Authentication - Authenticator Binding, v1.0

Credential Service Providers must bind authenticators to online identities during enrollment as well as after enrollment over appropriately protected channels. Additionally, records should be kept of all authenticators bound to the online identity.

Assessment Steps (7)

1
Binding (Binding)
Were authenticators bound as part of enrollment or by associating a subscriber provided authenticator the CSP finds acceptable?
Artifact
A1
Provide evidence (e.g. policies, operational details) that authenticator binding meets this requirement.
2
Records of Authenticator Bindings (RecordsofAuthenticatorBindings)
Does the CSP maintain records of authenticators bound to this identity? Records must contain date and time information for each authenticator.
Artifact
A1
Provide evidence (e.g. policies, operational details) that authenticator binding meets this requirement.
3
Binding AAL Requirements (BindingAALRequirements)
Does the CSP bind new authenticators to the account while interacting with the user at the same or higher AAL?
Artifact
A1
Provide evidence (e.g. policies, operational details) that authenticator binding meets this requirement.
4
At Least One Physical Authenticator Binding (AtLeastOnePhysicalAuthenticatorBinding)
Does the CSP bind at least one and preferably at least two physical authenticators to a subscriber's online identity?
Artifact
A1
Provide evidence (e.g. policies, operational details) that authenticator binding meets this requirement.
5
Proper Handling of Multi-Step Binding Transactions (ProperHandlingofMulti-StepBindingTransactions)
Does the CSP properly handle cases where authenticator binding cannot be completed in a single physical encounter or electronic transaction? For example must the CSP must reidentify the user in some way to pickup the binding process left off.
Artifact
A1
Provide evidence (e.g. policies, operational details) that authenticator binding meets this requirement.
6
AAL Authentication Requirement for Bindng New Authenticators (AALAuthenticationRequirementforBindngNewAuthenticators)
Does the CSP only allow new authenticators to be added after the subscriber has authenticated at an appropriate AAL?
Artifact
A1
Provide evidence (e.g. policies, operational details) that authenticator binding meets this requirement.
7
Handling of Lost and Forgotten Authenticators (HandlingofLostandForgottenAuthenticators)
Does the CSP have appropriate processes in place to handle lost/forgotten authenticators? This may necessitate reperforming Identity Proofing for lost authenticators at IAL2 and IAL3.
Artifact
A1
Provide evidence (e.g. policies, operational details) that authenticator binding meets this requirement.

Conformance Criteria (7)

C1
Authenticators SHALL be bound to subscriber accounts by either:
  • Issuance by the CSP as part of enrollment; or
  • Associating a subscriber-provided authenticator that is acceptable to the CSP.
Citation
NIST SP 800-63B
Section 6.1
C2
CSPs SHALL maintain a record of all authenticators that are or have been associated with each identity. The record created by the CSP SHALL contain the date and time the authenticator was bound to the account.
Citation
NIST SP 800-63B
Section 6.1
C3
When any new authenticator is bound to a subscriber account, the CSP SHALL ensure that the binding protocol and the protocol for provisioning the associated key(s) are done at a level of security commensurate with the AAL at which the authenticator will be used. For example, protocols for key provisioning SHALL use authenticated protected channels or be performed in person to protect against man-in-the-middle attacks. Binding of multi-factor authenticators SHALL require multi-factor authentication or equivalent (e.g., association with the session in which identity proofing has been just completed) be used in order to bind the authenticator. The same conditions apply when a key pair is generated by the authenticator and the public key is sent to the CSP.
Citation
NIST SP 800-63B
Section 6.1
C4
The CSP SHALL bind at least one, and SHOULD bind at least two, physical (something you have) authenticators to the subscriber's online identity, in addition to a memorized secret or one or more biometrics. Binding of multiple authenticators is preferred in order to recover from the loss or theft of the subscriber's primary authenticator.
Citation
NIST SP 800-63B
Section 6.1.1
C5
If enrollment and binding cannot be completed in a single physical encounter or electronic transaction (i.e., within a single protected session), the following methods SHALL be used to ensure that the same party acts as the applicant throughout the processes: For remote transactions:
  • The applicant SHALL identify themselves in each new binding transaction by presenting a temporary secret which was either established during a prior transaction, or sent to the applicant's phone number, email address, or postal address of record.
  • Long-term authenticator secrets SHALL only be issued to the applicant within a protected session.
For in-person transactions:
  • The applicant SHALL identify themselves in person by either using a secret as described in remote transaction (1) above, or through use of a biometric that was recorded during a prior encounter.
  • Temporary secrets SHALL NOT be reused.
  • If the CSP issues long-term authenticator secrets during a physical transaction, then they SHALL be loaded locally onto a physical device that is issued in person to the applicant or delivered in a manner that confirms the address of record.
Citation
NIST SP 800-63B
Section 6.1.1
C6
Before adding a new authenticator, the CSP SHALL first require the subscriber to authenticate at the AAL (or a higher AAL) at which the new authenticator will be used.
Citation
NIST SP 800-63B
Section 6.1.2.1
C7
If a subscriber loses all authenticators of a factor necessary to complete multi-factor authentication and has been identity proofed at IAL2 or IAL3, that subscriber SHALL repeat the identity proofing process for their IAL. The CSP SHALL require the claimant to authenticate using an authenticator of the remaining factor, if any, to confirm binding to the existing identity. Reestablishment of authentication factors at IAL3 SHALL be done in person, or through a supervised remote process ... and SHALL verify the biometric collected during the original proofing process.
Citation
NIST SP 800-63B
Section 6.1.2.3