Replies: 3 comments 2 replies
-
This can be easily a known ID from the first authentication method too because it would also work as the "something you know" part of the current workflow.
This would convert it to an MFA device for the purpose of Vault authentication.
This is actually the best reason to make this change. So the workflow would be like this:
Some auth methods embed this information in the metadata of the token but some don't. So there are 3 objectives to this change:
Thanks for the feedback, I will definitely do some research on this. |
Beta Was this translation helpful? Give feedback.
-
@bruj0 just asking if there's been any progress or further ideas on this ? ;) |
Beta Was this translation helpful? Give feedback.
-
@bruj0 I'm still lurking - did you get anywhere with the research ? ·. |
Beta Was this translation helpful? Give feedback.
-
At the moment, it is suggested that the registration endpoints are secured to require an administrator to register a new device. A better workflow would to to
(this workflow follows the recommendations on several sites)
https://webauthn.io/
https://doubleoctopus.com/blog/your-complete-guide-to-fido-fast-identity-online/
https://hybrismart.com/2019/05/23/authentication-with-hardware-security-keys-via-webauthn-in-sap-commerce-cloud/
So when they next log in, they have to present their userid and use their device
This workflow would mean that you can drop the requirement for roles, as all policies could be defined on either the entity or entity group . It also removes the requirement for the administrator to be the pinch point (imagine having to manually register a few hundred devices by yourself) and it also then gives the app developer the option to require username and password, username only (passwordless if the device is present)
You could grab the entityId from the token used to access the registration endpoint, thus preventing someone from id spoofing
thoughts ?
Beta Was this translation helpful? Give feedback.
All reactions