Password-Less Protection
Password-Less Protection
protection
Reduce your risk exposure with password alternatives
Contents
03 /
Introduction
Passwords are no longer enough
05 /
Why eliminate passwords?
Moving away from passwords
08 /
Introduction to password replacement technology
What do we mean by password-less authentication?
09 /
Adopting a password-less strategy
10 Choosing the right technology
11 Windows Hello for Business
13 Microsoft Authenticator app
14 FIDO2 security keys
16 Comparing the Microsoft technologies for password-less authentication
17 Understanding how strong authentication works
18 Secure authentication flow architecture
19 Common misconceptions
21 User adoption
22 Old-school mentality
22 Educating users on new authentication methods
23 /
Summary
Password-less protection 2
Passwords are no
longer enough
IT around the world see the beginning of a new era, where
passwords are considered as a relic of the past. The costs now
outweigh the benefits of using passwords, which increasingly
become predictable and leave users vulnerable to theft. Even
the strongest passwords are easily phishable. The motives
to eliminate authentication systems using passwords are
endlessly compelling and all too familiar to every enterprise IT
organization. But how do you get there?
Password-less protection 3
81% of hacking-
related breaches
used either
stolen or weak
passwords
Source: Verizon 2017 Data Breach
Investigations Report
Password-less protection 4
Why eliminate passwords?
Password authentication has always been challenging throughout
the evolving enterprise security landscape. A password is supposed
to provide a key to accessing an account and a security barrier to
protect the account from the attackers. To distinguish between
the account owner and the attacker, organizations have needed to
move beyond using just passwords for protection.
Password-less protection 5
Many years ago, we started multi-factor
authentication with smart-cards to secure
the identity of our employees. Initially,
we used physical smart-cards to secure,
but it didn’t give people a smooth user
experience. Additionally, this also requires
a card reader in each hardware device
which can be challenging to implement
and also smart-cards are prone to be
lost or forgotten. Then we focused
on a nearly-friction-free experience,
from using biometrics that allows
people to use fingerprints, iris scans,
facial recognition, and even heartbeats
to authenticate their identity. These
technologies are easier to use, more
accessible to the needs and preferences
of the person, and are significantly harder
for criminals to exploit.
Password-less protection 6
High Security
Password-less authentication
Passwords + standard
2 Factor authentication
Inconvenient Convenient
Passwords
Low Security
Today, IT security are moving toward password- Password replacement options can help
less authentication using advanced technologies organizations provide convenience
like biometrics, PIN, and public/private key and ease-of-use without high-security
cryptography. Plus, new standards like Web risks. Ideally, with password-less
Authentication API (WebAuthN) and Fast authentication, you can have a future
Identity Online (FIDO2) are enabling password- ecosystem of authentication that meets
less authentication across platforms. These the organizational needs of high security
standards are designed to replace passwords and privacy, usability, and interoperability
with biometrics and devices that people in your among different authentication devices.
organization already use, such as security keys,
smartphones, fingerprint scanners, or webcams. Moving forward, end-users should never
have to deal with passwords in their day-
to-day lives. And with an intuitive sign-in/
sign-up user experience, help desk costs
can be reduced.
Password-less protection 7
Introduction to password
replacement technology
What do we mean by password-less
authentication?
Password-less protection 8
Adopting a 1. Choosing the right technology –
Develop password-replacement offerings
Password-less protection 9
Choosing the
right technology
With biometrics on mobile phones and computers
becoming more ubiquitous, the number of password
replacement technologies has increased.
Microsoft offers solutions based on platform, As a member of the FIDO Alliance, Microsoft
hardware, or software that you can try out has been working with other alliance
today and map with your password-less members to develop open standards for the
authentication requirements. Introduced by next generation of credentials. As a result,
Microsoft in Windows 10, Windows Hello uses you can now use portable FIDO2 hardware
biometric sensors or a PIN to verify a user’s devices to log into a work machine or cloud
identity. The Microsoft Authenticator app is services on supported devices and browsers.
a software token that allows users to verify
their identity with a built-in biometric or a Let’s go into more detail on each of these
PIN when signing into their work or personal technology options.
accounts from a mobile phone.
Password-less protection 10
Windows Hello How it works
Password-less protection 11
Windows Hello
for Business is
personal, simple,
and provides
a brilliant user
experience with
high security.
Our people love
logging on with
their fingerprint
or face.
–Peter Scott, Director of Dynamic IT,
British Telecom Technology
Password-less protection 12
Microsoft Authenticator app
Millions of people are using the Microsoft Authenticator
app every day to better secure their sign-ins.
Password-less protection 13
FIDO2 How it works
Password-less protection 14
Security devices
fit nicely with our
current scenarios.
They are simple to
deploy and easy to
use. We see value
in rolling FIDO2-
enabled HID badges
to all 110,000+
Emirates Group staff
in the future.
–Emirates IT
Password-less protection 15
Comparing the Microsoft
technologies for password-less
authentication
Here are some factors for you to consider when choosing Microsoft password-less technology:
Azure Active Directory Phone (iOS and Android Azure Active Directory
devices running Android
6.0 or above.)
Mode Platform Software Hardware
Systems and devices PC with a built-in Trusted PIN and biometrics FIDO2 security devices that
Platform Module (TPM) recognition on phone are Microsoft compatible
Password-less protection 16
Understanding how strong
authentication works
Secure authentication Identity provider validates user identity
and maps the public key to a user account
flow architecture during the registration or provisioning step.
Authentication requires multiple factors,
All three technologies use the same proven combining a key or certificate tied to a
cryptographic authentication pattern, device and something that the person
with credentials based on the certificate or knows (a PIN) or something that the person
asymmetrical key pair. These credentials— is (biometrics). Private keys are securely
plus the token that is obtained using the stored on the device. Private keys are
credential—are bound to the device bound to a single device and never shared.
(Windows or FIDO2 device, or mobile These keys don’t roam and are never sent
phone). to external devices or servers.
The authenticator generates a key pair This kind of authentication requires a local
and returns the public key. Optionally, the gesture. PIN entry and biometric gesture
authenticator also returns an attestation to both trigger devices to use the private
the identity provider such as Azure Active key to sign data that’s sent to the identity
Directory. provider cryptographically. The identity
provider verifies the user’s identity and
authenticates the user.
Password-less protection 17
Secure authentication
flow architecture
3.
2.
1. Scan
Devices
User
Bio
4.
Hello
1. The user attempts to sign into their 3. Azure AD verifies the signature with the
account from a device. The device sends an public key in the user object and verifies
authentication request. The identity system (for nonce. Builds a Primary Refresh Token (SSO
example, Azure AD) requests validation. token) and an ID token and send them back
along with an encrypted session key. The
2. The user interacts with a local gesture (for user accesses applications without the need
example, biometric, PIN) from its device. The of authenticating again (SSO).
device uses the private key to sign nonce and
returns to Azure AD with key ID. A request/
signature containing both the nonce + the key
ID signed with the device key sent to Azure AD
Password-less protection 18
Common
misconceptions
Misconception 1: A PIN looks much like a password, which
may lead people to equate them. A PIN
Isn’t a PIN the same as a password?
can be a set of numbers, but enterprise
policy might allow complex PINs that
include special characters and letters, both
uppercase and lowercase. However, it’s not
the structure of the PIN that makes it better
(length, complexity), but rather how it
works. A PIN is tied to the specific hardware
device it was set up on. Without the device,
the PIN is useless. If someone stole your
PIN and wanted to sign in to your account,
they’d need your physical device too.
Password-less protection 19
Misconception 3: Microsoft understands how critical it is to
protect your biometric data from theft. For
Can’t a biometric access system
this reason, your “biometric signature” is
get hacked or spoofed?
secured locally on the device and shared
with no one but you. Plus, your signature
is only used to unlock your device and
never to authenticate you over the
network. As it just stores biometric or PIN
identification data on the device, there’s
no single collection point an attacker can
compromise to steal biometric data.
In a typical deployment of the FIDO2 and
Windows Hello, a user swipes a finger,
speaks a phrase, or looks at a camera on a
device to sign in. Behind the scenes on that
device, the biometric is used as an initial
factor to then unlock a second, more secure
factor: a private cryptographic key that
works to authenticate a user to the service.
A common biometric attack method
involves trying to spoof a person’s body
part, with the goal of tricking the system
into thinking that a fake is real. Any
spoofing or hacking attack would first
require that the attacker gains custody of
the device. Beyond the various layers of
protection, many biometric systems today
are building in “liveness detection” to
validate that a biometric presented is real.
Password-less protection 20
User adoption
No change is easy. Cultural and technical
challenges follow organizations as they proceed
with password-less authentication methods.
Every organization is complex; while Getting rid of passwords can help you
password-less authentication offers enjoy these benefits:
improved security and user experience,
most organizations need to fix many As a user, you can sign in faster to use
fundamental facets to start on this journey. applications and services. There are no
These fixes can be implemented over time passwords to create, store, or remember.
to additional groups to reduce your risk
of attacks and security breaches. That Password-less authentication delivers a
effort offers rewards, however. From a higher degree of trust and security for apps,
technological viewpoint, reducing the use devices, and service providers. You don’t
of passwords and eventually eliminating have to store passwords.
them can help you make a sea change in
both security and productivity for your It’s cost-effective for IT. IT support teams
organization. can be freed from endless password
problems.
Password-less protection 21
Old-school mentality Organizations need to educate their users
that:
Password-less protection 22
Summary
The adoption of modern multi-factor authentication
technologies—like biometrics and public key cryptography in
widely accessible devices—is one of the most impactful steps that
can meaningfully reduce a company’s identity risk. Given emerging
requirements, organizations can prepare themselves by making a
plan to start moving to to password-less technologies.
Password-less protection 23
© 2018 Microsoft Corporation. All rights reserved. This document is for
informational purposes only. Microsoft makes no warranties, express or
implied, with respect to the information presented here.
Password-less protection 24