SlideShare a Scribd company logo
1 of 14
Jackie Comp,VPWorldwide Sales
FIDO in Action:
Real World Deployment Case Studies
What Experience Do Consumers Want?
NokNokDemos
Today, in most cases hitting “next” brings you to a password…
A Consistent Passwordless Experience Across Any
Channel
NokNokDemos
With Nok Nok’s FIDO solution, you can get rid of passwords
A Consistent Passwordless Experience Across Any
Channel
NokNokDemos
• Same experience in mobile and web applications
• Turn biometrics into 2 factors
2 Examples: Business to Consumer Case Studies
©2018 Nok Nok Labs — Confidential — Do not distribute 5
• 9,000 employees worldwide
• 19 locations in 9 countries
• $6.0 billion in revenue
• 77M+ Million customers
• More than 51K employees worldwide
• Un-carrier CUSTOMER FIRST
philosophy
• Has led the industry in YoY growth for
18 consecutive quarters
©2018 Nok Nok Labs — Confidential — Do not distribute 6
Intuit and T-Mobile
Discuss Their FIDO
Deployments
Journey to Passwordless for Consumers
Phase 1
Mobile First Strategy
(Phase out SMS-OTP)
Phase 2
Add Web Support
Phase 3
Fully Deprecate
Passwords
©2018 Nok Nok Labs — Confidential — Do not distribute 8
Business Goals:
• Mobile first strategy using native
authenticators
• Reduce use of passwords
• Reduce cost of support for login related
issues
• Standardize across brands migrating from
Touch ID to FIDO
• Improve security controls
• Reduce overhead of developing
proprietary approaches
• Leverage best industry standard
• Rapidly support new native device
authenticators and all associated flows
Capabilities Needed:
• FIDO compliant technology
• Support all current and future FIDO protocols
• Private cloud hosting (on premise solution)
• Maintain standard for high availability and
performance
• Industry standards for security controls (e.g.
encryption key rotation)
• Durability: Partner fully invested in FIDO
today and in the future
• Lightweight integration with native apps and
backend services
• Quick turnaround on any required patches
©2018 Nok Nok Labs — Confidential — Do not distribute 9
Implementation Overview:
• Educate internal product teams on new
approach
• Scaled service deployment across multiple
cloud hosting zones and regions to meet
availability requirements
• Integrate risk screening as part of
authentication event
• Scale solution in phases: smaller user base
apps leading to TurboTax
• Controlled user rollout with iOS first
• Require use of FIDO authentication with
upgraded app
Why FIDO:
• Strong, multi-factor security model
• Industry standard, future proof
• Convenience for users
• Lower operational costs
Alternatives Considered:
• Buy versus build (context vs. core)
• Leverage best industry standard (FIDO)
with proven partner
©2018 Nok Nok Labs — Confidential — Do not distribute 10
Results:
• 99.9% % authentication success vs.
80-85% using SMS OTP
• Authentication time reduced by 20%
• No disruption and continued high adoption
rate
• Eliminated development costs of
maintaining proprietary solution
• Platform in place to rapidly support
additional use cases
Next Steps:
• Move to AWS Aurora
• Continue roll out to additional products
• Expand use cases including passwordless
browser login
“We have improved our security controls while providing our customers with
seamless access to their online financial data.”
- Antonio Fuentes, Principal Product Manager
©2018 Nok Nok Labs — Confidential — Do not distribute 11
Business Goals:
• Reduce pain point of passwords on phone
• Increase confidence of right user
• Implement a scalable, future-proof
approach to authentication
Why FIDO:
• Strong, multi-factor authentication and
biometrics
• Industry standard plug and play approach
today and in future
• Public private key pair trust model
• Lower operational costs
Capabilities Needed:
• Universal Server
• Integrate with existing IDP
• Carrier-grade platform and scalability
Alternatives Considered:
• Several evaluated including “Build Your
Own”
• Determined finding a partner to get to
desired state was more cost effective and
minimized risk
©2018 Nok Nok Labs — Confidential — Do not distribute 12
Implementation Overview:
• Design flows for Use Cases
• Determine UX terminology and experience
• Integrate with MyTMO native mobile app
• Integrate with in-house virtualized and
modular Ericsson IAM
• 6 month project from solution design to
launch
• Roll out to users in waves of 1M over 1
month period
• “Soft” push for registration
– remind users once/month 4 times
Results:
• Reduced password resets by 65% to 7%
• 50% adoption in first 5 months with
“soft” rollout
• Supported FaceID Day 1 with no
additional work
• “Flawless” implementation with no
service issues
• Expanding across applications including
authentication to Call Center
©2018 Nok Nok Labs — Confidential — Do not distribute 13
Next Steps:
• Roll out to additional products
• Push notification for quick authentication
into call center
• Leverage Nok Nok/FIDO for user
authentication for cross-carrier initiative
(CCID)
Lessons Learned:
• Important to be clear on which users to
target
• Determine the user experience you want
to accomplish
– Do you provide choice or simplify experience?
– Default to TMOs desired authenticator
“By implementing Nok Nok’s FIDO authentication platform we have achieved our
goal of providing T-Mobile customers a secure, frictionless experience for
accessing our services today and in the future.”
- Michael Engan, Principal Technology Architect
14
Nok Nok
Who’s
There?
Next-Generation Authentication
Simple, Secure

More Related Content

What's hot

FIDO Biometric Certification Program
FIDO Biometric Certification ProgramFIDO Biometric Certification Program
FIDO Biometric Certification ProgramFIDO Alliance
 
FIDO UAF and PKI in Asia: A Case Study and Recommendations
FIDO UAF and PKI in Asia: A Case Study and RecommendationsFIDO UAF and PKI in Asia: A Case Study and Recommendations
FIDO UAF and PKI in Asia: A Case Study and RecommendationsFIDO Alliance
 
FIDO Authentication in Hong Kong
FIDO Authentication in Hong KongFIDO Authentication in Hong Kong
FIDO Authentication in Hong KongFIDO Alliance
 
FIDO Certification Program Updates
FIDO Certification Program UpdatesFIDO Certification Program Updates
FIDO Certification Program UpdatesFIDO Alliance
 
FIDO and the Future of User Authentication
FIDO and the Future of User AuthenticationFIDO and the Future of User Authentication
FIDO and the Future of User AuthenticationFIDO Alliance
 
Ask FIDO About Anything: Certification
Ask FIDO About Anything: CertificationAsk FIDO About Anything: Certification
Ask FIDO About Anything: CertificationFIDO Alliance
 
Market Study on Mobile Authentication
Market Study on Mobile AuthenticationMarket Study on Mobile Authentication
Market Study on Mobile AuthenticationFIDO Alliance
 
Technical Principles of FIDO Authentication
Technical Principles of FIDO AuthenticationTechnical Principles of FIDO Authentication
Technical Principles of FIDO AuthenticationFIDO Alliance
 
Going Passwordless with Microsoft
Going Passwordless with MicrosoftGoing Passwordless with Microsoft
Going Passwordless with MicrosoftFIDO Alliance
 
Go passwordless with fido2
Go passwordless with fido2Go passwordless with fido2
Go passwordless with fido2Rob Dudley
 
FIDO Alliance Webinar: Intuit's Journey with FIDO Authentication
FIDO Alliance Webinar: Intuit's Journey with FIDO AuthenticationFIDO Alliance Webinar: Intuit's Journey with FIDO Authentication
FIDO Alliance Webinar: Intuit's Journey with FIDO AuthenticationFIDO Alliance
 
Lifecycle Consideration for Security Key Deployments
Lifecycle Consideration for Security Key DeploymentsLifecycle Consideration for Security Key Deployments
Lifecycle Consideration for Security Key DeploymentsFIDO Alliance
 
FIDO UAF and PKI in Asia - Case Study and Recommendations
FIDO UAF and PKI in Asia - Case Study and RecommendationsFIDO UAF and PKI in Asia - Case Study and Recommendations
FIDO UAF and PKI in Asia - Case Study and RecommendationsFIDO Alliance
 
The Future is Flying Cars and Digital Driver's Licenses on Our Phones - Scott...
The Future is Flying Cars and Digital Driver's Licenses on Our Phones - Scott...The Future is Flying Cars and Digital Driver's Licenses on Our Phones - Scott...
The Future is Flying Cars and Digital Driver's Licenses on Our Phones - Scott...IdentityNorthEvents
 
Secure Mobile Banking
Secure Mobile BankingSecure Mobile Banking
Secure Mobile BankingVeridium
 
CIS14: Filling the “authentication goes here” Hole in Identity
CIS14: Filling the “authentication goes here” Hole in IdentityCIS14: Filling the “authentication goes here” Hole in Identity
CIS14: Filling the “authentication goes here” Hole in IdentityCloudIDSummit
 
Mobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best PracticesMobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best PracticesCisco Canada
 

What's hot (19)

FIDO Biometric Certification Program
FIDO Biometric Certification ProgramFIDO Biometric Certification Program
FIDO Biometric Certification Program
 
FIDO UAF and PKI in Asia: A Case Study and Recommendations
FIDO UAF and PKI in Asia: A Case Study and RecommendationsFIDO UAF and PKI in Asia: A Case Study and Recommendations
FIDO UAF and PKI in Asia: A Case Study and Recommendations
 
FIDO Authentication in Hong Kong
FIDO Authentication in Hong KongFIDO Authentication in Hong Kong
FIDO Authentication in Hong Kong
 
FIDO Certification Program Updates
FIDO Certification Program UpdatesFIDO Certification Program Updates
FIDO Certification Program Updates
 
FIDO and the Future of User Authentication
FIDO and the Future of User AuthenticationFIDO and the Future of User Authentication
FIDO and the Future of User Authentication
 
Ask FIDO About Anything: Certification
Ask FIDO About Anything: CertificationAsk FIDO About Anything: Certification
Ask FIDO About Anything: Certification
 
Market Study on Mobile Authentication
Market Study on Mobile AuthenticationMarket Study on Mobile Authentication
Market Study on Mobile Authentication
 
WebAuthn & FIDO2
WebAuthn & FIDO2WebAuthn & FIDO2
WebAuthn & FIDO2
 
Technical Principles of FIDO Authentication
Technical Principles of FIDO AuthenticationTechnical Principles of FIDO Authentication
Technical Principles of FIDO Authentication
 
Going Passwordless with Microsoft
Going Passwordless with MicrosoftGoing Passwordless with Microsoft
Going Passwordless with Microsoft
 
Go passwordless with fido2
Go passwordless with fido2Go passwordless with fido2
Go passwordless with fido2
 
FIDO Alliance Webinar: Intuit's Journey with FIDO Authentication
FIDO Alliance Webinar: Intuit's Journey with FIDO AuthenticationFIDO Alliance Webinar: Intuit's Journey with FIDO Authentication
FIDO Alliance Webinar: Intuit's Journey with FIDO Authentication
 
Lifecycle Consideration for Security Key Deployments
Lifecycle Consideration for Security Key DeploymentsLifecycle Consideration for Security Key Deployments
Lifecycle Consideration for Security Key Deployments
 
FIDO UAF and PKI in Asia - Case Study and Recommendations
FIDO UAF and PKI in Asia - Case Study and RecommendationsFIDO UAF and PKI in Asia - Case Study and Recommendations
FIDO UAF and PKI in Asia - Case Study and Recommendations
 
Tatyana-Arnaudova - English
Tatyana-Arnaudova - EnglishTatyana-Arnaudova - English
Tatyana-Arnaudova - English
 
The Future is Flying Cars and Digital Driver's Licenses on Our Phones - Scott...
The Future is Flying Cars and Digital Driver's Licenses on Our Phones - Scott...The Future is Flying Cars and Digital Driver's Licenses on Our Phones - Scott...
The Future is Flying Cars and Digital Driver's Licenses on Our Phones - Scott...
 
Secure Mobile Banking
Secure Mobile BankingSecure Mobile Banking
Secure Mobile Banking
 
CIS14: Filling the “authentication goes here” Hole in Identity
CIS14: Filling the “authentication goes here” Hole in IdentityCIS14: Filling the “authentication goes here” Hole in Identity
CIS14: Filling the “authentication goes here” Hole in Identity
 
Mobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best PracticesMobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best Practices
 

Similar to FIDO in Action: Real World Development Case Studies

Concept of Hybrid Applications
Concept of Hybrid ApplicationsConcept of Hybrid Applications
Concept of Hybrid ApplicationsSkytap Cloud
 
Managing User Experience During Cloud Migrations
Managing User Experience During Cloud MigrationsManaging User Experience During Cloud Migrations
Managing User Experience During Cloud MigrationseG Innovations
 
DevOps for Enterprise Systems : Innovate like a Startup
DevOps for Enterprise Systems : Innovate like a StartupDevOps for Enterprise Systems : Innovate like a Startup
DevOps for Enterprise Systems : Innovate like a StartupDevOps for Enterprise Systems
 
Dronahq one app platform 7.0
Dronahq   one app platform 7.0Dronahq   one app platform 7.0
Dronahq one app platform 7.0Jinen Dedhia
 
Startup InsurTech Award - Galileo Platforms
Startup InsurTech Award - Galileo PlatformsStartup InsurTech Award - Galileo Platforms
Startup InsurTech Award - Galileo PlatformsThe Digital Insurer
 
Deploying FIDO Authentication - Business Considerations
Deploying FIDO Authentication  - Business ConsiderationsDeploying FIDO Authentication  - Business Considerations
Deploying FIDO Authentication - Business ConsiderationsFIDO Alliance
 
IAUG Converge2013 Avaya CEO Kevin Kennedy June 4 2013 Keynote
IAUG Converge2013 Avaya CEO Kevin Kennedy June 4 2013 KeynoteIAUG Converge2013 Avaya CEO Kevin Kennedy June 4 2013 Keynote
IAUG Converge2013 Avaya CEO Kevin Kennedy June 4 2013 KeynoteAvaya Inc.
 
CloudFIT_CSF_in_cloud_aug16
CloudFIT_CSF_in_cloud_aug16CloudFIT_CSF_in_cloud_aug16
CloudFIT_CSF_in_cloud_aug16Dennis. Lee
 
La Digital Transformation ha un nuovo alleato: Value Stream Management
La Digital Transformation ha un nuovo alleato: Value Stream ManagementLa Digital Transformation ha un nuovo alleato: Value Stream Management
La Digital Transformation ha un nuovo alleato: Value Stream ManagementEmerasoft, solutions to collaborate
 
Codestrong 2012 breakout session creating a mobile strategy
Codestrong 2012 breakout session   creating a mobile strategyCodestrong 2012 breakout session   creating a mobile strategy
Codestrong 2012 breakout session creating a mobile strategyAxway Appcelerator
 
corporate (1).ppt
corporate (1).pptcorporate (1).ppt
corporate (1).pptArti Gupta
 
Office 365 Migration
Office 365 MigrationOffice 365 Migration
Office 365 Migrationmicrolandland
 
UniqueSoft Overview
UniqueSoft OverviewUniqueSoft Overview
UniqueSoft Overviewbmskelly
 
Modernizing Applications by Replacing F5 with the NGINX Application Delivery ...
Modernizing Applications by Replacing F5 with the NGINX Application Delivery ...Modernizing Applications by Replacing F5 with the NGINX Application Delivery ...
Modernizing Applications by Replacing F5 with the NGINX Application Delivery ...NGINX, Inc.
 
DevOps Thinking for the Line of Business
DevOps Thinking for the Line of BusinessDevOps Thinking for the Line of Business
DevOps Thinking for the Line of BusinessSanjeev Sharma
 

Similar to FIDO in Action: Real World Development Case Studies (20)

Concept of Hybrid Applications
Concept of Hybrid ApplicationsConcept of Hybrid Applications
Concept of Hybrid Applications
 
Managing User Experience During Cloud Migrations
Managing User Experience During Cloud MigrationsManaging User Experience During Cloud Migrations
Managing User Experience During Cloud Migrations
 
DevOps for Enterprise Systems : Innovate like a Startup
DevOps for Enterprise Systems : Innovate like a StartupDevOps for Enterprise Systems : Innovate like a Startup
DevOps for Enterprise Systems : Innovate like a Startup
 
Dronahq one app platform 7.0
Dronahq   one app platform 7.0Dronahq   one app platform 7.0
Dronahq one app platform 7.0
 
Cloud webinar final
Cloud webinar finalCloud webinar final
Cloud webinar final
 
Startup InsurTech Award - Galileo Platforms
Startup InsurTech Award - Galileo PlatformsStartup InsurTech Award - Galileo Platforms
Startup InsurTech Award - Galileo Platforms
 
Deploying FIDO Authentication - Business Considerations
Deploying FIDO Authentication  - Business ConsiderationsDeploying FIDO Authentication  - Business Considerations
Deploying FIDO Authentication - Business Considerations
 
Making iot deliver business value v4
Making iot deliver business value v4Making iot deliver business value v4
Making iot deliver business value v4
 
IAUG Converge2013 Avaya CEO Kevin Kennedy June 4 2013 Keynote
IAUG Converge2013 Avaya CEO Kevin Kennedy June 4 2013 KeynoteIAUG Converge2013 Avaya CEO Kevin Kennedy June 4 2013 Keynote
IAUG Converge2013 Avaya CEO Kevin Kennedy June 4 2013 Keynote
 
myGPcloud Partner Brochure
myGPcloud Partner BrochuremyGPcloud Partner Brochure
myGPcloud Partner Brochure
 
CloudFIT_CSF_in_cloud_aug16
CloudFIT_CSF_in_cloud_aug16CloudFIT_CSF_in_cloud_aug16
CloudFIT_CSF_in_cloud_aug16
 
La Digital Transformation ha un nuovo alleato: Value Stream Management
La Digital Transformation ha un nuovo alleato: Value Stream ManagementLa Digital Transformation ha un nuovo alleato: Value Stream Management
La Digital Transformation ha un nuovo alleato: Value Stream Management
 
Codestrong 2012 breakout session creating a mobile strategy
Codestrong 2012 breakout session   creating a mobile strategyCodestrong 2012 breakout session   creating a mobile strategy
Codestrong 2012 breakout session creating a mobile strategy
 
corporate.ppt
corporate.pptcorporate.ppt
corporate.ppt
 
corporate (1).ppt
corporate (1).pptcorporate (1).ppt
corporate (1).ppt
 
Office 365 Migration
Office 365 MigrationOffice 365 Migration
Office 365 Migration
 
Belgian visual studio launch 2013
Belgian visual studio launch 2013Belgian visual studio launch 2013
Belgian visual studio launch 2013
 
UniqueSoft Overview
UniqueSoft OverviewUniqueSoft Overview
UniqueSoft Overview
 
Modernizing Applications by Replacing F5 with the NGINX Application Delivery ...
Modernizing Applications by Replacing F5 with the NGINX Application Delivery ...Modernizing Applications by Replacing F5 with the NGINX Application Delivery ...
Modernizing Applications by Replacing F5 with the NGINX Application Delivery ...
 
DevOps Thinking for the Line of Business
DevOps Thinking for the Line of BusinessDevOps Thinking for the Line of Business
DevOps Thinking for the Line of Business
 

More from FIDO Alliance

FIDO Alliance: Welcome and FIDO Update.pptx
FIDO Alliance: Welcome and FIDO Update.pptxFIDO Alliance: Welcome and FIDO Update.pptx
FIDO Alliance: Welcome and FIDO Update.pptxFIDO Alliance
 
IBM: Hey FIDO, Meet Passkey!.pptx
IBM: Hey FIDO, Meet Passkey!.pptxIBM: Hey FIDO, Meet Passkey!.pptx
IBM: Hey FIDO, Meet Passkey!.pptxFIDO Alliance
 
OTIS: Our Journey to Passwordless.pptx
OTIS: Our Journey to Passwordless.pptxOTIS: Our Journey to Passwordless.pptx
OTIS: Our Journey to Passwordless.pptxFIDO Alliance
 
FIDO Workshop-Demo Breakdown.pptx
FIDO Workshop-Demo Breakdown.pptxFIDO Workshop-Demo Breakdown.pptx
FIDO Workshop-Demo Breakdown.pptxFIDO Alliance
 
CISA: #MoreThanAPassword.pptx
CISA: #MoreThanAPassword.pptxCISA: #MoreThanAPassword.pptx
CISA: #MoreThanAPassword.pptxFIDO Alliance
 
FIDO Authentication: Unphishable MFA for All
FIDO Authentication: Unphishable MFA for AllFIDO Authentication: Unphishable MFA for All
FIDO Authentication: Unphishable MFA for AllFIDO Alliance
 
Introducing FIDO Device Onboard (FDO)
Introducing  FIDO Device Onboard (FDO)Introducing  FIDO Device Onboard (FDO)
Introducing FIDO Device Onboard (FDO)FIDO Alliance
 
FIDO Alliance Webinar: Catch Up WIth FIDO
FIDO Alliance Webinar: Catch Up WIth FIDOFIDO Alliance Webinar: Catch Up WIth FIDO
FIDO Alliance Webinar: Catch Up WIth FIDOFIDO Alliance
 
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.com
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.comConsumer Attitudes Toward Strong Authentication & LoginWithFIDO.com
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.comFIDO Alliance
 
新しい認証技術FIDOの最新動向
新しい認証技術FIDOの最新動向新しい認証技術FIDOの最新動向
新しい認証技術FIDOの最新動向FIDO Alliance
 
日立PBI技術を用いた「デバイスフリーリモートワーク」構想
日立PBI技術を用いた「デバイスフリーリモートワーク」構想日立PBI技術を用いた「デバイスフリーリモートワーク」構想
日立PBI技術を用いた「デバイスフリーリモートワーク」構想FIDO Alliance
 
Introduction to FIDO and eIDAS Services
Introduction to FIDO and eIDAS ServicesIntroduction to FIDO and eIDAS Services
Introduction to FIDO and eIDAS ServicesFIDO Alliance
 
富士通の生体認証ソリューションと提案
富士通の生体認証ソリューションと提案富士通の生体認証ソリューションと提案
富士通の生体認証ソリューションと提案FIDO Alliance
 
テレワーク本格導入におけるID認証考察
テレワーク本格導入におけるID認証考察テレワーク本格導入におけるID認証考察
テレワーク本格導入におけるID認証考察FIDO Alliance
 
「開けゴマ!」からYubiKeyへ
「開けゴマ!」からYubiKeyへ「開けゴマ!」からYubiKeyへ
「開けゴマ!」からYubiKeyへFIDO Alliance
 
YubiOnが目指す未来
YubiOnが目指す未来YubiOnが目指す未来
YubiOnが目指す未来FIDO Alliance
 
FIDO2導入してみたを考えてみた
FIDO2導入してみたを考えてみたFIDO2導入してみたを考えてみた
FIDO2導入してみたを考えてみたFIDO Alliance
 
中小企業によるFIDO導入事例
中小企業によるFIDO導入事例中小企業によるFIDO導入事例
中小企業によるFIDO導入事例FIDO Alliance
 
VPNはもう卒業!FIDO2認証で次世代リモートアクセス
VPNはもう卒業!FIDO2認証で次世代リモートアクセスVPNはもう卒業!FIDO2認証で次世代リモートアクセス
VPNはもう卒業!FIDO2認証で次世代リモートアクセスFIDO Alliance
 
CloudGate UNOで安全便利なパスワードレスリモートワーク
CloudGate UNOで安全便利なパスワードレスリモートワークCloudGate UNOで安全便利なパスワードレスリモートワーク
CloudGate UNOで安全便利なパスワードレスリモートワークFIDO Alliance
 

More from FIDO Alliance (20)

FIDO Alliance: Welcome and FIDO Update.pptx
FIDO Alliance: Welcome and FIDO Update.pptxFIDO Alliance: Welcome and FIDO Update.pptx
FIDO Alliance: Welcome and FIDO Update.pptx
 
IBM: Hey FIDO, Meet Passkey!.pptx
IBM: Hey FIDO, Meet Passkey!.pptxIBM: Hey FIDO, Meet Passkey!.pptx
IBM: Hey FIDO, Meet Passkey!.pptx
 
OTIS: Our Journey to Passwordless.pptx
OTIS: Our Journey to Passwordless.pptxOTIS: Our Journey to Passwordless.pptx
OTIS: Our Journey to Passwordless.pptx
 
FIDO Workshop-Demo Breakdown.pptx
FIDO Workshop-Demo Breakdown.pptxFIDO Workshop-Demo Breakdown.pptx
FIDO Workshop-Demo Breakdown.pptx
 
CISA: #MoreThanAPassword.pptx
CISA: #MoreThanAPassword.pptxCISA: #MoreThanAPassword.pptx
CISA: #MoreThanAPassword.pptx
 
FIDO Authentication: Unphishable MFA for All
FIDO Authentication: Unphishable MFA for AllFIDO Authentication: Unphishable MFA for All
FIDO Authentication: Unphishable MFA for All
 
Introducing FIDO Device Onboard (FDO)
Introducing  FIDO Device Onboard (FDO)Introducing  FIDO Device Onboard (FDO)
Introducing FIDO Device Onboard (FDO)
 
FIDO Alliance Webinar: Catch Up WIth FIDO
FIDO Alliance Webinar: Catch Up WIth FIDOFIDO Alliance Webinar: Catch Up WIth FIDO
FIDO Alliance Webinar: Catch Up WIth FIDO
 
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.com
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.comConsumer Attitudes Toward Strong Authentication & LoginWithFIDO.com
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.com
 
新しい認証技術FIDOの最新動向
新しい認証技術FIDOの最新動向新しい認証技術FIDOの最新動向
新しい認証技術FIDOの最新動向
 
日立PBI技術を用いた「デバイスフリーリモートワーク」構想
日立PBI技術を用いた「デバイスフリーリモートワーク」構想日立PBI技術を用いた「デバイスフリーリモートワーク」構想
日立PBI技術を用いた「デバイスフリーリモートワーク」構想
 
Introduction to FIDO and eIDAS Services
Introduction to FIDO and eIDAS ServicesIntroduction to FIDO and eIDAS Services
Introduction to FIDO and eIDAS Services
 
富士通の生体認証ソリューションと提案
富士通の生体認証ソリューションと提案富士通の生体認証ソリューションと提案
富士通の生体認証ソリューションと提案
 
テレワーク本格導入におけるID認証考察
テレワーク本格導入におけるID認証考察テレワーク本格導入におけるID認証考察
テレワーク本格導入におけるID認証考察
 
「開けゴマ!」からYubiKeyへ
「開けゴマ!」からYubiKeyへ「開けゴマ!」からYubiKeyへ
「開けゴマ!」からYubiKeyへ
 
YubiOnが目指す未来
YubiOnが目指す未来YubiOnが目指す未来
YubiOnが目指す未来
 
FIDO2導入してみたを考えてみた
FIDO2導入してみたを考えてみたFIDO2導入してみたを考えてみた
FIDO2導入してみたを考えてみた
 
中小企業によるFIDO導入事例
中小企業によるFIDO導入事例中小企業によるFIDO導入事例
中小企業によるFIDO導入事例
 
VPNはもう卒業!FIDO2認証で次世代リモートアクセス
VPNはもう卒業!FIDO2認証で次世代リモートアクセスVPNはもう卒業!FIDO2認証で次世代リモートアクセス
VPNはもう卒業!FIDO2認証で次世代リモートアクセス
 
CloudGate UNOで安全便利なパスワードレスリモートワーク
CloudGate UNOで安全便利なパスワードレスリモートワークCloudGate UNOで安全便利なパスワードレスリモートワーク
CloudGate UNOで安全便利なパスワードレスリモートワーク
 

Recently uploaded

Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779Delhi Call girls
 
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝soniya singh
 
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdfCTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdfhenrik385807
 
call girls in delhi malviya nagar @9811711561@
call girls in delhi malviya nagar @9811711561@call girls in delhi malviya nagar @9811711561@
call girls in delhi malviya nagar @9811711561@vikas rana
 
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...NETWAYS
 
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...NETWAYS
 
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...Pooja Nehwal
 
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdfOpen Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdfhenrik385807
 
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...NETWAYS
 
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )Pooja Nehwal
 
Microsoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AIMicrosoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AITatiana Gurgel
 
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night EnjoyCall Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night EnjoyPooja Nehwal
 
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...Krijn Poppe
 
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara ServicesVVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara ServicesPooja Nehwal
 
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...Salam Al-Karadaghi
 
Philippine History cavite Mutiny Report.ppt
Philippine History cavite Mutiny Report.pptPhilippine History cavite Mutiny Report.ppt
Philippine History cavite Mutiny Report.pptssuser319dad
 
ANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docxANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docxNikitaBankoti2
 
SaaStr Workshop Wednesday w: Jason Lemkin, SaaStr
SaaStr Workshop Wednesday w: Jason Lemkin, SaaStrSaaStr Workshop Wednesday w: Jason Lemkin, SaaStr
SaaStr Workshop Wednesday w: Jason Lemkin, SaaStrsaastr
 
Motivation and Theory Maslow and Murray pdf
Motivation and Theory Maslow and Murray pdfMotivation and Theory Maslow and Murray pdf
Motivation and Theory Maslow and Murray pdfakankshagupta7348026
 
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...Kayode Fayemi
 

Recently uploaded (20)

Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
 
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝
 
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdfCTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
CTAC 2024 Valencia - Henrik Hanke - Reduce to the max - slideshare.pdf
 
call girls in delhi malviya nagar @9811711561@
call girls in delhi malviya nagar @9811711561@call girls in delhi malviya nagar @9811711561@
call girls in delhi malviya nagar @9811711561@
 
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
 
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
 
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...
 
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdfOpen Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
 
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
 
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
 
Microsoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AIMicrosoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AI
 
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night EnjoyCall Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
 
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
 
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara ServicesVVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
 
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
 
Philippine History cavite Mutiny Report.ppt
Philippine History cavite Mutiny Report.pptPhilippine History cavite Mutiny Report.ppt
Philippine History cavite Mutiny Report.ppt
 
ANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docxANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docx
 
SaaStr Workshop Wednesday w: Jason Lemkin, SaaStr
SaaStr Workshop Wednesday w: Jason Lemkin, SaaStrSaaStr Workshop Wednesday w: Jason Lemkin, SaaStr
SaaStr Workshop Wednesday w: Jason Lemkin, SaaStr
 
Motivation and Theory Maslow and Murray pdf
Motivation and Theory Maslow and Murray pdfMotivation and Theory Maslow and Murray pdf
Motivation and Theory Maslow and Murray pdf
 
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
 

FIDO in Action: Real World Development Case Studies

  • 1. Jackie Comp,VPWorldwide Sales FIDO in Action: Real World Deployment Case Studies
  • 2. What Experience Do Consumers Want? NokNokDemos Today, in most cases hitting “next” brings you to a password…
  • 3. A Consistent Passwordless Experience Across Any Channel NokNokDemos With Nok Nok’s FIDO solution, you can get rid of passwords
  • 4. A Consistent Passwordless Experience Across Any Channel NokNokDemos • Same experience in mobile and web applications • Turn biometrics into 2 factors
  • 5. 2 Examples: Business to Consumer Case Studies ©2018 Nok Nok Labs — Confidential — Do not distribute 5 • 9,000 employees worldwide • 19 locations in 9 countries • $6.0 billion in revenue • 77M+ Million customers • More than 51K employees worldwide • Un-carrier CUSTOMER FIRST philosophy • Has led the industry in YoY growth for 18 consecutive quarters
  • 6. ©2018 Nok Nok Labs — Confidential — Do not distribute 6 Intuit and T-Mobile Discuss Their FIDO Deployments
  • 7. Journey to Passwordless for Consumers Phase 1 Mobile First Strategy (Phase out SMS-OTP) Phase 2 Add Web Support Phase 3 Fully Deprecate Passwords
  • 8. ©2018 Nok Nok Labs — Confidential — Do not distribute 8 Business Goals: • Mobile first strategy using native authenticators • Reduce use of passwords • Reduce cost of support for login related issues • Standardize across brands migrating from Touch ID to FIDO • Improve security controls • Reduce overhead of developing proprietary approaches • Leverage best industry standard • Rapidly support new native device authenticators and all associated flows Capabilities Needed: • FIDO compliant technology • Support all current and future FIDO protocols • Private cloud hosting (on premise solution) • Maintain standard for high availability and performance • Industry standards for security controls (e.g. encryption key rotation) • Durability: Partner fully invested in FIDO today and in the future • Lightweight integration with native apps and backend services • Quick turnaround on any required patches
  • 9. ©2018 Nok Nok Labs — Confidential — Do not distribute 9 Implementation Overview: • Educate internal product teams on new approach • Scaled service deployment across multiple cloud hosting zones and regions to meet availability requirements • Integrate risk screening as part of authentication event • Scale solution in phases: smaller user base apps leading to TurboTax • Controlled user rollout with iOS first • Require use of FIDO authentication with upgraded app Why FIDO: • Strong, multi-factor security model • Industry standard, future proof • Convenience for users • Lower operational costs Alternatives Considered: • Buy versus build (context vs. core) • Leverage best industry standard (FIDO) with proven partner
  • 10. ©2018 Nok Nok Labs — Confidential — Do not distribute 10 Results: • 99.9% % authentication success vs. 80-85% using SMS OTP • Authentication time reduced by 20% • No disruption and continued high adoption rate • Eliminated development costs of maintaining proprietary solution • Platform in place to rapidly support additional use cases Next Steps: • Move to AWS Aurora • Continue roll out to additional products • Expand use cases including passwordless browser login “We have improved our security controls while providing our customers with seamless access to their online financial data.” - Antonio Fuentes, Principal Product Manager
  • 11. ©2018 Nok Nok Labs — Confidential — Do not distribute 11 Business Goals: • Reduce pain point of passwords on phone • Increase confidence of right user • Implement a scalable, future-proof approach to authentication Why FIDO: • Strong, multi-factor authentication and biometrics • Industry standard plug and play approach today and in future • Public private key pair trust model • Lower operational costs Capabilities Needed: • Universal Server • Integrate with existing IDP • Carrier-grade platform and scalability Alternatives Considered: • Several evaluated including “Build Your Own” • Determined finding a partner to get to desired state was more cost effective and minimized risk
  • 12. ©2018 Nok Nok Labs — Confidential — Do not distribute 12 Implementation Overview: • Design flows for Use Cases • Determine UX terminology and experience • Integrate with MyTMO native mobile app • Integrate with in-house virtualized and modular Ericsson IAM • 6 month project from solution design to launch • Roll out to users in waves of 1M over 1 month period • “Soft” push for registration – remind users once/month 4 times Results: • Reduced password resets by 65% to 7% • 50% adoption in first 5 months with “soft” rollout • Supported FaceID Day 1 with no additional work • “Flawless” implementation with no service issues • Expanding across applications including authentication to Call Center
  • 13. ©2018 Nok Nok Labs — Confidential — Do not distribute 13 Next Steps: • Roll out to additional products • Push notification for quick authentication into call center • Leverage Nok Nok/FIDO for user authentication for cross-carrier initiative (CCID) Lessons Learned: • Important to be clear on which users to target • Determine the user experience you want to accomplish – Do you provide choice or simplify experience? – Default to TMOs desired authenticator “By implementing Nok Nok’s FIDO authentication platform we have achieved our goal of providing T-Mobile customers a secure, frictionless experience for accessing our services today and in the future.” - Michael Engan, Principal Technology Architect