FIDO — How to configure and use

FIDO support and usage

Pointsharp currently supports FIDO for web resources published in the Gateway Server and also the MFA Adapter for ADFS.

It can be used with external security keys from Feitian, Titan and Yubikey, as well as be used with on-device authenticators such as Windows Hello.

Configuration in Pointsharp ID — token setup

  1. Start the PSID Admin GUI.

  2. Go to the tab Tokens.

  3. Click FIDO.

admin gui tokens fido

Change the Relying Party Name and Relying Party ID to fit your company names.

Parameter Description

Relying Party Name

This name is used when adding a new FIDO security key.

Relying Party Id

This id is used to decide which domain is allowed to be used for registration/authentication with the FIDO security key via Pointsharp ID.

Challenge Size

The length of challenge to be used when doing attestation/assertion.

The default value is set to 16.

Timeout

The time that the caller is willing to wait for the call to complete. This is treated as a hint, and may be overridden by the client.

The default value is set to 3 minutes.

User Verification

Required: This value indicates that the Relying Party requires user verification for the operation and will fail the operation if the response does not have the UV flag set.

Preferred: This value indicates that the Relying Party prefers user verification for the operation if possible, but will not fail the operation if the response does not have the UV flag set.

Discouraged: This value indicates that the Relying Party does not want user verification employed during the operation (for example,, in the interest of minimizing disruption to the user interaction flow).

The default value is Preferred.

Security Key Limit

How many security keys users can have.

Access Timeout

Configuration on if the registered security key should have a access timeout or not.

Attestation Preference

In the context of FIDO, attestation involves the authenticator issuing an attestation statement that contains a cryptographic signature and other data about the authenticator itself.

The Relying Party uses an attestation conveyance preference, to tell which type of attestation information it wants; none, indirect, direct, or enterprise, offering different levels of detail and anonymization.

None: This value indicates that the Relying Party is not interested in authenticator attestation. For example, in order to potentially avoid having to obtain user consent to relay identifying information to the Relying Party, or to save a roundtrip to an Attestation CA.

Indirect: The Relying Party prefers verifiable attestation statements, but allows the client to decide how to obtain such attestation statements. This means that the client may replace the authenticator-generated attestation statements with attestation statements generated by an Anonymization CA, in order to protect the user’s privacy, or to assist Relying Parties with attestation verification in a heterogeneous ecosystem.

Direct: This value indicates that the Relying Party wants to receive the attestation statement as generated by the authenticator.

Enterprise: This value indicates that the Relying Party wants to receive an attestation statement that may include uniquely identifying information.

Large Blob

A FIDO large blob (large binary object), part of the FIDO Client to Authenticator Protocol (CTAP) 2.1 standard and exposed in WebAuthn via the largeBlobs extension, is a mechanism for a website (Relying Party) to store arbitrary, opaque data on a FIDO security authenticator.

Discoverable Credentials

A FIDO discoverable credential, also known as a resident key or a passkey, is a type of cryptographic credential where both the public and the private key material are securely stored in persistent memory directly on the FIDO security authenticator itself.

Configuration in Pointsharp ID - authentication method

authentication fido

  1. Start the PSID Admin GUI.

  2. Go to the tab Authentication.

  3. Click Add and choose FIDO as the Authentication method.

  4. The value Name is a Friendly Name (and is the name that will be seen in the Access Gateway later on).

  5. IP Address is only needed to be entered if the Pointsharp ID Server should use a specific network card with its specific IP. Default leave as it is.

  6. Set the Port for this authentication method to accept incoming authentication requests on. Port number does not need to be edited.

  7. Choose the Authentication method to be used for first step authentication. None if passwordless is to be used.

  8. Set the timeout in minutes for the user session.

  9. Login by using username from Discoverable Credentials in the security key.

  10. Click OK when done, and go to the tab General and restart the service.

Registering tokens — IIS manager and application settings

The process for registering a FIDO token is done in the User Portal, so the first thing to do is to enable the option FIDO token.

There are two options:

  • hardware tokens, and

  • on-device authenticators.

Do as follows:

  1. Start the IIS Manager on the Pointsharp ID Server.

  2. Expand the sites and click User Portal.

  3. Open the Application Settings for the User Portal site.

    user portal token

  4. Locate the value SECURITY_TOKEN_SELECTABLE_TYPES and double-click to edit.

    user portal token fido

  5. FidoTpmToken is on-device authenticators such as Windows Hello. FidoToken is external security keys. Add one or both exactly as shown in screenshot above. Case-sensitive!

  6. The configuration in User Portal is now done and the option for FIDO should now be seen in the User Portal when adding new tokens.

    user portal fido

Adding or edit FIDO authentication on Access Gateway Server

The next step is to add the FIDO authentication method as an option. This is done on the Access Gateway.

Create the FIDO authentication module manually

Create a Form-based authentication (modForms) using FIDO authentication method:

  1. Right-click Modules and select Add Module to run the Module wizard.

  2. Select Authentication and then Form-based Authentication.

  3. Name the module configuration. This will be displayed in the list of module configurations.

  4. Add Authentication method: Select FIDO.

modforms fido

Property Description

Authentication Method

The name of the authentication method to call on the Pointsharp ID. The selected authentication method has to support being used with FIDO authentication.

Discoverable Credentials

Removes username input and gets username from security key via Discoverable Credentials.

Friendly Name

A user-friendly name to be shown when authenticating.

Passwordless

Defines if this method is passwordless or not.

  1. Click Next and Apply.

  2. The Form-based Authentication module (modForms) with FIDO authentication method is now listed under Modules > Authentication, ready to be added to a Listener Rule.

Add FIDO when setting up a new rule on a Listener

  1. Run the Start Listener Configuration Wizard

  2. Choose Microsoft Exchange Server and click Next.

  3. Choose Outlook Web Application (OWA), and click Next.

  4. Create a new Listener, or select from existing Listeners.

  5. KCD options: We recommend to select "This Gateway is not a member of the domain and performs KCD". Click Next to continue setting up the KCD service account.

  6. When Authentication type is selected, choose FIDO:

    modforms wizard fido

Add FIDO to an existing OWA rule

This example shows how to change authentication method to OWA, or to add FIDO as an additional option on an already existing OWA Listener.

  1. Open up the OWA Listener and the /owa/ rule.

    listener owa

  2. Right-click the modForms module and choose Go to module.

    fido modforms

  3. In the modForms module under Authentication Methods, click Add and add the newly created FIDO Authentication method.

  4. Click Save and then Publish to complete the Gateway configuration.

MFA Adapter

When FIDO is used in combination with the MFA Adapter - simply add the new FIDO Authentication Method created in the PSID Admin GUI in the MFA Adapter configuration file as a regular authentication method.

Please see Secure ADFS Access

Authenticator attestation

A whitelist of allowed FIDO authenticators by defining friendly name and AAGUID (FIDO2).

The default value is All:* (Allow all).

Name Version FIDO2 AAGUID

Windows Hello

Software Authenticator

6028B017-B1D4-4C02-B4B3-AFCDAFC96BB2

Windows Hello

VBS Software Authenticator

6E96969E-A5CF-4AAD-9B56-305FE6C82795

Windows Hello

Hardware Authenticator(TPM)

08987058-CADC-4B81-B6E1-30DE50DCBE96

Windows Hello VBS

Hardware Authenticator(TPM)

9DDD1817-AF5A-4672-A2B9-3E3DD95000A9

YubiKey 5 (USB-A, No NFC)

5.1.X

cb69481e-8ff7-4039-93ec-0a2729a154a8

YubiKey 5 (USB-A, No NFC)

5.2.X

ee882879-721c-4913-9775-3dfcce97072a

YubiKey 5 NFC

5.1.X

fa2b99dc-9e39-4257-8f92-4a30d23c4118

YubiKey 5 NFC

5.2.X

2fc0579f-8113-47ea-b116-bb5a8db9202a

YubiKey 5 Nano

5.1.X

cb69481e-8ff7-4039-93ec-0a2729a154a8

YubiKey 5 Nano

5.2.X

ee882879-721c-4913-9775-3dfcce97072a

YubiKey 5C

5.1.X

cb69481e-8ff7-4039-93ec-0a2729a154a8

YubiKey 5C

5.2.X

ee882879-721c-4913-9775-3dfcce97072a

YubiKey 5C Nano

5.1.X

cb69481e-8ff7-4039-93ec-0a2729a154a8

YubiKey 5C Nano

5.2.X

ee882879-721c-4913-9775-3dfcce97072a

YubiKey 5Ci

5.2.X

c5ef55ff-ad9a-4b9f-b580-adebafe026d0

Security Key By Yubico

5.1.X

f8a011f3-8c0a-4d15-8006-17111f9edc7d

Security Key By Yubico

5.2.X

b92c3f9a-c014-4056-887f-140a2501163b

Security Key NFC

5.1.X

6d44ba9b-f6ec-2e49-b930-0c8fe920cb73

Security Key NFC

5.2.X

149a2021-8ef6-4133-96b8-81f8d5b7f1f5