Loading...
https://backstage.forgerock.com/cloud-storage-ws/api/v1/cloudstorage/getfile/jji0Q6jFT2Sswf3Kq70Mzw?imageSizeFallback=allowVectors&size=medium

Thales Auth Tree Nodes


Thales solves customer problems. We design and deliver authenticators that support your workflow, keep you in compliance, and keep your employees and customers safe. Our solution portfolio includes FIDO authenticators, hardware and software OTP tokens, X.509 certificate-based USB tokens and smart cards, OOB, hybrid tokens, and phone tokens for all mobile platforms.

Thales Auth Tree Nodes

Thales solves customer problems. We design and deliver authenticators that support your workflow, keep you in compliance, and keep your employees and customers safe.

Our solution portfolio includes FIDO authenticators, hardware and software OTP tokens, X.509 certificate-based USB tokens and smart cards, OOB, hybrid tokens, and phone tokens for all mobile platforms.

Stop Phishing Attacks with Strong Passwordless Multi-Factor Authentication

Thales FIDO2 security keys are offering organizations passwordless, phishing-resistant authentication, allowing them to stop account takeover and remove risk of unauthorized access to sensitive resources like SaaS applications and Windows endpoints.

Enable multiple user authentication journeys

Thales supports numerous passwordless authentication journeys with a wide range of FIDO authenticators.

Facilitate users’ MFA adoption with biometric authentication

Combining biometrics and NFC, the innovative SafeNet IDPrime FIDO Bio Smart Card allows end users to authenticate from multiple types of devices securely and easily, with just a fingerprint instead of a password.

image

Modernize PKI / CBA Environments

Organizations that rely on PKI and Certificate based Authentication (CBA) can now use a combined PKI-FIDO smart card or USB Token to facilitate their cloud and digital transformation initiatives. By providing their users with a single authentication device for securing access to legacy apps, network domains and cloud services, they reduce operational costs and simplify User Experience.

image

Secure Mobile Access

Thales FIDO devices enable users to authenticate to any cloud resources from their mobile devices: either by taping their contactless smart card on their device using NFC, or by plugging the SafeNet eToken Fusion USB-C to their mobile phone.

image

Combine Physical & Logical Access

For optimum convenience, Thales FIDO smart cards support physical access enabling users to access both physical spaces and logical resources with a single customizable smart card.

Solution brief : https://cpl.thalesgroup.com/resources/access-management/fido2-passwordless-authentication-for-azure-ad-solution-brief

Prerequisites - Supported FIDO Authenticators :

https://cpl.thalesgroup.com/access-management/authenticators/fido-devices

  • SafeNet IDPrime FIDO Bio Smart Card (FIDO & biometry)
  • SafeNet IDPrime FIDO series (combine FIDO with PKI and optionally physical access)
  • SafeNet IDCore FIDO series (combine FIDO with physical access)
  • SafeNet eToken Fusion Series (combine FIDO with PKI)
  • SafeNet eToken FIDO series (FIDO only)

Thales FIDO Authentication Tree

The tree below shows the flow to register and authenticate Thales FIDO authenticator

image

  1. In this tree, the user will provide his user name and password (‘Username Collector’ node and ‘Password Collector’ node) and then be directed to the FIDO authentication flow (‘WebAuthn Authentication Node’).
  2. If the user doesn’t have a FIDO Authenticator, he will be asked if he wishes to register (‘Register Thales Authenticator’ - Message Node). If his reply is positive (True), he will be directed to the registration node (‘WebAuthn Registration Node’ Node). If his reply is negative (False), he will be directed to provide his user name and password.

This listing focuses on the settings used to support Thales authenticators with ForgeRock access management.

ForgeRock WebAuthn Integration

For strong authentication, ForgeRock Access Management supports WebAuthn, enabling FIDO2 hardware devices, such as the Thales FIDO authenticators.

By using Thales FIDO authenticators and ForgeRock Access Management, your end users can replace their username-password with a much stronger authentication method, either 2FA (Two Factor Authentication) or MFA (Multi Factor Authentication), yet still keep the registration and authentication procedure easy and friendly.

Using ForgeRock for access management, you can create authentication flows such as:

  • FIDO authentication with a PIN
  • PIN and password
  • PIN and Touch sense

With Thales FIDO authenticators, you can create either 2FA (username/password + Thales FIDO authenticator) or MFA (username/password + Thales FIDO authenticator + PIN).

Combining ForgeRock access management with Thales authenticators, you have the flexibility to configure the environment and conditions.

In the following flows, we will demonstrate how we build different flows (for either 2FA or MFA) starting with a simple flow that defines registration for a Thales FIDO authenticator.

WebAuthn Authentication Node

Reference WebAuthn Authentication Node

The WebAuthn Authentication node allows users of supported clients to use a registered FIDO2 device during authentication.

image

Input to the WebAuthn Authentication Node:

  • Data Store Decision (True)

Output from the WebAuthn Authentication Node:

  • Unsupported --> Failure
  • No Device Registered --> Message Node
  • Success --> Success
  • Failure --> Failure
  • Client Error --> Failure

Configuration of WebAuthn Authentication Node:

  • User verification requirement:
    • DISCOURAGED – disable the PIN prompt for WebAuthn
    • PREFERRED – for MFA, the user will be prompted to enter a PIN
    • REQUIRED – for MFA, the user will be prompted to enter a PIN

Message Node

Reference Message Node

image

The Message node allows you to present a custom message to the user, such as “Have you registered your FIDO device?” else go back to collect the username.

Possible Input to the Message Node:

  • Have you registered your FIDO device?

Possible Output from the Message Node:

  • True --> WebAuthn Registration Node
  • False --> Username Collector

Configuration of Message Node:

  • Message
    • Value: “Have you registered your FIDO device?”
  • Positive answer
    • Value: “Yes”
  • Negative Answer
    • Value: “Not yet”

WebAuthn Registration Node

Reference WebAuthn Registration Node

The WebAuthn Registration authentication node allows users of supported clients to register FIDO2 devices for authentication.

image

Input to the WebAuthn Registration Node:

  • Message Node (True)

Output from the WebAuthn Registration Node:

  • Unsupported --> Failure
  • Success --> Success
  • Failure --> Failure
  • Client Error --> Failure

Configuration of WebAuthn Registration Node:

  • User verification requirement:
    • DISCOURAGED – disable the PIN prompt for WebAuthn
    • PREFERRED – for MFA, the user will be prompted to enter a PIN
    • REQUIRED – for MFA, the user will be prompted to enter a PIN
  • Authentication attachment:
    • CROSS_PLATFORM – instruct the browser to prompt for a Thales Authenticator
    • UNSPECIFIED – the user may be prompted for a platform authenticator such as Windows Hello on a Windows 10 device
  • Limit registration:
    • Enabled - Specify whether the same authenticator can be registered multiple times. If enabled, the client should not activate an authenticator that is already registered for registration
Verifications
Verified By
Unverified
Product VersionVerified On
access-managementPingAM7.0Sep 8, 2021
Releases
No releases
Report inappropriate content