SlideShare a Scribd company logo
All Rights Reserved | FIDO Alliance | Copyright 20171
Jeremy Grant, Managing Director, The Chertoff Group
INTRODUCTION TO FIDO:
A New Model for Authentication
#FIDOseminar
All Rights Reserved | FIDO Alliance | Copyright 20172
AGENDA:
THE PROBLEM
THE SOLUTION
FIDO ADOPTION
FIDO AND GOVERNMENT
THE WORLD HAS A PASSWORD PROBLEM
All Rights Reserved | FIDO Alliance | Copyright 20173
All Rights Reserved | FIDO Alliance | Copyright 20174
THE WORLD HAS A PASSWORD
PROBLEM
63% of data breaches
in 2015 involved
weak, default, or
stolen passwords
-Verizon 2016 Data
Breach Report
Data breaches
expected to reach
1,000 in 2016
up 22% from 2015
-Identity Theft Resource
Center
Each data breach
costs $3.8 million
on average
up 23% from 2013
-Ponemon Institute
SevenWaysYahoo’s 500M-User Data Breach
Affects Banks
ONE-TIME PASSCODES
Improve security but aren’t easy enough to use
Still
Phishable
User
Confusion
Token
Necklace
SMS
Reliability
All Rights Reserved | FIDO Alliance | Copyright 20175
THE WORLD HAS A “SHARED SECRETS” PROBLEM
All Rights Reserved | FIDO Alliance | Copyright 20176
WE NEED A
NEW MODEL
All Rights Reserved | FIDO Alliance | Copyright 20177
All Rights Reserved | FIDO Alliance | Copyright 20178
AGENDA:
THE PROBLEM
THE SOLUTION
FIDO ADOPTION
FIDO AND GOVERNMENT
THE NEW MODEL
Fast IDentity Online
online authentication using
public key cryptography
All Rights Reserved | FIDO Alliance | Copyright 20179
All Rights Reserved | FIDO Alliance | Copyright 201710
THE FACTS ON FIDO
The FIDO Alliance is an open
industry association of over
250 organizations with a
focused mission:
300+
FIDO Certified Solutions
3 BILLION
Available to protect
user accounts worldwide
Today, its members provide
the world’s largest ecosystem
for standards-based,
interoperable authentication
AUTHENTICATION
STANDARDS
based on public key cryptography
to solve the password problem
FIDO Alliance Mission
Develop
Specifications
Operate
Adoption Programs
Pursue Formal
Standardization
1 2 3
All Rights Reserved | FIDO Alliance | Copyright 201711
All Rights Reserved | FIDO Alliance | Copyright 201712
DRIVEN BY 250 MEMBERS
Leading global brands and technology providers
+ SPONSOR MEMBERS + ASSOCIATE MEMBERS + LIAISON MEMBERS
THE OLD
PARADIGM
SECURITY
USABILITY
Poor Easy
WeakStrong
All Rights Reserved | FIDO Alliance | Copyright 201713
THE FIDO
PARADIGM
SECURITY
USABILITY
Poor Easy
WeakStrong
authentication
All Rights Reserved | FIDO Alliance | Copyright 201714
All Rights Reserved | FIDO Alliance | Copyright 201715
ONLINE CONNECTION
The user authenticates themselves online by
presenting a human-readable “shared secret”
HOW OLD AUTHENTICATION WORKS
All Rights Reserved | FIDO Alliance | Copyright 201716
HOW FIDO WORKS
LOCAL CONNECTION
ONLINE CONNECTION
The device
authenticates the
user online using
public key
cryptography
The user
authenticates
“locally” to
their device
(by various means)
Passwordless Experience Second Factor Experience
Flexible authentication spanning
a myriad of service providers
ENHANCED AUTHENTICATION
EXPERIENCES
All Rights Reserved | FIDO Alliance | Copyright 201717
All Rights Reserved | FIDO Alliance | Copyright 201718
User Approval
2
Registration
Complete
4
New Keys Created
3
User is in a Session
or New Account Flow
1
PUBLIC KEY REGISTERED
WITH ONLINE SERVER
INVITATION SENT
FIDO REGISTRATION
All Rights Reserved | FIDO Alliance | Copyright 201719
User Approval
2
Login
Complete
4
Key Selected & Signs
3
User needs to login or
authorize a transaction
1
SIGNED RESPONSE
VERIFIED USING PUBLIC
KEY CRYPTOGRAPHY
FIDO CHALLENGE
FIDO AUTHENTICATION
USABILITY, SECURITY, R.O.I.
and
PRIVACY
All Rights Reserved | FIDO Alliance | Copyright 201720
No 3rd Party in the Protocol
No Secrets on the Server Side
Biometric Data (if used) Never Leaves Device
No Link-ability Between Services
No Link-ability Between Accounts
All Rights Reserved | FIDO Alliance | Copyright 201721
EU Privacy Principle FIDO Implementation of EU Privacy Principle
Personal data must be processed
fairly and lawfully
For a User to access a Relying Party’s services through FIDO Authentication, the User must first agree to register with that Relying Party. When the User
wishes to access the online service, they must execute the User Verification step, e.g. touching a sensor, entering a passcode, or providing their fingerprint,
in order to execute the cryptographic computation. This ensures that malware installed on the User’s device is unable to autonomously perform FIDO
operations.
Personal data can only be processed
for one or more specified lawful
purpose(s)
The Personal Data required to access an online service, such as a fingerprint, can only be accessed by the FIDO Authenticator which is part of the User’s
device. The FIDO Authenticator can only access such data when it is required to perform an Authentication. The FIDO protocol requires a minimum amount
of data stored by the Relying Party, for which the user is required to provide consent.
Personal data must be adequate,
relevant, and not excessive in
relation to the purposes for which it
is being used
The data needed to perform an Authentication is collected by the Relying Party when the User registers with it. This data is:
 A public key: This allows the Relying Party to verify that the FIDO Authenticator being used is the one previously registered by the User.
 Authenticator Attestation ID (AAID): This is a reference that allows the Relying Party to look-up the characteristics of the used FIDO Authenticator.
 Key Handle: An identifier created by a FIDO Authenticator, potentially containing an encrypted private key, to refer to a specific key maintained the
FIDO Authenticator.
Personal data must be accurate and
up to date
The data used for FIDO Authentication, such as the registered public key, must be accurate since cryptographic verification fails otherwise.
If the data becomes corrupted for any reason, the User needs to re-register with the Relying Party. Re-registration changes the registered public key.
Personal data must not be kept for
longer than necessary to fulfil the
purposes for which it was collected
The User may de-register from a Relying Party at any time. Once de-registration has taken place the Public key held by the Relying Party is of no further use.
Personal data must be kept secure Allowing users to authenticate using FIDO Authentication provides a greater level of security around accessing personal data than passwords alone.
Data required for local User Verification is stored locally on the FIDO Authenticator. FIDO-related data stored at the Relying Party is not confidential by
itself. The FIDO Authenticator is required to protect data required for User Verification and FIDO-related data, such as cryptographic keys, against
unauthorized access by third parties.
Personal data must be processed in
accordance with rights of data
subjects
Personal data used to authenticate a User can only be accessed by that User when the User wishes to be authenticated.
Personal data cannot be transferred
outside a given geographical area,
such as the EEA, without specific
circumstances being in place.
Personal data held in a FIDO Authenticator will be protected by the same mechanisms irrespective of the device’s location and the device can only leave the
EEA if the owner wishes it to do so.
The FIDO Server used by the Relying Party does not contain personal data.
FIDO WAS DESIGNED FROM THE START TO SUPPORT THE PRIVACY
PRINCIPLES OF THE EUROPEAN DATA PROTECTION DIRECTIVE
All Rights Reserved | FIDO Alliance | Copyright 201722
All Rights Reserved | FIDO Alliance | Copyright 201723
AGENDA:
THE PROBLEM
THE SOLUTION
FIDO ADOPTION
FIDO AND GOVERNMENT
FIDO 1.0
FINALFirst
Deployments
UAF & U2FSpecification
Review Draft
FIDO Ready
Program
FEB
2013
DEC
2013
FEB
2014
FEB-OCT
2014
DEC 9
2014
MAY
2015
FEB
2016
Formal
Standardization
JUNE
2015
Certification
Program
New U2F
Transports
NOV
2016
FIDO 1.1
FIDO DEVELOPMENT TIMELINE
All Rights Reserved | FIDO Alliance | Copyright 201724
Alliance
Announced
All Rights Reserved | FIDO Alliance | Copyright 201725
FIDO-ENABLED APPS + SERVICES
3 BILLION
AVAILABLE TO PROTECT
ACCOUNTS WORLDWIDE
Deployments are enabled by over 300
FIDO® Certified products
available today
All Rights Reserved | FIDO Alliance | Copyright 201726
All Rights Reserved | FIDO Alliance | Copyright 201727
CERTIFICATIONS – 200% YoY GROWTH
152
64
32
62
74
108
162
216
253
304
Apr-15 Jul-15 Sep-15 Dec-15 Mar-16 May-16 Aug-16 Dec-16
230
74
 An open competitive market
 Ensures interoperability
 Sign of mature FIDO ecosystem
All Rights Reserved | FIDO Alliance | Copyright 201728
FIDO IN THE ANDROID ECOSYSTEM
S5,
Mini
Alpha Note 4,5 Note
Edge
Tab S,
Tab S2
S6,
S6 Edge
S7,
S7 Edge
Vernee
Thor
Xperia Z5
SO-01H
Xperia Z5
Compact
SO-02H
Xperia Z5
Premium
SO-03H
Mate 8
V10 G5
Z2, Z2
Pro Xperia X
Performance
Xperia XZ Xperia X
Compact
SO-02J
Arrow
s
NX
Arrow
s
Fit
Arrow
s
Tab
F-02HF-04HF-04G
F-01H
Aquos Zeta
SH-02J
MO1T
F-01J
All Rights Reserved | FIDO Alliance | Copyright 201729
Supported iOS fingerprint devices
iPhone SE iPhone & iPhone+
iPad Pro iPad Air, Mini
FIDO IN THE iOS ECOSYSTEM
All Rights Reserved | FIDO Alliance | Copyright 201730
FIDO IN THE WINDOWS + WEB ECOSYSTEMS
Windows Platforms Web
Yoga 910
All Rights Reserved | FIDO Alliance | Copyright 201731
AGENDA:
THE PROBLEM
THE SOLUTION
FIDO ADOPTION
FIDO AND GOVERNMENT
All Rights Reserved | FIDO Alliance | Copyright 201732
AUTHENTICATION IS IMPORTANT TO GOVERNMENT
1. Protects access to government assets
2. Enables more high-value citizen-facing services
3. Empowers private sector to provide a wider range of high value
services to consumers
4. Secures critical assets and infrastructure
Governments seek identity solutions that can deliver not just improved
Security – but also Privacy, Interoperability, and better Customer
Experiences
All Rights Reserved | FIDO Alliance | Copyright 201733
FIDO IMPACT ON POLICY
FIDO specifications offer governments newer, better options for
strong authentication – but governments may need to update
some policies to support the ways in which FIDO is different.
As technology evolves,
policy needs to evolve with it.
AS TECHNOLOGY EVOLVES,
POLICY NEEDS TO EVOLVE WITH IT.
• While this statement was true of most “old” MFA
technology, FIDO specifically addresses these cost
and usability issues
• FIDO enables simpler, stronger authentication
capabilities that governments, businesses and
consumers can easily adopt at scale
1) Recognize that two-factor authentication
no longer brings higher burdens or costs
All Rights Reserved | FIDO Alliance | Copyright 201734
All Rights Reserved | FIDO Alliance | Copyright 201735
AS TECHNOLOGY EVOLVES,
POLICY NEEDS TO EVOLVE WITH IT.
• Recognized by the U.S. government (NIST) in 2014
• “OMB (White House) to update guidance on remote
electronic authentication” to remove requirements
that one factor be separate from the device accessing
the resource
• The evolution of mobile devices – in particular,
hardware architectures that offer highly robust and
isolated execution environments (such as TEE, SE and
TPM) – has allowed these devices to achieve high-
grade security without the need for a physically
distinct token
2) Recognize technology is now mature enough to enable
two secure, distinct authn factors in a single device
All Rights Reserved | FIDO Alliance | Copyright 201736
AS TECHNOLOGY EVOLVES,
POLICY NEEDS TO EVOLVE WITH IT.
2) Recognize technology is now mature enough to enable
two secure, distinct authn factors in a single device
All Rights Reserved | FIDO Alliance | Copyright 201737
AS TECHNOLOGY EVOLVES,
POLICY NEEDS TO EVOLVE WITH IT.
• The market is in the midst of a burst of innovation around
authentication technology—some solutions are better than others. Don’t
build rules focused on old authentication technology
• Old authentication technologies impose significant costs and burdens on
the user—which decreases adoption
• Old authentication technologies have security (i.e., phishable) and
privacy issues—putting both users and online service providers at risk
3) As governments promote or require strong authentication,
make sure it is the “right” authentication
Priorities:
• Ensuring that future online
products and services coming
into use are “secure by default”
• Empowering consumers to
“choose products and services
that have built-in security as a
default setting.”
“[We will] invest in technologies like Trusted Platform Modules (TPM)
and emerging industry standards such as Fast IDentity Online (FIDO),
which do not rely on passwords for user authentication, but use the
machine and other devices in the user’s possession to authenticate.
The Government will test innovative authentication mechanisms to
demonstrate what they can offer, both in terms of security and overall
user experience.”
FIDO IS IMPACTING HOW GOVERNMENTS THINK
ABOUT AUTHENTICATION
All Rights Reserved | FIDO Alliance | Copyright 201738
U.S. Commission on Enhancing
National Cybersecurity:
• Bipartisan commission established by
the White House in April – charged
with crafting recommendations for
the next President
• Major focus on Authentication
FIDO IS IMPACTING HOW GOVERNMENTS THINK
ABOUT AUTHENTICATION
All Rights Reserved | FIDO Alliance | Copyright 201739
US COMMISSION ON ENHANCING NATIONAL
CYBERSECURITY
“Other important work that must be undertaken to
overcome identity authentication challenges includes the
development of open-source standards and specifications
like those developed by the Fast IDentity Online (FIDO)
Alliance. FIDO specifications are focused largely on the
mobile smartphone platform to deliver multifactor
authentication to the masses, all based on industry
standard public key cryptography.
Windows 10 has deployed FIDO specifications (known as
Windows Hello), and numerous financial institutions have
adopted FIDO for consumer banking. Today, organizations
complying with FIDO specifications are able to deliver
secure authentication technology on a wide range of
devices, including mobile phones, USB keys, and near-field
communications (NFC) and Bluetooth low energy (BLE)
devices and wearables.
This work, other standards activities, and new tools that
support continuous authentication provide a strong
foundation for opt-in identity management for the digital
infrastructure.”
All Rights Reserved | FIDO Alliance | Copyright 201740
Security
Privacy Interoperability
Usability
All Rights Reserved | FIDO Alliance | Copyright 201741
FIDO DELIVERS ON KEY PRIORITIES
All Rights Reserved | FIDO Alliance | Copyright 201742
QUESTIONS?
THANK YOU!
jeremy.grant@chertoffgroup.com
info@fidoalliance.org

More Related Content

PPTX
FIDO Masterclass
PPTX
FIDO Authentication: Unphishable MFA for All
PPTX
FIDO Workshop-Demo Breakdown.pptx
PDF
What is self-sovereign identity (SSI)?
PDF
FIDO and the Future of User Authentication
PPTX
IBM: Hey FIDO, Meet Passkey!.pptx
PPTX
Fido Technical Overview
PDF
Integrating FIDO Authentication & Federation Protocols
FIDO Masterclass
FIDO Authentication: Unphishable MFA for All
FIDO Workshop-Demo Breakdown.pptx
What is self-sovereign identity (SSI)?
FIDO and the Future of User Authentication
IBM: Hey FIDO, Meet Passkey!.pptx
Fido Technical Overview
Integrating FIDO Authentication & Federation Protocols

What's hot (20)

PPTX
M365 e3 and identity and threat protection and compliance new skus
PDF
Google & FIDO Authentication
PDF
OpenID Connect Explained
PPTX
FIDO Alliance: Welcome and FIDO Update.pptx
PPTX
Multifactor Authentication
PPTX
Zero Trust
PDF
RSA SecurID Access
PPTX
OpenID for Verifiable Credentials
PDF
FIDO2 Overview & RaonSecure Integration Case Study (Korean Language)
PDF
ATT&CKcon Intro
PDF
FIDO2 ~ パスワードのいらない世界へ
PDF
Microsoft's Path to Passwordless - FIDO Authentication for Windows & Azure Ac...
PDF
Securing a Web App with Passwordless Web Authentication
PDF
Introduction to Self Sovereign Identity
PDF
OpenID for Verifiable Credentials
PPTX
SSO introduction
PDF
FIDO Specifications Overview: UAF & U2F
PDF
Microsoft Security - New Capabilities In Microsoft 365 E5 Plans
PDF
Digital Identity Wallets: What They Mean For Banks
PDF
Verifiable Credentials in Self-Sovereign Identity (SSI)
M365 e3 and identity and threat protection and compliance new skus
Google & FIDO Authentication
OpenID Connect Explained
FIDO Alliance: Welcome and FIDO Update.pptx
Multifactor Authentication
Zero Trust
RSA SecurID Access
OpenID for Verifiable Credentials
FIDO2 Overview & RaonSecure Integration Case Study (Korean Language)
ATT&CKcon Intro
FIDO2 ~ パスワードのいらない世界へ
Microsoft's Path to Passwordless - FIDO Authentication for Windows & Azure Ac...
Securing a Web App with Passwordless Web Authentication
Introduction to Self Sovereign Identity
OpenID for Verifiable Credentials
SSO introduction
FIDO Specifications Overview: UAF & U2F
Microsoft Security - New Capabilities In Microsoft 365 E5 Plans
Digital Identity Wallets: What They Mean For Banks
Verifiable Credentials in Self-Sovereign Identity (SSI)
Ad

Viewers also liked (17)

PDF
Javelin Research 2017 State of Authentication Report
PPTX
FIDO - The Value of Membership
PDF
FIDO Workshop at the Cloud Identity Summit: FIDO Alliance Overview
PDF
FIDO Authentication and GSMA Mobile Connect
PDF
Authentication and ID Proofing in Education
PDF
FIDO Authentication & Blockchain
PDF
FIDO Authentication Opportunities in Healthcare
PDF
Strong Authentication and US Federal Digital Services
PDF
FIDO Certified Program: Status & Futures
PDF
FIDO Technical Specifications Overview
PPTX
FIDO and Mobile Connect
PPTX
Introduction to FIDO Alliance
PDF
FIDO Authentication for Multifactor Payments
PDF
NIST 800-63 Guidance & FIDO Authentication
PDF
Protecting IDAAS with FIDO Authentication
PPTX
Getting to Know the FIDO Specifications - Technical Tutorial
PDF
Introduction to the FIDO Alliance
Javelin Research 2017 State of Authentication Report
FIDO - The Value of Membership
FIDO Workshop at the Cloud Identity Summit: FIDO Alliance Overview
FIDO Authentication and GSMA Mobile Connect
Authentication and ID Proofing in Education
FIDO Authentication & Blockchain
FIDO Authentication Opportunities in Healthcare
Strong Authentication and US Federal Digital Services
FIDO Certified Program: Status & Futures
FIDO Technical Specifications Overview
FIDO and Mobile Connect
Introduction to FIDO Alliance
FIDO Authentication for Multifactor Payments
NIST 800-63 Guidance & FIDO Authentication
Protecting IDAAS with FIDO Authentication
Getting to Know the FIDO Specifications - Technical Tutorial
Introduction to the FIDO Alliance
Ad

Similar to Introduction to FIDO: A New Model for Authentication (20)

PDF
FIDO in Government
PPTX
FIDO Webinar – A New Model for Online Authentication: Implications for Policy...
PPTX
FIDO Alliance: Year in Review Webinar slides from January 20 2016
PDF
Introduction to FIDO Authentication
PPTX
Introduction to FIDO Alliance: Vision and Status -Tokyo Seminar -Brett McDowell
PDF
FIDO Overview: Status and Future
PPTX
Introduction to FIDO Alliance
PPTX
Introduction to the FIDO Alliance: Vision and Status
PDF
FIDO Authentication Technical Overview
PDF
FIDO Authentication Technical Overview
PDF
Introduction to FIDO Alliance
PPTX
FIDO Alliance Vision and Updates
PDF
2018 12-07 tokyo-seminar Brett McDowell
PDF
FIDO Technical Specifications Overview
PDF
Beyond Passwords: FIDO & the Future of Consumer Authentication
PDF
FIDO Alliance Vision and Status
PDF
FIDO Alliance Today: Status and News
PDF
Beyond Passwords: FIDO and the Future of User Authentication
PPTX
Strong Authentication Trends in Government
PDF
Fido Overview: Status and Future
FIDO in Government
FIDO Webinar – A New Model for Online Authentication: Implications for Policy...
FIDO Alliance: Year in Review Webinar slides from January 20 2016
Introduction to FIDO Authentication
Introduction to FIDO Alliance: Vision and Status -Tokyo Seminar -Brett McDowell
FIDO Overview: Status and Future
Introduction to FIDO Alliance
Introduction to the FIDO Alliance: Vision and Status
FIDO Authentication Technical Overview
FIDO Authentication Technical Overview
Introduction to FIDO Alliance
FIDO Alliance Vision and Updates
2018 12-07 tokyo-seminar Brett McDowell
FIDO Technical Specifications Overview
Beyond Passwords: FIDO & the Future of Consumer Authentication
FIDO Alliance Vision and Status
FIDO Alliance Today: Status and News
Beyond Passwords: FIDO and the Future of User Authentication
Strong Authentication Trends in Government
Fido Overview: Status and Future

More from FIDO Alliance (20)

PPTX
Securing Account Lifecycles in the Age of Deepfakes.pptx
PPTX
FIDO Seminar: Perspectives on Passkeys & Consumer Adoption.pptx
PPTX
FIDO Seminar: Evolving Landscape of Post-Quantum Cryptography.pptx
PPTX
FIDO Seminar: Targeting Trust: The Future of Identity in the Workforce.pptx
PPTX
FIDO Seminar: New Data: Passkey Adoption in the Workforce.pptx
PPTX
FIDO Seminar: Authentication for a Billion Consumers - Amazon.pptx
PPTX
FIDO Alliance Seminar State of Passkeys.pptx
PPTX
FIDO Munich Seminar: FIDO Tech Principles.pptx
PPTX
FIDO Munich Seminar: Securing Smart Car.pptx
PPTX
FIDO Munich Seminar: Strong Workforce Authn Push & Pull Factors.pptx
PPTX
FIDO Munich Seminar: Biometrics and Passkeys for In-Vehicle Apps.pptx
PPTX
FIDO Munich Seminar Workforce Authentication Case Study.pptx
PPTX
FIDO Munich Seminar In-Vehicle Payment Trends.pptx
PPTX
FIDO Munich Seminar FIDO Automotive Apps.pptx
PPTX
FIDO Munich Seminar Blueprint for In-Vehicle Payment Standard.pptx
PPTX
FIDO Munich Seminar Introduction to FIDO.pptx
PPTX
UX Webinar Series: Essentials for Adopting Passkeys as the Foundation of your...
PPTX
UX Webinar Series: Drive Revenue and Decrease Costs with Passkeys for Consume...
PPTX
UX Webinar Series: Aligning Authentication Experiences with Business Goals
PDF
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
Securing Account Lifecycles in the Age of Deepfakes.pptx
FIDO Seminar: Perspectives on Passkeys & Consumer Adoption.pptx
FIDO Seminar: Evolving Landscape of Post-Quantum Cryptography.pptx
FIDO Seminar: Targeting Trust: The Future of Identity in the Workforce.pptx
FIDO Seminar: New Data: Passkey Adoption in the Workforce.pptx
FIDO Seminar: Authentication for a Billion Consumers - Amazon.pptx
FIDO Alliance Seminar State of Passkeys.pptx
FIDO Munich Seminar: FIDO Tech Principles.pptx
FIDO Munich Seminar: Securing Smart Car.pptx
FIDO Munich Seminar: Strong Workforce Authn Push & Pull Factors.pptx
FIDO Munich Seminar: Biometrics and Passkeys for In-Vehicle Apps.pptx
FIDO Munich Seminar Workforce Authentication Case Study.pptx
FIDO Munich Seminar In-Vehicle Payment Trends.pptx
FIDO Munich Seminar FIDO Automotive Apps.pptx
FIDO Munich Seminar Blueprint for In-Vehicle Payment Standard.pptx
FIDO Munich Seminar Introduction to FIDO.pptx
UX Webinar Series: Essentials for Adopting Passkeys as the Foundation of your...
UX Webinar Series: Drive Revenue and Decrease Costs with Passkeys for Consume...
UX Webinar Series: Aligning Authentication Experiences with Business Goals
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf

Recently uploaded (20)

PPTX
Proposed Odisha State Highways Authority OSHA Act 2025 Draft
PDF
Item # 4 -- 328 Albany St. compt. review
PPTX
Weekly Report 17-10-2024_cybersecutity.pptx
PPTX
DFARS Part 249 - Termination Of Contracts
PPTX
Quiz - Saturday.pptxaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
PDF
Strategic Planning for Child Rights and Protection Programming.pdf
PDF
buyers sellers meeting of mangoes in mahabubnagar.pdf
PPTX
STG - Sarikei 2025 Coordination Meeting.pptx
PDF
Storytelling youth indigenous from Bolivia 2025.pdf
PPT
generalgeologygroundwaterchapt11-181117073208.ppt
PPTX
PCCR-ROTC-UNIT-ORGANIZATIONAL-STRUCTURE-pptx-Copy (1).pptx
PDF
26.1.2025 venugopal K Awarded with commendation certificate.pdf
PDF
ISO-9001-2015-internal-audit-checklist2-sample.pdf
PDF
2025 Shadow report on Ukraine's progression regarding Chapter 29 of the acquis
PPT
Adolescent Health Orientation and Health care
PDF
NDR Week Motorcade 2025 of Pasig City PDAO (Bambang PWD Association, Inc. Par...
PPTX
sepsis.pptxMNGHGBDHSB KJHDGBSHVCJB KJDCGHBYUHFB SDJKFHDUJ
PDF
Item # 2 - 934 Patterson Specific Use Permit (SUP)
PDF
सुशासन सप्ताह भारत रत्न श्री अटल बिहारी बाजपेयी जी जन्मदिवस समारोह 19-24 दिसं...
PDF
It Helpdesk Solutions - ArcLight Group
Proposed Odisha State Highways Authority OSHA Act 2025 Draft
Item # 4 -- 328 Albany St. compt. review
Weekly Report 17-10-2024_cybersecutity.pptx
DFARS Part 249 - Termination Of Contracts
Quiz - Saturday.pptxaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
Strategic Planning for Child Rights and Protection Programming.pdf
buyers sellers meeting of mangoes in mahabubnagar.pdf
STG - Sarikei 2025 Coordination Meeting.pptx
Storytelling youth indigenous from Bolivia 2025.pdf
generalgeologygroundwaterchapt11-181117073208.ppt
PCCR-ROTC-UNIT-ORGANIZATIONAL-STRUCTURE-pptx-Copy (1).pptx
26.1.2025 venugopal K Awarded with commendation certificate.pdf
ISO-9001-2015-internal-audit-checklist2-sample.pdf
2025 Shadow report on Ukraine's progression regarding Chapter 29 of the acquis
Adolescent Health Orientation and Health care
NDR Week Motorcade 2025 of Pasig City PDAO (Bambang PWD Association, Inc. Par...
sepsis.pptxMNGHGBDHSB KJHDGBSHVCJB KJDCGHBYUHFB SDJKFHDUJ
Item # 2 - 934 Patterson Specific Use Permit (SUP)
सुशासन सप्ताह भारत रत्न श्री अटल बिहारी बाजपेयी जी जन्मदिवस समारोह 19-24 दिसं...
It Helpdesk Solutions - ArcLight Group

Introduction to FIDO: A New Model for Authentication

  • 1. All Rights Reserved | FIDO Alliance | Copyright 20171 Jeremy Grant, Managing Director, The Chertoff Group INTRODUCTION TO FIDO: A New Model for Authentication #FIDOseminar
  • 2. All Rights Reserved | FIDO Alliance | Copyright 20172 AGENDA: THE PROBLEM THE SOLUTION FIDO ADOPTION FIDO AND GOVERNMENT
  • 3. THE WORLD HAS A PASSWORD PROBLEM All Rights Reserved | FIDO Alliance | Copyright 20173
  • 4. All Rights Reserved | FIDO Alliance | Copyright 20174 THE WORLD HAS A PASSWORD PROBLEM 63% of data breaches in 2015 involved weak, default, or stolen passwords -Verizon 2016 Data Breach Report Data breaches expected to reach 1,000 in 2016 up 22% from 2015 -Identity Theft Resource Center Each data breach costs $3.8 million on average up 23% from 2013 -Ponemon Institute SevenWaysYahoo’s 500M-User Data Breach Affects Banks
  • 5. ONE-TIME PASSCODES Improve security but aren’t easy enough to use Still Phishable User Confusion Token Necklace SMS Reliability All Rights Reserved | FIDO Alliance | Copyright 20175
  • 6. THE WORLD HAS A “SHARED SECRETS” PROBLEM All Rights Reserved | FIDO Alliance | Copyright 20176
  • 7. WE NEED A NEW MODEL All Rights Reserved | FIDO Alliance | Copyright 20177
  • 8. All Rights Reserved | FIDO Alliance | Copyright 20178 AGENDA: THE PROBLEM THE SOLUTION FIDO ADOPTION FIDO AND GOVERNMENT
  • 9. THE NEW MODEL Fast IDentity Online online authentication using public key cryptography All Rights Reserved | FIDO Alliance | Copyright 20179
  • 10. All Rights Reserved | FIDO Alliance | Copyright 201710 THE FACTS ON FIDO The FIDO Alliance is an open industry association of over 250 organizations with a focused mission: 300+ FIDO Certified Solutions 3 BILLION Available to protect user accounts worldwide Today, its members provide the world’s largest ecosystem for standards-based, interoperable authentication AUTHENTICATION STANDARDS based on public key cryptography to solve the password problem
  • 11. FIDO Alliance Mission Develop Specifications Operate Adoption Programs Pursue Formal Standardization 1 2 3 All Rights Reserved | FIDO Alliance | Copyright 201711
  • 12. All Rights Reserved | FIDO Alliance | Copyright 201712 DRIVEN BY 250 MEMBERS Leading global brands and technology providers + SPONSOR MEMBERS + ASSOCIATE MEMBERS + LIAISON MEMBERS
  • 13. THE OLD PARADIGM SECURITY USABILITY Poor Easy WeakStrong All Rights Reserved | FIDO Alliance | Copyright 201713
  • 14. THE FIDO PARADIGM SECURITY USABILITY Poor Easy WeakStrong authentication All Rights Reserved | FIDO Alliance | Copyright 201714
  • 15. All Rights Reserved | FIDO Alliance | Copyright 201715 ONLINE CONNECTION The user authenticates themselves online by presenting a human-readable “shared secret” HOW OLD AUTHENTICATION WORKS
  • 16. All Rights Reserved | FIDO Alliance | Copyright 201716 HOW FIDO WORKS LOCAL CONNECTION ONLINE CONNECTION The device authenticates the user online using public key cryptography The user authenticates “locally” to their device (by various means)
  • 17. Passwordless Experience Second Factor Experience Flexible authentication spanning a myriad of service providers ENHANCED AUTHENTICATION EXPERIENCES All Rights Reserved | FIDO Alliance | Copyright 201717
  • 18. All Rights Reserved | FIDO Alliance | Copyright 201718 User Approval 2 Registration Complete 4 New Keys Created 3 User is in a Session or New Account Flow 1 PUBLIC KEY REGISTERED WITH ONLINE SERVER INVITATION SENT FIDO REGISTRATION
  • 19. All Rights Reserved | FIDO Alliance | Copyright 201719 User Approval 2 Login Complete 4 Key Selected & Signs 3 User needs to login or authorize a transaction 1 SIGNED RESPONSE VERIFIED USING PUBLIC KEY CRYPTOGRAPHY FIDO CHALLENGE FIDO AUTHENTICATION
  • 20. USABILITY, SECURITY, R.O.I. and PRIVACY All Rights Reserved | FIDO Alliance | Copyright 201720
  • 21. No 3rd Party in the Protocol No Secrets on the Server Side Biometric Data (if used) Never Leaves Device No Link-ability Between Services No Link-ability Between Accounts All Rights Reserved | FIDO Alliance | Copyright 201721
  • 22. EU Privacy Principle FIDO Implementation of EU Privacy Principle Personal data must be processed fairly and lawfully For a User to access a Relying Party’s services through FIDO Authentication, the User must first agree to register with that Relying Party. When the User wishes to access the online service, they must execute the User Verification step, e.g. touching a sensor, entering a passcode, or providing their fingerprint, in order to execute the cryptographic computation. This ensures that malware installed on the User’s device is unable to autonomously perform FIDO operations. Personal data can only be processed for one or more specified lawful purpose(s) The Personal Data required to access an online service, such as a fingerprint, can only be accessed by the FIDO Authenticator which is part of the User’s device. The FIDO Authenticator can only access such data when it is required to perform an Authentication. The FIDO protocol requires a minimum amount of data stored by the Relying Party, for which the user is required to provide consent. Personal data must be adequate, relevant, and not excessive in relation to the purposes for which it is being used The data needed to perform an Authentication is collected by the Relying Party when the User registers with it. This data is:  A public key: This allows the Relying Party to verify that the FIDO Authenticator being used is the one previously registered by the User.  Authenticator Attestation ID (AAID): This is a reference that allows the Relying Party to look-up the characteristics of the used FIDO Authenticator.  Key Handle: An identifier created by a FIDO Authenticator, potentially containing an encrypted private key, to refer to a specific key maintained the FIDO Authenticator. Personal data must be accurate and up to date The data used for FIDO Authentication, such as the registered public key, must be accurate since cryptographic verification fails otherwise. If the data becomes corrupted for any reason, the User needs to re-register with the Relying Party. Re-registration changes the registered public key. Personal data must not be kept for longer than necessary to fulfil the purposes for which it was collected The User may de-register from a Relying Party at any time. Once de-registration has taken place the Public key held by the Relying Party is of no further use. Personal data must be kept secure Allowing users to authenticate using FIDO Authentication provides a greater level of security around accessing personal data than passwords alone. Data required for local User Verification is stored locally on the FIDO Authenticator. FIDO-related data stored at the Relying Party is not confidential by itself. The FIDO Authenticator is required to protect data required for User Verification and FIDO-related data, such as cryptographic keys, against unauthorized access by third parties. Personal data must be processed in accordance with rights of data subjects Personal data used to authenticate a User can only be accessed by that User when the User wishes to be authenticated. Personal data cannot be transferred outside a given geographical area, such as the EEA, without specific circumstances being in place. Personal data held in a FIDO Authenticator will be protected by the same mechanisms irrespective of the device’s location and the device can only leave the EEA if the owner wishes it to do so. The FIDO Server used by the Relying Party does not contain personal data. FIDO WAS DESIGNED FROM THE START TO SUPPORT THE PRIVACY PRINCIPLES OF THE EUROPEAN DATA PROTECTION DIRECTIVE All Rights Reserved | FIDO Alliance | Copyright 201722
  • 23. All Rights Reserved | FIDO Alliance | Copyright 201723 AGENDA: THE PROBLEM THE SOLUTION FIDO ADOPTION FIDO AND GOVERNMENT
  • 24. FIDO 1.0 FINALFirst Deployments UAF & U2FSpecification Review Draft FIDO Ready Program FEB 2013 DEC 2013 FEB 2014 FEB-OCT 2014 DEC 9 2014 MAY 2015 FEB 2016 Formal Standardization JUNE 2015 Certification Program New U2F Transports NOV 2016 FIDO 1.1 FIDO DEVELOPMENT TIMELINE All Rights Reserved | FIDO Alliance | Copyright 201724 Alliance Announced
  • 25. All Rights Reserved | FIDO Alliance | Copyright 201725 FIDO-ENABLED APPS + SERVICES 3 BILLION AVAILABLE TO PROTECT ACCOUNTS WORLDWIDE
  • 26. Deployments are enabled by over 300 FIDO® Certified products available today All Rights Reserved | FIDO Alliance | Copyright 201726
  • 27. All Rights Reserved | FIDO Alliance | Copyright 201727 CERTIFICATIONS – 200% YoY GROWTH 152 64 32 62 74 108 162 216 253 304 Apr-15 Jul-15 Sep-15 Dec-15 Mar-16 May-16 Aug-16 Dec-16 230 74  An open competitive market  Ensures interoperability  Sign of mature FIDO ecosystem
  • 28. All Rights Reserved | FIDO Alliance | Copyright 201728 FIDO IN THE ANDROID ECOSYSTEM S5, Mini Alpha Note 4,5 Note Edge Tab S, Tab S2 S6, S6 Edge S7, S7 Edge Vernee Thor Xperia Z5 SO-01H Xperia Z5 Compact SO-02H Xperia Z5 Premium SO-03H Mate 8 V10 G5 Z2, Z2 Pro Xperia X Performance Xperia XZ Xperia X Compact SO-02J Arrow s NX Arrow s Fit Arrow s Tab F-02HF-04HF-04G F-01H Aquos Zeta SH-02J MO1T F-01J
  • 29. All Rights Reserved | FIDO Alliance | Copyright 201729 Supported iOS fingerprint devices iPhone SE iPhone & iPhone+ iPad Pro iPad Air, Mini FIDO IN THE iOS ECOSYSTEM
  • 30. All Rights Reserved | FIDO Alliance | Copyright 201730 FIDO IN THE WINDOWS + WEB ECOSYSTEMS Windows Platforms Web Yoga 910
  • 31. All Rights Reserved | FIDO Alliance | Copyright 201731 AGENDA: THE PROBLEM THE SOLUTION FIDO ADOPTION FIDO AND GOVERNMENT
  • 32. All Rights Reserved | FIDO Alliance | Copyright 201732 AUTHENTICATION IS IMPORTANT TO GOVERNMENT 1. Protects access to government assets 2. Enables more high-value citizen-facing services 3. Empowers private sector to provide a wider range of high value services to consumers 4. Secures critical assets and infrastructure Governments seek identity solutions that can deliver not just improved Security – but also Privacy, Interoperability, and better Customer Experiences
  • 33. All Rights Reserved | FIDO Alliance | Copyright 201733 FIDO IMPACT ON POLICY FIDO specifications offer governments newer, better options for strong authentication – but governments may need to update some policies to support the ways in which FIDO is different. As technology evolves, policy needs to evolve with it.
  • 34. AS TECHNOLOGY EVOLVES, POLICY NEEDS TO EVOLVE WITH IT. • While this statement was true of most “old” MFA technology, FIDO specifically addresses these cost and usability issues • FIDO enables simpler, stronger authentication capabilities that governments, businesses and consumers can easily adopt at scale 1) Recognize that two-factor authentication no longer brings higher burdens or costs All Rights Reserved | FIDO Alliance | Copyright 201734
  • 35. All Rights Reserved | FIDO Alliance | Copyright 201735 AS TECHNOLOGY EVOLVES, POLICY NEEDS TO EVOLVE WITH IT. • Recognized by the U.S. government (NIST) in 2014 • “OMB (White House) to update guidance on remote electronic authentication” to remove requirements that one factor be separate from the device accessing the resource • The evolution of mobile devices – in particular, hardware architectures that offer highly robust and isolated execution environments (such as TEE, SE and TPM) – has allowed these devices to achieve high- grade security without the need for a physically distinct token 2) Recognize technology is now mature enough to enable two secure, distinct authn factors in a single device
  • 36. All Rights Reserved | FIDO Alliance | Copyright 201736 AS TECHNOLOGY EVOLVES, POLICY NEEDS TO EVOLVE WITH IT. 2) Recognize technology is now mature enough to enable two secure, distinct authn factors in a single device
  • 37. All Rights Reserved | FIDO Alliance | Copyright 201737 AS TECHNOLOGY EVOLVES, POLICY NEEDS TO EVOLVE WITH IT. • The market is in the midst of a burst of innovation around authentication technology—some solutions are better than others. Don’t build rules focused on old authentication technology • Old authentication technologies impose significant costs and burdens on the user—which decreases adoption • Old authentication technologies have security (i.e., phishable) and privacy issues—putting both users and online service providers at risk 3) As governments promote or require strong authentication, make sure it is the “right” authentication
  • 38. Priorities: • Ensuring that future online products and services coming into use are “secure by default” • Empowering consumers to “choose products and services that have built-in security as a default setting.” “[We will] invest in technologies like Trusted Platform Modules (TPM) and emerging industry standards such as Fast IDentity Online (FIDO), which do not rely on passwords for user authentication, but use the machine and other devices in the user’s possession to authenticate. The Government will test innovative authentication mechanisms to demonstrate what they can offer, both in terms of security and overall user experience.” FIDO IS IMPACTING HOW GOVERNMENTS THINK ABOUT AUTHENTICATION All Rights Reserved | FIDO Alliance | Copyright 201738
  • 39. U.S. Commission on Enhancing National Cybersecurity: • Bipartisan commission established by the White House in April – charged with crafting recommendations for the next President • Major focus on Authentication FIDO IS IMPACTING HOW GOVERNMENTS THINK ABOUT AUTHENTICATION All Rights Reserved | FIDO Alliance | Copyright 201739
  • 40. US COMMISSION ON ENHANCING NATIONAL CYBERSECURITY “Other important work that must be undertaken to overcome identity authentication challenges includes the development of open-source standards and specifications like those developed by the Fast IDentity Online (FIDO) Alliance. FIDO specifications are focused largely on the mobile smartphone platform to deliver multifactor authentication to the masses, all based on industry standard public key cryptography. Windows 10 has deployed FIDO specifications (known as Windows Hello), and numerous financial institutions have adopted FIDO for consumer banking. Today, organizations complying with FIDO specifications are able to deliver secure authentication technology on a wide range of devices, including mobile phones, USB keys, and near-field communications (NFC) and Bluetooth low energy (BLE) devices and wearables. This work, other standards activities, and new tools that support continuous authentication provide a strong foundation for opt-in identity management for the digital infrastructure.” All Rights Reserved | FIDO Alliance | Copyright 201740
  • 41. Security Privacy Interoperability Usability All Rights Reserved | FIDO Alliance | Copyright 201741 FIDO DELIVERS ON KEY PRIORITIES
  • 42. All Rights Reserved | FIDO Alliance | Copyright 201742 QUESTIONS? THANK YOU! jeremy.grant@chertoffgroup.com info@fidoalliance.org

Editor's Notes

  • #4: But what specifically makes passwords such a problem? (lead into next slide)
  • #6: The only thing worse than a password is two passwords. SMS is not always available / dedicated hardware is often service-specific / it’s cumbersome process users generally don’t like / and it is still vulnerable to phishing (it is still a symmetric shared secret, just short-lived, but malware tools have adjusted to this)
  • #7: But what specifically makes passwords such a problem? (lead into next slide)
  • #10: User convenience is so important that we put it in the very name of the technology itself - the “F” in FIDO stands for Fast. Historically, “Fast” has always meant “Weak” – but it’s important to understand that FIDO was designed from the ground up to provide privacy protections in addition to providing strong authentication. Fundamentally, the solution that we developed replaces passwords, which are over 50 years old, with modern public key cryptography.
  • #28: How are these deployments going live and where are the devices coming from? This chart shows adoption of devices and commercially available software. Right now there are over 300 FIDO Certified products available in the market today. That’s an increase of over 200% in just the past year. These devices cover a range of things – security keys to support second factor deployments, and leading handset manufacturers, all shipping out-of-the-box support for FIDO certified authentication using onboard embedded biometrics. In addition even some o the deployments from before have put their own locked ecosystem implementations through cert testing just to make sure they could truly interoperate with all devices. There are also some software development kits (SDKs) that have gone through certification testing to make it easy for mobile application developers to simply add FIDO to the applications that they already have.
  • #42: To sum up, FIDO delivers on all of these key priorities: security, usability, privacy and interoperability. Some additional points on privacy: There’s no 3rd party in the protocol so you don’t have to worry about correlation handles or any third-party watching where users are authenticating. It’s direct from the device to the application. There are no shared secrets stored on the server, which saves you in the case of a data breach of that server. If used, biometric data must never leave the device, which is privacy preserving. That’s a requirement of FIDO certification. One of the biggest benefits of the FIDO design is that there’s no new link-ability or identifier in a FIDO device – no new way to track a user or link their behavior across applications. There isn’t even a way to link that user across different accounts on the same system. Cookie methods still exist, but nothing new that’s being delivered by FIDO.