{"id":8265,"date":"2022-09-30T11:58:04","date_gmt":"2022-09-30T10:58:04","guid":{"rendered":"https:\/\/emtunc.org\/blog\/?p=8265"},"modified":"2022-09-30T12:04:31","modified_gmt":"2022-09-30T11:04:31","slug":"passkeys-are-great-but-are-they-suitable-for-the-enterprise","status":"publish","type":"post","link":"https:\/\/emtunc.org\/blog\/09\/2022\/passkeys-are-great-but-are-they-suitable-for-the-enterprise\/","title":{"rendered":"Passkeys are great but are they suitable for the enterprise?"},"content":{"rendered":"\n<p>A mouthful of a title but in this blog, I&#8217;ll try to answer this question based on my own understanding and experiences deploying WebAuthn.<\/p>\n\n\n\n<p>Firstly, if you don&#8217;t know what Web Authentication is (commonly referred to as WebAuthn), it might be worth having a quick read of my  <a href=\"https:\/\/emtunc.org\/blog\/01\/2022\/webauthn-the-future-of-strong-user-authentication\/\" data-type=\"post\" data-id=\"8021\">previous blog post<\/a> as the WebAuthn standard is the foundational building block for passkeys.<\/p>\n\n\n\n<!--more-->\n\n\n\n<p>So, if passkeys are based off of the WebAuthn standard, what makes them special? A couple of things actually&#8230;<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>Up until now, WebAuthn platform credentials were device bound.  If you generate a WebAuthn credential on your phone, by design that credential will never leave the device (this isn&#8217;t a bad thing by the way; actually, it&#8217;s probably preferable to have the option in a secure enterprise setting which I&#8217;ll come on to later).<br><br>Passkeys change things up by synchronising these credentials with your cloud account (Apple ID, Microsoft account, Google account) therefore reducing the likelihood of being locked out of accounts due to a lost, stolen or damaged authenticator.<br><br><\/li><li>Another feature that helps enable passkeys across the ecosystem is the FIDO Cross Device Authentication flow that allows you to use a passkey on one device to sign in on another. For example, using a passkey on your Google Pixel to sign in to a website on Windows.<\/li><\/ol>\n\n\n\n<h2 class=\"wp-block-heading\">WebAuthn in the enterprise<\/h2>\n\n\n\n<p><em>When<\/em> WebAuthn is deployed in the enterprise, typically it&#8217;s via the use of roaming authenticators (commonly Yubikeys), platform authenticators (TouchID\/FaceID\/Windows Hello) or a combination of both.<\/p>\n\n\n\n<p>In my previous role, I deployed two Yubikeys to each member of staff; one for daily use and the other which would serve as a backup but also crucially, it provided a way to bootstrap access from the user&#8217;s iPhone\/Android.<\/p>\n\n\n\n<p>In my current role, I decided not to go down the path of  roaming authenticators but instead rely on platform authenticators. They&#8217;re less costly (comes free with the laptop!) and provide a slightly better user experiencecccjgjgkhcbbirdrfdnlnghhfgrtnnlgedjlftrbdeut<\/p>\n\n\n\n<p>To summarise, we get the following security benefits:<br><br>\u2705 Strong resistance to phishing attacks<\/p>\n\n\n\n<p>\u2705 Strong guarantees that the user authenticating is the same person who set-up the keys. i.e., it is designed to be incredibly difficult, if not impossible to extract the credentials out of the authenticator. Therefore it is fair to say that when <em>Mr. Wick<\/em> logs in to an application, we have an extremely high confidence that it is indeed <em>Mr. Wick<\/em>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Passkeys in the enterprise<\/h2>\n\n\n\n<p>The ability to bootstrap user authentication from another device is a killer feature and should help drive adoption. Widely used Identity Providers currently have <em>no way<\/em> of supporting platform authenticators on more than one device <em>without<\/em> falling back to weaker authentication (at the expense of a worse security and user experience).<\/p>\n\n\n\n<p>As an Okta user my self &#8211; passkeys are a game changer. I no longer need to go through the painful process of adding users to temporary exception groups simply because they want to sign in to an application from their mobile device. Instead, I can include the bootstrap process of setting up WebAuthn on both laptop and phone in the onboarding guide.<\/p>\n\n\n\n<p class=\"has-normal-font-size\"><strong>Saying that, Apple has set a precedent that I fear Google and Microsoft will follow.<\/strong><\/p>\n\n\n\n<p>The Apple implementation of passkeys has <em>removed<\/em> the ability for WebAuthn credentials to be <em>device bound.<\/em> You have <em>no<\/em> choice but to synchronise them to your Apple ID account. The same Apple ID that is a common phishing target for criminals and the same Apple ID that cannot be protected with phish resistant MFA (actually SMS is always available as a fallback)<\/p>\n\n\n\n<p>To summarise, this is where I stand on the matter:<br><br>\u2705 Passkeys could be used to bootstrap other devices so that staff can set-up strong user authentication on multiple devices. This is awesome and should help drive adoption because it should no longer be necessary to purchase hardware security keys<\/p>\n\n\n\n<p>\u274c We&#8217;ve gone from <em>device bound, strong-guarantees-its-the-same-user<\/em> credentials to <em>your credentials <strong>must<\/strong> be synchronised to this user&#8217;s personal iCloud account which <span style=\"text-decoration: underline;\">can<\/span> be phished<\/em><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Summary<\/h2>\n\n\n\n<p>We seem to be missing an opportunity to have the best of both worlds for consumer and enterprise adoption.<\/p>\n\n\n\n<p>By all means, drive hard the adoption for consumers and synchronise their credentials to their cloud accounts. I have no doubt that both user experience and security will increase.<\/p>\n\n\n\n<p>However, the threat models faced by enterprises aren&#8217;t necessarily the same as those that consumers face and therefore I think it would be a mistake to replace an existing strong process with a weaker one in the name of security and adoption; especially when there is little to no technical or UX reason to not give customers the <em>choice<\/em>.<\/p>\n\n\n\n<p>For the avoidance of doubt, I think organisations coming from weak, phishable MFA <em>will<\/em> benefit from passkeys; regardless of if they are synchronised or not. Nonetheless, I believe that if your organisation (like the last two I have worked for) is already immersed in the WebAuthn world then this could be a step backwards for you.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A mouthful of a title but in this blog, I&#8217;ll try to answer this question based on my own understanding and experiences deploying WebAuthn. Firstly, if you don&#8217;t know what Web Authentication is (commonly referred to as WebAuthn), it might be worth having a quick read of my previous blog post as the WebAuthn standard [&hellip;]<\/p>\n","protected":false},"author":32,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"templates\/template-full-width.php","format":"standard","meta":{"jetpack_post_was_ever_published":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-8265","post","type-post","status-publish","format-standard","hentry","category-tech"],"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/p1trTO-29j","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/emtunc.org\/blog\/wp-json\/wp\/v2\/posts\/8265","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/emtunc.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/emtunc.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/emtunc.org\/blog\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/emtunc.org\/blog\/wp-json\/wp\/v2\/comments?post=8265"}],"version-history":[{"count":38,"href":"https:\/\/emtunc.org\/blog\/wp-json\/wp\/v2\/posts\/8265\/revisions"}],"predecessor-version":[{"id":8305,"href":"https:\/\/emtunc.org\/blog\/wp-json\/wp\/v2\/posts\/8265\/revisions\/8305"}],"wp:attachment":[{"href":"https:\/\/emtunc.org\/blog\/wp-json\/wp\/v2\/media?parent=8265"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/emtunc.org\/blog\/wp-json\/wp\/v2\/categories?post=8265"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/emtunc.org\/blog\/wp-json\/wp\/v2\/tags?post=8265"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}