...
Control | Rationale | |
|---|---|---|
| 1 | Mobile apps that are used to authenticate Users are installed from an authorised and certified source |
|
| 2 | Mobile apps that are used to authenticate Users verify they are installed on a mobile operating system version for which they are approved |
|
| 3 | A given installation of an application that performs User authentication is correlated to the signature of device on which it is installed |
|
| 4 | A given User is correlated to a private key, used for the purposes of User authentication, which in turn is correlated to a given device |
|
| 5 | Private keys created on a device for purposes of authentication are stored in the device security module |
|
| 6 | Private keys are represented by their corresponding public key or certificate, which can be published for use by relying parties |
|
| 7 | Use a biometric gesture (digit, face) as an authentication factor |
|
| 8 | A given authentication operation accepts an input parameter that uniquely links a given authentication operation to a given consent or consent signature |
|
| 9 | The identifier used to link to a given consent or consent signature is validated before a User authentication operation is initiated |
|
| 10 | A given User authentication operation is asserted using a complex object that describes the conditions of the User authentication operation |
|
| 11 | The assertion of a given User authentication operation is signed using the private key available in the device security module |
|
| 12 | Signing of the assertion of a given User authentication operation is completed using an appropriate function or method available on the device that provides signing access |
|
| 13 | Signing of the assertion of a given User authentication operation is consistent with the FAPI 2.0 Security Profile |
|
| 14 | Apps must verify the identity of external services on which they have a dependency for User authentication operations |
|
| 15 | TPPs must safeguard against installation of their apps on jailbroken devices and prohibiting initiating redirects for Authentication and Authorization when installed on a jailbroken device. |
|
| 16 | TPPs must not allow installation or usage of their apps from within sanctioned countries, including but not limited to initiating redirects for Authentication and Authorization. |
|
3. Emerging Standards
At the time of writing the standards and technologies considered to be consistent with the principles and controls above are as follows:
...