For decades, we’ve used the classic security system with a com­bin­a­tion of both password and username. If you want to log in somewhere on the Internet – whether at a social media portal or a web-shop, you simply enter your account name and a secret password. However, it has since emerged that this technique is not as perfect as it once was. Users often choose passwords that are too simple or use the same password for many different accounts, making them­selves vul­ner­able to attacks. That’s why the FIDO Alliance has teamed up with the World Wide Web Con­sor­ti­um (W3C) to develop a system that is both more secure and more con­veni­ent than previous password pro­tec­tion.

The results of the col­lab­or­a­tion can be found in FIDO2 and WebAuthn. Another mechanism commonly mentioned in con­nec­tion with the new online pro­tec­tion is the Client to Au­then­tic­at­or Protocol (CTAP). But what exactly is behind the term?

What is CTAP?

FIDO2 and Web Authn are intended to replace normal passwords. Biometric data, like a fin­ger­print, will back up your online accounts. A hardware token, like a USB stick, can be used for au­then­tic­a­tion. These devices are referred to as au­then­tic­at­ors in the context of FIDO. Com­mu­nic­a­tion between this token and the user’s system is regulated by CTAP. Therefore, the protocol de­term­ines how the two com­pon­ents must com­mu­nic­ate with each other in order to suc­cess­fully au­then­tic­ate and log-in to work on the web.

CTAP is available in two different versions. The first version of the protocol was also known as Universal 2nd Factor (U2F) and refers primarily to two factor au­then­tic­a­tion. CTAP2 is used for in­nov­a­tion sur­round­ing FIDO2. The new protocol, in com­bin­a­tion with WebAuthn, makes FIDO2 work. WebAuthn regulates the con­nec­tion between the user’s system and the website where the person needs to identify them­selves. CTP, on the other hand, regulates the con­nec­tion between the au­then­tic­at­or and the user’s PC or laptop – or the browser on the platform, since the user is re­spons­ible for au­then­tic­a­tion.

How the Client to Au­then­tic­at­or Protocol functions

To ensure that only au­thor­ised in­di­vidu­als can log into an online account, there must be some form of au­then­tic­a­tion. FIDO2 allows you to use an ad­di­tion­al device to identify yourself as a user. These tokens are intended to replace im­prac­tic­al, sometimes insecure passwords. The idea is that the au­then­tic­at­or connects through USB, NFC or Bluetooth to the actual device you want to use. For CAP, WebAuthn and FIDO2 to work, the browser you use should support new standards. However, the current versions of market leaders have already im­ple­men­ted FIDO2.

Note

There are other forms of au­then­tic­at­ors that are installed directly in your PC, laptop or smart­phone. These are primarily tools for capturing FaceID or TouchID – i.e. fin­ger­print scanners of cameras with facial re­cog­ni­tion. Since this hardware is not external, the hardware com­pon­ents do not require a separate com­mu­nic­a­tion protocol.

Com­mu­nic­a­tion through CTAP follows a specific pattern. First, the browser (or any other re­spons­ible software) connects to the au­then­tic­at­or and queries about the in­form­a­tion. The system de­term­ines what au­then­tic­a­tion option the external device is offering. Based on this in­form­a­tion, the system is then able to send a command to the au­then­tic­at­or. The au­then­tic­at­or will send either a response or an error message if the command doesn’t match the devices cap­ab­il­it­ies.

The au­then­tic­a­tion data, like the fin­ger­print for example, never leaves the user’s access area with this method. All sensitive data remains in the system. The browser only sends con­firm­a­tion through WebAuthn that access is permitted. This transfer, in turns, works through a public key procedure. Phishing attacks don’t work with CTAP, WebAuth and FIDO2: If users no longer need to provide passwords or usernames, then these can no longer be stolen through scams.

Note

An au­then­tic­at­or can be im­ple­men­ted as FIDO2 security key. This is a small UCD stick that works like a key. By owning the security key, the user proves they have per­mis­sion to access the online account. In this instance, the key and system com­mu­nic­ate with each other through the Client to Au­then­tic­at­or Protocol.

Go to Main Menu