Skip to main content

FIDO2 WebAuthn global MFA settings

You can allow users to register their FIDO2 authenticators as a login multi-factor authentication (MFA) option. Set how many devices users can register and whether users can remove their own devices. For FIDO2 authenticators, you can require user verification for device registration and authentication.

Note

FIDO2 authenticators could be known as external security keys or built into devices like phones and laptops. In the Identity Platform UI, the term device is interchangeable to mean either device or security key.

When you configure and save the global settings for FIDO2, it automatically generates a FIDO2 registration and management page. Some of the settings in this page also apply to the User Account page, where users can manage their profile and device information all in one place.User Account page configuration

The FIDO2 registration and management page is localized and translated based on the user's browser language settings.

Once end users register a FIDO2 device, it becomes available as a FIDO2 login option to authenticate their access to resources.

Enable FIDO2 devices

Follow these steps to enable FIDO2 devices in the SecureAuth® Identity Platform New Experience.

  1. On the left side of the Identity Platform page, click Multi-Factor Methods.

  2. Click the pencil icon for FIDO2 (WebAuthn).

    The configuration page for FIDO2 (WebAuthn) appears.

  3. In the Register and Manage Devices section, set the following configurations.

    Authentication Policy

    Select the login authentication policy for the FIDO2 registration page.

    The authentication policy includes the login workflow to register the FIDO2 device.

    Data Stores

    Enter the data stores to to authenticate and allow user access to register their FIDO2 device. Start typing to bring up a list of data store names. You can enter more than one data store.

    Groups

    Use one of the following options:

    • Slider in the On position (enabled): Allow users from every group in your selected data stores access to this FIDO2 registration page.

    • Slider in the Off position (disabled): Enter the specific groups who are allowed access to this FIDO2 registration page.

    Realm Number

    Select the Realm Number to use for this application.

    The Identity Platform allows only one FIDO2 enrollment realm. This field appears when configuring the page for the first time.

    Custom Application URL

    Enter a unique URL alias to simplify access and provide a user-friendly path for logins.

    The allowed characters are letters, numbers and a dash (-).

    fido2_24_4_3.png
  4. In the User Device Settings section, set the following configurations.

    Maximum Device Count

    Set how many FIDO2-enabled devices a user can register.

    Valid values are No limit, or 1 through 10.

    Allow device replacement

    Set whether to allow replacement of a device when the user has reached the maximum number of registered devices.

    The next admin setting determines which device to replace. This information is not displayed to the end user; they are only prompted to replace a device.

    Replacement Order

    This option is active only when the Allow device replacement option is selected. Choose which device to automatically replace:

    • Oldest by creation date/ time - the last time the user registered the device

    • Oldest by date time last accessed - the last time the device was used in the system

    Allow device removal

    Set whether to allow users to remove their own device from the FIDO2 registration and management page.

    Device Display Setting

    Set how users view their devices on the FIDO2 enrollment page.

    The options are:

    • Card view

    • Table view

    fido_user_device_settings.png
  5. In the Device Restriction section, set whether users must provide verification (for example, PIN) for enrollment and verification while using a FIDO2 authenticator, like a security key or mobile device.

    Note

    Some browsers and operating systems might not have PIN support for FIDO2 authenticators. To learn more, see Admin troubleshooting PIN support for FIDO2 WebAuthn.

    70487381.png
  6. In the Email Notification section, set whether to send an email to the user when they enroll or remove a FIDO authenticator in their profile.

    Then, select which email to send to the user. Make sure you have the emails mapped and configured in your data store properties.

    To customize the email, see How to send a confirmation email about a FIDO2 device

    fido2_global_mfa_002.png
  7. In the Advanced Settings section, set whether to allow registration of any FIDO2 authenticator by default. Or, you can limit registrations to certain FIDO2 authenticator types.

    Show Advanced Settings during enrollment

    Indicate whether to show the Advanced Settings during enrollment of the FIDO2 authenticator.

    Use this setting only for end users who understand the FIDO2 WebAuthn specifications. Otherwise, the default settings are correct for most users.

    Attestation Type

    Attestation type is a FIDO protocol that sends identifying data about the device model.

    • None. Do not sent authenticator data to the server. (Default setting)

    • Indirect. Requires user consent. Send anonymized authenticator data to the server.

    • Direct. Requires user consent. Send authenticator data to the server.

    Authenticator Type

    Authenticator type enables you to allow or restrict certain authenticator types.

    • Unspecified. Allow all authenticator types like built-in biometric readers and separate (roaming) security keys. (Default setting)

    • Cross platform. Allow only separate (roaming) authenticators like smartphones and security keys (like YubiKey, Titan Security Key, etc.)

    • Platform (TPM). Allow only built-in (bound) authenticators on the same device like Touch ID, Face ID, and Windows Hello.

    Default option

    Recommended default settings are:

    • Attestation Type – None

    • Authenticator Type – Unspecified

    If you change the default settings, take note of the following:

    • It will allow registration of new devices only to the selected Authenticator Type. Users with existing devices in this category can still authenticate.

    • It will block all existing devices that do not belong to the selected Authenticator Type. Users with existing devices in this category will not be able to authenticate.

    fido2_global_mfa_001.png
  8. Set whether to Validate device registration with FIDO Alliance during enrollment.

    Note: Most devices comply, some unregistered devices like Touch ID on older MacBooks might fail enrollment.

    fido2_global_mfa_004.png
  9. Optional. To allow or block certain FIDO devices, enable Device Permissions.

    You must first select the Validate device registration with FIDO Alliance check box.

    Result: When this setting is ON, it displays more settings for device permissions.

  10. If you enabled Device Permissions, set the following:

    1. In the Default Permission,section set the default setting for all devices:

      • Attest (verified) – Permit all devices verified by the FIDO Alliance, except those you choose to block.

      • Allow – Permit all devices, whether verified by the FIDO Alliance or not, except those you choose to block.

      • Block – Block all devices, except those you choose to permit (allow or attest).

    2. Next, in the Individual Device Permissions section, select the check box for each device and specify the following (as applicable):

      • Attest – Allow this device verified by the FIDO Alliance metadata service.

      • Allow – Allow this device whether verified by the FIDO Alliance or not.

      • Block – Block this device.

      You can also Add a FIDO Device. You will need provide a description and the AAGUID (Authenticator Attestation Global Unique Identifier) of the device.

      fido2_global_mfa_005.png

    Result: All devices that you block, allow, or attest appear in a list below the Individual Devices Permissions section.

    You can search by device description or AAGUID.

    fido2_global_mfa_006.png

    Blocked device after removal

    A user enrolls FIDO2 device, but as an admin, you remove it later from the Individual Device Permissions list. The device will still show up for the user in their profile, but it will be blocked from use.

  11. Save your changes.

    Result: This creates the FIDO2 Enrollment page and provides a URL to this page.

    70487382.png

    End users can register their FIDO2 devices in the following ways:

    • On the User Account page where they can manage their profile and device registrations in one place.User Account page configuration

    • On the standalone FIDO2 Enrollment page. Share this URL with your end users to register and manage their FIDO2 devices.

    Note

    If you turn off FIDO2 as a login method, it prevents end users from seeing it as an MFA choice during login. However, the FIDO2 Enrollment URL page stays active for end users to manage their FIDO2 devices.

Enable FIDO2 devices in the Advanced Settings

You can enable FIDO2 WebAuthn as authenticators for logins to realms created in the Identity Platform Advanced Settings (formerly Classic Experience).

To enable FIDO2 devices in Advanced Settings
  1. In the Advanced Settings, select the Multi-Factor Methods tab.

  2. In the Multi-Factor Configuration > FIDO2 (WebAuthn) Settings section, set the following:

    FIDO2 Devices

    Set to Enabled.

    Classic_ui_enable_fido2.png
  3. To continue with the FIDO2 enrollment page configuration, click the Fido Enrollment Page Settings link.

    You will be redirected to the FIDO2 (WebAuthn) settings page in the New Experience.

Next steps

  • Configure a policy to use FIDO2 authenticators as MFA in the login workflow. See Policy configuration - Multi-factor methods.

  • Share the User Account page URL with your end users so they can register their FIDO2 devices.User Account page configuration

  • Not using the the User Account page? Share the FIDO2 Enrollment URL with your end users. For example, to encourage end users to register their FIDO2 devices, customize the "Passwordless with FIDO2" setup instructions available in the SecureAuth Onboarding Toolkit.User Account page configuration

    Note

    The FIDO2 registration and authentication web page for your end users requires HTTPS in the URL.