaming passkeys and used for CDA via methods like QR-code scanning with Bluetooth Low Energy (BLE).

Note: A single Security key can be enrolled as a passkey for multiple users. Multiple Security keys can also be enrolled for a single user account. Similarly, the same smartphone can be enrolled as a Platform (Device's built-in) Authenticator or a Security key for all the users who have enrolled for that phone's biometric authentication.

However, the same smartphone cannot be registered as both a built-in authenticator as well as a Security Key for the same user. Each device can be registered as only one type of authenticator per user. If a user attempts to access the ADSelfService Plus end-user portal on a smartphone that has already been registered to them as a Security key (roaming authenticator), they need to select 'Security Key' as the passkey type to authenticate and confirm their identity on the same smartphone. They cannot choose 'Device Built-in Authenticator' even though they are both accessing and authenticating to the portal on the same device.

Thanks!

Your request has been submitted to the ADSelfService Plus technical support team. Our technical support people will assist you at the earliest.

 

Need technical assistance?

  • Enter your email ID
  • Talk to experts
  •  
     
  •  
  • By clicking 'Talk to experts' you agree to processing of personal data according to the Privacy Policy.

Don't see what you're looking for?

  •  

    Visit our community

    Post your questions in the forum.

     
  •  

    Request additional resources

    Send us your requirements.

     
  •  

    Need implementation assistance?

    Try onboarding

     

Copyright © 2024, ZOHO Corp. All Rights Reserved.