Podcast
Root Causes 204: PKI's Role in Passwordless


Hosted by
Tim Callan
Chief Compliance Officer
Jason Soroko
Fellow
Original broadcast date
February 2, 2022
In previous episodes we have defined passwordless identity authentication. In this episode our hosts explain PKI's specific role in passwordless authentication, along the way clarifying the difference between password-masking and true passwordless technologies.
Podcast Transcript
Lightly edited for flow and brevity.
And there are vendors out there who are doing very good work at essentially creating very large, automated password managers, for a lack of better way of saying it. And that’s my term for it. It might not be theirs. But to me, really what they are doing is they are masking underlying password or other forms of authentication technologies that are perhaps obsolete, whatever, but they are adding some layer of non-password authentication on top of it. So, essentially, it’s an abstraction layer. That’s what I would describe it as as the highest-level concept and on the bottom of the underlying the abstraction layer is the legacy authentication technology and then above the abstraction layer is something that you could consider passwordless.
They’ll probably say both and they might even be right. But the fact of the matter is the underlying password isn’t going away. It kind of reminds me of the old trope that I keep going back to, which is Microsoft’s Pass-the-Hash attack, which has been around for 20 years plus because of the fact that backwards technologies and legacy technologies for authentication you just can’t get rid of them. And so, therefore, unless you can go to a more application centric world where you can apply modern forms of authentication at the application level, if you are still doing network level authentication or authentication to Active Directory – whatever you legacy is – then you probably are going to need bridge technologies in order to be able to deal with that through time. And, I know that Microsoft is doing a good job to even change that and we can into that, but the fact of the matter is there are non-Microsoft technologies that are legacy that we are probably never gonna extinguish from our enterprises for many years to come. Therefore, definitely these bridge technologies are gonna be important. So, that’s the non-PKI, non-passwordless passwordless technologies. I had to address it because then everything else from here kind of starts to make more sense in terms of what I would call true passwordless. Really and truly getting rid of the passwords.
Typically what happens is that vendor will quite often white label their technology to somebody who is building a major cloud application and that cloud application can say to their users, hey, download our app and when you authenticate there will probably be keys generated either on the device or we will pass keys to you, crypto keys, and then as part of your authentication sequence, when you basically announce, hey, I am me – however it is that you are doing that. It could be a biometric. It could be a lot of different things that you are using for your authentication, but no password. Then ultimately, the challenge for what used to be the password would essentially be the usage of your private key signing some sort of challenge document. Which essentially completes the authentication sequence.
Let’s then talk about security. Well, I don’t think anybody is gonna argue that a certificate with policies wrapped as the envelope around that certificate that’s stored in a secure element is less secure than any other authentication technology that exists today. That’s like maximum secure.
Then let’s move onto the other thing that should never be an afterthought which is the user experience. Well, if you can just look at your laptop screen and then you are authenticated with the strongest authentication possible, can you have an easier authentication. To me, it really is the best of all worlds of, well, it is passwordless, it is the most secure and it is the easiest to use when its implemented properly.
Thank you very much, Jay. I think that is a great overview of where PKI fits into passwordless. I do believe this is a topic we are going to continue to touch in the future as we explore this but probably a good place to stop for today. So, thank you. This has been Root Causes.

