© 2014 FIDO Alliance
Standards for
Simpler Stronger Authentication
Rajiv Dholakia – VP Products & Business Development
, Nok Nok Labs
rajiv@noknok.com
Context & Aspirations
I.T. HAS SCALED: IT’S A HETEROGENEOUS WORLD
$$$
Technological capabilities: (1971 ! 2013)
Clock speed x4700
#transistors x608k
Structure size /450
Price: (1980 ! 2013)
HDD $/MB /12k
NV RAM $/MB /1.3m
Ubiquity:
More than 7bn mobile
connected devices by end of
2013
Connectivity: (2013)
34% of all people ww have internet
access
Relevance: (2012)
$1 trillion eCommerce
Social media: (2013)
>10% of all people ww active
NOK NOK LABS
The Authentication Tower of Babel
Silos, proprietary, privacy, reliance on 3rd party, tolls
NOK NOK LABS
?
4
IMPLEMENTOR’s PERSPECTIVE: A CHALLENGE
Aplumbingproblem:ShadesofRubeGoldberg…
NOK NOK LABS
App 2
New
App
?
RP 1
RP 1
App 1
?
Applications Authentication MethodsOrganizations
Silo 1
Silo 2
Silo N
Silo 3
5
Taking lessons from History
6
Authentication
SSL
Communication
???
Common authentication plumbing
7
Users
Cloud/Enterprise
Devices
Federation
Open Standard
Plug-In Approach
Interoperable Ecosystem
Usable
Authentication
WHAT IS NEEDED
FIDO 101
Goal: Simpler, Stronger Authentication
(a) Developing unencumbered Specifications that define
interoperable mechanisms that supplant reliance on
passwords
(b) Operating programs to help ensure industry adoption
(c) Submitting mature Specifications for formal
standardization
Mission: To Change Authentication Online by:
Identity & Authentication Building Blocks
NOK NOK LABS 10
Physical-to-digital identity
User Management
Authentication
Federation
Single
Sign-On
E-Gov Payments Security
Passwords Risk-BasedStrong
MODERN
AUTHENTICATION
Personalization
User Authentication Online
Do you want to login?
Do you want to transfer $100 to Frank?
Do you want to ship to a new address?
Do you want to delete all of your emails?
Do you want to share your dental record?
Authentication today:
Ask user for a password
(and perhaps a one time code)
Today’s Passwords
REUSED PHISHED KEYLOGGED
Today’s Password Alternatives
One Time Codes with SMS or Device
SMS
USABILITY
DEVICE
USABILITY
USER
EXPERIENCE
STILL
PHISHABLE
Coverage | Delay | Cost One per site | $$ | Fragile User find it hard Known attacks today
Megatrend
Simpler, Stronger Local Device Auth
PERSONAL DEVICES LOCAL LOCKING
NEW WAVE: CONVENIENT
SECURITY
Carry Personal Data Pins & Patterns today
Simpler, Stronger local
auth
Putting It Together
The problem:
Simpler, Stronger online
The trend:
Simpler, Stronger local device auth
Why not:
Use local device auth for online auth?
This is the core idea behind FIDO standards!
FIDO Experiences
LOCAL DEVICE AUTH SUCCESSONLINE AUTH REQUEST
PASSWORDLESS EXPERIENCE (UAF standards)
SECOND FACTOR EXPERIENCE (U2F standards)
Show a biometricTransaction Detail Done
Login & Password Insert Dongle, Press button Done
FIDO Registration
REGISTRATION BEGINS USER APPROVAL
REGISTRATION COMPLETE NEW KEY CREATED
USER APPROVAL
KEY REGISTERED
1 2
Using
Public key
Cryptography
4 3
FIDO Login
LOGIN USER APPROVAL
LOGIN COMPLETE KEY SELECTED
LOGIN CHALLENGE
LOGIN RESPONSE
1 2
4 3
Login
Using
Public key
Cryptography
Decouple User Verification Method from
Authentication Protocol
LOGIN USER APPROVAL
REGISTRATION COMPLETE KEY SELECTED
LOGIN CHALLENGE
LOGIN RESPONSE
1 2
4 3
Leverage public key
cryptography
ONLINE SECURITY
PROTOCOL
PLUGGABLE
LOCAL
AUTH
User Device
User Agent Mobile Apps
Authenticator Abstraction
(ASM)
Authenticators
Authenticators
Private Keys
Authentication Keys
Attestation Keys
Relying Party
Web Application
FIDO UAF Server
Authentication Keys
Attestation Key
Public KeysRegistration,
Authentication &
Transaction Confirmation!
UAF
Protocol
UAF ARCHITECTURE OVERVIEW
UAF Authenticators
Relying Party
User Side
U2F APDU
USB API
NFC API
Bluetooth API
U2F JS API
Secure U2F
Element
Connectors
USB
NFC
Bluetooth
Web Application
FIDO U2F
Server
User Keys
U2F Flow Diagram
User Action
BrowserU2F Token
Options
Passwordless UX = UAF:
Universal Auth Framework
•  User carries client device with UAF
stack installed
•  User presents a local biometric or PIN
•  Website can choose whether to retain
password
Simpler Stronger Authentication
Second Factor UX = U2F:
Universal Second Factor
•  User carries U2F device with built-
in support in web browsers
•  User presents U2F device
•  Website can simplify password
(e.g, 4 digit PIN)
Design
Considerations
No 3rd Party in the Protocol
No secrets on Server side
Focus on User Privacy
• Biometric data never leaves user’s device
• No linkability between RPs
• No linkability between RP accounts
Embrace all kinds of Authenticators
software, proprietary hardware,
certified hardware, ...
Risk Based Authentication
"  Login to online account
"  Change shipping address
"  Transfer $10.000
Low
High
Choice of Security Profiles
NOK NOK LABS
User Space
Secure
Hardware
FIDO
UX Layer
Input, Display
Crypto Layer
FIDO
UX Layer
Input, Display
Crypto Layer
FIDO
Crypto Layer
UX Layer
Input, Display
No Secure HW Secure Crypto
+
Storage
Secure Execution
Environment
Risk Appropriate Authentication
30
Strong Stronger
FIDO Security Spectrum
Software Only
ID
TPM/SE
ID
TEE + SE
ID
Protects Keys
Protects Keys
Protects Crypto
Protects Keys
Protects Crypto
Protects Code
Protects Display
Strongest
Permanent link to this comic: http://xkcd.com/538/
A webcomic of romance, sarcasm, math, and language.
On SECURITY
A peek into MODERN AUTHENTICATION
32NOK NOK LABS
IMPLICIT
AUTHENTICATION
EXPLICIT
AUTHENTICATION
COMPLEMENTS IDENTITY &
FEDERATION STANDARDS
NOK NOK LABS 33
STRONG AUTH
PASSWORDS
SSO/FEDERATION
Recreated PMS
First Mile Second Mile
SAML
OpenID
FIDO/Strong Auth Federation Standards
FIDO Model: Direct to Relying Party OR through IdP
34Devices support multiple authenticators
User Authenticates to the Device
Relying Parties (SP)
Device Authenticates
to Relying Party
2a
1
Identity Provider (IdP)
2b
OR Device Authenticates
to Identity Provider (IDP)
2c
IDP asserts identity via
SAML, Oauth,
OpenID Connect…
OR
Recap
Identity & Authentication
NOK NOK LABS 36
Physical-to-digital identity
User Management
Authentication
Federation
Single
Sign-On
E-Gov Payments Security
Passwords Risk-BasedStrong
MODERN
AUTHENTICATION
Personalization
Simplifying and Scaling Authentication
AnyDevice.AnyApplication.AnyAuthenticator.
37
Standardized Protocols
Local authentication
unlocks app specific key
Key used to authenticate
to server
IMPLEMENTATION CHALLENGE
Aplumbingproblem:ShadesofRubeGoldberg…
NOK NOK LABS
App 2
New
App
?
RP 1
RP 1
App 1
?
Applications Authentication MethodsOrganizations
Silo 1
Silo 2
Silo N
Silo 3
38
SIMPLIFIED IMPLEMENTATION
WHATISBEINGSTANDARDIZED
App 2
Applications Authentication Methods
RP 1
RP 1
App 1
New
App
FIDO UNIFIED
STANDARDS
Organizations
?
39
Online Crypto Protocol
Pluggable Authentication
CONCLUSIONS
•  The enemy is symmetric shared secrets
•  The enemy is poor user experiences and friction
•  FIDO is a building block
•  Even simple software-based authenticator with a pin
offers many advantages over passwords
•  FIDO complements your investments in federation and
improves your security and ease of use
FIDO Alliance Snapshot
July 2014
42Nok Nok Labs Confidential — Do Not Distribute
FIDO Alliance Role
•  Paper Specifications, Interop and Conformance testing, Trademark
licensing against criteria, thought leadership, nurture ecosystem of
vendors delivering FIDO implementations to market
•  Alliance does not ship products (only specifications)
o  Implementations left to commercial vendors
•  FIDO Alliance designs core protocol
o  Like SSL, FIDO has no domain semantics
o  Relying parties and Vendors may adapt FIDO into commercial solutions
o  Vendors may deliver FIDO specification as product or service, standalone or as
part of a solution stack
o  Extended use cases may be explored by vendors long before imported into
protocol
Version 1.0 (Review Draft) is in Public Review
FIDO at Industry Events – Readiness
FIDO-Ready Products & Deployment for Mobile & More
SIM + Secure Element
PIN + MicroSD, USB
Fingerprint, Mobile
Speaker Recognition
Mobile via NFC*
Useful to keep these separate:
Design Intent
FIDO Protocol Specification
Specific Implementations
Solution that incorporates FIDO
Select Authenticate Purchase
47
MOBILE DEVICES reshaping Security, Commerce
NOK NOK LABS
AUTHENTICATION THAT IS
“One-Swipe”, “One-Phrase”, “One-Look”, “One Touch”
OEMs SHIPPING FIDO-READY ™ PRODUCTS
New and existing devices are supported
48
OEM Enabled: Samsung Galaxy S5OEM Enabled: Lenovo ThinkPads with
Fingerprint Sensors
Clients available for these operating systems :
Software Authenticator Examples:
Voice/Face recognition, PIN, QR Code, etc.
Aftermarket Hardware Authenticator Examples:
USB fingerprint scanner, MicroSD Secure Element
First FIDO Deployment already live…
49
•  Customers can use their finger to pay with
PayPal from their new Samsung Galaxy S5
because the FIDO Ready™ software on the
device securely communicates between the
fingerprint sensor on their device and
PayPal’s service in the cloud. The only
information the device shares with PayPal
is a unique cryptographic “public key”
that allows PayPal to verify the identity of the
customer without having to store any
biometric information on PayPal’s
servers.
Breaking news for July…
•  Alipay – formerly a part of
Alibaba Group in China
•  Processed $519 Billion in
transactions in 2013
•  Launched FIDO-based
payments using Galaxy S5
Better Security, Better User Experience
Goingbeyond“Risk,Regulation,Reputation”
51
Setup Confirm Sent
DESIGN, DELIGHT & DOLLARS!
Call to Action
•  FIDO is ready for use – launch a POC, Pilot
•  Get involved:
o  Develop or adapt your products to FIDO
o  Come to the plenary, meet and mingle, speak with the pioneers,
select your partners
o  Join the Alliance and contribute – we are a volunteer run
organization!
o  Contact donal@fidoalliance.org for membership details
o  Other questions – rajiv@noknok.com
FIN
THANK YOU

More Related Content

PDF
FIDO Specifications Tutorial
PDF
FIDO Specifications Overview: UAF & U2F
PDF
Bio-Authentication (FIDO) and PKI Trends in Korea
PDF
LINEのFIDO導入と将来展望
PDF
Google Case Study: Becoming Unphisable: Towards Simpler, Stronger Authenticat...
PDF
FIDO’s fit for Key Industries in Korea
PDF
FIDO Authentication: Its Evolution and Opportunities in Business -FIDO Allian...
PDF
FIDO UAF Specifications: Overview & Tutorial
FIDO Specifications Tutorial
FIDO Specifications Overview: UAF & U2F
Bio-Authentication (FIDO) and PKI Trends in Korea
LINEのFIDO導入と将来展望
Google Case Study: Becoming Unphisable: Towards Simpler, Stronger Authenticat...
FIDO’s fit for Key Industries in Korea
FIDO Authentication: Its Evolution and Opportunities in Business -FIDO Allian...
FIDO UAF Specifications: Overview & Tutorial

What's hot (20)

PPTX
Getting to Know the FIDO Specifications - Technical Tutorial
PPTX
New FIDO Specifications Overview -FIDO Alliance -Tokyo Seminar -Nadalin
PPTX
FIDOAlliance
PPTX
Introduction to FIDO Alliance: Vision and Status -Tokyo Seminar -Brett McDowell
PDF
Fido Overview: Status and Future
PDF
CIS14: An Overview of FIDO's Universal Factor (UAF) Specifications
PDF
FIDO U2F & UAF Tutorial
PDF
Introduction to FIDO Authentication
PDF
FIDO UAF 1.0 Specs: Overview and Insights
PPTX
FIDO Specifications Overview
PDF
FIDO in Government
PDF
KICA Case Study: Bio-Authentication and PKI Trends in Korea -FIDO Alliance -T...
PDF
FIDO2 and Microsoft
PPTX
Fido U2F Protocol by Ather Ali
PPTX
FIDO & GSMA Mobile Connect
PDF
CIS14: An Overview of FIDO’s Universal 2nd Factor (U2F) Specification
PDF
Google Case Sudy: Becoming Unphishable: Towards Simpler, Stronger Authenticaton
PPTX
Technical Principles of FIDO Authentication
PDF
Mobile Cloud Identity
PDF
FIDO, Strong Authentication and elD in Germany
Getting to Know the FIDO Specifications - Technical Tutorial
New FIDO Specifications Overview -FIDO Alliance -Tokyo Seminar -Nadalin
FIDOAlliance
Introduction to FIDO Alliance: Vision and Status -Tokyo Seminar -Brett McDowell
Fido Overview: Status and Future
CIS14: An Overview of FIDO's Universal Factor (UAF) Specifications
FIDO U2F & UAF Tutorial
Introduction to FIDO Authentication
FIDO UAF 1.0 Specs: Overview and Insights
FIDO Specifications Overview
FIDO in Government
KICA Case Study: Bio-Authentication and PKI Trends in Korea -FIDO Alliance -T...
FIDO2 and Microsoft
Fido U2F Protocol by Ather Ali
FIDO & GSMA Mobile Connect
CIS14: An Overview of FIDO’s Universal 2nd Factor (U2F) Specification
Google Case Sudy: Becoming Unphishable: Towards Simpler, Stronger Authenticaton
Technical Principles of FIDO Authentication
Mobile Cloud Identity
FIDO, Strong Authentication and elD in Germany
Ad

Viewers also liked (19)

PDF
Technical Overview of FIDO Solution
PDF
FIDO UAF 1.0 Specs: Overview and Insights
PDF
WSO2 Guest Webinar: FIDO Universal Second Factor (U2F) for WSO2 Identity Server
PDF
ARM: Trusted Zone on Android
PDF
FIDO U2F Specifications: Overview & Tutorial
PDF
Easy public-private-keys-strong-authentication-using-u2 f
PDF
Why FIDO Matters: Digital Government Services
PDF
2014 IoT Forum_ Fido Alliance
PDF
FIDO alliance #idcon vol.18
PDF
Usher functionality
PDF
Authentication.Next
PPTX
Mobile Single Sign-On (Gluecon '15)
PDF
NTT DOCOMO Deployment Case Study: Your Security, More Simple.
PPTX
20150723 最近の興味動向 fido編
PDF
Introduction to OpenID Connect
PPTX
OpenID Connect and Single Sign-On for Beginners
PPTX
Strong Authentication Trends in Government
PPTX
Identity and Access Management - RSA 2017 Security Foundations Seminar
PDF
reveal.js 3.0.0
Technical Overview of FIDO Solution
FIDO UAF 1.0 Specs: Overview and Insights
WSO2 Guest Webinar: FIDO Universal Second Factor (U2F) for WSO2 Identity Server
ARM: Trusted Zone on Android
FIDO U2F Specifications: Overview & Tutorial
Easy public-private-keys-strong-authentication-using-u2 f
Why FIDO Matters: Digital Government Services
2014 IoT Forum_ Fido Alliance
FIDO alliance #idcon vol.18
Usher functionality
Authentication.Next
Mobile Single Sign-On (Gluecon '15)
NTT DOCOMO Deployment Case Study: Your Security, More Simple.
20150723 最近の興味動向 fido編
Introduction to OpenID Connect
OpenID Connect and Single Sign-On for Beginners
Strong Authentication Trends in Government
Identity and Access Management - RSA 2017 Security Foundations Seminar
reveal.js 3.0.0
Ad

Similar to CIS14: FIDO 101 (What, Why and Wherefore of FIDO) (20)

PDF
FIDO Overview: Status and Future
PDF
Introduction to the FIDO Alliance
PDF
FIDO & The Mobile Network Operator - Goode Intelligence & Nok Nok Labs
PPTX
FIDO Munich Seminar: FIDO Tech Principles.pptx
PPTX
Introduction to FIDO Alliance
PPTX
FIDO Webinar – A New Model for Online Authentication: Implications for Policy...
PDF
FIDO & PSD2 – Achieving Strong Customer Authentication Compliance
PDF
Introduction to the FIDO Alliance
PDF
FIDO Workshop at the Cloud Identity Summit: FIDO Alliance Overview
PPTX
FIDO Alliance: Year in Review Webinar slides from January 20 2016
PDF
Deploying FIDO Authentication - Business Considerations
PDF
FIDO Authentication Technical Overview
PDF
FIDO Authentication Technical Overview
PDF
The Future of Authentication for IoT
PDF
Market Study on Mobile Authentication
PPTX
Introduction to FIDO Alliance
PDF
FIDO And the Future of User Authentication
PPTX
Introduction to FIDO: A New Model for Authentication
PPTX
Hardware Authentication
PDF
FIDO Technical Specifications Overview
FIDO Overview: Status and Future
Introduction to the FIDO Alliance
FIDO & The Mobile Network Operator - Goode Intelligence & Nok Nok Labs
FIDO Munich Seminar: FIDO Tech Principles.pptx
Introduction to FIDO Alliance
FIDO Webinar – A New Model for Online Authentication: Implications for Policy...
FIDO & PSD2 – Achieving Strong Customer Authentication Compliance
Introduction to the FIDO Alliance
FIDO Workshop at the Cloud Identity Summit: FIDO Alliance Overview
FIDO Alliance: Year in Review Webinar slides from January 20 2016
Deploying FIDO Authentication - Business Considerations
FIDO Authentication Technical Overview
FIDO Authentication Technical Overview
The Future of Authentication for IoT
Market Study on Mobile Authentication
Introduction to FIDO Alliance
FIDO And the Future of User Authentication
Introduction to FIDO: A New Model for Authentication
Hardware Authentication
FIDO Technical Specifications Overview

More from CloudIDSummit (20)

PPTX
CIS 2016 Content Highlights
PPTX
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
PDF
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
PDF
Mobile security, identity & authentication reasons for optimism 20150607 v2
PDF
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
PDF
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
PDF
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
PDF
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
PDF
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
PDF
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
PDF
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
PDF
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
PDF
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
PDF
CIS 2015 The IDaaS Dating Game - Sean Deuby
PDF
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
PDF
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
PDF
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
PDF
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
PDF
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
PDF
CIS 2015 Identity Relationship Management in the Internet of Things
CIS 2016 Content Highlights
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
Mobile security, identity & authentication reasons for optimism 20150607 v2
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 Identity Relationship Management in the Internet of Things

Recently uploaded (20)

PDF
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
PDF
Hybrid model detection and classification of lung cancer
PDF
sustainability-14-14877-v2.pddhzftheheeeee
PPTX
observCloud-Native Containerability and monitoring.pptx
PDF
Unlock new opportunities with location data.pdf
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
Getting started with AI Agents and Multi-Agent Systems
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PPTX
Benefits of Physical activity for teenagers.pptx
PDF
CloudStack 4.21: First Look Webinar slides
PDF
Five Habits of High-Impact Board Members
PPTX
Web Crawler for Trend Tracking Gen Z Insights.pptx
PDF
Architecture types and enterprise applications.pdf
DOCX
search engine optimization ppt fir known well about this
PDF
A review of recent deep learning applications in wood surface defect identifi...
PDF
Developing a website for English-speaking practice to English as a foreign la...
PDF
Taming the Chaos: How to Turn Unstructured Data into Decisions
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
Hybrid model detection and classification of lung cancer
sustainability-14-14877-v2.pddhzftheheeeee
observCloud-Native Containerability and monitoring.pptx
Unlock new opportunities with location data.pdf
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Getting started with AI Agents and Multi-Agent Systems
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
A contest of sentiment analysis: k-nearest neighbor versus neural network
Benefits of Physical activity for teenagers.pptx
CloudStack 4.21: First Look Webinar slides
Five Habits of High-Impact Board Members
Web Crawler for Trend Tracking Gen Z Insights.pptx
Architecture types and enterprise applications.pdf
search engine optimization ppt fir known well about this
A review of recent deep learning applications in wood surface defect identifi...
Developing a website for English-speaking practice to English as a foreign la...
Taming the Chaos: How to Turn Unstructured Data into Decisions
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
NewMind AI Weekly Chronicles – August ’25 Week III

CIS14: FIDO 101 (What, Why and Wherefore of FIDO)

  • 1. © 2014 FIDO Alliance Standards for Simpler Stronger Authentication Rajiv Dholakia – VP Products & Business Development , Nok Nok Labs rajiv@noknok.com
  • 3. I.T. HAS SCALED: IT’S A HETEROGENEOUS WORLD $$$ Technological capabilities: (1971 ! 2013) Clock speed x4700 #transistors x608k Structure size /450 Price: (1980 ! 2013) HDD $/MB /12k NV RAM $/MB /1.3m Ubiquity: More than 7bn mobile connected devices by end of 2013 Connectivity: (2013) 34% of all people ww have internet access Relevance: (2012) $1 trillion eCommerce Social media: (2013) >10% of all people ww active NOK NOK LABS
  • 4. The Authentication Tower of Babel Silos, proprietary, privacy, reliance on 3rd party, tolls NOK NOK LABS ? 4
  • 5. IMPLEMENTOR’s PERSPECTIVE: A CHALLENGE Aplumbingproblem:ShadesofRubeGoldberg… NOK NOK LABS App 2 New App ? RP 1 RP 1 App 1 ? Applications Authentication MethodsOrganizations Silo 1 Silo 2 Silo N Silo 3 5
  • 6. Taking lessons from History 6 Authentication SSL Communication ???
  • 7. Common authentication plumbing 7 Users Cloud/Enterprise Devices Federation Open Standard Plug-In Approach Interoperable Ecosystem Usable Authentication WHAT IS NEEDED
  • 9. Goal: Simpler, Stronger Authentication (a) Developing unencumbered Specifications that define interoperable mechanisms that supplant reliance on passwords (b) Operating programs to help ensure industry adoption (c) Submitting mature Specifications for formal standardization Mission: To Change Authentication Online by:
  • 10. Identity & Authentication Building Blocks NOK NOK LABS 10 Physical-to-digital identity User Management Authentication Federation Single Sign-On E-Gov Payments Security Passwords Risk-BasedStrong MODERN AUTHENTICATION Personalization
  • 11. User Authentication Online Do you want to login? Do you want to transfer $100 to Frank? Do you want to ship to a new address? Do you want to delete all of your emails? Do you want to share your dental record? Authentication today: Ask user for a password (and perhaps a one time code)
  • 13. Today’s Password Alternatives One Time Codes with SMS or Device SMS USABILITY DEVICE USABILITY USER EXPERIENCE STILL PHISHABLE Coverage | Delay | Cost One per site | $$ | Fragile User find it hard Known attacks today
  • 14. Megatrend Simpler, Stronger Local Device Auth PERSONAL DEVICES LOCAL LOCKING NEW WAVE: CONVENIENT SECURITY Carry Personal Data Pins & Patterns today Simpler, Stronger local auth
  • 15. Putting It Together The problem: Simpler, Stronger online The trend: Simpler, Stronger local device auth Why not: Use local device auth for online auth? This is the core idea behind FIDO standards!
  • 16. FIDO Experiences LOCAL DEVICE AUTH SUCCESSONLINE AUTH REQUEST PASSWORDLESS EXPERIENCE (UAF standards) SECOND FACTOR EXPERIENCE (U2F standards) Show a biometricTransaction Detail Done Login & Password Insert Dongle, Press button Done
  • 17. FIDO Registration REGISTRATION BEGINS USER APPROVAL REGISTRATION COMPLETE NEW KEY CREATED USER APPROVAL KEY REGISTERED 1 2 Using Public key Cryptography 4 3
  • 18. FIDO Login LOGIN USER APPROVAL LOGIN COMPLETE KEY SELECTED LOGIN CHALLENGE LOGIN RESPONSE 1 2 4 3 Login Using Public key Cryptography
  • 19. Decouple User Verification Method from Authentication Protocol LOGIN USER APPROVAL REGISTRATION COMPLETE KEY SELECTED LOGIN CHALLENGE LOGIN RESPONSE 1 2 4 3 Leverage public key cryptography ONLINE SECURITY PROTOCOL PLUGGABLE LOCAL AUTH
  • 20. User Device User Agent Mobile Apps Authenticator Abstraction (ASM) Authenticators Authenticators Private Keys Authentication Keys Attestation Keys Relying Party Web Application FIDO UAF Server Authentication Keys Attestation Key Public KeysRegistration, Authentication & Transaction Confirmation! UAF Protocol UAF ARCHITECTURE OVERVIEW UAF Authenticators
  • 21. Relying Party User Side U2F APDU USB API NFC API Bluetooth API U2F JS API Secure U2F Element Connectors USB NFC Bluetooth Web Application FIDO U2F Server User Keys U2F Flow Diagram User Action BrowserU2F Token
  • 22. Options Passwordless UX = UAF: Universal Auth Framework •  User carries client device with UAF stack installed •  User presents a local biometric or PIN •  Website can choose whether to retain password Simpler Stronger Authentication Second Factor UX = U2F: Universal Second Factor •  User carries U2F device with built- in support in web browsers •  User presents U2F device •  Website can simplify password (e.g, 4 digit PIN)
  • 24. No 3rd Party in the Protocol
  • 25. No secrets on Server side
  • 26. Focus on User Privacy • Biometric data never leaves user’s device • No linkability between RPs • No linkability between RP accounts
  • 27. Embrace all kinds of Authenticators software, proprietary hardware, certified hardware, ...
  • 28. Risk Based Authentication "  Login to online account "  Change shipping address "  Transfer $10.000 Low High
  • 29. Choice of Security Profiles NOK NOK LABS User Space Secure Hardware FIDO UX Layer Input, Display Crypto Layer FIDO UX Layer Input, Display Crypto Layer FIDO Crypto Layer UX Layer Input, Display No Secure HW Secure Crypto + Storage Secure Execution Environment
  • 30. Risk Appropriate Authentication 30 Strong Stronger FIDO Security Spectrum Software Only ID TPM/SE ID TEE + SE ID Protects Keys Protects Keys Protects Crypto Protects Keys Protects Crypto Protects Code Protects Display Strongest
  • 31. Permanent link to this comic: http://xkcd.com/538/ A webcomic of romance, sarcasm, math, and language. On SECURITY
  • 32. A peek into MODERN AUTHENTICATION 32NOK NOK LABS IMPLICIT AUTHENTICATION EXPLICIT AUTHENTICATION
  • 33. COMPLEMENTS IDENTITY & FEDERATION STANDARDS NOK NOK LABS 33 STRONG AUTH PASSWORDS SSO/FEDERATION Recreated PMS First Mile Second Mile SAML OpenID FIDO/Strong Auth Federation Standards
  • 34. FIDO Model: Direct to Relying Party OR through IdP 34Devices support multiple authenticators User Authenticates to the Device Relying Parties (SP) Device Authenticates to Relying Party 2a 1 Identity Provider (IdP) 2b OR Device Authenticates to Identity Provider (IDP) 2c IDP asserts identity via SAML, Oauth, OpenID Connect… OR
  • 35. Recap
  • 36. Identity & Authentication NOK NOK LABS 36 Physical-to-digital identity User Management Authentication Federation Single Sign-On E-Gov Payments Security Passwords Risk-BasedStrong MODERN AUTHENTICATION Personalization
  • 37. Simplifying and Scaling Authentication AnyDevice.AnyApplication.AnyAuthenticator. 37 Standardized Protocols Local authentication unlocks app specific key Key used to authenticate to server
  • 38. IMPLEMENTATION CHALLENGE Aplumbingproblem:ShadesofRubeGoldberg… NOK NOK LABS App 2 New App ? RP 1 RP 1 App 1 ? Applications Authentication MethodsOrganizations Silo 1 Silo 2 Silo N Silo 3 38
  • 39. SIMPLIFIED IMPLEMENTATION WHATISBEINGSTANDARDIZED App 2 Applications Authentication Methods RP 1 RP 1 App 1 New App FIDO UNIFIED STANDARDS Organizations ? 39 Online Crypto Protocol Pluggable Authentication
  • 40. CONCLUSIONS •  The enemy is symmetric shared secrets •  The enemy is poor user experiences and friction •  FIDO is a building block •  Even simple software-based authenticator with a pin offers many advantages over passwords •  FIDO complements your investments in federation and improves your security and ease of use
  • 42. 42Nok Nok Labs Confidential — Do Not Distribute
  • 43. FIDO Alliance Role •  Paper Specifications, Interop and Conformance testing, Trademark licensing against criteria, thought leadership, nurture ecosystem of vendors delivering FIDO implementations to market •  Alliance does not ship products (only specifications) o  Implementations left to commercial vendors •  FIDO Alliance designs core protocol o  Like SSL, FIDO has no domain semantics o  Relying parties and Vendors may adapt FIDO into commercial solutions o  Vendors may deliver FIDO specification as product or service, standalone or as part of a solution stack o  Extended use cases may be explored by vendors long before imported into protocol
  • 44. Version 1.0 (Review Draft) is in Public Review
  • 45. FIDO at Industry Events – Readiness FIDO-Ready Products & Deployment for Mobile & More SIM + Secure Element PIN + MicroSD, USB Fingerprint, Mobile Speaker Recognition Mobile via NFC*
  • 46. Useful to keep these separate: Design Intent FIDO Protocol Specification Specific Implementations Solution that incorporates FIDO
  • 47. Select Authenticate Purchase 47 MOBILE DEVICES reshaping Security, Commerce NOK NOK LABS AUTHENTICATION THAT IS “One-Swipe”, “One-Phrase”, “One-Look”, “One Touch”
  • 48. OEMs SHIPPING FIDO-READY ™ PRODUCTS New and existing devices are supported 48 OEM Enabled: Samsung Galaxy S5OEM Enabled: Lenovo ThinkPads with Fingerprint Sensors Clients available for these operating systems : Software Authenticator Examples: Voice/Face recognition, PIN, QR Code, etc. Aftermarket Hardware Authenticator Examples: USB fingerprint scanner, MicroSD Secure Element
  • 49. First FIDO Deployment already live… 49 •  Customers can use their finger to pay with PayPal from their new Samsung Galaxy S5 because the FIDO Ready™ software on the device securely communicates between the fingerprint sensor on their device and PayPal’s service in the cloud. The only information the device shares with PayPal is a unique cryptographic “public key” that allows PayPal to verify the identity of the customer without having to store any biometric information on PayPal’s servers.
  • 50. Breaking news for July… •  Alipay – formerly a part of Alibaba Group in China •  Processed $519 Billion in transactions in 2013 •  Launched FIDO-based payments using Galaxy S5
  • 51. Better Security, Better User Experience Goingbeyond“Risk,Regulation,Reputation” 51 Setup Confirm Sent DESIGN, DELIGHT & DOLLARS!
  • 52. Call to Action •  FIDO is ready for use – launch a POC, Pilot •  Get involved: o  Develop or adapt your products to FIDO o  Come to the plenary, meet and mingle, speak with the pioneers, select your partners o  Join the Alliance and contribute – we are a volunteer run organization! o  Contact donal@fidoalliance.org for membership details o  Other questions – rajiv@noknok.com
  • 53. FIN