Skip to main content
Version: 1.15.x.x LTS

FIDO UAF Credential Deregistration


A user may want to remove existing FIDO UAF credentials for several reasons. In the FIDO UAF context, removing existing FIDO UAF credentials is called "Deregistration". The credentials must be removed from both the user's device and the FIDO server. For more information, see chapter "FIDO UAF (Universal Authentication Framework) - Deregistration."


  • The user's client application that is deregistering the credentials must have FIDO capabilities. It must contain an embedded FIDO client with access to one or several FIDO authenticators.
  • The user has already existing credentials, such as a password in nevisIDM, that can be used to authenticate.
  • Nevis should be configured such that only authenticated clients can deregister FIDO UAF credentials. In this case, the legacy credentials are used to authenticate.
  • The user has already registered FIDO credentials (which he now wants to remove).


The numbers in the description below correspond with the numbers in the next figure.

  1. The user no longer wishes to use an application. She initiates the deregistration procedure to remove her credentials.
  2. The mobile application sends a request to trigger the in-band FIDO authentication.
  3. The user authenticates. Nevis allows the mobile client application to perform a deregistration.
  4. The mobile application sends a request to Nevis to perform the deregistration.
  5. The FIDO credentials are removed from their storage on the Nevis side. Nevis informs the mobile application which FIDO credentials must be removed on the mobile application side.
  6. The mobile application removes the FIDO credentials.

Instead of the in-band FIDO authentication, it is also possible to use legacy nevisIDM credentials to authenticate. The performance of a Deregistration operation in nevisFIDO requires an authentication with the username.


The Deregistration operation described in this section only affects the registered FIDO UAF credentials. The corresponding registered dispatch targets will stay in place and are not removed. Refer to chapter Dispatch Target Management for additional details.

To find the the dispatch target that is associated with a FIDO UAF credential, you can use the deviceId attribute. The dispatch targets and FIDO UAF credentials that have the same deviceIdvalue are stored on the same device. So if you want to remove all dispatch targets and corresponding FIDO UAF credentials on a given device, remove all elements with the same deviceId.
For details, see the nevisFIDO Reference Guide, sections "Registration Response Service"/"Request Body" and "Dispatch Target Service"/"Request Body".

In-Band Deregistration

Technical Flow

The technical flow in the next figure explains the component interaction in detail. The step numbers in the figure do not correlate with the simplified example above.

In-Band Deregistration Flow

The following table describes the steps in the previous figure. The numbers in the table correlate with the step numbers in the previous figure.

1.The relying party mobile application authenticates with FIDO UAF credentials.https://<nevisProxy-host>:<nevisProxy-port>/auth/fidouaf- In-Band Authentication
2.The relying party mobile application sends a GetUAFRequestto the Deregistration Request Service endpoint.In this step, the mobile client accesses the same endpoint as in step 1. But now the client possesses an existing authentication to do so. The GetUAFRequestmust be created with the operation set to "Dereg".In case of a deregistration, the GetUAFRequest has special context extensions that enable several different behaviors of the endpoint. For details and the use cases it supports, have a look at the nevisFIDO Reference Guide, chapter "Context".https://<nevisProxy-host>:<nevisProxy-port>/nevisfido/uaf/1.1/request/deregistration This endpoint is defined in nevisProxy and maps to the Deregistration Request Service endpoint.nevisFIDO Reference Guide:- Chapter "Deregistration Request Service"- Chapter "Context"FIDO Specification:- GetUAFRequest
3.nevisProxy includes the SecToken and the UserId into the forwarded request.The inclusion of the SecToken ensures that nevisFIDO will receive the user information in a secure way. It also helps to verify that an authentication has already been successfully completed. This information is necessary to initiate the FIDO deregistration.The UserId is delegated to ensure that the generated authorization header is correctly formatted.-nevisProxy Reference Guide:- Chapter DelegationFilternevisFIDO Reference Guide:- Chapter "SecToken Username Provider"
4.nevisProxy forwards the GetUAFRequestto nevisFIDO.https://<nevisFIDO-host>:<nevisFIDO-port>/nevisfido/uaf/1.1/request/deregistrationnevisFIDO Reference Guide:- Chapter "Deregistration Request Service"- Chapter "Context"FIDO Specification:- GetUAFRequest
5.The signature of the SecToken is verified by nevisFIDO, to ensure that a previous authentication happened.nevisFIDO extracts the username from the context of the GetUAFRequest. The username can be the user's extId or the loginId in nevisIDM - this is configurable.--
6.nevisFIDO removes the credentials from nevisIDM.Based on the context provided in the GetUAFRequest, nevisFIDO might remove more than one (even all) credentials associated with the username in nevisIDM.Once the endpoint is successfully called, the credentials are removed without further consulting the mobile device or with the user.-nevisFIDO Reference Guide:- Chapter "Context"
7.nevisFIDO returns the ReturnUAFRequest containing the DeregistrationRequest.The generated DeregistrationRequest always contains all deregistered credentials as separated entries.nevisProxy forwards the ReturnUAFRequest to the relying party mobile application.After receiving the DeregistrationRequest, it is crucial that the FIDO client removes all corresponding registered credentials. If the credentials are not removed, they may remain on the device indefinitely.-nevisFIDO Reference Guide:- Chapter "Response Body"FIDO Specification:- ReturnUAFRequest

Configuration Snippets

Refer to Nevis Component Configuration Examples for sample configuration snippets regarding all involved components.