The Value of FIDO Certification

FIDO Alliance
FIDO AllianceFIDO Alliance
All Rights Reserved | FIDO Alliance | Copyright 2018
FIDO Certification
Programs
2
AGENDA
• The Value of FIDO Certification
• FIDO Certification Programs
• Functional
• Authenticator
• Biometric
• Getting Started
Dr. Rae Hayward,
Certification Director,
FIDO Alliance
All Rights Reserved | FIDO Alliance | Copyright 20183
BENEFITS TO CERTIFICATION
Validation Interoperability Rigorous testing
Trust
Competitive
edge
Market
expansion
All Rights Reserved | FIDO Alliance | Copyright 20184
FIDO CERTIFIED ECOSYSTEM (SAMPLE)
PHONES & PCs
Over 525 FIDO Certified Solutions Available Today
SECURITY KEYS CLOUD/SERVER SOLUTIONS
5
FIDO METADATA SERVICE
• Web-based tool where FIDO authenticator vendors can publish metadata
statements for FIDO servers to download
• Provides organizations deploying FIDO servers with a centralized and
trusted source of information about FIDO authenticators
• Validate the integrity of a device population by periodically
downloading a digitally signed metadata to verify individual metadata
statements
All Rights Reserved | FIDO Alliance | Copyright 2018
All Rights Reserved | FIDO Alliance | Copyright 20186
7
AGENDA
• The Value of FIDO Certification
• FIDO Certification Programs
• Functional
• Authenticator
• Biometric
• Getting Started
FUNCTIONAL CERTIFICATION
• Available to members and non-members
• Measures compliance among products and services
that support FIDO specifications
• Validates interoperability within the ecosystem
• Certify products such as authenticators, servers,
clients, and combos
All Rights Reserved | FIDO Alliance | Copyright 2018
All Rights Reserved | FIDO Alliance | Copyright 2018
9
INTEROP TESTING OVERVIEW
• Existing Process – Interop Testing Events
• Interop every 90 days
• Plan ahead! May impact product schedules…
• New Process – On Demand Testing
• Pick your testing date from a calendar
• Servers: remote / virtual testing
• Authenticators: ship device or in-person testing
• Convenience and fast turn-around
FIOD
Testing
Virtual
Shipped
In-Person
Interop Events
All Rights Reserved | FIDO Alliance | Copyright 2018
10
FIDO AUTHENTICATOR CERTIFICATION
• The FIDO Authenticator Certification
Program validates that Authenticators
conform to the FIDO specifications
(UAF/U2F/FIDO2) and allows vendors to
certify the security characteristics of their
implementations
• After completing certification, vendors may
use the FIDO logo on their products
11
A COMPREHENSIVE SET OF LEVELS FOR ALL USES CASES
SAMPLE DEVICE HARDWARE &
SOFTWARE REQUIREMENTS
DEFENDS AGAINST
Protection against chip fault injection,
invasive attacks… L3+
Captured devices
(chip-level attacks)
Circuit board potting, package on
package memory, encrypted RAM… L3
Captured devices
(circuit board level attacks)
Restricted Operating Environment (ROE)
(e.g., TEE or Secure Element in a phone,
USB token or Smart Card which are
intrinsically ROEs, other…)
L2+
Device OS compromise
(defended by ROE)
L2
Any device HW or SW
L1+
Device OS compromise
(defended by white-box cryptography)
L1
Phishing, server credential
breaches & MiTM attacks
(better than passwords)
All Rights Reserved | FIDO Alliance | Copyright 201812
LEVEL 1
Examples
• Android or IoS applications
• Platform built-in authenticators
• Level 2- or Level 3-capable
authenticators that yet been certified
at Level 2 or Level 3
Certification Process
Vendor documents their design in detail
L1+ only: Evaluation by FIDO-accredited lab,
penetration testing (L1+ program still in development)
Evaluation by FIDO Alliance Security Secretariat
• Better than passwords
• FIDO is unfishable and biometrics are
more convenient
• Keys and biometric templates are
protected similar to passwords
stored by a browser or password
manager app
• Requires best facilities offered by
hosting OS
• L1+ adds white-box cryptography
(obfuscation and other techniques)
to defend against compromise of
hosting OS
All Rights Reserved | FIDO Alliance | Copyright 201813
LEVEL 2
In addition to L1
• A restricted operating
environment like a TEE gives
security even if OS is
compromised.
• Separate USB, BLE and NFC
authenticators are considered
to use a restricted operating
environment
• Gives defense against larger
scale attacks
• Additional assurance at L2+
Certification Process
Vendor documents their design in detail
L2+ only: Vendor submits source code (L2+ program
still in development)
Evaluation by a FIDO-accredited lab
L2+ only: Attack potential calculation, pen testing
Examples
• Android apps using FIDO Level 2 certified
phone (there aren’t any yet)
• USB, BLE and NFC Security Keys
• Level 3-capable authenticators that
haven’t yet been certified at Level 3
All Rights Reserved | FIDO Alliance | Copyright 201814
LEVEL 3
In addition to L2
• Defends against physically
captured authenticators
• Defenses against disassembling,
probing, glitch and other such
physical attacks
• L3+ adds defense against chip-level
physical attacks, such as decapping
and probing the chip
Certification Process
Vendor documents their design in detail
Vendor submits source code
Evaluation by a FIDO-accredited lab (L3, L3+)
Attack potential calculation and penetration testing
L3+ only: Higher attack potential requirements
Examples
• USB, BLE and NFC Security Keys using
Secure Elements or other means of
defending HW attacks
• In some case phone or platform
authenticators may achieve L3, but is
difficult
All Rights Reserved | FIDO Alliance | Copyright 201815
COMPANION PROGRAMS
Re use as much as possible from other programs like
Common Criteria
• Reduces time, effort and cost of certification for authenticator
vendors, sometimes by quite a lot
Companion programs never cover all FIDO requirements;
they were not developed specifically for authenticators
• Even with advanced companion programs, vendors will have to
go through additional certification with the FIDO Alliance
Companion Program FIDO Security Level Program Status
Common Criteria AVA_VAN 3 L3 Operating
Common Criteria AVA_VAN 4 L3+ Operating
FIPS L2+, L3 In development
Global Platform TEE Protection Profile L2+ In development
Authentication-
specific
Companion program
AllFIDOSecurityRequirements
End-device
configuration
Cryptographic
algorithms
FIDOSpecific
All Rights Reserved | FIDO Alliance | Copyright 201816
FIDO ACCREDITED LABS
L2 L3, L3+
All labs that do FIDO certification must pass accreditation by the FIDO Alliance
Biometric
All Rights Reserved | FIDO Alliance | Copyright 201817
EXPIRATION, DERIVATIVE & DELTA CERTIFICATION
xPhone Asteroid1 32GB
Authenticator v1
xPhone Asteroid1 64GB
Authenticator v1
xPhone Asteroid2 32GB
Authenticator v1
xPhone Asteroid3 32GB
Authenticator v2
Security Requirements 1.2 Security Requirements 1.3
xPhone Asteroid1 64GB
Authenticator v1
Delta Certification
• When the FIDO functionality changes
• Recertification against new requirements
• After fix to close a vulnerability
• Reevaluation of security is required
Derivative certification
• No change to FIDO functionality allowed
• Surrounding functionality may change
• Packaging & product name may change
• No re evaluation of security
No Expiration
• Certification of a given product never
expires
• Recertification against new versions of
the requirements is optional
Derivative
Delta
Derivative
Delta
xPhone Asteroid1 64GB
Authenticator v1.1 (fixed)
Delta
FIDO Alliance | All Rights Reserved | Copyright 201818
FIDO BIOMETRIC CERTIFICATION
The FIDO Biometric Certification
Program is intended to certify
biometric components and/or
subsystems and is independent from
Authenticator Certification Program
19
BIOMETRIC AND AUTHENTICATOR CERTIFICATION
Using a Certified Biometric Subcomponent:
• Optional for Authenticators using a Biometric at L1-L2.
• The Security Requirements enforce Biometric Certification of the
biometric at L3 and higher when a biometric is used in the
authenticator.
• Once L2+ is finalized Biometric Certification will also be required
• Results in a “FIDO Certified” Authenticator
20
BIOMETRIC DEFINITIONS
• False Accept Rate (FAR): The proportion of verification transactions with
wrongful claims of identity that are incorrectly confirmed
• The requirement of less than 1:10,000 for the upper bound of a 80% confidence
interval
• False Reject Rate (FRR): The proportion of verification transactions with
truthful claims of identity that are incorrectly denied
• the requirement of less than 3:100 for the upper bound of a 80% confidence
interval
• Impostor Attack Presentation Match Rate (IAPMR): Proportion of
presentation attacks in which the target reference is matched
• evaluation measures the Impostor Attack Presentation Match Rate for each
presentation attack type, as defined in ISO 30107 Part 3
FIDO Alliance | All Rights Reserved | Copyright 201821
SELF-ATTESTATION - OPTIONAL
Biometric Requirements:
• False Accept Rate (FAR): The vendor SHALL attest to an FAR of [1:25,000 or
1:50,000 or 1:75,000 or 1:100,000] at an FRR of 3% or less.
• False Reject Rate (FRR): The vendor SHALL attest to an FRR at no greater than 3%
as measured when determining the self-attested FAR. In other words, self
attestation for FRR is only possible when self attesting for FAR.
NOTE: Self-attestation for FAR and FRR shall be supported by test data and
documented in a report submitted to lab from vendor.
22
AGENDA
• The Value of FIDO Certification
• FIDO Certification Programs
• Functional
• Authenticator
• Biometric
• Getting Started
All Rights Reserved | FIDO Alliance | Copyright 201623
GETTING STARTED: FUNCTIONAL CERTIFICATION
Register for Self-Conformance Test Tool Access :
https://fidoalliance.org/test-tool-access-request/
• For UAF, you will need to complete both automated and manual testing
• UAF Authenticators only will need a Vendor ID:
http://fidoalliance.org/vendor-id-request/
Complete Self-Conformance Testing at least two weeks prior to
interoperability event.
Elect to Participate in Pre-Testing in the two weeks prior to the
interoperability event (recommended)
Register for and attend the next interoperability event:
https://fidoalliance.org/interop-registration/
Next Interoperability Event Host: Seoul, S. Korea, 12-15 November 2018
(Location TBD). Registration is open.
Functional
Testing
Security
Evaluation
Certification
Issuance
Trademark
Licensing
Agreement
Metadata
Submission
24
CERTIFICATION PROCESS OVERVIEW
FIDO Alliance | All Rights Reserved | Copyright 2018
All Rights Reserved | FIDO Alliance | Copyright 201825
GETTING STARTED – BIOMETRIC CERTIFICATION
Apply for Biometric component certification
• Request an account: https://fidoalliance.org/certification/certification-
account-request/
Select an Accredited Biometric Lab and agree to terms for testing
• Biometric Accredited Lab list:
https://fidoalliance.org/fido-accredited-biometric-laboratories/
All Rights Reserved | FIDO Alliance | Copyright 201826
BIOMETRIC SUBCOMPONENT TESTING
FIDO Alliance | All Rights Reserved | Copyright 2018
27
ALLOWED INTEGRATION DOCUMENT
• Developed by vendor and submitted to lab
• Used to document changes necessary to accommodate integration with
authenticator
• Must include explanation of possible software and hardware changes
All Rights Reserved | FIDO Alliance | Copyright 201828
TESTING STEP 2: AUTHENTICATOR
All Rights Reserved | FIDO Alliance | Copyright 201829
Connect with FIDO
fidoalliance.org
1 of 29

Recommended

FIDO & PSD2: Solving the Strong Customer Authentication Challenge in Europe by
FIDO & PSD2: Solving the Strong Customer Authentication Challenge in EuropeFIDO & PSD2: Solving the Strong Customer Authentication Challenge in Europe
FIDO & PSD2: Solving the Strong Customer Authentication Challenge in EuropeFIDO Alliance
9.3K views44 slides
2019 FIDO Tokyo Seminar - FIDO認定と国内で初めて開催したFIDO相互接続性試験について by
2019 FIDO Tokyo Seminar - FIDO認定と国内で初めて開催したFIDO相互接続性試験について2019 FIDO Tokyo Seminar - FIDO認定と国内で初めて開催したFIDO相互接続性試験について
2019 FIDO Tokyo Seminar - FIDO認定と国内で初めて開催したFIDO相互接続性試験についてFIDO Alliance
542 views13 slides
User Management Life Cycle with Keycloak by
User Management Life Cycle with KeycloakUser Management Life Cycle with Keycloak
User Management Life Cycle with KeycloakMuhammad Edwin
533 views38 slides
Integrating FIDO Authentication & Federation Protocols by
Integrating FIDO Authentication & Federation ProtocolsIntegrating FIDO Authentication & Federation Protocols
Integrating FIDO Authentication & Federation ProtocolsFIDO Alliance
15K views25 slides
Go passwordless with fido2 by
Go passwordless with fido2Go passwordless with fido2
Go passwordless with fido2Rob Dudley
1.3K views48 slides
Verifiable Credentials, Self Sovereign Identity and DLTs by
Verifiable Credentials, Self Sovereign Identity and DLTs Verifiable Credentials, Self Sovereign Identity and DLTs
Verifiable Credentials, Self Sovereign Identity and DLTs Vasiliy Suvorov
1K views20 slides

More Related Content

What's hot

Session 1 - Introduction to i4Trust Data Spaces, building blocks, and roles |... by
Session 1 - Introduction to i4Trust Data Spaces, building blocks, and roles |...Session 1 - Introduction to i4Trust Data Spaces, building blocks, and roles |...
Session 1 - Introduction to i4Trust Data Spaces, building blocks, and roles |...FIWARE
511 views83 slides
Digital Identity Wallets: What They Mean For Banks by
Digital Identity Wallets: What They Mean For BanksDigital Identity Wallets: What They Mean For Banks
Digital Identity Wallets: What They Mean For BanksEvernym
434 views24 slides
FIDO and the Future of User Authentication by
FIDO and the Future of User AuthenticationFIDO and the Future of User Authentication
FIDO and the Future of User AuthenticationFIDO Alliance
422 views23 slides
FIDO Authentication: Unphishable MFA for All by
FIDO Authentication: Unphishable MFA for AllFIDO Authentication: Unphishable MFA for All
FIDO Authentication: Unphishable MFA for AllFIDO Alliance
513 views20 slides
Integration: The $100 Billion Opportunity No One Wants to Talk About by
Integration: The $100 Billion Opportunity No One Wants to Talk AboutIntegration: The $100 Billion Opportunity No One Wants to Talk About
Integration: The $100 Billion Opportunity No One Wants to Talk AboutBramh Gupta
7K views53 slides
Fido Technical Overview by
Fido Technical OverviewFido Technical Overview
Fido Technical OverviewFIDO Alliance
1.9K views27 slides

What's hot(20)

Session 1 - Introduction to i4Trust Data Spaces, building blocks, and roles |... by FIWARE
Session 1 - Introduction to i4Trust Data Spaces, building blocks, and roles |...Session 1 - Introduction to i4Trust Data Spaces, building blocks, and roles |...
Session 1 - Introduction to i4Trust Data Spaces, building blocks, and roles |...
FIWARE511 views
Digital Identity Wallets: What They Mean For Banks by Evernym
Digital Identity Wallets: What They Mean For BanksDigital Identity Wallets: What They Mean For Banks
Digital Identity Wallets: What They Mean For Banks
Evernym434 views
FIDO and the Future of User Authentication by FIDO Alliance
FIDO and the Future of User AuthenticationFIDO and the Future of User Authentication
FIDO and the Future of User Authentication
FIDO Alliance422 views
FIDO Authentication: Unphishable MFA for All by FIDO Alliance
FIDO Authentication: Unphishable MFA for AllFIDO Authentication: Unphishable MFA for All
FIDO Authentication: Unphishable MFA for All
FIDO Alliance513 views
Integration: The $100 Billion Opportunity No One Wants to Talk About by Bramh Gupta
Integration: The $100 Billion Opportunity No One Wants to Talk AboutIntegration: The $100 Billion Opportunity No One Wants to Talk About
Integration: The $100 Billion Opportunity No One Wants to Talk About
Bramh Gupta7K views
Fido Technical Overview by FIDO Alliance
Fido Technical OverviewFido Technical Overview
Fido Technical Overview
FIDO Alliance1.9K views
IBM: Hey FIDO, Meet Passkey!.pptx by FIDO Alliance
IBM: Hey FIDO, Meet Passkey!.pptxIBM: Hey FIDO, Meet Passkey!.pptx
IBM: Hey FIDO, Meet Passkey!.pptx
FIDO Alliance908 views
What makes a successful SSI strategy? by Evernym
What makes a successful SSI strategy?What makes a successful SSI strategy?
What makes a successful SSI strategy?
Evernym409 views
How to Build Interoperable Decentralized Identity Systems with OpenID for Ver... by Torsten Lodderstedt
How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...
How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...
Torsten Lodderstedt1.2K views
FIDO2 ~ パスワードのいらない世界へ by FIDO Alliance
FIDO2 ~ パスワードのいらない世界へFIDO2 ~ パスワードのいらない世界へ
FIDO2 ~ パスワードのいらない世界へ
FIDO Alliance9.4K views
パスワードのいらない世界へ by Keiko Itakura
パスワードのいらない世界へパスワードのいらない世界へ
パスワードのいらない世界へ
Keiko Itakura388 views
Web Authentication API by FIDO Alliance
Web Authentication APIWeb Authentication API
Web Authentication API
FIDO Alliance4.3K views
NIST 800-63 Guidance & FIDO Authentication by FIDO Alliance
NIST 800-63 Guidance & FIDO AuthenticationNIST 800-63 Guidance & FIDO Authentication
NIST 800-63 Guidance & FIDO Authentication
FIDO Alliance9.2K views
FIDO2導入とヤフーがめざすパスワードレスの世界 by FIDO Alliance
FIDO2導入とヤフーがめざすパスワードレスの世界FIDO2導入とヤフーがめざすパスワードレスの世界
FIDO2導入とヤフーがめざすパスワードレスの世界
FIDO Alliance1.1K views
FIDO U2F Specifications: Overview & Tutorial by FIDO Alliance
FIDO U2F Specifications: Overview & TutorialFIDO U2F Specifications: Overview & Tutorial
FIDO U2F Specifications: Overview & Tutorial
FIDO Alliance2.9K views
FIDOセキュリティ認定の概要と最新状況 by FIDO Alliance
FIDOセキュリティ認定の概要と最新状況FIDOセキュリティ認定の概要と最新状況
FIDOセキュリティ認定の概要と最新状況
FIDO Alliance823 views
Verifiable Credentials in Self-Sovereign Identity (SSI) by Evernym
Verifiable Credentials in Self-Sovereign Identity (SSI)Verifiable Credentials in Self-Sovereign Identity (SSI)
Verifiable Credentials in Self-Sovereign Identity (SSI)
Evernym498 views

Similar to The Value of FIDO Certification

Overview of FIDO Security Requirements and Certifications by
Overview of FIDO Security Requirements and CertificationsOverview of FIDO Security Requirements and Certifications
Overview of FIDO Security Requirements and CertificationsFIDO Alliance
1.4K views15 slides
FIDO Certified Program: The Value of Certification by
FIDO Certified Program: The Value of Certification FIDO Certified Program: The Value of Certification
FIDO Certified Program: The Value of Certification FIDO Alliance
1.7K views26 slides
FIDO & PSD2 – Achieving Strong Customer Authentication Compliance by
FIDO & PSD2 – Achieving Strong Customer Authentication ComplianceFIDO & PSD2 – Achieving Strong Customer Authentication Compliance
FIDO & PSD2 – Achieving Strong Customer Authentication ComplianceFIDO Alliance
2.7K views32 slides
FIDO Certification Program Updates by
FIDO Certification Program UpdatesFIDO Certification Program Updates
FIDO Certification Program UpdatesFIDO Alliance
420 views30 slides
FIDO Biometric Certification Program by
FIDO Biometric Certification ProgramFIDO Biometric Certification Program
FIDO Biometric Certification ProgramFIDO Alliance
34.9K views13 slides
FIDO: The Value of Certification by
FIDO: The Value of CertificationFIDO: The Value of Certification
FIDO: The Value of CertificationFIDO Alliance
450 views29 slides

Similar to The Value of FIDO Certification(20)

Overview of FIDO Security Requirements and Certifications by FIDO Alliance
Overview of FIDO Security Requirements and CertificationsOverview of FIDO Security Requirements and Certifications
Overview of FIDO Security Requirements and Certifications
FIDO Alliance1.4K views
FIDO Certified Program: The Value of Certification by FIDO Alliance
FIDO Certified Program: The Value of Certification FIDO Certified Program: The Value of Certification
FIDO Certified Program: The Value of Certification
FIDO Alliance1.7K views
FIDO & PSD2 – Achieving Strong Customer Authentication Compliance by FIDO Alliance
FIDO & PSD2 – Achieving Strong Customer Authentication ComplianceFIDO & PSD2 – Achieving Strong Customer Authentication Compliance
FIDO & PSD2 – Achieving Strong Customer Authentication Compliance
FIDO Alliance2.7K views
FIDO Certification Program Updates by FIDO Alliance
FIDO Certification Program UpdatesFIDO Certification Program Updates
FIDO Certification Program Updates
FIDO Alliance420 views
FIDO Biometric Certification Program by FIDO Alliance
FIDO Biometric Certification ProgramFIDO Biometric Certification Program
FIDO Biometric Certification Program
FIDO Alliance34.9K views
FIDO: The Value of Certification by FIDO Alliance
FIDO: The Value of CertificationFIDO: The Value of Certification
FIDO: The Value of Certification
FIDO Alliance450 views
FIDO Authentication Technical Overview by FIDO Alliance
FIDO Authentication Technical OverviewFIDO Authentication Technical Overview
FIDO Authentication Technical Overview
FIDO Alliance452 views
FIDO Authentication Technical Overview by FIDO Alliance
FIDO Authentication Technical OverviewFIDO Authentication Technical Overview
FIDO Authentication Technical Overview
FIDO Alliance4.1K views
Using FIDO Authenticator for IoT Devices by FIDO Alliance
Using FIDO Authenticator for IoT DevicesUsing FIDO Authenticator for IoT Devices
Using FIDO Authenticator for IoT Devices
FIDO Alliance1.1K views
Getting to Know the FIDO Specifications - Technical Tutorial by FIDO Alliance
Getting to Know the FIDO Specifications - Technical TutorialGetting to Know the FIDO Specifications - Technical Tutorial
Getting to Know the FIDO Specifications - Technical Tutorial
FIDO Alliance8.9K views
Beyond Passwords: FIDO & the Future of Consumer Authentication by FIDO Alliance
Beyond Passwords: FIDO & the Future of Consumer AuthenticationBeyond Passwords: FIDO & the Future of Consumer Authentication
Beyond Passwords: FIDO & the Future of Consumer Authentication
FIDO Alliance763 views
Technical Principles of FIDO Authentication by FIDO Alliance
Technical Principles of FIDO AuthenticationTechnical Principles of FIDO Authentication
Technical Principles of FIDO Authentication
FIDO Alliance2.5K views
Technical Principles of FIDO Authentication by FIDO Alliance
Technical Principles of FIDO AuthenticationTechnical Principles of FIDO Authentication
Technical Principles of FIDO Authentication
FIDO Alliance2.6K views
FIDO UAF 1.0 Specs: Overview and Insights by FIDO Alliance
FIDO UAF 1.0 Specs: Overview and InsightsFIDO UAF 1.0 Specs: Overview and Insights
FIDO UAF 1.0 Specs: Overview and Insights
FIDO Alliance2.1K views
FIDO Specifications Overview by FIDO Alliance
FIDO Specifications OverviewFIDO Specifications Overview
FIDO Specifications Overview
FIDO Alliance1.3K views
CIS14: An Overview of FIDO's Universal Factor (UAF) Specifications by CloudIDSummit
CIS14: An Overview of FIDO's Universal Factor (UAF) SpecificationsCIS14: An Overview of FIDO's Universal Factor (UAF) Specifications
CIS14: An Overview of FIDO's Universal Factor (UAF) Specifications
CloudIDSummit5.1K views
Introducing FIDO Device Onboard (FDO) by FIDO Alliance
Introducing  FIDO Device Onboard (FDO)Introducing  FIDO Device Onboard (FDO)
Introducing FIDO Device Onboard (FDO)
FIDO Alliance2.4K views

More from FIDO Alliance

FIDO Alliance: Welcome and FIDO Update.pptx by
FIDO Alliance: Welcome and FIDO Update.pptxFIDO Alliance: Welcome and FIDO Update.pptx
FIDO Alliance: Welcome and FIDO Update.pptxFIDO Alliance
841 views19 slides
OTIS: Our Journey to Passwordless.pptx by
OTIS: Our Journey to Passwordless.pptxOTIS: Our Journey to Passwordless.pptx
OTIS: Our Journey to Passwordless.pptxFIDO Alliance
593 views13 slides
FIDO Workshop-Demo Breakdown.pptx by
FIDO Workshop-Demo Breakdown.pptxFIDO Workshop-Demo Breakdown.pptx
FIDO Workshop-Demo Breakdown.pptxFIDO Alliance
653 views19 slides
CISA: #MoreThanAPassword.pptx by
CISA: #MoreThanAPassword.pptxCISA: #MoreThanAPassword.pptx
CISA: #MoreThanAPassword.pptxFIDO Alliance
461 views14 slides
FIDO Alliance Webinar: Catch Up WIth FIDO by
FIDO Alliance Webinar: Catch Up WIth FIDOFIDO Alliance Webinar: Catch Up WIth FIDO
FIDO Alliance Webinar: Catch Up WIth FIDOFIDO Alliance
1.1K views28 slides
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.com by
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.comConsumer Attitudes Toward Strong Authentication & LoginWithFIDO.com
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.comFIDO Alliance
3K views42 slides

More from FIDO Alliance(20)

FIDO Alliance: Welcome and FIDO Update.pptx by FIDO Alliance
FIDO Alliance: Welcome and FIDO Update.pptxFIDO Alliance: Welcome and FIDO Update.pptx
FIDO Alliance: Welcome and FIDO Update.pptx
FIDO Alliance841 views
OTIS: Our Journey to Passwordless.pptx by FIDO Alliance
OTIS: Our Journey to Passwordless.pptxOTIS: Our Journey to Passwordless.pptx
OTIS: Our Journey to Passwordless.pptx
FIDO Alliance593 views
FIDO Workshop-Demo Breakdown.pptx by FIDO Alliance
FIDO Workshop-Demo Breakdown.pptxFIDO Workshop-Demo Breakdown.pptx
FIDO Workshop-Demo Breakdown.pptx
FIDO Alliance653 views
CISA: #MoreThanAPassword.pptx by FIDO Alliance
CISA: #MoreThanAPassword.pptxCISA: #MoreThanAPassword.pptx
CISA: #MoreThanAPassword.pptx
FIDO Alliance461 views
FIDO Alliance Webinar: Catch Up WIth FIDO by FIDO Alliance
FIDO Alliance Webinar: Catch Up WIth FIDOFIDO Alliance Webinar: Catch Up WIth FIDO
FIDO Alliance Webinar: Catch Up WIth FIDO
FIDO Alliance1.1K views
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.com by FIDO Alliance
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.comConsumer Attitudes Toward Strong Authentication & LoginWithFIDO.com
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.com
FIDO Alliance3K views
日立PBI技術を用いた「デバイスフリーリモートワーク」構想 by FIDO Alliance
日立PBI技術を用いた「デバイスフリーリモートワーク」構想日立PBI技術を用いた「デバイスフリーリモートワーク」構想
日立PBI技術を用いた「デバイスフリーリモートワーク」構想
FIDO Alliance1.3K views
Introduction to FIDO and eIDAS Services by FIDO Alliance
Introduction to FIDO and eIDAS ServicesIntroduction to FIDO and eIDAS Services
Introduction to FIDO and eIDAS Services
FIDO Alliance1.5K views
富士通の生体認証ソリューションと提案 by FIDO Alliance
富士通の生体認証ソリューションと提案富士通の生体認証ソリューションと提案
富士通の生体認証ソリューションと提案
FIDO Alliance1.4K views
テレワーク本格導入におけるID認証考察 by FIDO Alliance
テレワーク本格導入におけるID認証考察テレワーク本格導入におけるID認証考察
テレワーク本格導入におけるID認証考察
FIDO Alliance1.2K views
「開けゴマ!」からYubiKeyへ by FIDO Alliance
「開けゴマ!」からYubiKeyへ「開けゴマ!」からYubiKeyへ
「開けゴマ!」からYubiKeyへ
FIDO Alliance1.3K views
YubiOnが目指す未来 by FIDO Alliance
YubiOnが目指す未来YubiOnが目指す未来
YubiOnが目指す未来
FIDO Alliance374 views
FIDO2導入してみたを考えてみた by FIDO Alliance
FIDO2導入してみたを考えてみたFIDO2導入してみたを考えてみた
FIDO2導入してみたを考えてみた
FIDO Alliance1.5K views
中小企業によるFIDO導入事例 by FIDO Alliance
中小企業によるFIDO導入事例中小企業によるFIDO導入事例
中小企業によるFIDO導入事例
FIDO Alliance1.3K views
VPNはもう卒業!FIDO2認証で次世代リモートアクセス by FIDO Alliance
VPNはもう卒業!FIDO2認証で次世代リモートアクセスVPNはもう卒業!FIDO2認証で次世代リモートアクセス
VPNはもう卒業!FIDO2認証で次世代リモートアクセス
FIDO Alliance1.8K views
CloudGate UNOで安全便利なパスワードレスリモートワーク by FIDO Alliance
CloudGate UNOで安全便利なパスワードレスリモートワークCloudGate UNOで安全便利なパスワードレスリモートワーク
CloudGate UNOで安全便利なパスワードレスリモートワーク
FIDO Alliance951 views
数々の実績:迅速なFIDO認証の展開をサポート by FIDO Alliance
数々の実績:迅速なFIDO認証の展開をサポート数々の実績:迅速なFIDO認証の展開をサポート
数々の実績:迅速なFIDO認証の展開をサポート
FIDO Alliance1.1K views
FIDO Alliance Research: Consumer Attitudes Towards Authentication by FIDO Alliance
FIDO Alliance Research: Consumer Attitudes Towards AuthenticationFIDO Alliance Research: Consumer Attitudes Towards Authentication
FIDO Alliance Research: Consumer Attitudes Towards Authentication
FIDO Alliance571 views
Webinar: Securing IoT with FIDO Authentication by FIDO Alliance
Webinar: Securing IoT with FIDO AuthenticationWebinar: Securing IoT with FIDO Authentication
Webinar: Securing IoT with FIDO Authentication
FIDO Alliance1.9K views
20200303 ISR プライベートセミナー:パスワードのいらない世界へ by FIDO Alliance
20200303 ISR プライベートセミナー:パスワードのいらない世界へ20200303 ISR プライベートセミナー:パスワードのいらない世界へ
20200303 ISR プライベートセミナー:パスワードのいらない世界へ
FIDO Alliance770 views

Recently uploaded

Optimizing Communication to Optimize Human Behavior - LCBM by
Optimizing Communication to Optimize Human Behavior - LCBMOptimizing Communication to Optimize Human Behavior - LCBM
Optimizing Communication to Optimize Human Behavior - LCBMYaman Kumar
38 views49 slides
Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit... by
Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit...Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit...
Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit...ShapeBlue
162 views25 slides
The Power of Heat Decarbonisation Plans in the Built Environment by
The Power of Heat Decarbonisation Plans in the Built EnvironmentThe Power of Heat Decarbonisation Plans in the Built Environment
The Power of Heat Decarbonisation Plans in the Built EnvironmentIES VE
84 views20 slides
Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ... by
Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ...Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ...
Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ...ShapeBlue
129 views10 slides
Webinar : Desperately Seeking Transformation - Part 2: Insights from leading... by
Webinar : Desperately Seeking Transformation - Part 2:  Insights from leading...Webinar : Desperately Seeking Transformation - Part 2:  Insights from leading...
Webinar : Desperately Seeking Transformation - Part 2: Insights from leading...The Digital Insurer
91 views52 slides
KVM Security Groups Under the Hood - Wido den Hollander - Your.Online by
KVM Security Groups Under the Hood - Wido den Hollander - Your.OnlineKVM Security Groups Under the Hood - Wido den Hollander - Your.Online
KVM Security Groups Under the Hood - Wido den Hollander - Your.OnlineShapeBlue
225 views19 slides

Recently uploaded(20)

Optimizing Communication to Optimize Human Behavior - LCBM by Yaman Kumar
Optimizing Communication to Optimize Human Behavior - LCBMOptimizing Communication to Optimize Human Behavior - LCBM
Optimizing Communication to Optimize Human Behavior - LCBM
Yaman Kumar38 views
Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit... by ShapeBlue
Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit...Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit...
Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit...
ShapeBlue162 views
The Power of Heat Decarbonisation Plans in the Built Environment by IES VE
The Power of Heat Decarbonisation Plans in the Built EnvironmentThe Power of Heat Decarbonisation Plans in the Built Environment
The Power of Heat Decarbonisation Plans in the Built Environment
IES VE84 views
Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ... by ShapeBlue
Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ...Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ...
Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ...
ShapeBlue129 views
Webinar : Desperately Seeking Transformation - Part 2: Insights from leading... by The Digital Insurer
Webinar : Desperately Seeking Transformation - Part 2:  Insights from leading...Webinar : Desperately Seeking Transformation - Part 2:  Insights from leading...
Webinar : Desperately Seeking Transformation - Part 2: Insights from leading...
KVM Security Groups Under the Hood - Wido den Hollander - Your.Online by ShapeBlue
KVM Security Groups Under the Hood - Wido den Hollander - Your.OnlineKVM Security Groups Under the Hood - Wido den Hollander - Your.Online
KVM Security Groups Under the Hood - Wido den Hollander - Your.Online
ShapeBlue225 views
"Node.js Development in 2024: trends and tools", Nikita Galkin by Fwdays
"Node.js Development in 2024: trends and tools", Nikita Galkin "Node.js Development in 2024: trends and tools", Nikita Galkin
"Node.js Development in 2024: trends and tools", Nikita Galkin
Fwdays33 views
The Role of Patterns in the Era of Large Language Models by Yunyao Li
The Role of Patterns in the Era of Large Language ModelsThe Role of Patterns in the Era of Large Language Models
The Role of Patterns in the Era of Large Language Models
Yunyao Li91 views
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda... by ShapeBlue
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...
ShapeBlue164 views
VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlue by ShapeBlue
VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlueVNF Integration and Support in CloudStack - Wei Zhou - ShapeBlue
VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlue
ShapeBlue207 views
Business Analyst Series 2023 - Week 4 Session 8 by DianaGray10
Business Analyst Series 2023 -  Week 4 Session 8Business Analyst Series 2023 -  Week 4 Session 8
Business Analyst Series 2023 - Week 4 Session 8
DianaGray10145 views
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f... by TrustArc
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc176 views
Initiating and Advancing Your Strategic GIS Governance Strategy by Safe Software
Initiating and Advancing Your Strategic GIS Governance StrategyInitiating and Advancing Your Strategic GIS Governance Strategy
Initiating and Advancing Your Strategic GIS Governance Strategy
Safe Software184 views
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlue by ShapeBlue
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlueCloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlue
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlue
ShapeBlue137 views
NTGapps NTG LowCode Platform by Mustafa Kuğu
NTGapps NTG LowCode Platform NTGapps NTG LowCode Platform
NTGapps NTG LowCode Platform
Mustafa Kuğu437 views
Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ... by ShapeBlue
Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ...Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ...
Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ...
ShapeBlue120 views
DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti... by ShapeBlue
DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti...DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti...
DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti...
ShapeBlue141 views
"Surviving highload with Node.js", Andrii Shumada by Fwdays
"Surviving highload with Node.js", Andrii Shumada "Surviving highload with Node.js", Andrii Shumada
"Surviving highload with Node.js", Andrii Shumada
Fwdays58 views
Developments to CloudStack’s SDN ecosystem: Integration with VMWare NSX 4 - P... by ShapeBlue
Developments to CloudStack’s SDN ecosystem: Integration with VMWare NSX 4 - P...Developments to CloudStack’s SDN ecosystem: Integration with VMWare NSX 4 - P...
Developments to CloudStack’s SDN ecosystem: Integration with VMWare NSX 4 - P...
ShapeBlue196 views
"Package management in monorepos", Zoltan Kochan by Fwdays
"Package management in monorepos", Zoltan Kochan"Package management in monorepos", Zoltan Kochan
"Package management in monorepos", Zoltan Kochan
Fwdays34 views

The Value of FIDO Certification

  • 1. All Rights Reserved | FIDO Alliance | Copyright 2018 FIDO Certification Programs
  • 2. 2 AGENDA • The Value of FIDO Certification • FIDO Certification Programs • Functional • Authenticator • Biometric • Getting Started Dr. Rae Hayward, Certification Director, FIDO Alliance
  • 3. All Rights Reserved | FIDO Alliance | Copyright 20183 BENEFITS TO CERTIFICATION Validation Interoperability Rigorous testing Trust Competitive edge Market expansion
  • 4. All Rights Reserved | FIDO Alliance | Copyright 20184 FIDO CERTIFIED ECOSYSTEM (SAMPLE) PHONES & PCs Over 525 FIDO Certified Solutions Available Today SECURITY KEYS CLOUD/SERVER SOLUTIONS
  • 5. 5 FIDO METADATA SERVICE • Web-based tool where FIDO authenticator vendors can publish metadata statements for FIDO servers to download • Provides organizations deploying FIDO servers with a centralized and trusted source of information about FIDO authenticators • Validate the integrity of a device population by periodically downloading a digitally signed metadata to verify individual metadata statements All Rights Reserved | FIDO Alliance | Copyright 2018
  • 6. All Rights Reserved | FIDO Alliance | Copyright 20186
  • 7. 7 AGENDA • The Value of FIDO Certification • FIDO Certification Programs • Functional • Authenticator • Biometric • Getting Started
  • 8. FUNCTIONAL CERTIFICATION • Available to members and non-members • Measures compliance among products and services that support FIDO specifications • Validates interoperability within the ecosystem • Certify products such as authenticators, servers, clients, and combos All Rights Reserved | FIDO Alliance | Copyright 2018
  • 9. All Rights Reserved | FIDO Alliance | Copyright 2018 9 INTEROP TESTING OVERVIEW • Existing Process – Interop Testing Events • Interop every 90 days • Plan ahead! May impact product schedules… • New Process – On Demand Testing • Pick your testing date from a calendar • Servers: remote / virtual testing • Authenticators: ship device or in-person testing • Convenience and fast turn-around FIOD Testing Virtual Shipped In-Person Interop Events
  • 10. All Rights Reserved | FIDO Alliance | Copyright 2018 10 FIDO AUTHENTICATOR CERTIFICATION • The FIDO Authenticator Certification Program validates that Authenticators conform to the FIDO specifications (UAF/U2F/FIDO2) and allows vendors to certify the security characteristics of their implementations • After completing certification, vendors may use the FIDO logo on their products
  • 11. 11 A COMPREHENSIVE SET OF LEVELS FOR ALL USES CASES SAMPLE DEVICE HARDWARE & SOFTWARE REQUIREMENTS DEFENDS AGAINST Protection against chip fault injection, invasive attacks… L3+ Captured devices (chip-level attacks) Circuit board potting, package on package memory, encrypted RAM… L3 Captured devices (circuit board level attacks) Restricted Operating Environment (ROE) (e.g., TEE or Secure Element in a phone, USB token or Smart Card which are intrinsically ROEs, other…) L2+ Device OS compromise (defended by ROE) L2 Any device HW or SW L1+ Device OS compromise (defended by white-box cryptography) L1 Phishing, server credential breaches & MiTM attacks (better than passwords)
  • 12. All Rights Reserved | FIDO Alliance | Copyright 201812 LEVEL 1 Examples • Android or IoS applications • Platform built-in authenticators • Level 2- or Level 3-capable authenticators that yet been certified at Level 2 or Level 3 Certification Process Vendor documents their design in detail L1+ only: Evaluation by FIDO-accredited lab, penetration testing (L1+ program still in development) Evaluation by FIDO Alliance Security Secretariat • Better than passwords • FIDO is unfishable and biometrics are more convenient • Keys and biometric templates are protected similar to passwords stored by a browser or password manager app • Requires best facilities offered by hosting OS • L1+ adds white-box cryptography (obfuscation and other techniques) to defend against compromise of hosting OS
  • 13. All Rights Reserved | FIDO Alliance | Copyright 201813 LEVEL 2 In addition to L1 • A restricted operating environment like a TEE gives security even if OS is compromised. • Separate USB, BLE and NFC authenticators are considered to use a restricted operating environment • Gives defense against larger scale attacks • Additional assurance at L2+ Certification Process Vendor documents their design in detail L2+ only: Vendor submits source code (L2+ program still in development) Evaluation by a FIDO-accredited lab L2+ only: Attack potential calculation, pen testing Examples • Android apps using FIDO Level 2 certified phone (there aren’t any yet) • USB, BLE and NFC Security Keys • Level 3-capable authenticators that haven’t yet been certified at Level 3
  • 14. All Rights Reserved | FIDO Alliance | Copyright 201814 LEVEL 3 In addition to L2 • Defends against physically captured authenticators • Defenses against disassembling, probing, glitch and other such physical attacks • L3+ adds defense against chip-level physical attacks, such as decapping and probing the chip Certification Process Vendor documents their design in detail Vendor submits source code Evaluation by a FIDO-accredited lab (L3, L3+) Attack potential calculation and penetration testing L3+ only: Higher attack potential requirements Examples • USB, BLE and NFC Security Keys using Secure Elements or other means of defending HW attacks • In some case phone or platform authenticators may achieve L3, but is difficult
  • 15. All Rights Reserved | FIDO Alliance | Copyright 201815 COMPANION PROGRAMS Re use as much as possible from other programs like Common Criteria • Reduces time, effort and cost of certification for authenticator vendors, sometimes by quite a lot Companion programs never cover all FIDO requirements; they were not developed specifically for authenticators • Even with advanced companion programs, vendors will have to go through additional certification with the FIDO Alliance Companion Program FIDO Security Level Program Status Common Criteria AVA_VAN 3 L3 Operating Common Criteria AVA_VAN 4 L3+ Operating FIPS L2+, L3 In development Global Platform TEE Protection Profile L2+ In development Authentication- specific Companion program AllFIDOSecurityRequirements End-device configuration Cryptographic algorithms FIDOSpecific
  • 16. All Rights Reserved | FIDO Alliance | Copyright 201816 FIDO ACCREDITED LABS L2 L3, L3+ All labs that do FIDO certification must pass accreditation by the FIDO Alliance Biometric
  • 17. All Rights Reserved | FIDO Alliance | Copyright 201817 EXPIRATION, DERIVATIVE & DELTA CERTIFICATION xPhone Asteroid1 32GB Authenticator v1 xPhone Asteroid1 64GB Authenticator v1 xPhone Asteroid2 32GB Authenticator v1 xPhone Asteroid3 32GB Authenticator v2 Security Requirements 1.2 Security Requirements 1.3 xPhone Asteroid1 64GB Authenticator v1 Delta Certification • When the FIDO functionality changes • Recertification against new requirements • After fix to close a vulnerability • Reevaluation of security is required Derivative certification • No change to FIDO functionality allowed • Surrounding functionality may change • Packaging & product name may change • No re evaluation of security No Expiration • Certification of a given product never expires • Recertification against new versions of the requirements is optional Derivative Delta Derivative Delta xPhone Asteroid1 64GB Authenticator v1.1 (fixed) Delta
  • 18. FIDO Alliance | All Rights Reserved | Copyright 201818 FIDO BIOMETRIC CERTIFICATION The FIDO Biometric Certification Program is intended to certify biometric components and/or subsystems and is independent from Authenticator Certification Program
  • 19. 19 BIOMETRIC AND AUTHENTICATOR CERTIFICATION Using a Certified Biometric Subcomponent: • Optional for Authenticators using a Biometric at L1-L2. • The Security Requirements enforce Biometric Certification of the biometric at L3 and higher when a biometric is used in the authenticator. • Once L2+ is finalized Biometric Certification will also be required • Results in a “FIDO Certified” Authenticator
  • 20. 20 BIOMETRIC DEFINITIONS • False Accept Rate (FAR): The proportion of verification transactions with wrongful claims of identity that are incorrectly confirmed • The requirement of less than 1:10,000 for the upper bound of a 80% confidence interval • False Reject Rate (FRR): The proportion of verification transactions with truthful claims of identity that are incorrectly denied • the requirement of less than 3:100 for the upper bound of a 80% confidence interval • Impostor Attack Presentation Match Rate (IAPMR): Proportion of presentation attacks in which the target reference is matched • evaluation measures the Impostor Attack Presentation Match Rate for each presentation attack type, as defined in ISO 30107 Part 3
  • 21. FIDO Alliance | All Rights Reserved | Copyright 201821 SELF-ATTESTATION - OPTIONAL Biometric Requirements: • False Accept Rate (FAR): The vendor SHALL attest to an FAR of [1:25,000 or 1:50,000 or 1:75,000 or 1:100,000] at an FRR of 3% or less. • False Reject Rate (FRR): The vendor SHALL attest to an FRR at no greater than 3% as measured when determining the self-attested FAR. In other words, self attestation for FRR is only possible when self attesting for FAR. NOTE: Self-attestation for FAR and FRR shall be supported by test data and documented in a report submitted to lab from vendor.
  • 22. 22 AGENDA • The Value of FIDO Certification • FIDO Certification Programs • Functional • Authenticator • Biometric • Getting Started
  • 23. All Rights Reserved | FIDO Alliance | Copyright 201623 GETTING STARTED: FUNCTIONAL CERTIFICATION Register for Self-Conformance Test Tool Access : https://fidoalliance.org/test-tool-access-request/ • For UAF, you will need to complete both automated and manual testing • UAF Authenticators only will need a Vendor ID: http://fidoalliance.org/vendor-id-request/ Complete Self-Conformance Testing at least two weeks prior to interoperability event. Elect to Participate in Pre-Testing in the two weeks prior to the interoperability event (recommended) Register for and attend the next interoperability event: https://fidoalliance.org/interop-registration/ Next Interoperability Event Host: Seoul, S. Korea, 12-15 November 2018 (Location TBD). Registration is open.
  • 25. All Rights Reserved | FIDO Alliance | Copyright 201825 GETTING STARTED – BIOMETRIC CERTIFICATION Apply for Biometric component certification • Request an account: https://fidoalliance.org/certification/certification- account-request/ Select an Accredited Biometric Lab and agree to terms for testing • Biometric Accredited Lab list: https://fidoalliance.org/fido-accredited-biometric-laboratories/
  • 26. All Rights Reserved | FIDO Alliance | Copyright 201826 BIOMETRIC SUBCOMPONENT TESTING
  • 27. FIDO Alliance | All Rights Reserved | Copyright 2018 27 ALLOWED INTEGRATION DOCUMENT • Developed by vendor and submitted to lab • Used to document changes necessary to accommodate integration with authenticator • Must include explanation of possible software and hardware changes
  • 28. All Rights Reserved | FIDO Alliance | Copyright 201828 TESTING STEP 2: AUTHENTICATOR
  • 29. All Rights Reserved | FIDO Alliance | Copyright 201829 Connect with FIDO fidoalliance.org