Skip to content

WebAuthn Authenticators

WebAuthn Authenticators are the specialized hardware entities that act as the user’s cryptographically secure “Identity Proof.” Unlike traditional software-based MFA (like SMS or TOTP), an authenticator is a physical or logical device designed to protect private keys from extraction. Whether it is a “Platform” authenticator—baked into your smartphone or laptop (like FaceID or Windows Hello)—or a “Roaming” authenticator—a portable security key (like a YubiKey)—every device follows the same rigorous FIDO2 standard. Understanding the capabilities and level of assurance of these devices is critical for designing authentication policies that match the risk profile of your application.

HARDWARE

Trust Anchors
Core Mission
Sovereign Secret Isolation. Ensuring that the private cryptographic keys used for authentication are physically inaccessible to the user's operating system, the internet, and potential attackers.
Like the Security Hardware Spectrum: Imagine you have different types of locks. A "Platform Authenticator" (FaceID) is like a biometric safe built directly into the wall of your house—it's incredibly convenient but stays in that house. A "Roaming Authenticator" (YubiKey) is like a portable vault you carry on your keychain—you can use it at your office, your home, or a public library. Both are "Maximum Security," but they serve different roles in how the user carries their identity across different environments.
Secure Onboarding / High-Assurance Admin Access / Mobile First Design

Different authenticators offer varying trade-offs between user convenience, portability, and cryptographic assurance.

TypeExamplesPortabilityStrategic Value
PlatformTouchID, Windows Hello, FaceID.Low (Device-bound).Maximum convenience for daily use.
RoamingYubiKey, Google Titan, NFC Key.Highest (Universal).Critical for recovery & high security.
Cross-DeviceSmartphone as a key (Passkeys).High.Bridging the gap between platforms.
VirtualBrowsers as authenticators.Internal.Development and testing only.

Choosing and verifying an authenticator requires a disciplined understanding of the device’s provenance and security capabilities.

graph LR
    Identify[Identify Discovery] --> Attest[Verify Attestation]
    Attest --> Bind[Bind Credential]
    Bind --> Validate[Continuous Verification]
1

Identify Type

The application determines if it should allow any authenticator or restrict access to specific hardware. For high-security internal apps, you may mandate "Roaming" hardware to ensure the user can log in regardless of which device they are using.

2

Verify Attestation

During registration, the authenticator provides an "Attestation Statement." This is a digital certificate signed by the manufacturer (e.g., Yubico). The server uses the **FIDO Metadata Service (MDS)** to verify the hardware's security certifications (e.g., FIPS 140-2).

3

Manage Presence

Modern flows encourage the enrollment of multiple authenticators—typically one platform-based for convenience (FaceID) and one roaming-based for emergency recovery (Security Key)—ensuring the user is never locked out of their account.


Relying parties can inspect the “AAGUID” (Authenticator Attestation GUID) to identify the specific make and model of the user’s hardware.

Authenticator Mapping (Conceptual Example)

Section titled “Authenticator Mapping (Conceptual Example)”
AAGUIDManufacturerDevice ModelSecurity Level
cb695123-...YubicoYubiKey 5 SeriesFIPS-Level Cryptography.
0898732a-...AppleiCloud KeychainHardware-backed Passkey.
6028a38c-...GoogleAndroid Platform AuthSecure Element (SE) backed.

Master the technical details of the WebAuthn and FIDO2 hardware ecosystem.