Configure Support for FIDO U2F Authentication

ActivID AS supports FIDO™ two-factor (U2F) enrollment (via the ActivID Self-Service Portal) and authentication using FIDO-compliant devices such as the HID Crescendo® Key Series.

By default, the ActivID AS includes the following elements for FIDO U2F support:

  • FIDO Device type - DT_FIDO
  • FIDO Credential type - CT_FIDO
  • FIDO Authentication policy - AT_FIDO

To configure FIDO U2F support, you can either use the default elements or create new device types, credential types and authentication policies.

This section uses the default elements to illustrate the configuration steps.

Assign the FIDO Authentication Policy to Users

To allow users to authenticate with a FIDO device, assign the authentication policy:

  1. Log on to the ActivID Management Console as an ActivID Administrator.

  2. In the Access Administration tab, under User Organization, select User Types.

  3. Select the Name for the User Type for the FIDO users (in this examples, Employees User Type).

  4. Select the Authentication Policies tab and set the display to view the Available or All policies.

  5. Select the check box for the FIDO authentication policy.

  6. Click Save.

Configure the FIDO Authentication Policy for Tiered-Authentication

  1. Log on to the ActivID Management Console as an ActivID Administrator.

  2. In the Configuration tab, under Authentication, select Authentication Policies.

  3. Click on AT_FIDO for the FIDO authentication policy.

  4. Select the Advanced tab.

  5. Set the Level of Assurance service name.

  6. Each assurance level describes the recipient’s degree of certainty that the user has presented an identifier that refers to their identity.

    Identity authentication levels of assurance (LOA) service values can be configured with integer values 1, 2, 3, or 4:

    1 = Little or no confidence in the asserted identity’s validity.

    2 = Some confidence in the asserted identity’s validity.

    3 = High confidence in the asserted identity’s validity.

    4 = Very high confidence in the asserted identity’s validity.

  7. From the Base authentication policy drop-down list, select the ‘parent’ policy (in this example, Employee Static Password).

  8. The FIDO authentication policy will be the ‘child’ policy in the tiered-authentication.

    This means the user will need to successfully authenticate with the base authentication policy (that is, a static password), before being prompted to authenticate using FIDO U2F. Both authentications need to succeed for the tiered-authentication to succeed.

  9. Click Save.

Map the Authentication Policies to the GUI Templates

  1. Log on to the ActivID Management Console as an ActivID Administrator.

  2. In the Configuration tab, under Identity Providers, select ActivID Identity Provider.

  3. Go to the Login Pages section.

  4. Click Add to create a new mapping for FIDO U2F.

  5. In the Authentication Class URI field, enter SSP:FIDO.

  6. From the ActivID Authentication Policy drop-down list, select the FIDO authentication policy.

  7. From the GUI Template drop-down list, select the FIDO device authentication template and click Next.

  8. From the ActivID Authentication Policy drop-down list, select the base authentication policy you previously defined as the ‘parent’ policy (in this example, Employee Static Password).

  9. From the GUI Template drop-down list, select the Username password template and click Next.

  10. Review the tiered-authentication policy mapping and click OK.

  11. Click Save.

User can now enroll a FIDO device and use it for two-factor/two-step authentication. The FIDO tiered-challenge/response authentication icon is displayed in the login page. For example:

You can view the audit records related to FIDO authentication using the Reporting tab of the ActivID Management Console.