Dear IAWG members,

I know we will meet this week to learn more about FIDO and passkeys and consider how to address the 63B supplement in our criteria. We have discussed reviewing the next 63-4 draft as part of our thinking, but the NIST 63-4 draft missed the rumored July release.  We can be certain that NIST released the supplement recognizing the market and in an attempt to be agile.  I think it behooves us to attempt to be similarly responsive.  And, among almost all the organizations I am working with passkeys are desired, if not imperative.  I believe we need to take two steps: 

Based on that sense of urgency, I took a first pass at rolling in the supplement (attached).  It is fairly straight forward but asks a few questions.  One over-arching question; the supplement makes reference to “properly configured syncable authenticators,” and it seems to imply that FIDO/WebAuth is OK; but I have assumed that the actual SHALL statements they gave us ARE the “proper configuration” they are looking for.

For those of you who saw an earlier draft of the criteria, they have been tweaked, based on some suggestions from Richard Wilshire.  In that time, I also came up with a few other questions that will no doubt take us down some rabbit holes. 

The NIST supplement ONLY addresses Multifactor Cryptographic Software MF-CS Authenticators, not Single-Factor Cryptographic Software Authenticators; and we can assume that NIST has accepted the argument that passkeys are multifactor.  But they are only multifactor to the extent that you can consider the device (e.g., workstation or laptop) “something you have.”  I’m having to rewire some paradigms to think of my laptop as an authentication token; but if NIST is good with it, I guess I can manage.  But if passkeys are Multifactor Cryptographic Software Authenticators then “syncability” is not the only obstacle they have to deal with.  The rest of the 63B MF-CS criteria includes rules for the activation data and biometrics (63B 5.1.8 and Kantara criteria 63B#1250 - 63B#1330). 

Multifactor Cryptographic Software Authenticators require either a randomly generated 6 digit OR an 8 character activation secret to activate (see below).  Can passkeys do either of these?  The CSP/relying party has no way to generate a secret for the user and no control over the length of the user generated secret.  As best I can tell, I can lower my passkey to four digits and the CSP has no way to know or enforce the length of my passkey activation PIN .  Also, the multifactor criteria requires the CSP to zeroize the unencrypted activation secret or biometric sample after authentication AND enforce biometric criteria – and the CSP has no control over that; although maybe by requiring FIDO, that is being met.  In general, 63B and our criteria assign a number of items to the CSP, that in passkeys are managed locally.  Some of them are perhaps inherited from the FIDO implementation, but I’m cautious about the CSPs ability to control the activation secrets, the rate-limiting, biometric Failed Match Rates or any of the biometric implementation. 

To some extent I’m wondering if passkeys work under 800-63, even with the NIST supplement.

Jimmy

PS – There are 4 requirements for a Single-Factor Cryptographic Software Authenticator.  Those same 4 requirements also apply to Multifactor-Factor Cryptographic Software Authenticators, plus another 6 all relating to the second factor (e.g., biometrics, activation secret).  Am I allowed to declare my MF-CS a SF-CS and just ignore those 6 requirements?  😊

 

 

 

Jimmy Jung

www.Slandala.com

703 851 6813

 

 

 

 

 

 

 

 

Jimmy

 

 

 

 

 

 

 

From: Amanda Gay <amanda@kantarainitiative.org>
Sent: Tuesday, August 6, 2024 7:30 AM
To: wg-idassurance@kantarainitiative.org
Cc: tim.cappalli@okta.com; dean.saxe@beyondidentity.com; alexei.czeskis@id.me; tanel@id.me
Subject: [WG-IDAssurance] Agenda and Invitation - IAWG - August 08, 2025

 

Dear IAWG Members:

Please join us this Thursday, at 12 Noon ET for the next IAWG meeting.

 

The proposed agenda and Zoom details are below.  Please also keep an eye out for an email from Jimmy containing a first attempt at rolling the supplement into Kantara criteria!

 

Date and Time

·  Date: Thursday, 2024-08-08

·  Time: 9:00 PT | 12:00 ET (time zone calculator)

o Please join the meeting from your computer, tablet or smartphone: https://zoom.us/j/93167965850?pwd=dldoT0hYK1k4MkVGYkQ3TkNqdG1Idz09 

o Meeting ID: 931 6796 5850

o Passcode: 884696

o You can also dial in using your phone. Find your local number: https://zoom.us/u/aeg9vt8LSr

o Need to add IAWG meetings to your calendar? Do so here!

DRAFT 08.08.2024

  1. Administration:

o    Roll call, determination of quorum. 

o    Minutes approval 

§  Jimmy moves for unanimous, seconded by Hughes. Motion passes.

§  2024.07.25 DRAFT Minutes 

o    Kantara Updates

o    Assurance Updates

2.            IAWG Actions/Reminders/Updates:

    • Proposed Meeting Cadence for June/Extended Summer*
      • August 8 (Passkey Presentations), August 22
      • *If rev.4 is released, this cadence will be updated 

3.            ISO 17065 Discussion Items

4.            Group Discussion:  

    • Passkey Presentations
      • Tim Capalli, Okta
      • Dean Saxe, Beyond Identity
      • Alexei Czeskis, ID.me

5.            Any Other Business

 

--

Amanda Gay | Administrative Coordinator

 

Twitter:    @KantaraNews

LinkedIn:  @KantaraInitiative