Skip to content

Commit e09a4a6

Browse files
committed
moved FIPS compliance to authenticator conceptual topic
1 parent 39b5661 commit e09a4a6

File tree

2 files changed

+16
-14
lines changed

2 files changed

+16
-14
lines changed

articles/active-directory/authentication/concept-authentication-authenticator-app.md

Lines changed: 16 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 06/23/2022
9+
ms.date: 11/15/2022
1010

1111
ms.author: justinha
1212
author: justinha
@@ -57,8 +57,23 @@ Users may have a combination of up to five OATH hardware tokens or authenticator
5757
>
5858
> When two methods are required, users can reset using either a notification or verification code in addition to any other enabled methods.
5959
60+
61+
### FIPS 140 compliant for Azure AD authentication
62+
63+
Beginning with version 6.6.8, Microsoft Authenticator for iOS is compliant with [Federal Information Processing Standard (FIPS) 140](https://csrc.nist.gov/publications/detail/fips/140/3/final) for all Azure AD authentications using push multi-factor authentications (MFA), passwordless Phone Sign-In (PSI), and time-based one-time passcodes (TOTP).  
64+
65+
Consistent with the guidelines outlined in [NIST SP 800-63B](https://pages.nist.gov/800-63-3/sp800-63b.html), authenticators are required to use FIPS 140 validated cryptography. This helps federal agencies meet the requirements of [Executive Order (EO) 14028](https://www.whitehouse.gov/briefing-room/presidential-actions/2021/05/12/executive-order-on-improving-the-nations-cybersecurity/) and healthcare organizations working with [Electronic Prescriptions for Controlled Substances (EPCS)](/azure/compliance/offerings/offering-epcs-us)
66+
67+
FIPS 140 is a US government standard that defines minimum security requirements for cryptographic modules in information technology products and systems. Testing against the FIPS 140 standard is maintained by the [Cryptographic Module Validation Program (CMVP)](https://csrc.nist.gov/Projects/cryptographic-module-validation-program).
68+
69+
No changes in configurations are required in Microsoft Authenticator or the Azure portal to enable FIPS 140 compliance. Beginning with Microsoft Authenticator for iOS version 6.6.8, Azure AD authentications will be FIPS 140 compliant by default. 
70+
Authenticator leverages the native Apple cryptography to achieve FIPS 140, Security Level 1 compliance on Apple iOS devices beginning with Microsoft Authenticator version 6.6.8. For more information about the certifications being used, see the [Apple CoreCrypto module](https://support.apple.com/guide/sccc/security-certifications-for-ios-scccfa917cb49/web)
71+
 
72+
FIPS 140 compliance for Microsoft Authenticator on Android is in progress and will follow soon. 
73+
6074
## Next steps
6175

6276
- To get started with passwordless sign-in, see [Enable passwordless sign-in with the Microsoft Authenticator](howto-authentication-passwordless-phone.md).
6377

6478
- Learn more about configuring authentication methods using the [Microsoft Graph REST API](/graph/api/resources/authenticationmethods-overview).
79+

articles/active-directory/authentication/concept-authentication-passwordless.md

Lines changed: 0 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -77,19 +77,6 @@ To get started with passwordless sign-in, complete the following how-to:
7777
> [!div class="nextstepaction"]
7878
> [Enable passwordless sign using the Authenticator app](howto-authentication-passwordless-phone.md)
7979
80-
### FIPS 140 compliance for enterprise authentication
81-
82-
[Executive Order 14028](https://www.gsa.gov/technology/technology-products-services/it-security/executive-order-14028-improving-the-nations-cybersecurity) requires authenticator apps to comply with Federal Information Processing Standard (FIPS) 140. FIPS 140 defines a minimum set of security requirements for products that implement cryptography.
83-
84-
The [Cryptographic Module Validation Program](https://csrc.nist.gov/Projects/Cryptographic-Module-Validation-Program) lists cryptographic modules that have been validated to comply with FIPS requirements. For example, Windows uses [SymCrypt](/windows/security/cryptography-certificate-mgmt), which is FIPS 140 certified for Windows-based devices, but not for mobile.
85-
86-
As a mobile app in enterprise authentication scenarios like MFA and passwordless, Microsoft Authenticator on iOS relies upon the [Apple Corecrypto module](https://support.apple.com/guide/sccc/security-certifications-for-ios-scccfa917cb49/web) of the corresponding iOS version. The Apple Corecrypto module is pending FIPS 140-3 validation beginning with iOS 14, and FIPS 140-2 validated on earlier versions of iOS.
87-
88-
For Android, Microsoft Authenticator uses WolfSSL cryptography. By using WolfSSL cryptography, Microsoft Authenticator relies upon the same FIPS 140 compliant cryptography for any Android device manufacturer. The encryption method is FIPS 140-2 validated, and pending FIPS 140-3 validation. For more information, see [wolfCrypt FIPS 140-2 and FIPS 140-3](https://www.wolfssl.com/license/fips/).
89-
90-
>[!NOTE]
91-
>Microsoft Authenticator is FIPS 140 compliant only for enterprise authentication flows like MFA, time-based one-time passcodes (TOTP), or passwordless authentication. Consumer authentication flows aren't FIPS 140 compliant.
92-
9380
## FIDO2 security keys
9481

9582
The FIDO (Fast IDentity Online) Alliance helps to promote open authentication standards and reduce the use of passwords as a form of authentication. FIDO2 is the latest standard that incorporates the web authentication (WebAuthn) standard.

0 commit comments

Comments
 (0)