Failed login tracking
Apart from tracking the last successful login information, nevisFIDO also updates the failed login information for both UAF and FIDO2 credentials. However, tracking if failed login attempts is not always possible and additionally what constitutes a failed login attempt in the UAF and FIDO2 context may not be inherently clear.
Independent of the credential type:
- The
userandcredentialmust be known at the time of the (failed) login attempt, requiring the credential identifier (nevisIDMextId) to be present. - An authentication attempt with a non-active nevisIDM credential leads to authentication failure.
UAF
Failed login attempts are tracked in step up scenarios, when the user is known at the time of authentication.
Authentication depends on successful verification of the UAF assertion sent by the client as part of the SendUafResponse, the following conditions lead to a failed login attempt:
- The assertion scheme is not
UAFV1TLV - The authenticator identifier (
AAID) is not present in either the policy or metadata information - The authenticator versions don't match the metadata information
- The assertion
algorithmsdon't match the metadata information - The authenticators
signCounteris lower than the current corresponding credential value - The transaction hash does not match the server side hash
- The final challenge parameters
fcParamshash does not match the server side hash - The assertions
signatureis invalid
For detailed information refer to the FIDO UAF server processing rules of the official specification.
FIDO2
Authentication depends on successful verification of the ServerAuthenticatorAssertionResponse sent by the client, the following conditions lead to a failed login attempt:
- User verification / presence was required but corresponding flag is not set in the assertion
- The backup eligibility in the assertion does not match the credential capabilities
- The
challengereceived does not match the server side - The
origindoes not match the server side configuration - The
collectedClientDatais not WebAuthn conformant - The signature
sigis invalid - The
attestedCredentialDatais not present - The
credentialIdexceeds the allowed maximum size - A not allowed cross-origin request was attempted
- The assertion extension
OIDin the key is not present - The authenticators
signCounteris lower than the current corresponding credential value - The public key and signature algorithms are not accepted by the server
- The used credential is not present in the
allowedCredentialslist - Mismatch in token binding token
- Credential is not in the allow-list in case
fido2.metadata.allow-listing-enabledis set totrue
For detailed information refer to the Authentication Assertion verification in the official specification.