SlideShare a Scribd company logo
1 of 24
© FIDO Alliance 2021
1
WEBINAR
© FIDO Alliance 2021
2
© FIDO Alliance 2021
Today’s Speakers
Dr. Rae Rivera
Director of Certification
FIDO Alliance
Megan Shamas
Director of Marketing &
Chief Question Asker
FIDO Alliance
© FIDO Alliance 2021
© FIDO Alliance 2021
Standardization for
industry
Market
differentiation
Regulatory
requirement
Consumer
protection
© FIDO Alliance 2021
FIDO’s Perspective
© FIDO Alliance 2021
© FIDO Alliance 2021
Stand out against competition
Increased product rigor
Competitive edge
© FIDO Alliance 2021
INDUSTRY
REQUIREMENT
MEETS COMPLIANCE
ASPECTS
VALIDATED IN
MARKET
© FIDO Alliance 2021
Confidence in
product quality
Security and
trust
Informed
purchases
Product rigor
© FIDO Alliance 2021
FIDOCertificationProgram
© FIDO Alliance 2021
12
© FIDO Alliance 2021
Functional Certification
Conformance Test Validation
• Validates product against
specification
Interoperability
• Validates implementability of
product in the marketplace
© FIDO Alliance 2021
•
•
•
14
© FIDO Alliance 2021
15
Functional
Certification
Security
Evaluation
Authenticator
Certification
© FIDO Alliance 2021
Vendor
Questionnaire
Test
Procedures
Secretariat or
Lab
Evaluation
© FIDO Alliance 2021
17
AUTHENTICATOR SECURITY LEVELS
Level 1
• Basic authenticator security
• Software based solutions
Level 2
• Adds Allowed Restricted Operating Requirement (AROE)
• Increased assurances based on the AROE
Level 3
• All requirements of level 1 and 2, with added assurances
related to hardware protections
• Companion Program required
© FIDO Alliance 2021
18
© FIDO Alliance 2021
19
© FIDO Alliance 2021
20
What is tested?
• False Accept Rate (FAR)
• False Reject Rate (FRR)
• Presentation Attack Detection (PAD)
• Program includes Self-attestation (validated based on vendor test data)
Using a Certified Biometric Subcomponent:
• Optional for Authenticators using a Biometric at L1-L2.
• The Security Requirements enforce Biometric Certification of the
biometric at L3 and higher when a biometric is used in the authenticator.
• Once L2+ is finalized Biometric Certification will also be required
• Results in a “FIDO Certified” Authenticator
© FIDO Alliance 2021
21
© FIDO Alliance 2021
22
© FIDO Alliance 2021
Thank you
© FIDO Alliance 2021
Ask FIDO Anything
Dr. Rae Rivera
Director of Certification
FIDO Alliance
Megan Shamas
Director of Marketing &
Chief Question Asker
FIDO Alliance

More Related Content

What's hot

Webinar: Catch Up with FIDO Plus AMA Session
Webinar: Catch Up with FIDO Plus AMA SessionWebinar: Catch Up with FIDO Plus AMA Session
Webinar: Catch Up with FIDO Plus AMA SessionFIDO Alliance
 
Fido Security Key
Fido Security KeyFido Security Key
Fido Security KeyGoTrust ID
 
Consumer Authentication Trends in APAC
Consumer Authentication Trends in APACConsumer Authentication Trends in APAC
Consumer Authentication Trends in APACFIDO Alliance
 
FIDO and Adaptive Authentication
FIDO and Adaptive AuthenticationFIDO and Adaptive Authentication
FIDO and Adaptive AuthenticationFIDO Alliance
 
Authenticate 2021: Welcome Address
Authenticate 2021: Welcome AddressAuthenticate 2021: Welcome Address
Authenticate 2021: Welcome AddressFIDO Alliance
 
FIDO & PSD2 – Achieving Strong Customer Authentication Compliance
FIDO & PSD2 – Achieving Strong Customer Authentication ComplianceFIDO & PSD2 – Achieving Strong Customer Authentication Compliance
FIDO & PSD2 – Achieving Strong Customer Authentication ComplianceFIDO Alliance
 
The Value of FIDO Certification
The Value of FIDO CertificationThe Value of FIDO Certification
The Value of FIDO CertificationFIDO Alliance
 
Market Study on Mobile Authentication
Market Study on Mobile AuthenticationMarket Study on Mobile Authentication
Market Study on Mobile AuthenticationFIDO Alliance
 
Normalization of Security Key User Experience
Normalization of Security Key User ExperienceNormalization of Security Key User Experience
Normalization of Security Key User ExperienceFIDO Alliance
 
U2F Tutorial - Authentication Tokens for Enterprise and Consumers
U2F Tutorial - Authentication Tokens for Enterprise and ConsumersU2F Tutorial - Authentication Tokens for Enterprise and Consumers
U2F Tutorial - Authentication Tokens for Enterprise and ConsumersFIDO Alliance
 
FIDO Authentication in a Mobile Network
FIDO Authentication in a Mobile NetworkFIDO Authentication in a Mobile Network
FIDO Authentication in a Mobile NetworkFIDO Alliance
 
Lifecycle Consideration for Security Key Deployments
Lifecycle Consideration for Security Key DeploymentsLifecycle Consideration for Security Key Deployments
Lifecycle Consideration for Security Key DeploymentsFIDO Alliance
 
Javelin Research 2017 State of Authentication Report
Javelin Research 2017 State of Authentication ReportJavelin Research 2017 State of Authentication Report
Javelin Research 2017 State of Authentication ReportFIDO Alliance
 
FIDO Authentication Technical Overview
FIDO Authentication Technical OverviewFIDO Authentication Technical Overview
FIDO Authentication Technical OverviewFIDO Alliance
 
FIDO and the Future of User Authentication
FIDO and the Future of User AuthenticationFIDO and the Future of User Authentication
FIDO and the Future of User AuthenticationFIDO Alliance
 
Technical Principles of FIDO Authentication
Technical Principles of FIDO AuthenticationTechnical Principles of FIDO Authentication
Technical Principles of FIDO AuthenticationFIDO Alliance
 
Using FIDO Authenticator for IoT Devices
Using FIDO Authenticator for IoT DevicesUsing FIDO Authenticator for IoT Devices
Using FIDO Authenticator for IoT DevicesFIDO Alliance
 
Global Regulatory Landscape for Strong Authentication
Global Regulatory Landscape for Strong AuthenticationGlobal Regulatory Landscape for Strong Authentication
Global Regulatory Landscape for Strong AuthenticationFIDO Alliance
 

What's hot (20)

Webinar: Catch Up with FIDO Plus AMA Session
Webinar: Catch Up with FIDO Plus AMA SessionWebinar: Catch Up with FIDO Plus AMA Session
Webinar: Catch Up with FIDO Plus AMA Session
 
Fido Security Key
Fido Security KeyFido Security Key
Fido Security Key
 
Consumer Authentication Trends in APAC
Consumer Authentication Trends in APACConsumer Authentication Trends in APAC
Consumer Authentication Trends in APAC
 
FIDO and Adaptive Authentication
FIDO and Adaptive AuthenticationFIDO and Adaptive Authentication
FIDO and Adaptive Authentication
 
Authenticate 2021: Welcome Address
Authenticate 2021: Welcome AddressAuthenticate 2021: Welcome Address
Authenticate 2021: Welcome Address
 
FIDO & PSD2 – Achieving Strong Customer Authentication Compliance
FIDO & PSD2 – Achieving Strong Customer Authentication ComplianceFIDO & PSD2 – Achieving Strong Customer Authentication Compliance
FIDO & PSD2 – Achieving Strong Customer Authentication Compliance
 
The State of FIDO
The State of FIDOThe State of FIDO
The State of FIDO
 
The Value of FIDO Certification
The Value of FIDO CertificationThe Value of FIDO Certification
The Value of FIDO Certification
 
FIDO2 & Microsoft
FIDO2 & MicrosoftFIDO2 & Microsoft
FIDO2 & Microsoft
 
Market Study on Mobile Authentication
Market Study on Mobile AuthenticationMarket Study on Mobile Authentication
Market Study on Mobile Authentication
 
Normalization of Security Key User Experience
Normalization of Security Key User ExperienceNormalization of Security Key User Experience
Normalization of Security Key User Experience
 
U2F Tutorial - Authentication Tokens for Enterprise and Consumers
U2F Tutorial - Authentication Tokens for Enterprise and ConsumersU2F Tutorial - Authentication Tokens for Enterprise and Consumers
U2F Tutorial - Authentication Tokens for Enterprise and Consumers
 
FIDO Authentication in a Mobile Network
FIDO Authentication in a Mobile NetworkFIDO Authentication in a Mobile Network
FIDO Authentication in a Mobile Network
 
Lifecycle Consideration for Security Key Deployments
Lifecycle Consideration for Security Key DeploymentsLifecycle Consideration for Security Key Deployments
Lifecycle Consideration for Security Key Deployments
 
Javelin Research 2017 State of Authentication Report
Javelin Research 2017 State of Authentication ReportJavelin Research 2017 State of Authentication Report
Javelin Research 2017 State of Authentication Report
 
FIDO Authentication Technical Overview
FIDO Authentication Technical OverviewFIDO Authentication Technical Overview
FIDO Authentication Technical Overview
 
FIDO and the Future of User Authentication
FIDO and the Future of User AuthenticationFIDO and the Future of User Authentication
FIDO and the Future of User Authentication
 
Technical Principles of FIDO Authentication
Technical Principles of FIDO AuthenticationTechnical Principles of FIDO Authentication
Technical Principles of FIDO Authentication
 
Using FIDO Authenticator for IoT Devices
Using FIDO Authenticator for IoT DevicesUsing FIDO Authenticator for IoT Devices
Using FIDO Authenticator for IoT Devices
 
Global Regulatory Landscape for Strong Authentication
Global Regulatory Landscape for Strong AuthenticationGlobal Regulatory Landscape for Strong Authentication
Global Regulatory Landscape for Strong Authentication
 

Similar to Ask FIDO About Anything: Certification

FIDO Certified Program: Status & Futures
FIDO Certified Program: Status & FuturesFIDO Certified Program: Status & Futures
FIDO Certified Program: Status & FuturesFIDO Alliance
 
Introduction+to+OCI+ppt_0322.pdf
Introduction+to+OCI+ppt_0322.pdfIntroduction+to+OCI+ppt_0322.pdf
Introduction+to+OCI+ppt_0322.pdfNandiniSinghal16
 
Software Quality as a Competitive Differentiator
Software Quality as a Competitive Differentiator Software Quality as a Competitive Differentiator
Software Quality as a Competitive Differentiator DevOps.com
 
Navigating the Path to BIS Registration & Certification in India
Navigating the Path to BIS Registration & Certification in IndiaNavigating the Path to BIS Registration & Certification in India
Navigating the Path to BIS Registration & Certification in IndiaPranshuCorpseed
 
ISO 22222 Information Sheet
ISO 22222 Information SheetISO 22222 Information Sheet
ISO 22222 Information SheetMichelle Hoskin
 
ISO 22222 Information Sheet
ISO 22222 Information SheetISO 22222 Information Sheet
ISO 22222 Information SheetMichelle Hoskin
 
Intertek Corporate Brochure 2012
Intertek Corporate Brochure 2012Intertek Corporate Brochure 2012
Intertek Corporate Brochure 2012ericris
 
Intertek corporate brochure 2012
Intertek corporate brochure 2012Intertek corporate brochure 2012
Intertek corporate brochure 2012ericris
 
How to Master Product-Led Growth Strategy in B2B by Gainsight CTO
How to Master Product-Led Growth Strategy in B2B by Gainsight CTOHow to Master Product-Led Growth Strategy in B2B by Gainsight CTO
How to Master Product-Led Growth Strategy in B2B by Gainsight CTOProduct School
 
FIDO Alliance Webinar: Catch Up WIth FIDO
FIDO Alliance Webinar: Catch Up WIth FIDOFIDO Alliance Webinar: Catch Up WIth FIDO
FIDO Alliance Webinar: Catch Up WIth FIDOFIDO Alliance
 
Software Quality as a Competitive Differentiator
Software Quality as a Competitive Differentiator Software Quality as a Competitive Differentiator
Software Quality as a Competitive Differentiator DevOps.com
 
Vidyo’s Leadership in Healthcare and Financial Services Recognized by Frost &...
Vidyo’s Leadership in Healthcare and Financial Services Recognized by Frost &...Vidyo’s Leadership in Healthcare and Financial Services Recognized by Frost &...
Vidyo’s Leadership in Healthcare and Financial Services Recognized by Frost &...Vidyo, Inc.
 
FIDO - The Value of Membership
FIDO -  The Value of Membership FIDO -  The Value of Membership
FIDO - The Value of Membership FIDO Alliance
 
Risk & Reward: Protecting IP and Growing Revenue with Product Authentication ...
Risk & Reward: Protecting IP and Growing Revenue with Product Authentication ...Risk & Reward: Protecting IP and Growing Revenue with Product Authentication ...
Risk & Reward: Protecting IP and Growing Revenue with Product Authentication ...Authentic Vision
 
Silica Ramming Mass Manufacturing Plant Project Report.pptx
Silica Ramming Mass Manufacturing Plant Project Report.pptxSilica Ramming Mass Manufacturing Plant Project Report.pptx
Silica Ramming Mass Manufacturing Plant Project Report.pptxsurajimarc0777
 
PVC Blister Packaging Manufacturing Plant Project Report.pptx
PVC Blister Packaging Manufacturing Plant Project Report.pptxPVC Blister Packaging Manufacturing Plant Project Report.pptx
PVC Blister Packaging Manufacturing Plant Project Report.pptxsurajimarc0777
 
Alineación de requerimientos y pruebas de software
Alineación de requerimientos y pruebas de softwareAlineación de requerimientos y pruebas de software
Alineación de requerimientos y pruebas de softwareSoftware Guru
 

Similar to Ask FIDO About Anything: Certification (20)

FIDO Certified Program: Status & Futures
FIDO Certified Program: Status & FuturesFIDO Certified Program: Status & Futures
FIDO Certified Program: Status & Futures
 
Introduction+to+OCI+ppt_0322.pdf
Introduction+to+OCI+ppt_0322.pdfIntroduction+to+OCI+ppt_0322.pdf
Introduction+to+OCI+ppt_0322.pdf
 
Software Quality as a Competitive Differentiator
Software Quality as a Competitive Differentiator Software Quality as a Competitive Differentiator
Software Quality as a Competitive Differentiator
 
Navigating the Path to BIS Registration & Certification in India
Navigating the Path to BIS Registration & Certification in IndiaNavigating the Path to BIS Registration & Certification in India
Navigating the Path to BIS Registration & Certification in India
 
ISO 22222 Information Sheet
ISO 22222 Information SheetISO 22222 Information Sheet
ISO 22222 Information Sheet
 
ISO 22222 Information Sheet
ISO 22222 Information SheetISO 22222 Information Sheet
ISO 22222 Information Sheet
 
Intertek Corporate Brochure 2012
Intertek Corporate Brochure 2012Intertek Corporate Brochure 2012
Intertek Corporate Brochure 2012
 
Intertek corporate brochure 2012
Intertek corporate brochure 2012Intertek corporate brochure 2012
Intertek corporate brochure 2012
 
Systematically Creating Superior Products
Systematically Creating Superior ProductsSystematically Creating Superior Products
Systematically Creating Superior Products
 
How to Master Product-Led Growth Strategy in B2B by Gainsight CTO
How to Master Product-Led Growth Strategy in B2B by Gainsight CTOHow to Master Product-Led Growth Strategy in B2B by Gainsight CTO
How to Master Product-Led Growth Strategy in B2B by Gainsight CTO
 
Pidilite.pptx
Pidilite.pptxPidilite.pptx
Pidilite.pptx
 
FIDO Alliance Webinar: Catch Up WIth FIDO
FIDO Alliance Webinar: Catch Up WIth FIDOFIDO Alliance Webinar: Catch Up WIth FIDO
FIDO Alliance Webinar: Catch Up WIth FIDO
 
FIDO Certification
FIDO CertificationFIDO Certification
FIDO Certification
 
Software Quality as a Competitive Differentiator
Software Quality as a Competitive Differentiator Software Quality as a Competitive Differentiator
Software Quality as a Competitive Differentiator
 
Vidyo’s Leadership in Healthcare and Financial Services Recognized by Frost &...
Vidyo’s Leadership in Healthcare and Financial Services Recognized by Frost &...Vidyo’s Leadership in Healthcare and Financial Services Recognized by Frost &...
Vidyo’s Leadership in Healthcare and Financial Services Recognized by Frost &...
 
FIDO - The Value of Membership
FIDO -  The Value of Membership FIDO -  The Value of Membership
FIDO - The Value of Membership
 
Risk & Reward: Protecting IP and Growing Revenue with Product Authentication ...
Risk & Reward: Protecting IP and Growing Revenue with Product Authentication ...Risk & Reward: Protecting IP and Growing Revenue with Product Authentication ...
Risk & Reward: Protecting IP and Growing Revenue with Product Authentication ...
 
Silica Ramming Mass Manufacturing Plant Project Report.pptx
Silica Ramming Mass Manufacturing Plant Project Report.pptxSilica Ramming Mass Manufacturing Plant Project Report.pptx
Silica Ramming Mass Manufacturing Plant Project Report.pptx
 
PVC Blister Packaging Manufacturing Plant Project Report.pptx
PVC Blister Packaging Manufacturing Plant Project Report.pptxPVC Blister Packaging Manufacturing Plant Project Report.pptx
PVC Blister Packaging Manufacturing Plant Project Report.pptx
 
Alineación de requerimientos y pruebas de software
Alineación de requerimientos y pruebas de softwareAlineación de requerimientos y pruebas de software
Alineación de requerimientos y pruebas de software
 

More from FIDO Alliance

Making FIDO Deployments Accessible to Users with Disabilities_slides.pptx
Making FIDO Deployments Accessible to Users with Disabilities_slides.pptxMaking FIDO Deployments Accessible to Users with Disabilities_slides.pptx
Making FIDO Deployments Accessible to Users with Disabilities_slides.pptxFIDO Alliance
 
Welcome and FIDO Update.pptx
Welcome and FIDO Update.pptxWelcome and FIDO Update.pptx
Welcome and FIDO Update.pptxFIDO Alliance
 
CISA - More Than A Password.pptx
CISA - More Than A Password.pptxCISA - More Than A Password.pptx
CISA - More Than A Password.pptxFIDO Alliance
 
Workshop-Demo Breakdown.pptx
Workshop-Demo Breakdown.pptxWorkshop-Demo Breakdown.pptx
Workshop-Demo Breakdown.pptxFIDO Alliance
 
IBM - Hey FIDO, Meet Passkey!.pptx
IBM - Hey FIDO, Meet Passkey!.pptxIBM - Hey FIDO, Meet Passkey!.pptx
IBM - Hey FIDO, Meet Passkey!.pptxFIDO Alliance
 
OTIS - Our Journey to Passwordless: Secure Authn & Frictionless User Experien...
OTIS - Our Journey to Passwordless: Secure Authn & Frictionless User Experien...OTIS - Our Journey to Passwordless: Secure Authn & Frictionless User Experien...
OTIS - Our Journey to Passwordless: Secure Authn & Frictionless User Experien...FIDO Alliance
 
The State of Strong Authentication
The State of Strong AuthenticationThe State of Strong Authentication
The State of Strong AuthenticationFIDO Alliance
 

More from FIDO Alliance (8)

Making FIDO Deployments Accessible to Users with Disabilities_slides.pptx
Making FIDO Deployments Accessible to Users with Disabilities_slides.pptxMaking FIDO Deployments Accessible to Users with Disabilities_slides.pptx
Making FIDO Deployments Accessible to Users with Disabilities_slides.pptx
 
Welcome and FIDO Update.pptx
Welcome and FIDO Update.pptxWelcome and FIDO Update.pptx
Welcome and FIDO Update.pptx
 
CISA - More Than A Password.pptx
CISA - More Than A Password.pptxCISA - More Than A Password.pptx
CISA - More Than A Password.pptx
 
Workshop-Demo Breakdown.pptx
Workshop-Demo Breakdown.pptxWorkshop-Demo Breakdown.pptx
Workshop-Demo Breakdown.pptx
 
IBM - Hey FIDO, Meet Passkey!.pptx
IBM - Hey FIDO, Meet Passkey!.pptxIBM - Hey FIDO, Meet Passkey!.pptx
IBM - Hey FIDO, Meet Passkey!.pptx
 
OTIS - Our Journey to Passwordless: Secure Authn & Frictionless User Experien...
OTIS - Our Journey to Passwordless: Secure Authn & Frictionless User Experien...OTIS - Our Journey to Passwordless: Secure Authn & Frictionless User Experien...
OTIS - Our Journey to Passwordless: Secure Authn & Frictionless User Experien...
 
FIDO Masterclass
FIDO MasterclassFIDO Masterclass
FIDO Masterclass
 
The State of Strong Authentication
The State of Strong AuthenticationThe State of Strong Authentication
The State of Strong Authentication
 

Recently uploaded

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 

Ask FIDO About Anything: Certification

  • 1. © FIDO Alliance 2021 1 WEBINAR
  • 3. © FIDO Alliance 2021 Today’s Speakers Dr. Rae Rivera Director of Certification FIDO Alliance Megan Shamas Director of Marketing & Chief Question Asker FIDO Alliance
  • 5. © FIDO Alliance 2021 Standardization for industry Market differentiation Regulatory requirement Consumer protection
  • 6. © FIDO Alliance 2021 FIDO’s Perspective
  • 8. © FIDO Alliance 2021 Stand out against competition Increased product rigor Competitive edge
  • 9. © FIDO Alliance 2021 INDUSTRY REQUIREMENT MEETS COMPLIANCE ASPECTS VALIDATED IN MARKET
  • 10. © FIDO Alliance 2021 Confidence in product quality Security and trust Informed purchases Product rigor
  • 11. © FIDO Alliance 2021 FIDOCertificationProgram
  • 12. © FIDO Alliance 2021 12
  • 13. © FIDO Alliance 2021 Functional Certification Conformance Test Validation • Validates product against specification Interoperability • Validates implementability of product in the marketplace
  • 14. © FIDO Alliance 2021 • • • 14
  • 15. © FIDO Alliance 2021 15 Functional Certification Security Evaluation Authenticator Certification
  • 16. © FIDO Alliance 2021 Vendor Questionnaire Test Procedures Secretariat or Lab Evaluation
  • 17. © FIDO Alliance 2021 17 AUTHENTICATOR SECURITY LEVELS Level 1 • Basic authenticator security • Software based solutions Level 2 • Adds Allowed Restricted Operating Requirement (AROE) • Increased assurances based on the AROE Level 3 • All requirements of level 1 and 2, with added assurances related to hardware protections • Companion Program required
  • 18. © FIDO Alliance 2021 18
  • 19. © FIDO Alliance 2021 19
  • 20. © FIDO Alliance 2021 20 What is tested? • False Accept Rate (FAR) • False Reject Rate (FRR) • Presentation Attack Detection (PAD) • Program includes Self-attestation (validated based on vendor test data) Using a Certified Biometric Subcomponent: • Optional for Authenticators using a Biometric at L1-L2. • The Security Requirements enforce Biometric Certification of the biometric at L3 and higher when a biometric is used in the authenticator. • Once L2+ is finalized Biometric Certification will also be required • Results in a “FIDO Certified” Authenticator
  • 21. © FIDO Alliance 2021 21
  • 22. © FIDO Alliance 2021 22
  • 23. © FIDO Alliance 2021 Thank you
  • 24. © FIDO Alliance 2021 Ask FIDO Anything Dr. Rae Rivera Director of Certification FIDO Alliance Megan Shamas Director of Marketing & Chief Question Asker FIDO Alliance

Editor's Notes

  1. Let me introduce today’s speakers… me, and Andrew Shikiar who is the FIDO Alliance executive director and chief marketing officer
  2. Functional Testing –compliant and conformant Interoperability testing
  3. We are seeing an increase in relying parties requesting products to be FIDO Certified, including specific level requirements to meet RP needs.
  4. Government agencies continue to recognize FIDO Certified products in the market. This is seen internationally within the authentication and identity space.
  5. This is a growing area for FIDO Alliance as we have seen with the Login with FIDO gain interest and increase awareness of FIDO products n the marketplace.
  6. Available to members and non-members; servers and SDKs
  7. The FIDO Certification Program is intended to certify FIDO authenticators (e.g. UAF, U2F) against FIDO specifications and some additional security requirements. Level 1 ensures implementations are conformant to the specifications, are interoperable, and meet basic security and privacy considerations. Level 1 is tested by FIDO. Level 2 and above require evaluation and/or testing by a FIDO Accredited Security Laboratory.
  8. Let me introduce today’s speakers… me, and Andrew Shikiar who is the FIDO Alliance executive director and chief marketing officer