Posted by:
admin
10 years, 10 months ago
The FIDO Alliance published their standards recently. I was amazed to find out from Eve Maler that the license does not include any implementation rights. You just get to look at them. I find this fascinating in today's world of prolific coding. Verisign, on the other hand, published the Oauth protocol as an IETF standard, which Google made popular. WiKID is not in danger of becoming a market-dominating standard (yet), but we have an open-source version that mitigates many of risks of choosing WiKID. This led me to think about what's really important from a buyer's perspective.
Buyers like standards (either industry-chosen or market-created) because of:
- Interoperability. Standards help things communicate. RADIUS allows my Cisco VPN to talk to AD and then to a WiKID Strong Authentication server.
- Substitution. RADIUS allows me to swap out my first Linksys VPN/Router with a Cisco without changing my AD or WiKID Server. It allows me to swap out an expensive two-factor server with a WiKID server.
- Reduced risk of obsolescence. I gradually had to get rid of all my BetaMax equipment as the video store's shelves gradually went from 50/50 VHS/Beta to 100% VHS.
- Reduced costs. An open standard should reduce costs. There should be a number of suppliers. It's easier to hire an employee that knows a standard. If a person has worked in enterprise IAM and security, chances are they know LDAP, RADIUS, SAML, etc.
It is too early to say if the Fido Alliance provides any of these benefits. Interoperability is already provided on the back-end by Radius inside the firewall and SAML/OpenID Connect/etc outside. There's no need to interoperability on the client itself. While it might be nice to have one token client, it might also be nice not to. (What's needed is a trusted computing platform for all authentication mechanisms.)
RADIUS also allows extensive substitution. Switching costs would consist of token distribution and user registration. WiKID minimizes sunk costs via our subscription licensing (as do services). One strategy to pursue during this time of confusion is to avoid any large deployment costs, going with low-cost software solutions or services until standards develop. Let the pioneers get the arrows, but do what you should to minimize your risks.
Because for enterprises obsolescence is only an issue if you don't get your money's worth. If you spend a great deal of money on something that doesn't work or needs to be replaced, you are a poor steward of your shareholder's capital. Keep your network running Token Ring until Ethernet cards are dirt cheap.
WiKID's open-source version provides many of the benefits of a standard. In the unlikely event we went out of business (we are cash-flow positive), our customers could hire developers to improve and maintain the code. The costs would be minimal. The code could be extended via our API to support any additional protocols.
I posited on Twitter that WiKID could release our architecture as a part of a consortium and give all of our customers a free membership. We would be well ahead of Fido in deployments. We wouldn't have members like Google, but clearly Google is playing the field. They want a solution and perhaps they realize that there will not be a single winning standard.
That's my belief: There won't be a winning standard in two-factor authentication. Fido seems aimed at the consumer authentication problem. I think that market is splintered. What will be needed for online banking will be different than an online health exchange or an email service. The differences are too great and the benefits of standardization are too small. Most breaches would not be stopped by consumer authentication anyway. It's the authentication of admins and users inside the firewall that have been causing problems.
Recent Posts
- Blast-RADIUS attack
- The latest WiKID version includes an SBOM
- WiKID 6 is released!
- Log4j CVE-2021-44228
- Questions about 2FA for AD admins
Archive
2024
2022
- December (1)
2021
2019
2018
2017
2016
2015
2014
- December (2)
- November (3)
- October (3)
- September (5)
- August (4)
- July (5)
- June (5)
- May (2)
- April (2)
- March (2)
- February (3)
- January (1)
2013
2012
- December (1)
- November (1)
- October (5)
- September (1)
- August (1)
- June (2)
- May (2)
- April (1)
- March (2)
- February (3)
- January (1)
2011
2010
- December (2)
- November (3)
- October (3)
- September (4)
- August (1)
- July (1)
- June (3)
- May (3)
- April (1)
- March (1)
- February (6)
- January (3)
2009
- December (4)
- November (1)
- October (3)
- September (3)
- August (2)
- July (5)
- June (6)
- May (8)
- April (7)
- March (6)
- February (4)
- January (427)
2008
- December (1)
Categories
- PCI-DSS (2)
- Two-factor authentication (3)
Tags
- wireless-cellular-mobile-devices (7)
- Two-factor authentication (10)
- Wireless, cellular, mobile devices (6)
- NPS (1)
- Phishing and Fraud (111)
- Active Directory (1)
- pam-radius (3)
- privileged access (2)
- Cloud Security (10)
- Mutual Authentication (60)
- Web Application Authentication (1)
- Authentication Attacks (99)
- pci (50)
- Security and Economics (97)
- WiKID (133)
- pam (2)
- VPN (1)
- Installation (2)
- RADIUS Server (1)
- Open Source (64)
- Tutorial (2)
- Strong Authentication (35)
- Information Security (137)
- Transaction Authentication (13)
- Miscellaneous (100)
- Linux (2)
- transaction-authentication (6)
- Two Factor Authentication (254)