Challenges with Passwordless FIDO2 in an Enterprise Setting: A Usability Study

08/16/2023
by   Michał Kępkowski, et al.
0

Fast Identity Online 2 (FIDO2), a modern authentication protocol, is gaining popularity as a default strong authentication mechanism. It has been recognized as a leading candidate to overcome limitations (e.g., phishing resistance) of existing authentication solutions. However, the task of deprecating weak methods such as password-based authentication is not trivial and requires a comprehensive approach. While security, privacy, and end-user usability of FIDO2 have been addressed in both academic and industry literature, the difficulties associated with its integration with production environments, such as solution completeness or edge-case support, have received little attention. In particular, complex environments such as enterprise identity management pose unique challenges for any authentication system. In this paper, we identify challenging enterprise identity lifecycle use cases (e.g., remote workforce and legacy systems) by conducting a usability study, in which over 100 cybersecurity professionals shared their perception of challenges to FIDO2 integration from their hands-on field experience. Our analysis of the user study results revealed serious gaps such as account recovery (selected by over 60 community.

READ FULL TEXT

page 7

page 8

page 9

page 12

research
07/02/2018

Tap-based User Authentication for Smartwatches

This paper presents TapMeIn, an eyes-free, two-factor authentication met...
research
11/20/2018

Killing the Password and Preserving Privacy with Device-Centric and Attribute-based Authentication

Current authentication methods on the Web have serious weaknesses. First...
research
02/20/2018

Frictionless Authentication Systems: Emerging Trends, Research Challenges and Opportunities

Authentication and authorization are critical security layers to protect...
research
01/04/2023

MetaSecure: A Passwordless Authentication for the Metaverse

Metaverse in general holds a potential future for cyberspace. At the beg...
research
08/20/2019

Securing HPC using Federated Authentication

Federated authentication can drastically reduce the overhead of basic ac...
research
06/15/2020

BubbleMap: Privilege Mapping for Behavior-based Implicit Authentication Systems

Implicit authentication (IA) is gaining popularity over recent years due...
research
09/28/2022

That Depends – Assessing User Perceptions of Authentication Schemes across Contexts of Use

Choosing authentication schemes for a specific purpose is challenging fo...

Please sign up or login with your details

Forgot password? Click here to reset