Learn why synced passkeys are AAL2- & device-bound passkeys are AAL3-compliant after NIST's SP 800-63B supplement & what ENISA, NCSC & BSI say about passkeys.
Vincent
Created: April 24, 2024
Updated: September 5, 2024
Our mission is to make the Internet a safer place, and the new login standard passkeys provides a superior solution to achieve that. That's why we want to keep you up to date on the latest developments in the industry.
5.1 What are Authenticator Assurance Levels (AALs)?
5.1.1 Why are Synced Passkeys AAL2-Compliant?
5.1.2 Why are Device-Bound Passkeys AAL3-Compliant?
5.2 What are the New Requirements?
5.2.1 General Requirements
5.2.2 Federal Enterprise Requirements
5.3 How Should WebAuthn Properties be Set?
5.4 How is Attestation Affected by the NIST Supplement?
5.5 New Threat Model and Mitigations
8.1 European Union: ENISA (European Union Agency for Cybersecurity)
8.2 UK: NCSC (National Cyber Security Centre)
8.3 Germany: BSI (Bundesamt für Sicherheit in der Informationstechnik)
As technology moves forward, policies often struggle to keep pace. In authentication, guidance has typically been password-centric, originating in a less complex digital era in the early days of the world wide web in the 1990s. That's why it's great to see NIST (National Institute of Standards and Technology), one of the most influential organizations in standards and technology, respond to the rising adoption of (recently Mastercard, Finom or Revolut) and push passkeys them with a clear statement. The release of NIST Special Publication (SP) 800-63B's (Digital Identity Guidelines: Authentication and Lifecycle Management) supplement officially confirms synced passkeys as meeting Authentication Assurance Level 2 (AAL2) standards.
This new supplement is released before the Revision 4, because the great adoption of passkeys outpaces the current documentation cycle. Synced passkeys (the most user-friendly way form of passkeys) are transforming how private keys are managed. They carry the promise of stronger security through phishing-resistant authentication, simplified recovery processes, and better convenience.
However, with this evolution, new challenges emerge, necessitating a thorough understanding of threats and a proper implementation strategy. This blog post will help to understand the meaning of this supplement and helps developers and product managers to leverage passkeys for better user authentication.
NIST, the National Institute of Standards and Technology, is a federal agency within the U.S. Department of Commerce. Tasked with promoting innovation and industrial competitiveness, NIST advances measurement science, standards, and technology in ways that enhance economic security and improve our quality of life.
At the heart of NIST's mandate is the development of technology, metrics, and standards to drive innovation and economic growth. When it comes to digital identity and cybersecurity, NIST's guidelines are the gold standard. They lay down the foundational principles for securing digital identities and provide comprehensive frameworks for authentication and lifecycle management, influencing both public and private sectors. NIST does not create laws, but some of its standards are binding for federal agencies in the USA. That is why their significance is so considerable.
By aligning with NIST guidelines, developers and product managers can ensure that their products meet high security and interoperability standards, which are critical for user trust and regulatory compliance.
Subscribe to our Passkeys Substack for the latest news, insights and strategies.
SubscribeNIST has provided a clear stance on the roles of passkeys in the context of modern authentication requirements. The new supplement shines a spotlight on passkeys, particularly synced passkeys, positioning them as meeting Authentication Assurance Levels AAL2 requirements, and in the case of device-bound passkeys, AAL3 (more on that below).
Synced passkeys are now recognized for their phishing-resistant attributes when deployed according to NIST guidelines, marking a significant endorsement of their security capabilities. Read this article to better understand the distinction between synced and device-bound passkeys.
The significance of NIST's decision to endorse passkeys can't be overstated. It can be a real booster for the adoption of passkeys, especially in regulated industries like banking or healthcare.
Why does this matter so much?
This decision by NIST will help the passkey ecosystem overall. Passkeys are now officially aligning with the high standards of Authentication Assurance Levels. This can be seen as an indirect request for industries to move forward with adopting passkeys.
Become part of our Passkeys Community for updates and support.
JoinLet’s have a more in-depth analysis of the new Supplement 1 NIST SP 800-63B.
First of all, we need to understand what Authenticator Assurance Levels are and what their impact is.
Authenticator Assurance Levels (AALs) are part of NIST's framework for digital identity guidelines, defining the robustness of authentication processes. These levels measure the confidence in a user’s identity by assessing the strength and assurance of the authentication process. See the following general definition to learn more about the three levels:
AAL1 | AAL2 | AAL3 | |
---|---|---|---|
Key Characteristics | Single-factor | Two-factor or Multi-factor | Multi-factor with hard cryptographic proof of identity |
Example Use Cases |
|
|
|
Sample Authenticators |
|
|
|
Man-in-the-Middle resistance | Required | Required | Required |
Phishing Reistance | Not required | Recommended | Required |
Verifier-compromise resistance | Not required | Not required | Required |
Replay resistance | Not required | Required | Required |
Authentication intent | Not required | Recommended | Required |
In the following, you’ll find an overview of AAL2 characteristics and how synced passkeys fulfill them.
Requirement | AAL2 | Synced Passkeys |
---|---|---|
Man-in-the-Middle Resistance | Required | Achieved: Synced passkeys ensure that all authentication data is transmitted through secure and encrypted channels. |
Verifier-Impersonation Resistance | Not required | Achieved: Synced passkeys generate key pairs that are uniquely tied to the originating domain (the relying party ID), preventing their misuse on any other site and preventing attempts by malicious websites to capture and misuse authentication data. |
Verifier-Compromise Resistance | Not required | Achieved: Synced passkey maintain only public keys on the server-side, which cannot be used for authentication on its own (successful logins always require the corresponding private key). Private keys, managed by the synchronization service, are always encrypted using approved encryption methods, and access to them is strictly controlled to prevent unauthorized use. |
Reply Resistance | Required | Achieved: Synced passkeys are designed to combat replay attacks by incorporating a unique, one-time-use nonce into each authentication action, ensuring that authentication cannot be reused in subsequent transactions. |
Authentication Intent | Recommended | Achieved: Synced passkeys necessitate a deliberate action from the user, such as entering a PIN or using a biometric (e.g. Face ID, Touch ID), to initiate the authentication process. This step serves as a demonstration of the user's active participation and intent to authenticate. |
Note that we left out “Records Retention Policy” and “Privacy Controls”, as they are required by all Authenticator Assurance Levels.
Another part of the supplement addresses further details concerning the configuration of synced passkeys. To fulfill AAL2 standards, synced passkeys must either initiate a local authentication event to access the locally stored private key or must be utilized alongside an additional authentication method (e.g. password or OTP) if a local authentication method is absent. Within the WebAuthn standard, this is denoted by the User Verification flag found in the authenticator data.
After assessing synced passkeys as AAL2-compliant, we now take a look at device-bound passkeys to understand why they are AAL3-compliant.
From purely reading the special publication and the supplement, it’s not immediately obvious why synced passkeys are only AAL2-compliant, while device-bound passkeys are AAL3-compliant (according to an official statement by FIDO Alliance Executive Director & CEO Andrew Shikiar). The main reason we have identified that supports this distinction is that AAL3 requires very high confidence (not just high) that the claimant controls authenticators bound to the subscriber's account. Additionally, AAL3 mandates the use of a hardware-based authenticator, which could be interpreted as being device-bound.
Before the supplement, the authenticator’s ability to clone a cryptographic authentication key from one device to another was restricted. However, synced passkeys explicitly promote the sharing / cloning of passkeys throughout a passkey provider.
The following requirements are now applicable for synced passkeys that make them AAL2-compliant.
Moreover, in federal enterprise scenarios, some additional requirements are in place (e.g. government contractors, government employees or mission partners but not government-to-consumer or public-facing use cases)
In the following, we analyze WebAuthn server options and how they should be set if the relying party is a federal agency, so that AAL2 threats can be mitigated appropriately.
Flag | Description | Requirements & Recommendations |
---|---|---|
User Present (UP) | This flag serves to validate user interaction with the authenticator, such as by pressing a button on a hardware security key that’s been connected to a USB port. | Federal agencies shall verify that the User Present flag has been activated, as it affirms the user's active participation, thus supporting the Authentication Intent. |
User Verified (UV) | This indicates that user verification has been performed on the authenticator by employing one of the designated verification methods. | Federal agencies shall acknowledge User Verified as a preferred status. All assertions shall be scrutinized to confirm the presence of the UV flag. This serves to identify whether the authenticator can be recognized as a multi-factor cryptographic tool. Absence of user verification prompts federal agencies to classify the authenticator as a single-factor tool by integrating a specific memorized piece of information to the authentication process. |
Backup Eligibility | Specifies if the authenticator has the capability to be synced with other devices, which implies the possibility of storing the passkey outside the original device. It’s crucial to understand that the ability to sync does not necessarily imply it has occurred. | Federal agencies may utilize this flag if they aim to enact policies limiting the use of synced passkeys. Such policies are crucial to differentiate between device-bound passkeys and synced passkeys. |
Backup State | Confirms whether a passkey has already been synced to another device. | Federl agencies may employ this flag if they wish to place limitations on the use of passkeys that are synced. For services facing the general public, it is advised against altering acceptance based on this flag to prevent negatively impacting user experience. However, within an enterprise setting, this flag can be instrumental in establishing restrictions on the use of synced passkeys for particular applications. |
In the following, you find PublicKeyCredentialOptions
that would indicate an AAL2-compatible passkey-login.
Here’s an attestation object that adheres to AAL2.
Agencies might find it beneficial to get more details about the origins and features of the synced passkeys. In WebAuthn, certain authenticators are equipped with attestation features that help identify the manufacturer and capabilities of the authenticator in question. For enterprise-level applications, it's advised that agencies should incorporate attestation that is supported by the passkey providers. Ideally, this should be in the form of an enterprise attestation wherein the Relying Party (RP) is able to request information that uniquely identifies the authenticator. However, attestation for widespread public applications should not be used. Insisting on attestation in these cases could potentially rejecting public users' synced passkeys that lack attestation support. This could lead them towards alternative authentication methods that are less secure and more susceptible to phishing, like SMS OTP.
The following table provides an overview of the new threat model for synced passkeys and how these threats can be mitigated.
Threats & Challenges | Description | Synced Passkey Mitigations |
---|---|---|
Risk of Unauthorized Sharing or Misuse of Private Keys | Synced passkeys allow the sharing of private keys across devices, leading to potential misuse. |
|
Compromised Sync Infrastructure | The passkey sync service can be at risk if it's cloud-based and is connected to multiple devices. |
|
Unauthorized Cloud-Based Sync Service and Recovery Access | The ability to recover synced keys through cloud-based account recovery poses a potential security issue. |
|
Revocation Issues with Synced Passkeys | Central revocation of synced passkey access for multiple sites is difficult because these devices use unique, RP-specific keys, unlike traditional PKI systems. |
|
When the SP 800-63B guidelines were initially released in 2017, critical technical specifications such as the CTAP and WebAuthn (collectively referred to as FIDO2 when combined) had not been established, nor was there a mature, well-defined range of implementations. At that time, due to the available types of authenticators, the guidelines limited the ability to sync a key across devices for MFA. However, there has been a significant evolution within the past two years. Presently, most leading platform providers (e.g. Apple, Google) have adopted advanced, synced passkeys, which provide several advantages, such as enhancing resistance to phishing attacks, the capacity to bind credentials to specific relying parties, removing the necessity to send passwords across networks, streamlining the process of account recovery, and allowing the use of various device-native biometrics and PINs as a second factor with the stored private key. Additionally, they provide a level of convenience that aligns with the growing trend of using multiple devices across different platforms.
Take, for instance, scenarios where a combination of a password and OTP has been used so far. With the updated guidance from NIST, a synced passkey is not only adequate for fulfilling AAL2 criteria but is superior. In nearly every implementation scenario, the introduction of synced passkeys marks a considerable advancement in security and user experience over the authentication methods currently in use, which are predominantly vulnerable to phishing attacks – be it passwords, OTPs or TOTPs.
As we already mentioned above, NIST is the gold standard for providing guidance on new standards in the digital authentication space. Other regulatory bodies and organizations are yet to deliver clear statements but after this move by NIST it’s only a matter of time until others catch up (even the data-privacy- and -security-driven European and German bodies). Nevertheless, let’s have a brief look at the stance of the ENISA (EU), NCSC (UK) and BSI (Germany) on synced passkeys.
No clear statement on passkeys (be it device-bound or synced) or WebAuthn in general yet by ENISA.
However, they cleared recognized FIDO as an authentication standard for eIDAS2.
No clear statement on passkeys (be it device-bound or synced) or WebAuthn in general yet by NCSC.
However, the CTO Ollie Whitehouse predicts a great decline in passwords use within a decade. He also mentions that “passkeys could be the modern answer to passwords“.
In March 2024, the BSI pushed passkeys as the new standard for authentication via their social media channels. Besides, they published two major web pages explaining passkeys to the general public and also the cryptography behind it. This recent push can be seen as recognition of passkeys but more details are yet to be published.
The endorsement by NIST of synced passkeys as AAL2-compliant represents a major advancement in modern authentication. By recognizing synced passkeys, NIST not only enhances the security framework for digital identities but also paves the way for broader adoption across various sectors. Organizations across the globe, especially those in regulated industries, now have the confidence to integrate passkeys and roll them out to their users, thanks to the clear guidelines and standards set by NIST.
Even in higher risk scenarios, the AAL3-compliance of device-bound passkeys provides a viable option now that is backed by NIST. We expect other authorities like ENIS, NCSC and BSI to also come up soon with their own clear statements regarding the push for passkeys.
Other standard and regulatory will follow the lead, subscribe to our Passkeys Substack to always be update.
Table of Contents
Enjoyed this read?
🤝 Join our Passkeys Community
Share passkeys implementation tips and get support to free the world from passwords.
🚀 Subscribe to Substack
Get the latest news, strategies, and insights about passkeys sent straight to your inbox.
We provide UI components, SDKs and guides to help you add passkeys to your app in <1 hour
Start for free
Recent Articles