• What is a root of trust?

    A root of trust in an external hardware authenticator that can be used with any computer or mobile device to identify that the person accessing an account is the rightful owner.

    Why is a root of trust important?

    Today, you may have several devices that you use on a day-to-day basis to log into websites, services and applications. A WebAuthn root of trust, such as the one offered by a hardware security key, ensures that you can always authenticate to any website or service, across any platform, rapidly and securely.

    Account access and recovery

    2 devices lost

    Every 3 years, an average user will lose two devices which they never see again.

    10.9 hours

    Overall, the average user spends 10.9 hours per year managing passwords.*

    $5.2M lost

    The average company loses $5.2M annually in productivity due to account lockouts.*

    * Source: Ponemon Report – 2019 State of Password and Authentication Security Behaviors Report

     

    How a root of trust works

    Powered by WebAuthn and PIV

    Easy and fast user registration

    When a user registers on a website the device platform offers the user several options to start their journey.

    The user may be offered to use either an external authenticator, such as a hardware security key, or an internal authenticator built into the OS platform itself, such as a fingerprint touchpad on the user’s laptop, to secure their new account. The best practice is first use the external authenticator before enabling the internal authenticator.

    Greater user choice and control

    During the registration process, a credential is created which is stored on the authenticator of choice. For fast recovery and bootstrapping of a new device it is recommended that the user always first register using the external authenticator, such as a hardware security key, and then bootstrap the internal authenticator using the external key. If a device is lost the security key credential is still usable on a replacement device, unlike the built-in authenticator which is no longer accessible if the device is lost.

    Once this has been completed, the user can authenticate to the web service or other resources using whichever authenticator they prefer on a day-to-day basis.

    Fast-track onboarding a new device or account recovery

    If the user wants to add a new device to authenticate to the web service, or in the event of a lost or stolen device, having a portable root of trust, such as a security key, greatly accelerates the onboarding and account recovery process.

    The user no longer needs cellular connectivity, or to wait for SMS codes to be sent from each web service, or to enter multi-digit codes one by one for each web service. With a security key a user can quickly insert the key into the USB port of a laptop or desktop, simply tap a mobile device and instantly be re-authenticated to a variety of web services quickly and efficiently, without any need for cellular connectivity or calls to the helpdesk.

    A security key root of trust delivers high security

    A root of trust, such as a hardware security key, offers a physical and cryptographic guarantee of possession of a unique hardware device. The private key material or “secret” cannot be extracted as the external authenticator cannot be cloned or tampered with, and the privacy secrets cannot be revealed.

    A root of trust can be used for step-up authentication. With an external portable root of trust, a user can be easily and quickly re-authenticated when initiating sensitive transactions such as making a large financial transaction, or when submitting a prescription.

    User experience:

    User gets a new device and is trying to log into a mobile app using 2FA

    NO PORTABLE ROOT OF TRUST

    User installs mobile application

    User signs in using username and password

    User is prompted on which phone number to receive SMS OTP

    User waits for the SMS OTP

    User receives message

    User taps on message

    User memorizes or copies the code in the message

    User switches to mobile app

    User enters OTP into mobile app

    User submits the code

    User gains access to the service

    WITH PORTABLE ROOT OF TRUST

    User installs mobile application

    User signs in using username and password

    User inserts the YubiKey into device and touches the key

    User gains access to the service