Previous Topic: ArcotID Mobile PKI Client FlowNext Topic: Forgot Password Flow


ArcotID PKI Roaming Flow

For end users who do not have the ArcotID PKI credential present on the device from which they are trying to access a protected resource, the Advanced Authentication service offers roaming capabilities. With this feature, end users first download the ArcotID PKI after successfully completing secondary authentication and then use the ArcotID PKI to authenticate themselves and access the protected resource.

A roaming user can be authenticated using knowledge-based question and answer pairs, or security code through SMS, email, or voice message. Each security code is generated by the Advanced Authentication Server, and it does not require any credential-specific information.

This section describes the steps for the ArcotID PKI Roaming Download flow using security questions, security code, or both for secondary authentication.

Note: For detailed information about the back-end operations that take place when an end user tries to access a protected resource, see How Advanced Authentication Flows Work.

Assumptions:

This flow is based on the following assumptions:

The Flow:

  1. In a browser window, the end user attempts to access a protected resource.
  2. On the login page, the end user enters their user name and password, and then clicks Submit.
  3. CA SiteMinder verifies the end user's login credentials.
  4. The ArcotID PKI Client checks for an ArcotID PKI for the provided user name but does not find it on the end user’s device.
  5. The Advanced Authentication application invokes the Advanced Authentication Server to retrieve the end user’s ArcotID PKI.
  6. If the user name exists in the database but if their ArcotID PKI is not available on the device being used, the user is challenged for secondary authentication. Depending on the secondary authentication mechanism, one of the following sequence of steps takes place:
  7. If the verification is successful, depending on whether two-step authentication is enabled, either of the following steps take place:

    Note: Two-step authentication is not enabled for authentication using the ArcotID PKI mobile client. When a mobile client is used, all configured authentication methods are used one after the other.

  8. Upon downloading the credential, the browser displays the login page with the user name and challenges the end user for the password.
  9. The end user enters the password and completes the rest of the authentication process.
  10. If the authentication is successful, then the browser is redirected to SiteMinder with a success message.