SlideShare ist ein Scribd-Unternehmen logo
1 von 32
FIDO CERTIFICATION:
VALIDATING THE NEXT GENERATION OF
STRONGER, SIMPLER AUTHENTICATION
Steve Wilson, Ramesh Kesanupalli, Adam Powers
All Rights Reserved | FIDO Alliance | Copyright 2016
Agenda
• Welcome
• The Importance of Interoperability
• FIDO Certification Program Overview
• Highlights from Year One
• What’s New with the Program
• Implementation Highlights
• Getting Certified
• Q & A
2All Rights Reserved | FIDO Alliance | Copyright 2016
The Importance of Interoperability
3All Rights Reserved | FIDO Alliance | Copyright 2016
STEVE WILSON
Vice President and Principal Analyst,
Constellation Research
Physical-to-digital identity
User Management
Authentication
Federation
Single
Sign-On
Passwords Risk-BasedStrong
MODERN
AUTHENTICATION
FIDO Scope
PROGRAM OVERVIEW
Ramesh Kesanupalli, FIDO Visionary & Founder Nok Nok Labs
5All Rights Reserved | FIDO Alliance | Copyright 2016
Certification Goals
• Enable implementations to be identified as
officially FIDO certified
• Ensure interoperability between FIDO
officially recognized implementations
• Promote the adoption of the FIDO
ecosystem
6All Rights Reserved | FIDO Alliance | Copyright 2016
Certification Overview
• Available to both members and non-members
• Four steps to certification
7All Rights Reserved | FIDO Alliance | Copyright 2016
8All Rights Reserved | FIDO Alliance | Copyright 2016
Deployments are enabled by
150+ 200+ FIDO® Certified products
available today
9All Rights Reserved | FIDO Alliance | Copyright 2016
Certification Growth
10All Rights Reserved | FIDO Alliance | Copyright 2016
151
62
32
62
74
108
159
213
Apr-15 Jul-15 Sep-15 Dec-15 Mar-16 May-16
TOTAL
OEMs Now Shipping FIDO Certified Devices
S5, Mini Alpha Note 4,5 Note Edge Tab S,
Tab S2
S6,
S6 Edge
S7,
S7 Edge
Vernee
Thor
Aquos Zeta
Xperia Z5 Xperia Z5
Compact
Xperia Z5
Premium
Mate 8
V10 G5
Phab2
Pro
Phab2
Plus
Z2, Z2 ProArrows
NX
Arrows
Fit
Arrows
Tab
All Rights Reserved | FIDO Alliance | Copyright 2016
FIDO Applications Now Run on iOS 9
12All Rights Reserved | FIDO Alliance | Copyright 2016
iPhone 5s iPhone 6, 6+
iPad Air 2, Mini 3
iPhone 6s, 6s+
iPad Mini 4 iPad Pro
Supported iOS Fingerprint Devices
WHAT’S NEW WITH THE
CERTIFICATION PROGRAM
Adam Powers, Director of Technology, FIDO Alliance
13All Rights Reserved | FIDO Alliance | Copyright 2016
BLE
• 2014: USB
• 2015: NFC
• 2016: BLE
• Bluetooth Smart authenticators, based on new U2F BLE specification
• One-click authentication
• U2F support for iOS
14
+
All Rights Reserved | FIDO Alliance | Copyright 2016
On Demand Testing Overview
On
Demand
Testing
Virtual
Shipped
In-
Person
Confidential
FIDO Alliance | Confidential | All Rights Reserved | Copyright 2016 15
• Existing Process – Interop Testing
• Interop every 90 days
• Plan ahead! May impact product schedules…
• New Process – On Demand Testing
• Pick your testing date from a calendar
• Servers: remote / virtual testing
• Authenticators: ship device or in-person testing
• Convenience and fast turn-around
Upcoming Certification Programs
• Security Certification
• Third-party lab security testing
• Ensure authenticators are secure against at-scale and
targeted attacks
• Biometric Certification
• Biometric neutral third-party biometric testing
• Ensure levels of False Accept Rate (FAR) and resistance to
predefined presentation attacks
• New Specification Releases
• Stay tuned for more details…
16All Rights Reserved | FIDO Alliance | Copyright 2016
IMPLEMENTATION HIGHLIGHTS
17All Rights Reserved | FIDO Alliance | Copyright 2016
Korean Market Growth
• Most markets seeing
healthy growth…
• Huge spike in Korean
certifications in 2016
18All Rights Reserved | FIDO Alliance | Copyright 2016
3
16
55
73
Sept-15 Dec-15 Mar-16 May-16
BLE & NFC
All Rights Reserved | FIDO Alliance | Copyright 2016
BLE / NFC Implementations
21All Rights Reserved | FIDO Alliance | Copyright 2016
Cool Authentication
22
Voice + FacePalm Recognition
Iris Recognition PIN + Mini jack
All Rights Reserved | FIDO Alliance | Copyright 2016
TIPS FOR RELYING PARTIES
23All Rights Reserved | FIDO Alliance | Copyright 2016
Key Considerations
• FIDO® Certified
• Out-of-the-box interoperability
• Broad ecosystem of authenticators and devices
• Open Source Implementations
• Exist for both UAF and U2F
• Great for prototyping and small deployments
• Include FIDO in your RFP
• The simple way to ask for secure authentication
24All Rights Reserved | FIDO Alliance | Copyright 2016
Deploying: Authentication
25
phone / app
FIDO Client
FIDO
Authenticator(s)
Web
Server
Relying Party Applications
FIDO Components
FIDO Client API
All Rights Reserved | FIDO Alliance | Copyright 2016
Deploying: Second Factor
Original DB
Original Database
user_id Password#
JohnDoe
4^hfd;`gpo
U2F Database
U2F DB
Relation
Relying Party
user_id Meta U2F Data
JohnDoe
Yubico, Security
Key, USB
key handle, public
key, certificate
JohnDoe
Yubico, YubiKey
NEO, USB + NFC
key handle, public
key, certificate
John Doe Yubico, Mobile app
key handle, public
key, certificatediagram provided by:
• Average time to integrate: < 1
week
• Stats from Google Deployment:
• 4x faster login
• Significant fraud reduction
• 40% support reduction
All Rights Reserved | FIDO Alliance | Copyright 2016
TIPS FOR PRODUCT IMPLEMENTERS
27All Rights Reserved | FIDO Alliance | Copyright 2016
The Value of Ecosystem
28All Rights Reserved | FIDO Alliance | Copyright 2016
The Value of Certification
29All Rights Reserved | FIDO Alliance | Copyright 2016
Higher Quality
Deployment Ready
Interoperability
Market Ready
Getting the Most from Certification
• Remember to use your FIDO Certified logo!
• Tradeshows, websites, product briefs, etc.
• Being a member has its privileges
• Connect with RPs at plenaries, networking events, etc.
• Certification discounts
• Early access to specifications = first mover advantage
30All Rights Reserved | FIDO Alliance | Copyright 2016
Getting Started
• Register for Self-Conformance Test Tool Access : https://fidoalliance.org/test-tool-
access-request/
• For UAF, you will need to complete both automated and manual testing
• UAF Authenticators only will need a Vendor ID: http://fidoalliance.org/vendor-id-request/
• Complete Self-Conformance Testing at least two weeks prior to interoperability event.
• Elect to Participate in Pre-Testing in the two weeks prior to the interoperability event
(recommended)
• Register for the next interoperability event to be held in Korea :
https://fidoalliance.org/interop-registration/
• Next Interoperability Event Host: CrucialTec (Korea)
• August 30 – 31, 2016: UAF
• September 1, 2016: U2F
31All Rights Reserved | FIDO Alliance | Copyright 2016
Next Steps
32All Rights Reserved | FIDO Alliance | Copyright 2016
https://fidoalliance.org/certification/
QUESTIONS?
33All Rights Reserved | FIDO Alliance | Copyright 2016

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

Fido China Working Group (FCWG)
Fido China Working Group (FCWG)Fido China Working Group (FCWG)
Fido China Working Group (FCWG)
 
FIDO Overview: Status and Future
FIDO Overview: Status and FutureFIDO Overview: Status and Future
FIDO Overview: Status and Future
 
Fido Certification Program Process
Fido Certification Program ProcessFido Certification Program Process
Fido Certification Program Process
 
The Value of FIDO Alliance Membership
The Value of FIDO Alliance MembershipThe Value of FIDO Alliance Membership
The Value of FIDO Alliance Membership
 
U2F Tutorial - Authentication Tokens for Enterprise and Consumers
U2F Tutorial - Authentication Tokens for Enterprise and ConsumersU2F Tutorial - Authentication Tokens for Enterprise and Consumers
U2F Tutorial - Authentication Tokens for Enterprise and Consumers
 
FIDO And the Future of User Authentication
FIDO And the Future of User AuthenticationFIDO And the Future of User Authentication
FIDO And the Future of User Authentication
 
FIDO as Regtech - Addressing Government Requirements
FIDO as Regtech - Addressing Government RequirementsFIDO as Regtech - Addressing Government Requirements
FIDO as Regtech - Addressing Government Requirements
 
FIDO Specifications Overview
FIDO Specifications OverviewFIDO Specifications Overview
FIDO Specifications Overview
 
FIDO2 & Microsoft
FIDO2 & MicrosoftFIDO2 & Microsoft
FIDO2 & Microsoft
 
Google Case Sudy: Becoming Unphishable: Towards Simpler, Stronger Authenticaton
Google Case Sudy: Becoming Unphishable: Towards Simpler, Stronger AuthenticatonGoogle Case Sudy: Becoming Unphishable: Towards Simpler, Stronger Authenticaton
Google Case Sudy: Becoming Unphishable: Towards Simpler, Stronger Authenticaton
 
2018 12-07 tokyo-seminar Brett McDowell
2018 12-07 tokyo-seminar Brett McDowell2018 12-07 tokyo-seminar Brett McDowell
2018 12-07 tokyo-seminar Brett McDowell
 
Consumer Authentication Trends in APAC
Consumer Authentication Trends in APACConsumer Authentication Trends in APAC
Consumer Authentication Trends in APAC
 
FIDO and Strong Authentication in US Federal Government
FIDO and Strong Authentication in US Federal GovernmentFIDO and Strong Authentication in US Federal Government
FIDO and Strong Authentication in US Federal Government
 
Webinar: Considerations for Deploying FIDO in the Enterprise
Webinar: Considerations for Deploying FIDO in the EnterpriseWebinar: Considerations for Deploying FIDO in the Enterprise
Webinar: Considerations for Deploying FIDO in the Enterprise
 
Introduction to FIDO Authentication
Introduction to FIDO AuthenticationIntroduction to FIDO Authentication
Introduction to FIDO Authentication
 
FIDO Support for the GDPR
FIDO Support for the GDPRFIDO Support for the GDPR
FIDO Support for the GDPR
 
Introduction to FIDO Alliance
Introduction to FIDO AllianceIntroduction to FIDO Alliance
Introduction to FIDO Alliance
 
Introduction to the FIDO Alliance: Vision & Status
Introduction to the FIDO Alliance: Vision & StatusIntroduction to the FIDO Alliance: Vision & Status
Introduction to the FIDO Alliance: Vision & Status
 
New FIDO Specifications Overview -FIDO Alliance -Tokyo Seminar -Nadalin
New FIDO Specifications Overview -FIDO Alliance -Tokyo Seminar -NadalinNew FIDO Specifications Overview -FIDO Alliance -Tokyo Seminar -Nadalin
New FIDO Specifications Overview -FIDO Alliance -Tokyo Seminar -Nadalin
 
FIDO and Adaptive Authentication
FIDO and Adaptive AuthenticationFIDO and Adaptive Authentication
FIDO and Adaptive Authentication
 

Ähnlich wie FIDO Certification

Ähnlich wie FIDO Certification (20)

FIDO - The Value of Membership
FIDO -  The Value of Membership FIDO -  The Value of Membership
FIDO - The Value of Membership
 
Introduction to FIDO Alliance: Vision and Status -Tokyo Seminar -Brett McDowell
Introduction to FIDO Alliance: Vision and Status -Tokyo Seminar -Brett McDowellIntroduction to FIDO Alliance: Vision and Status -Tokyo Seminar -Brett McDowell
Introduction to FIDO Alliance: Vision and Status -Tokyo Seminar -Brett McDowell
 
Beyond Passwords: FIDO & the Future of Consumer Authentication
Beyond Passwords: FIDO & the Future of Consumer AuthenticationBeyond Passwords: FIDO & the Future of Consumer Authentication
Beyond Passwords: FIDO & the Future of Consumer Authentication
 
Tokyo Seminar: FIDO Alliance Vision and Status
Tokyo Seminar: FIDO Alliance Vision and StatusTokyo Seminar: FIDO Alliance Vision and Status
Tokyo Seminar: FIDO Alliance Vision and Status
 
FIDO Alliance Vision and Status
FIDO Alliance Vision and StatusFIDO Alliance Vision and Status
FIDO Alliance Vision and Status
 
FIDO Certified Program: The Value of Certification
FIDO Certified Program: The Value of Certification FIDO Certified Program: The Value of Certification
FIDO Certified Program: The Value of Certification
 
FIDO & PSD2 – Achieving Strong Customer Authentication Compliance
FIDO & PSD2 – Achieving Strong Customer Authentication ComplianceFIDO & PSD2 – Achieving Strong Customer Authentication Compliance
FIDO & PSD2 – Achieving Strong Customer Authentication Compliance
 
Technical Principles of FIDO Authentication
Technical Principles of FIDO AuthenticationTechnical Principles of FIDO Authentication
Technical Principles of FIDO Authentication
 
Technical Principles of FIDO Authentication
Technical Principles of FIDO AuthenticationTechnical Principles of FIDO Authentication
Technical Principles of FIDO Authentication
 
FIDO Alliance Vision and Updates
FIDO Alliance Vision and UpdatesFIDO Alliance Vision and Updates
FIDO Alliance Vision and Updates
 
FIDO Certification Program Updates
FIDO Certification Program UpdatesFIDO Certification Program Updates
FIDO Certification Program Updates
 
FIDO Alliance Vision and Status
FIDO Alliance Vision and StatusFIDO Alliance Vision and Status
FIDO Alliance Vision and Status
 
FIDO Alliance Webinar: Intuit's Journey with FIDO Authentication
FIDO Alliance Webinar: Intuit's Journey with FIDO AuthenticationFIDO Alliance Webinar: Intuit's Journey with FIDO Authentication
FIDO Alliance Webinar: Intuit's Journey with FIDO Authentication
 
Getting to Know the FIDO Specifications - Technical Tutorial
Getting to Know the FIDO Specifications - Technical TutorialGetting to Know the FIDO Specifications - Technical Tutorial
Getting to Know the FIDO Specifications - Technical Tutorial
 
The FIDO Alliance Today: Status and News
The FIDO Alliance Today: Status and NewsThe FIDO Alliance Today: Status and News
The FIDO Alliance Today: Status and News
 
Fido Technical Overview
Fido Technical OverviewFido Technical Overview
Fido Technical Overview
 
FIDO Workshop at the Cloud Identity Summit: FIDO Alliance Overview
FIDO Workshop at the Cloud Identity Summit: FIDO Alliance OverviewFIDO Workshop at the Cloud Identity Summit: FIDO Alliance Overview
FIDO Workshop at the Cloud Identity Summit: FIDO Alliance Overview
 
Fido uaf-overview-v1.1-rd-20161005
Fido uaf-overview-v1.1-rd-20161005Fido uaf-overview-v1.1-rd-20161005
Fido uaf-overview-v1.1-rd-20161005
 
Introduction to FIDO's Identity Verification & Binding Initiative
Introduction to FIDO's Identity Verification & Binding Initiative Introduction to FIDO's Identity Verification & Binding Initiative
Introduction to FIDO's Identity Verification & Binding Initiative
 
FIDO Authentication in Korea: Early Adoption & Rapid Innovation
FIDO Authentication in Korea: Early Adoption & Rapid InnovationFIDO Authentication in Korea: Early Adoption & Rapid Innovation
FIDO Authentication in Korea: Early Adoption & Rapid Innovation
 

Mehr von FIDO Alliance

Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.com
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.comConsumer Attitudes Toward Strong Authentication & LoginWithFIDO.com
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.com
FIDO Alliance
 

Mehr von FIDO Alliance (20)

FIDO Alliance: Welcome and FIDO Update.pptx
FIDO Alliance: Welcome and FIDO Update.pptxFIDO Alliance: Welcome and FIDO Update.pptx
FIDO Alliance: Welcome and FIDO Update.pptx
 
IBM: Hey FIDO, Meet Passkey!.pptx
IBM: Hey FIDO, Meet Passkey!.pptxIBM: Hey FIDO, Meet Passkey!.pptx
IBM: Hey FIDO, Meet Passkey!.pptx
 
OTIS: Our Journey to Passwordless.pptx
OTIS: Our Journey to Passwordless.pptxOTIS: Our Journey to Passwordless.pptx
OTIS: Our Journey to Passwordless.pptx
 
FIDO Workshop-Demo Breakdown.pptx
FIDO Workshop-Demo Breakdown.pptxFIDO Workshop-Demo Breakdown.pptx
FIDO Workshop-Demo Breakdown.pptx
 
CISA: #MoreThanAPassword.pptx
CISA: #MoreThanAPassword.pptxCISA: #MoreThanAPassword.pptx
CISA: #MoreThanAPassword.pptx
 
FIDO Authentication: Unphishable MFA for All
FIDO Authentication: Unphishable MFA for AllFIDO Authentication: Unphishable MFA for All
FIDO Authentication: Unphishable MFA for All
 
FIDO Alliance Webinar: Catch Up WIth FIDO
FIDO Alliance Webinar: Catch Up WIth FIDOFIDO Alliance Webinar: Catch Up WIth FIDO
FIDO Alliance Webinar: Catch Up WIth FIDO
 
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.com
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.comConsumer Attitudes Toward Strong Authentication & LoginWithFIDO.com
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.com
 
新しい認証技術FIDOの最新動向
新しい認証技術FIDOの最新動向新しい認証技術FIDOの最新動向
新しい認証技術FIDOの最新動向
 
日立PBI技術を用いた「デバイスフリーリモートワーク」構想
日立PBI技術を用いた「デバイスフリーリモートワーク」構想日立PBI技術を用いた「デバイスフリーリモートワーク」構想
日立PBI技術を用いた「デバイスフリーリモートワーク」構想
 
Introduction to FIDO and eIDAS Services
Introduction to FIDO and eIDAS ServicesIntroduction to FIDO and eIDAS Services
Introduction to FIDO and eIDAS Services
 
富士通の生体認証ソリューションと提案
富士通の生体認証ソリューションと提案富士通の生体認証ソリューションと提案
富士通の生体認証ソリューションと提案
 
テレワーク本格導入におけるID認証考察
テレワーク本格導入におけるID認証考察テレワーク本格導入におけるID認証考察
テレワーク本格導入におけるID認証考察
 
「開けゴマ!」からYubiKeyへ
「開けゴマ!」からYubiKeyへ「開けゴマ!」からYubiKeyへ
「開けゴマ!」からYubiKeyへ
 
YubiOnが目指す未来
YubiOnが目指す未来YubiOnが目指す未来
YubiOnが目指す未来
 
FIDO2導入してみたを考えてみた
FIDO2導入してみたを考えてみたFIDO2導入してみたを考えてみた
FIDO2導入してみたを考えてみた
 
中小企業によるFIDO導入事例
中小企業によるFIDO導入事例中小企業によるFIDO導入事例
中小企業によるFIDO導入事例
 
VPNはもう卒業!FIDO2認証で次世代リモートアクセス
VPNはもう卒業!FIDO2認証で次世代リモートアクセスVPNはもう卒業!FIDO2認証で次世代リモートアクセス
VPNはもう卒業!FIDO2認証で次世代リモートアクセス
 
CloudGate UNOで安全便利なパスワードレスリモートワーク
CloudGate UNOで安全便利なパスワードレスリモートワークCloudGate UNOで安全便利なパスワードレスリモートワーク
CloudGate UNOで安全便利なパスワードレスリモートワーク
 
数々の実績:迅速なFIDO認証の展開をサポート
数々の実績:迅速なFIDO認証の展開をサポート数々の実績:迅速なFIDO認証の展開をサポート
数々の実績:迅速なFIDO認証の展開をサポート
 

Kürzlich hochgeladen

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Kürzlich hochgeladen (20)

Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 

FIDO Certification

  • 1. FIDO CERTIFICATION: VALIDATING THE NEXT GENERATION OF STRONGER, SIMPLER AUTHENTICATION Steve Wilson, Ramesh Kesanupalli, Adam Powers All Rights Reserved | FIDO Alliance | Copyright 2016
  • 2. Agenda • Welcome • The Importance of Interoperability • FIDO Certification Program Overview • Highlights from Year One • What’s New with the Program • Implementation Highlights • Getting Certified • Q & A 2All Rights Reserved | FIDO Alliance | Copyright 2016
  • 3. The Importance of Interoperability 3All Rights Reserved | FIDO Alliance | Copyright 2016 STEVE WILSON Vice President and Principal Analyst, Constellation Research
  • 5. PROGRAM OVERVIEW Ramesh Kesanupalli, FIDO Visionary & Founder Nok Nok Labs 5All Rights Reserved | FIDO Alliance | Copyright 2016
  • 6. Certification Goals • Enable implementations to be identified as officially FIDO certified • Ensure interoperability between FIDO officially recognized implementations • Promote the adoption of the FIDO ecosystem 6All Rights Reserved | FIDO Alliance | Copyright 2016
  • 7. Certification Overview • Available to both members and non-members • Four steps to certification 7All Rights Reserved | FIDO Alliance | Copyright 2016
  • 8. 8All Rights Reserved | FIDO Alliance | Copyright 2016 Deployments are enabled by 150+ 200+ FIDO® Certified products available today
  • 9. 9All Rights Reserved | FIDO Alliance | Copyright 2016
  • 10. Certification Growth 10All Rights Reserved | FIDO Alliance | Copyright 2016 151 62 32 62 74 108 159 213 Apr-15 Jul-15 Sep-15 Dec-15 Mar-16 May-16 TOTAL
  • 11. OEMs Now Shipping FIDO Certified Devices S5, Mini Alpha Note 4,5 Note Edge Tab S, Tab S2 S6, S6 Edge S7, S7 Edge Vernee Thor Aquos Zeta Xperia Z5 Xperia Z5 Compact Xperia Z5 Premium Mate 8 V10 G5 Phab2 Pro Phab2 Plus Z2, Z2 ProArrows NX Arrows Fit Arrows Tab All Rights Reserved | FIDO Alliance | Copyright 2016
  • 12. FIDO Applications Now Run on iOS 9 12All Rights Reserved | FIDO Alliance | Copyright 2016 iPhone 5s iPhone 6, 6+ iPad Air 2, Mini 3 iPhone 6s, 6s+ iPad Mini 4 iPad Pro Supported iOS Fingerprint Devices
  • 13. WHAT’S NEW WITH THE CERTIFICATION PROGRAM Adam Powers, Director of Technology, FIDO Alliance 13All Rights Reserved | FIDO Alliance | Copyright 2016
  • 14. BLE • 2014: USB • 2015: NFC • 2016: BLE • Bluetooth Smart authenticators, based on new U2F BLE specification • One-click authentication • U2F support for iOS 14 + All Rights Reserved | FIDO Alliance | Copyright 2016
  • 15. On Demand Testing Overview On Demand Testing Virtual Shipped In- Person Confidential FIDO Alliance | Confidential | All Rights Reserved | Copyright 2016 15 • Existing Process – Interop Testing • Interop every 90 days • Plan ahead! May impact product schedules… • New Process – On Demand Testing • Pick your testing date from a calendar • Servers: remote / virtual testing • Authenticators: ship device or in-person testing • Convenience and fast turn-around
  • 16. Upcoming Certification Programs • Security Certification • Third-party lab security testing • Ensure authenticators are secure against at-scale and targeted attacks • Biometric Certification • Biometric neutral third-party biometric testing • Ensure levels of False Accept Rate (FAR) and resistance to predefined presentation attacks • New Specification Releases • Stay tuned for more details… 16All Rights Reserved | FIDO Alliance | Copyright 2016
  • 17. IMPLEMENTATION HIGHLIGHTS 17All Rights Reserved | FIDO Alliance | Copyright 2016
  • 18. Korean Market Growth • Most markets seeing healthy growth… • Huge spike in Korean certifications in 2016 18All Rights Reserved | FIDO Alliance | Copyright 2016 3 16 55 73 Sept-15 Dec-15 Mar-16 May-16
  • 19. BLE & NFC All Rights Reserved | FIDO Alliance | Copyright 2016
  • 20. BLE / NFC Implementations 21All Rights Reserved | FIDO Alliance | Copyright 2016
  • 21. Cool Authentication 22 Voice + FacePalm Recognition Iris Recognition PIN + Mini jack All Rights Reserved | FIDO Alliance | Copyright 2016
  • 22. TIPS FOR RELYING PARTIES 23All Rights Reserved | FIDO Alliance | Copyright 2016
  • 23. Key Considerations • FIDO® Certified • Out-of-the-box interoperability • Broad ecosystem of authenticators and devices • Open Source Implementations • Exist for both UAF and U2F • Great for prototyping and small deployments • Include FIDO in your RFP • The simple way to ask for secure authentication 24All Rights Reserved | FIDO Alliance | Copyright 2016
  • 24. Deploying: Authentication 25 phone / app FIDO Client FIDO Authenticator(s) Web Server Relying Party Applications FIDO Components FIDO Client API All Rights Reserved | FIDO Alliance | Copyright 2016
  • 25. Deploying: Second Factor Original DB Original Database user_id Password# JohnDoe 4^hfd;`gpo U2F Database U2F DB Relation Relying Party user_id Meta U2F Data JohnDoe Yubico, Security Key, USB key handle, public key, certificate JohnDoe Yubico, YubiKey NEO, USB + NFC key handle, public key, certificate John Doe Yubico, Mobile app key handle, public key, certificatediagram provided by: • Average time to integrate: < 1 week • Stats from Google Deployment: • 4x faster login • Significant fraud reduction • 40% support reduction All Rights Reserved | FIDO Alliance | Copyright 2016
  • 26. TIPS FOR PRODUCT IMPLEMENTERS 27All Rights Reserved | FIDO Alliance | Copyright 2016
  • 27. The Value of Ecosystem 28All Rights Reserved | FIDO Alliance | Copyright 2016
  • 28. The Value of Certification 29All Rights Reserved | FIDO Alliance | Copyright 2016 Higher Quality Deployment Ready Interoperability Market Ready
  • 29. Getting the Most from Certification • Remember to use your FIDO Certified logo! • Tradeshows, websites, product briefs, etc. • Being a member has its privileges • Connect with RPs at plenaries, networking events, etc. • Certification discounts • Early access to specifications = first mover advantage 30All Rights Reserved | FIDO Alliance | Copyright 2016
  • 30. Getting Started • Register for Self-Conformance Test Tool Access : https://fidoalliance.org/test-tool- access-request/ • For UAF, you will need to complete both automated and manual testing • UAF Authenticators only will need a Vendor ID: http://fidoalliance.org/vendor-id-request/ • Complete Self-Conformance Testing at least two weeks prior to interoperability event. • Elect to Participate in Pre-Testing in the two weeks prior to the interoperability event (recommended) • Register for the next interoperability event to be held in Korea : https://fidoalliance.org/interop-registration/ • Next Interoperability Event Host: CrucialTec (Korea) • August 30 – 31, 2016: UAF • September 1, 2016: U2F 31All Rights Reserved | FIDO Alliance | Copyright 2016
  • 31. Next Steps 32All Rights Reserved | FIDO Alliance | Copyright 2016 https://fidoalliance.org/certification/
  • 32. QUESTIONS? 33All Rights Reserved | FIDO Alliance | Copyright 2016

Hinweis der Redaktion

  1. Before moving on, it’s important to understand FIDO’s scope – looking at the “identity” pyramid you’ll see where FIDO resides. While FIDO is complementary to Federation and the other components, we don’t explicity consider them in our specifications. From a technical perspective we’re focused solely on Authentication– and specifically, stronger, simpler authentication.
  2. We support a growing number of fingerprint enabled Android devices that have in-built UAF capabilities Most of the new Samsung high devices with FPSs support UAF Newer devices from Fujitsu, Sharp and Sony increasingly include UAF support out of the box Fujitsu Arrows NX supports UAF-enabled iris authentication. We will see other types of authenticators also appear in coming devices We support the Android M fingerprint API Apart from these devices with native FIDO UAF support, we also support virtually any non-FPS Android device running Kit Kat or newer using an embedded UAF PIN authenticator.