In order to satisfy the requirements of a given Authenticator Assurance Level (AAL), a claimant SHALL authenticate themselves with at least a given level of strength to be recognized as a subscriber. The result of an authentication process is an identifier, that MAY be pseudonymous, that SHALL be used each time that subscriber authenticates to that relying party. Optionally, other attributes that identify the subscriber as a unique person may also be provided.
Detailed normative requirements for authenticators and verifiers at each AAL are provided in Section 5.
FIPS 140 requirements are satisfied by [FIPS 140-2] or newer revisions.
###4.1. Authenticator Assurance Level 1
AAL 1 provides single factor remote network authentication, giving some assurance that the same Claimant who participated in previous transactions is accessing the protected transaction or data. AAL 1 allows a wide range of available authentication technologies to be employed and requires only a single authentication factor to be used. It also permits the use of any of the authentication methods of higher authenticator assurance levels. Successful authentication requires that the Claimant prove through a secure authentication protocol that he or she possesses and controls the authenticator.
####4.1.1. Permitted Authenticator Types
Authenticator Assurance Level 1 permits the use of any of the following authenticator types, defined in Section 5:
- Memorized Secret
- Look-up Secret
- Out of Band (Partially deprecated; see Section 5.1.3 for more details)
- Single Factor OTP Device
- Multi-Factor OTP Device
- Single Factor Cryptographic Device
- Multi-Factor Software Cryptographic Authenticator
- Multi-Factor Cryptographic Device
####4.1.2. Authenticator and Verifier Requirements
Cryptographic authenticators used at AAL 1 SHALL use approved cryptography.
Verifiers operated by government agencies at AAL 1 SHALL be validated to meet the requirements of [FIPS 140] Level 1.
####4.1.3. Assertion Requirements
In order to be valid at AAL 1, authentication assertions SHALL meet the requirements defined in SP 800-63C. Bearer assertions MAY be used.
At AAL 1, reauthentication of the subscriber SHOULD be repeated at least once per 30 days, regardless of user activity.
####4.1.5. Security Controls
The CSP SHALL employ appropriately tailored security controls from the low baseline of security controls defined in [SP 800-53] or equivalent industry standard and SHALL ensure that the minimum assurance requirements associated with the low baseline are satisfied.
####4.1.6. Records Retention
The CSP shall comply with their respective records retention policies in accordance with whatever laws and/or regulations apply. Otherwise, no retention period is required.
###4.2. Authenticator Assurance Level 2
AAL 2 provides higher assurance that the same claimant who participated in previous transactions is accessing the protected transaction or data. At least two different authentication factors are required. Various types of authenticators, including multi-factor software cryptographic authenticators, may be used as described below. AAL 2 also permits any of the authentication methods of AAL 3. AAL 2 authentication requires cryptographic mechanisms that protect the primary authenticator against compromise by the protocol threats for all threats at AAL 1 as well as against verifier impersonation attacks. Approved cryptographic techniques are required at AAL 2 and above.
####4.2.1. Permitted Authenticator Types
At AAL 2, it is required to have (a) a multi-factor authenticator, or (b) a combination of two single-factor authenticators. Authenticator requirements are specified in Section 5.
When a multi-factor authenticator is used, any of the following may be used:
- Multi-Factor OTP Device
- Multi-Factor Software Cryptographic Authenticator
- Multi-Factor Cryptographic Device
When a combination of two single-factor authenticators is used, it SHALL include a Memorized Secret authenticator and one possession-based ("something you have") authenticator from the following list:
- Look-up Secret
- Out of Band
- Single Factor OTP Device
- Single Factor Cryptographic Device
Note: The requirement for a memorized secret authenticator above derives from the need for two different types of authentication factors to be used. All biometric authenticators compliant with this specification are multi-factor, so something you know (a memorized secret) is the remaining possibility.
####4.2.2. Authenticator and Verifier Requirements
Cryptographic authenticators used at AAL 2 SHALL use approved cryptography. Authenticators developed by government agencies SHALL be validated to meet the requirements of [FIPS 140] Level 1.
Verifiers operated by government agencies at AAL 2 SHALL be validated to meet the requirements of [FIPS 140] Level 1.
####4.2.3. Assertion Requirements
In order to be valid at AAL 2, authentication assertions SHALL meet the requirements defined in SP 800-63C. Bearer assertions MAY be used.
At AAL 2, authentication of the subscriber SHALL be repeated at least once per 12 hours, regardless of user activity. Reauthentication of the subscriber SHALL be repeated following no more than 30 minutes of user inactivity. The CSP MAY prompt the user to cause activity just before the inactivity timeout, if desired. Reauthentication MAY use one of two authentication factors if the AAL 2 requirements of Section 5.2.4 are met.
####4.2.5. Security Controls
The CSP SHALL employ appropriately tailored security controls from the moderate baseline of security controls defined in [SP 800-53] or equivalent industry standard and SHALL ensure that the minimum assurance requirements associated with the moderate baseline are satisfied.
####4.2.6. Records Retention
CSPs shall comply with their respective records retention policies in accordance with whatever laws and/or regulations apply to those entities. Otherwise, retention of records is required for seven years and 6 months.
###4.3. Authenticator Assurance Level 3
AAL 3 is intended to provide the highest practical remote network authentication assurance. Authentication at AAL 3 is based on proof of possession of a key through a cryptographic protocol. AAL 3 is similar to AAL 2 except that only “hard” cryptographic authenticators are allowed.
####4.3.1. Permitted Authenticator Types
Authentication Assurance Level 3 requires the use of one of two kinds of hardware devices:
- Multi-factor OTP Device
- Multi-Factor Cryptographic Device
####4.3.2. Authenticator and Verifier Requirements
Authenticators used at AAL 3 SHALL be hardware cryptographic modules validated at [FIPS 140] Level 2 or higher overall with at least [FIPS 140] Level 3 physical security. AAL 3 authenticator requirements CAN be met by using the PIV authentication key of a [FIPS 201] compliant Personal Identity Verification (PIV) Card.
Verifiers at AAL 3 SHALL be validated at [FIPS 140] Level 2 or higher.
####4.3.3. Assertion Requirements
In order to be valid at AAL 3, authentication assertions SHALL meet the requirements of proof-of-possession assertions as defined in SP 800-63C.
At AAL 3, authentication of the subscriber SHALL be repeated at least once per 12 hours, regardless of user activity. Reauthentication of the subscriber SHALL be repeated following a period of no more than 15 minutes of user inactivity. It is permissible to prompt the user to cause activity just before the inactivity timeout, if desired.
####4.3.5. Security Controls
The CSP SHALL employ appropriately tailored security controls from the high baseline of security controls defined in [SP 800-53] or equivalent industry standard and SHALL ensure that the minimum assurance requirements associated with the high baseline are satisfied.
####4.3.6. Records Retention
CSP shall comply with their respective records retention policies in accordance with whatever laws and/or regulations apply to those entities. Otherwise, retention of records is required for ten years and 6 months.
###4.4. Summary of Requirements
(Non-normative; refer to preceding sections for normative requirements)
The following table summarizes the requirements for each of the authenticator assurance levels:
Requirement | AAL 1 | AAL 2 | AAL 3 |
---|---|---|---|
Authenticator types | Memorized Secret Look-up Secret Out of Band SF OTP Device MF OTP Device SF Cryptographic Device MF Software Cryptographic Authenticator MF Cryptographic Device |
MF OTP Device MF Software Cryptographic Authenticator MF Cryptographic Device or memorized secret plus: Look-up Secret Out of Band SF OTP Device SF Cryptographic Device |
MF OTP Device MF Cryptographic Device |
FIPS 140 verification | Level 1 | Level 1 (single factor), Level 2 (multi factor) |
Level 2 overall Level 3 physical security |
Assertions | Bearer or proof of possession | Bearer or proof of possession | Proof of possession only |
Reauthentication | 30 days | 12 hours or 30 minutes inactivity; may use one authentication factor | 12 hours or 15 minutes inactivity; shall use both authentication factors |
Security Controls | [SP 800-53] Low Baseline (or equivalent) | [SP 800-53] Moderate Baseline (or equivalent) | [SP 800-53] High Baseline (or equivalent) |
Records Retention | Not required | 7 years, 6 months | 10 years, 6 months |