If you're new to the world of the FIDO Alliance, we recommend reading our FIDO 101 article, and our in-depth guide to FIDO Protocols.
In the last week of March 2020, the White House Office of Management and Budget (OMB) issued a new policy focused on giving government agencies new flexibilities as agencies move to telework due to the COVID-19 pandemic. This includes letting agencies use other types of authentication outside of the smart card/Public Key Infrastructure (PKI) combination, which is the government’s standard.
If you don’t work for the government, you might wonder “Why should I care about this?” Although the memo is specific to government agencies, companies across industries that use smart cards and/or PKI for authentication are going through the same struggle: how to keep their data systems secure while working with remote teams.
Organizations face three problems as they move to telework:
This memo gives government agencies some much-needed flexibility to go beyond PIV/PKI combinations for authentication purposes. While most organizations don’t need to comply with government policies, the following sections of the memo provide solid guidelines that should be followed by any organization wanting to maintain a high level of security:
Among the silver linings of this worldwide pandemic is that it has brought the opportunity to introduce significant operational changes in your organization without major resistance from employees; after all, we’re all having to adapt to new ways of working.
We recognize organizations and government agencies are unlikely to duplicate their previous efforts to deploy alternative authentication and data security approaches after having invested hundreds of millions of dollars in vetting humans in the process of issuing PIV/CAC/National ID and similar credentials.
Therefore, StrongKey has created PKI2FIDO, a free and open-source web application to help organizations deploy Fast Identity Online, version 2 (FIDO2)-based authentication. Among the benefits of moving beyond PKI or using FIDO based strong authentication where PIV authentication is infeasible, are the shorter implementation time and lower price. PKI2FIDO enables this seamlessly today without licensing costs per user.
Based on the free and open-source standards of the FIDO Alliance, PKI2FIDO is a single-page application that enables holders of X.509 digital certificates (implemented in the PIV cards and the CACs) to strongly authenticate with their digital certificate to the PKI2FIDO web application and register a FIDO2 Authenticator with a FIDO server in their enterprise.
Going through the implementation process of PKI2FIDO as a new authentication solution may sound daunting at first, but it doesn’t have to be. Here’s a step-by-step view of a deployment:
PKI2FIDO allows an organization to enable its users to strongly authenticate to the web application with their smart card/digital certificates, and to register one or more FIDO security keys on their enterprise FIDO server using one or more FIDO U2F Authenticators. Once Authenticators are registered, they can be used to strongly authenticate to FIDO-enabled web applications supported within their enterprise/agency.
If you would like to discuss using the PKI2FIDO web application, please contact us at getsecure@strongkey.com or request a free security assessment.