--
You received this message because you are subscribed to the Google Groups "FIDO Dev (fido-dev)" group.
To unsubscribe from this group and stop receiving emails from it, send an email to fido-dev+u...@fidoalliance.org.
To view this discussion on the web visit https://groups.google.com/a/fidoalliance.org/d/msgid/fido-dev/4cad31a9-c747-413a-82df-3154bb767fe9n%40fidoalliance.org.
It all depends on the implementation of the FIDO server, and the implementation of the application using the FIDO server.
While I am confident others will elucidate on how their FIDO servers will handle this, here is how StrongKey's FIDO Certified server - StrongKey FIDO Server (SKFS) - handles this:
The Authenticate presentations I referenced can all be found here: https://authenticatecon.com/speaker/arshad-noor/
Hope that helps.
Arshad Noor
StrongKey
I may be wrong on this but I believe Open Finance Brazil refers to the exchange of customer data, with customer permission of course, and not inclusive of customer authentication credentials which of course should remain confidential.
As for RpID, there’s the requirement that it be associated with service (RP) URL during FIDO2 registration.
Regards,
--
The use-case is not uncommon. This is the mandate of Strong Customer Authentication (SCA) in the EU PSD2 regulation.
Here is how the FIDO Alliance claimed it meets the Regulatory
Technical Standards (RTS) for SCA:
https://fidoalliance.org/how_fido_meets_the_rts_requirements.
There are pictures and regulatory statements on how the law must
be complied with. The JWR journey is no different, IMO.
While the W3C is trying to leverage FIDO/WebAuthn to support SCA
using a different API - Secure Payment Confirmation (SPC) - that
API is not a standard yet. Last I looked at it 3-4 years ago, it
would not meet stipulations in the RTS. Perhaps the SPC Working
Group has updated their specification - I cannot tell since I
have not read the spec recently.
In order to meet Brazil's Open Finance regulation and stipulations for JWR, it cannot be done with a browser using the WebAuthn Level-2 API - Level-3 is a different matter, as I've already stated earlier. However, even though some browsers may have implemented some Level-3 features, I'm not sure you can comply with Brazilian law to use a FIDO Certified implementation if the Level-3 API itself is not a standard yet.
This brings you back to using what is defined in WebAuthn Level-1 and/or Level-2 (for which FIDO Certification existed/exists). The flow I mentioned earlier is the only technical way I can think of, where one can implement JWR using existing standards and its implementations.
Arshad
- -- with portuguese, this specification is based on Open Finance Brasil
Is it correct to the FIDO2 proposition to implement such a protocol when a company holds a FIDO2 Server that may represent several other companies (instead of subdomains)?
A company's registered credentials are distributed in several FIDO2 servers which they have no control over, and they are bound to trust the authentication from remote servers to perform their operations. This seems to be against what is proposed by FIDO and WebAuthn.
Confidentiality note: This e-mail may contain confidential information from Nu Holdings Ltd and/or its affiliates. If you have received it by mistake, please let us know by e-mail reply and delete it from your system; you may not copy this message or disclose its contents to anyone; for details about what personal information we collect and why, please refer to our privacy policy.
--
You received this message because you are subscribed to the Google Groups "FIDO Dev (fido-dev)" group.
To unsubscribe from this group and stop receiving emails from it, send an email to fido-dev+u...@fidoalliance.org.
To view this discussion on the web visit https://groups.google.com/a/fidoalliance.org/d/msgid/fido-dev/4cad31a9-c747-413a-82df-3154bb767fe9n%40fidoalliance.org.
Confidentiality note: This e-mail may contain confidential information from Nu Holdings Ltd and/or its affiliates. If you have received it by mistake, please let us know by e-mail reply and delete it from your system; you may not copy this message or disclose its contents to anyone; for details about what personal information we collect and why, please refer to our privacy policy.--
You received this message because you are subscribed to the Google Groups "FIDO Dev (fido-dev)" group.
To unsubscribe from this group and stop receiving emails from it, send an email to fido-dev+u...@fidoalliance.org.
To view this discussion on the web visit https://groups.google.com/a/fidoalliance.org/d/msgid/fido-dev/698abbe6-d12d-4bfc-bd3b-74f0227d5030n%40fidoalliance.org.
I confirm that a FIDO Certified implementation meets the requirements of Brazil’s Open Finance.
More information is coming, and I’ll be sure to share it here when it becomes available.
Thank you,
Paul
Paul Heim | Certification Director | FIDO Alliance
pa...@fidoalliance.org | www.fidoalliance.org
Join us Oct. 14-16 in Carlsbad, CA or virtually! Learn more at authenticatecon.com
To view this discussion on the web visit https://groups.google.com/a/fidoalliance.org/d/msgid/fido-dev/d9ca3004-2b33-4bbd-b9cf-1527c25fdf8e%40strongkey.com.
Hello,
This seems to be a complex approach to solving what is otherwise a simple problem. Actually two problems that I separate for simplification purposes.
The architecture you propose raises security concerns whilst at the same time potentially sacrificing the mutual authentication feature of FIDO2 which to many is one of FIDO2’s strengths.
There may be a more straightforward approach to accomplish the same goals as I now understand them.
For the authentication part of the problem:
This then leaves the second problem of sharing customer information between Alpha, Beta, and Gamma separate and apart from the complexities of identity verification and authentication.
All,
I would like to provide additional context for my initial September 26, 2024, post. Please see the additional context and the original post as follows:
Re: Clarification to “Multiple Relying Party in a single FIDO2 Server”
I would like to clarify that anyone choosing to use a FIDO Certified/FOSS product from its original manufacturer uses a certified solution for their deployment. This is outlined in certification policies and TMLA documentation at https://fidoalliance.org/. StrongKey FIDO Server (SKFS) is an example of this scenario, receiving FIDO Certification in 2019.
Refer to the FIDO Certified Database for such details: https://fidoalliance.org/certification/fido-certified-products/.
FIDO Certification Policies and TMLA should be reviewed completely to understand the nuances of the ongoing maintenance of certifications, delta/derivative/recertification, and other requirements for all FIDO Certified Products. FIDO Certification can be contacted at certif...@fidoalliance.org for more information.
>> Original Post to “Multiple Relying Party in a single FIDO2 Server”
On 9/26/24 6:16 PM, pa...@fidoalliance.org wrote:
FIDO Certified does not apply to open-source solutions.
Please feel free to directly contact me if you have any questions or would like to discuss this in detail.
Thank you,
Paul
Paul Heim | Certification Director | FIDO Alliance
pa...@fidoalliance.org |www.fidoalliance.org
>> send an email to fido-dev+unsubscribe@fidoalliance.org
>> <mailto:fido-dev+unsubscribe@fidoalliance.org>.