[Openid-specs-fapi] BG/Embedded SCA - Clinically free from OAuth

Torsten Lodderstedt torsten at lodderstedt.net
Sun Jul 26 17:08:53 UTC 2020



> On 26. Jul 2020, at 18:59, Anders Rundgren <anders.rundgren.net at gmail.com> wrote:
> 
> On 2020-07-26 18:38, Torsten Lodderstedt wrote:
>>> On 26. Jul 2020, at 18:21, Anders Rundgren <anders.rundgren.net at gmail.com> wrote:
>>> 
>>> On 2020-07-26 17:52, Torsten Lodderstedt wrote:
>>> <snip>
>>>>> 
>>>>> My turn for a question: do you think FAPI/OBIE should follow BG?
>>>> Why should we? The whole embedded stuff is contrary to any security best practice.
>>> 
>>> Essentially you are saying that Apple Pay and EMV doesn't work.
>> No, I’m saying the BG embedded SCA mode contradicts best security practice.
> 
> It can be as secure as the targeted payment scheme is.

Secure and best security practice are two different things. Best security practice refers to a set of practice that most people would accept as reasonable and battle proven. One of those practice is not to share credentials with other parties. This significantly reduces the attack surface. Most modern standards are built on this practice (or better but design principle). Cookies are sent to the originator only, FIDO 2 assumes the party creating the key pair is the party using the key pair. As long as one works within this corridor, things are simple, well understood and easier to secure. 

One can also secure the embedded mode, but it comes at a price, complex liability rules and regulatory obligations and incompatibility with current and emerging web (security) technology. 

> 
> 
>> I’m not an expert in payments, but here is my take:
>> Apple Pay works differently as the credit card is tokenized and I assume Apple never sees the user’s credentials with the bank.
> 
> Correct.  This can be achieved with a suitable Embedded SCA scheme which then can offer a payment experience that is comparable to Apple Pay which is the explicit goal.

Don’t you see the contradiction? Embedded SCA == PSU credentials are handled by 3rd parties (Apple in this case). 

> 
> That's all.
> 
> Regards,
> Anders
> 
>> EMV at the POS is closer to the embedded mode as everything, including the PIN, goes through the terminal. Security is ensured by tight control over the participants - the whole approach is everything but open.
>> In online use cases, 3DS uses the break out to let the issuer ask the user for her credentials, which is more OAuth alike.
>> The world is a bit more complicated than black and white.
>>> 
>>> Regards,
>>> Anders
>>> 
>>> 
>>> 
> 

-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/pkcs7-signature
Size: 3946 bytes
Desc: not available
URL: <http://lists.openid.net/pipermail/openid-specs-fapi/attachments/20200726/6ab9ba97/attachment.p7s>


More information about the Openid-specs-fapi mailing list