Podcast
Root Causes 278: Microsoft on Certificates and FIDO


Hosted by
Tim Callan
Chief Compliance Officer
Jason Soroko
Fellow
Original broadcast date
February 17, 2023
Recent public discussion of FIDO and digital certificates reveal details of Microsoft's approach to consumer digital authentication. We discuss secure elements, Windows Hello, and the differences between B2C, B2B, and B2E.
Podcast Transcript
Lightly edited for flow and brevity.
So cutting complications. So, Tim, as you know, it’s tough out there to get from legacy passwords to passwordless.
And one of the great ways that you can beat that is to change the operating system so that you are no longer having to build software that sits on top of the operating system. In other words, multi-factor authentication.
MFA was a gigantic band-aid that was used for years and years and we’re not here to say that was a bad, bad road to take. It was probably the only road to take. But as we’ve said many times on this podcast, not all multi-factor authentication are created equal and some are downright weak. And we’ve seen a lot of problems and you and I, Tim, have reported - -
So if you actually have deep support for passwordless authentication down in the operating system level – that’s awesome. Two problems there is you do still have to build your software that will hook into it. In other words, just because Microsoft or Apple has chosen to adopt FIDO standards does mean that your application is going to use them. So, in other words, legacy apps are still hanging out in the wind.
And the other thing you have got to deal with is FIDO is really absolutely ideal for business to consumer level passwordless authentication, Tim. That’s a really important point I want to make.
The reason why it’s great for B2C, Tim, is because you don’t need all of that centralized technology that goes with certificates. FIDO, of course, the basis of it in terms of identity is cryptographic key pair. It’s not a certificate. It’s a cryptographic key pair. That can be stored in a lot of different places. It can be stored in one of the most popular places to put it is in a YubiKey hardware token. We’ve all seen that. But, also, it took a long, long time for secure elements on mobile devices and laptops to be ubiquitously available. I mean it took until Windows 11 before Microsoft said it had to be there.
In terms of all the motherboard makers. So, this marriage of hardware and software had to happen. That’s why it took this long to get here. But now that all of this is in place, you can actually have a scheme, a protocol, which actually does the key pair generation at the device. And so, therefore, it doesn’t require this centralization creation of a certificate and that makes it great for B2C when you don’t completely control all the people who will be authenticating. That’s the big point.
So to compare and contrast, let’s talk about beating certificates. Well, you definitely don’t beat certificates in terms of business to business and business to employee authentication. And absolutely not with respect to other types of device authentication as well. And so, therefore, somebody who might not – listen to 200x podcasts of this - -
If you haven’t been up on the industry and you just read that title, you might think, oh geez, FIDO is gonna take over everything.
And I gotta tell you, that’s just simply not true. I think Bank Info Security went a little far. They were trying to be provocative with their title and that’s great. That’s great. I don’t even think Libby herself, Libby Brown from Microsoft was really implying we are getting rid of certificates for everything. Because I tell you something right now, Microsoft is making enormous investments in certificate-based authentication. Make no mistake. And that includes their Azure platform and everywhere else Microsoft exists, which is a big, big world when you add it all up.
But B2C, geez, I gotta say FIDO seems to be pulling ahead here and good for them.

