Client to Authenticator Protocol

From HandWiki
Revision as of 22:59, 6 February 2024 by DanMescoff (talk | contribs) (over-write)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Short description: Authentication protocol

The Client to Authenticator Protocol (CTAP) or X.1278[1] enables a roaming, user-controlled cryptographic authenticator (such as a smartphone or a hardware security key) to interoperate with a client platform such as a laptop.

Standard

CTAP is complementary to the Web Authentication (WebAuthn) standard published by the World Wide Web Consortium (W3C).[2] WebAuthn and CTAP are the primary outputs of the FIDO2 Project, a joint effort between the FIDO Alliance and the W3C.[3]

CTAP is based upon previous work done by the FIDO Alliance, in particular the Universal 2nd Factor (U2F) authentication standard. Specifically, the FIDO U2F 1.2 Proposed Standard (July 11, 2017) became the starting point for the CTAP Proposed Standard, the latest version 2.0 of which was published on January 30, 2019.[4] A new version 2.2 is currently published as a "Review Draft Specification".[5]

The CTAP specification refers to two protocol versions, the CTAP1/U2F protocol and the CTAP2 protocol.[4] An authenticator that implements CTAP2 is called a FIDO2 authenticator (also called a WebAuthn authenticator). If that authenticator implements CTAP1/U2F as well, it is backward compatible with U2F.

The protocol uses the CBOR binary data serialization format.

The standard was adopted as ITU-T Recommendation X.1278.[6][1]

References

External links