CPAS04 Authenticator Options Version 1.0 11 November 2015
Total Page:16
File Type:pdf, Size:1020Kb
GSM Association Non-confidential Official Document PDATA.03 - CPAS04 Authenticator Options CPAS04 Authenticator Options Version 1.0 11 November 2015 This is a Non-binding Permanent Reference Document of the GSMA Security Classification: Non-confidential Access to and distribution of this document is restricted to the persons permitted by the security classification. This document is confidential to the Association and is subject to copyright protection. This document is to be used only for the purposes for which it has been supplied and information contained in it must not be disclosed or in any other way made available, in whole or in part, to persons other than those permitted under the security classification without the prior written approval of the Association. Copyright Notice Copyright © 2016 GSM Association Disclaimer The GSM Association (“Association”) makes no representation, warranty or undertaking (express or implied) with respect to and does not accept any responsibility for, and hereby disclaims liability for the accuracy or completeness or timeliness of the information contained in this document. The information contained in this document may be subject to change without prior notice. Antitrust Notice The information contain herein is in full compliance with the GSM Association’s antitrust compliance policy. V1.0 Page 1 of 38 GSM Association Non-confidential Official Document PDATA.03 - CPAS04 Authenticator Options Table of Contents 1 Introduction 3 1.1 Overview 3 1.2 Scope 3 1.3 Abbreviations 3 1.4 References 5 2 Level of Assurance (LoA) 5 3 Mobile Connect Pluggable Architecture 5 4 Inventory of Candidate Authenticators 7 4.1 Seamless Authenticators 8 4.1.1 Header Enrichment-based Authenticators 8 4.1.2 MO SMS-based Authenticator 10 4.1.3 Device Agent/Library-based Authenticator 11 4.2 SIM Applet-based (using MSSP) Authenticator 12 4.2.1 SFRA Recommendations on Mitigations 13 4.3 Fast Identity Online (FIDO) Authenticator 13 4.3.1 FIDO Authenticator Using SIM as the Secure Element 15 4.4 QR Code-based Authenticator 16 4.5 Network Initiated USSD-based Authenticator 17 4.5.1 SFRA Recommendations on Mitigations 18 4.6 SMS and URL-based Authenticator 18 4.6.1 SFRA Recommendations on Mitigations 19 4.7 Smartphone App Authenticator 19 4.7.1 Setup Mode 19 4.7.2 Authentication Mode 20 4.8 “Points in a Picture” App Authenticator 22 4.8.1 Authentication Mode 23 5 Other Potential Authentication Approaches 24 5.1 GBA: Generic Bootstrapping Architecture 3GPP TS 33.220 24 5.2 Secure Quick Reliable Login (SQRL) 25 5.3 Hybrid Authenticator 26 5.4 OTP Generated on the Device (HOTP)-based Authenticator 27 6 Account Chooser 27 7 SFRA Analysis of the key Authenticators 29 7.1 General mitigation recommendations from the SFRA analysis 36 Annex A Document Management 37 A.1 Document History 37 A.2 Other Information 37 V1.0 Page 2 of 38 GSM Association Non-confidential Official Document PDATA.03 - CPAS04 Authenticator Options 1 Introduction 1.1 Overview The GSMA Personal Data Programme is focused on positioning operators as trusted providers of identity services to third party service providers. Within this context, the programme identifies a set of propositions - including authentication, identity, attribute validation, attribute brokerage - that are collectively referred to as Mobile Connect. This document identifies a number of different Authenticator options that an operator may choose to deploy and support. A separate document, CPAS8 [1], focuses specifically on the use of an applet on the SIM as an authentication option and is based around the ETSI Mobile Signature Service (MSS) specifications that enable a mobile operator deploying this authentication method to easily migrate to a full MSS solution in Step 2 (Identity & Attributes). Step 3: Personal Step 2: data Centralising Iden ty & A ributes and controlling Step 1: Provision of iden ty services and your personal enhancement of digital transac ons through informa on Authen ca on the provision or verifica on of a ributes Enabling users to authen cate to and authorise transac ons within 3rd party services Very strong LoA Authen ca on Current Age An -fraud Example (MC_A3) Very high address >18yrs no fica ons services Strong Authen ca on High (MC_A2) A ribute A ribute A ribute Mobile Verifica on Provision Publish Connect Medium (MC_AV) (MC_AP) (MC_APS) Simple Authen ca on capabili es (MC_A1) Low Figure 1: Mobile Connect roadmap 1.2 Scope This document provides the description, architecture and functioning of the key authenticators for Mobile Connect along with the pros and cons and SFRA analysis for some of the authenticators. This is a non-exhaustive list of the key authenticators, as Mobile Connect uses a "Pluggable Authenticator" principle – where authenticators can be plugged- in to the system with minimum impact. 1.3 Abbreviations Term Description AuthN Authentication AuthZ Authorisation BSF Bootstrapping Server Function V1.0 Page 3 of 38 GSM Association Non-confidential Official Document PDATA.03 - CPAS04 Authenticator Options Term Description BSS Business Support System CRM Customer Relationship Management DOB Date Of Birth ECC Elliptic Curve Cryptography ESB Enterprise Service Bus ETSI European Telecommunications Standard Institute FIDO Fast Identity Online GBA Generic Bootstrapping Architecture HOTP HMAC based One Time Password HSS Home Subscriber Server ID GW Identity Gateway IDP Identity Provider IMEI International Mobile Station Equipment Identity IMSI International Mobile Subscriber Identity JMS Java Messaging Service LoA Level Of Assurance LTE Long Term Evolution MFA Multi-Factor Authentication MO Mobile Originated MSISDN Mobile Station International Subscriber Directory Number MSS Mobile Signature Service MSSP Mobile Signature Service Platform NAF Network Application Function OIDC OpenID Connect OPCO Operating Company OSS Operational Support System OTA Over The Air OTP One Time Password QR Quick Response RFC Request For Comment SMSC Simple Message Service Centre SOAP Simple Object Access Protocol SP Service Provider SFRA Security and Fraud Risk Assessment SDK Software Development Kit SPCR Service Provider Customer Reference SQRL Secure Quick Reliable Login TEE Trusted Execution Environment V1.0 Page 4 of 38 GSM Association Non-confidential Official Document PDATA.03 - CPAS04 Authenticator Options Term Description UAF Universal Authentication Framework UE User Experience UI User Interface USP Unique Selling Point 1.4 References Ref Doc Number Title [1] CPAS8 CPAS8 SIM Applet Authentication Specification [2] CPAS3 CPAS3 Level of Assurance Definition [3] CPAS6 CPAS6 Identity GW Functional Architecture [4] CPAS5 CPAS5 OpenID Connect Specification [5] CPAS13 CPAS13 Mobile Signature Service 2 Level of Assurance (LoA) The Level of Assurance describes the degree of confidence in the process of authentication and the level of identity proofing achieved in user registration for identity services. It provides assurance that the entity claiming a particular identity is in fact the entity to which the identity was assigned. The assurance is a reflection of the processes and the technical controls implemented. The following table provides the four levels of assurance identified as per ISO/IEC 29115 Clause 6 in Mobile Connect. Level Description 1 – Low Little or no confidence in the asserted identity. 2 – Medium Some confidence in the asserted identity. 3 – High High confidence in the asserted identity. 4 – Very High Very high confidence in the asserted identity. Table 1: Levels of Assurance in Mobile Connect More information on the definitions, security requirements, risk profile, threats and controls needed for the threats can be found in CPAS3 [2]. At runtime, an authenticator is selected based on the LoA indicated in the OpenID Connect (OIDC) request by the service provider along with the mobile operator implementation policies and additional context information (e.g. device capability, connectivity, eligibility, etc.). 3 Mobile Connect Pluggable Architecture One of the key aspects of the Mobile Connect architecture is the pluggability of the authenticators (known as authentication mechanisms). This is achieved through an abstraction architecture using a logical component, the Identity Gateway (ID GW), which V1.0 Page 5 of 38 GSM Association Non-confidential Official Document PDATA.03 - CPAS04 Authenticator Options separates out the interface to the service provider and the authenticator implementation used providing functional control to the service provider to indicate the Level of Assurance needed for the use case and with the ID GW interfacing to the appropriate authenticator based on the configured policy. More information on the ID GW can be found in CPAS6 [3]. Figure 2: Mobile Connect logical architecture The Mobile Connect architecture has 2 logical subsystems: The Exposure subsystem The Authenticator subsystem The Exposure subsystem is the entry point for the Mobile Connect architecture and contains the ID GW as the logical component. The Mobile Connect services are exposed by this subsystem using the OpenID Connect protocol, according to CPAS5 [4]. The Authenticator subsystem is an internal subsystem to Mobile Connect. The service providers do not interact with this subsystem directly but via the ID GW. This subsystem contains the authenticators selected and implemented within the Mobile Connect deployment. A number of different authenticators can be used, based on the LoA needed and the implementation choice of the mobile operator. One of the key architecture