Passwordless authentication using FIDO2¶
WSO2 Identity Server supports passwordless authentication using FIDO2, which is a phishing-proof passwordless authentication protocol developed as a joint effort between the FIDO Alliance and the World Wide Web Consortium (W3C).
The three major enablers of the FIDO2 flow are;
- The FIDO2 Authenticator (biometrics, mobile devices or FIDO2 security keys)
- The client or browser that operates as a mediator
- The WebAuthn Relying Party (WSO2 Identity Server)
Does your browser support your FIDO devices?
The https://demo.yubico.com/webauthn-technical/registration site can be used to check the browser support for FIDO devices.
Before you Begin
WSO2 Identity Server uses the WebAuthn API to enable FIDO-based passwordless authentication. The WebAuthn API is supported from the following browser versions onwards:
- Chrome(CHROME 67)
- Firefox (FIREFOX 60)
- Edge (EDGE 17723)
Follow the steps given below to define the set of origin URLs where the WSO2 Identity Server User Portal will be hosted (e.g.,
- Open the
deployment.tomlfile in the
- Add the following configuration.
Configuring passwordless authentication using FIDO2¶
Setting up the FIDO2 device¶
To associate a FIDO2 device with the user account, refer Add security device.
Configuring FIDO as an authenticator¶
- Sign in to the Management Console.
To create a new Service Provider:
- On the Main menu, click Identity > Service Providers > Add.
- Enter a name and a brief description of the service provider.
- Click Register.
For more information on creating a service provider, see Adding and Configuring a Service Provider.
In the Local & Outbound Authentication Configuration section, select Local Authentication and from the dropdown select fido. To enable passwordless authentication, the fido authenticator alone is sufficient.
For more information on configuring the local and outbound authentication configuration, see Configuring Local and Outbound Authentication for a Service Provider .