Download free for 30 days
Sign in
Upload
Language (EN)
Support
Business
Mobile
Social Media
Marketing
Technology
Art & Photos
Career
Design
Education
Presentations & Public Speaking
Government & Nonprofit
Healthcare
Internet
Law
Leadership & Management
Automotive
Engineering
Software
Recruiting & HR
Retail
Sales
Services
Science
Small Business & Entrepreneurship
Food
Environment
Economy & Finance
Data & Analytics
Investor Relations
Sports
Spiritual
News & Politics
Travel
Self Improvement
Real Estate
Entertainment & Humor
Health & Medicine
Devices & Hardware
Lifestyle
Change Language
Language
English
Español
Português
Français
Deutsche
Cancel
Save
EN
Uploaded by
FIDO Alliance
PPTX, PDF
1,950 views
FIDO Seminar: Authentication for a Billion Consumers - Amazon.pptx
FIDO Seminar: Authentication for a Billion Consumers - Amazon
Technology
◦
Read more
0
Save
Share
Embed
Embed presentation
Download
Downloaded 10 times
1
/ 21
2
/ 21
3
/ 21
4
/ 21
5
/ 21
6
/ 21
7
/ 21
8
/ 21
9
/ 21
10
/ 21
11
/ 21
12
/ 21
13
/ 21
14
/ 21
15
/ 21
Most read
16
/ 21
17
/ 21
18
/ 21
Most read
19
/ 21
20
/ 21
21
/ 21
Most read
More Related Content
PDF
The Consumerization of Authentication with iovation
by
TransUnion
PDF
Javelin Research's State of Strong Authentication 2019 Report Webinar
by
FIDO Alliance
PDF
Beyond Passwords: FIDO & the Future of Consumer Authentication
by
FIDO Alliance
PDF
FIDO Authentication Technical Overview
by
FIDO Alliance
PDF
FIDO Authentication Technical Overview
by
FIDO Alliance
PDF
Introduction to the FIDO Alliance
by
FIDO Alliance
PDF
Beyond Passwords: FIDO and the Future of User Authentication
by
FIDO Alliance
PDF
FIDO Technical Specifications Overview
by
FIDO Alliance
The Consumerization of Authentication with iovation
by
TransUnion
Javelin Research's State of Strong Authentication 2019 Report Webinar
by
FIDO Alliance
Beyond Passwords: FIDO & the Future of Consumer Authentication
by
FIDO Alliance
FIDO Authentication Technical Overview
by
FIDO Alliance
FIDO Authentication Technical Overview
by
FIDO Alliance
Introduction to the FIDO Alliance
by
FIDO Alliance
Beyond Passwords: FIDO and the Future of User Authentication
by
FIDO Alliance
FIDO Technical Specifications Overview
by
FIDO Alliance
Similar to FIDO Seminar: Authentication for a Billion Consumers - Amazon.pptx
PDF
FIDO Technical Specifications Overview
by
FIDO Alliance
PDF
FIDO and the Future of User Authentication
by
FIDO Alliance
PDF
Beyond Passwords: FIDO and the Future of User Authentication
by
FIDO Alliance
PDF
FIDO And the Future of User Authentication
by
FIDO Alliance
PDF
2018 12-07 tokyo-seminar Brett McDowell
by
FIDO Alliance
PPTX
FIDO Alliance Vision and Updates
by
FIDO Alliance
PPTX
IdentityVerification IDV + Passkeys.pptx
by
LoriGlavin3
PPTX
Authenticate 2021: Welcome Address
by
FIDO Alliance
PDF
2014 IoT Forum_ Fido Alliance
by
COMPUTEX TAIPEI
PPTX
Introduction to FIDO Alliance
by
FIDO Alliance
PPTX
Introduction to FIDO: A New Model for Authentication
by
FIDO Alliance
PPTX
Introduction to FIDO Alliance: Vision and Status -Tokyo Seminar -Brett McDowell
by
FIDO Alliance
PPTX
FIDO Alliance: Year in Review Webinar slides from January 20 2016
by
FIDO Alliance
PDF
Deploying FIDO Authentication - Business Considerations
by
FIDO Alliance
PPTX
Strong Authentication Trends in Government
by
FIDO Alliance
PDF
Introduction to FIDO Authentication
by
FIDO Alliance
PDF
Intelligent Authentication
by
CA Technologies
PDF
FIDO & PSD2 – Achieving Strong Customer Authentication Compliance
by
FIDO Alliance
PDF
FIDO Authentication in a Mobile Network
by
FIDO Alliance
PDF
Fido Overview: Status and Future
by
FIDO Alliance
FIDO Technical Specifications Overview
by
FIDO Alliance
FIDO and the Future of User Authentication
by
FIDO Alliance
Beyond Passwords: FIDO and the Future of User Authentication
by
FIDO Alliance
FIDO And the Future of User Authentication
by
FIDO Alliance
2018 12-07 tokyo-seminar Brett McDowell
by
FIDO Alliance
FIDO Alliance Vision and Updates
by
FIDO Alliance
IdentityVerification IDV + Passkeys.pptx
by
LoriGlavin3
Authenticate 2021: Welcome Address
by
FIDO Alliance
2014 IoT Forum_ Fido Alliance
by
COMPUTEX TAIPEI
Introduction to FIDO Alliance
by
FIDO Alliance
Introduction to FIDO: A New Model for Authentication
by
FIDO Alliance
Introduction to FIDO Alliance: Vision and Status -Tokyo Seminar -Brett McDowell
by
FIDO Alliance
FIDO Alliance: Year in Review Webinar slides from January 20 2016
by
FIDO Alliance
Deploying FIDO Authentication - Business Considerations
by
FIDO Alliance
Strong Authentication Trends in Government
by
FIDO Alliance
Introduction to FIDO Authentication
by
FIDO Alliance
Intelligent Authentication
by
CA Technologies
FIDO & PSD2 – Achieving Strong Customer Authentication Compliance
by
FIDO Alliance
FIDO Authentication in a Mobile Network
by
FIDO Alliance
Fido Overview: Status and Future
by
FIDO Alliance
More from FIDO Alliance
PPTX
Securing Account Lifecycles in the Age of Deepfakes.pptx
by
FIDO Alliance
PPTX
FIDO Seminar: Perspectives on Passkeys & Consumer Adoption.pptx
by
FIDO Alliance
PPTX
FIDO Seminar: Evolving Landscape of Post-Quantum Cryptography.pptx
by
FIDO Alliance
PPTX
FIDO Seminar: Targeting Trust: The Future of Identity in the Workforce.pptx
by
FIDO Alliance
PPTX
FIDO Seminar: New Data: Passkey Adoption in the Workforce.pptx
by
FIDO Alliance
PPTX
FIDO Alliance Seminar State of Passkeys.pptx
by
FIDO Alliance
PPTX
FIDO Munich Seminar: FIDO Tech Principles.pptx
by
FIDO Alliance
PPTX
FIDO Munich Seminar: Securing Smart Car.pptx
by
FIDO Alliance
PPTX
FIDO Munich Seminar: Strong Workforce Authn Push & Pull Factors.pptx
by
FIDO Alliance
PPTX
FIDO Munich Seminar: Biometrics and Passkeys for In-Vehicle Apps.pptx
by
FIDO Alliance
PPTX
FIDO Munich Seminar Workforce Authentication Case Study.pptx
by
FIDO Alliance
PPTX
FIDO Munich Seminar In-Vehicle Payment Trends.pptx
by
FIDO Alliance
PPTX
FIDO Munich Seminar FIDO Automotive Apps.pptx
by
FIDO Alliance
PPTX
FIDO Munich Seminar Blueprint for In-Vehicle Payment Standard.pptx
by
FIDO Alliance
PPTX
FIDO Munich Seminar Introduction to FIDO.pptx
by
FIDO Alliance
PPTX
UX Webinar Series: Essentials for Adopting Passkeys as the Foundation of your...
by
FIDO Alliance
PPTX
UX Webinar Series: Drive Revenue and Decrease Costs with Passkeys for Consume...
by
FIDO Alliance
PPTX
UX Webinar Series: Aligning Authentication Experiences with Business Goals
by
FIDO Alliance
PDF
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
by
FIDO Alliance
PDF
FIDO Alliance Osaka Seminar: LY-DOCOMO-KDDI-Mercari Panel.pdf
by
FIDO Alliance
Securing Account Lifecycles in the Age of Deepfakes.pptx
by
FIDO Alliance
FIDO Seminar: Perspectives on Passkeys & Consumer Adoption.pptx
by
FIDO Alliance
FIDO Seminar: Evolving Landscape of Post-Quantum Cryptography.pptx
by
FIDO Alliance
FIDO Seminar: Targeting Trust: The Future of Identity in the Workforce.pptx
by
FIDO Alliance
FIDO Seminar: New Data: Passkey Adoption in the Workforce.pptx
by
FIDO Alliance
FIDO Alliance Seminar State of Passkeys.pptx
by
FIDO Alliance
FIDO Munich Seminar: FIDO Tech Principles.pptx
by
FIDO Alliance
FIDO Munich Seminar: Securing Smart Car.pptx
by
FIDO Alliance
FIDO Munich Seminar: Strong Workforce Authn Push & Pull Factors.pptx
by
FIDO Alliance
FIDO Munich Seminar: Biometrics and Passkeys for In-Vehicle Apps.pptx
by
FIDO Alliance
FIDO Munich Seminar Workforce Authentication Case Study.pptx
by
FIDO Alliance
FIDO Munich Seminar In-Vehicle Payment Trends.pptx
by
FIDO Alliance
FIDO Munich Seminar FIDO Automotive Apps.pptx
by
FIDO Alliance
FIDO Munich Seminar Blueprint for In-Vehicle Payment Standard.pptx
by
FIDO Alliance
FIDO Munich Seminar Introduction to FIDO.pptx
by
FIDO Alliance
UX Webinar Series: Essentials for Adopting Passkeys as the Foundation of your...
by
FIDO Alliance
UX Webinar Series: Drive Revenue and Decrease Costs with Passkeys for Consume...
by
FIDO Alliance
UX Webinar Series: Aligning Authentication Experiences with Business Goals
by
FIDO Alliance
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
by
FIDO Alliance
FIDO Alliance Osaka Seminar: LY-DOCOMO-KDDI-Mercari Panel.pdf
by
FIDO Alliance
Recently uploaded
PDF
From Artificial Intelligence to African Intelligence: Transforming Research &...
by
Moses Kemibaro
PDF
The new book “Marketing in the Metaverse” spotlights Scott M. Graffius’ research
by
Scott M. Graffius
PDF
Explaining specific examples of purpose-specific BOM
by
akipii ogaoga
PPTX
Do You Control the AI, or Does the AI Control You?
by
medhateltoukhy
PDF
Chapter 5 Security Mechanisms iin computer security.pdf
by
Getnet Tigabie Askale -(GM)
PDF
GTM-and-Sales-Plan for a cyber security product
by
Ashish Jangir
PDF
The Emergence of Empathic XR: AWE Asia 2026 keynote
by
Mark Billinghurst
PDF
Spec-Driven Development with Kiro: Elevating Software Quality, Traceability, ...
by
Haim Michael
PDF
February 2026 Patch Tuesday hosted by Chris Goettl and Todd Schell
by
Ivanti
PPTX
Celonis Optimizing your future with process
by
devjeremyappleyard
PDF
NTG -Company Profile_Software_Vendor_Company_in_MENA
by
Mustafa Kuğu
PDF
Traditional-Security-Models-No-Longer-Work.pptx (1).pdf
by
OhhproJunction
PPTX
Workflow and decision Automation with Flowable
by
chakib ch
PDF
UiPath Modern Automation Playbook -Session 2
by
suhanisingh58689
PDF
How to Install XRDP on CentOS 10 .pdf
by
Green Webpage
PDF
Oracle Cloud Infrastructure 2025 Architect Professional (1Z0-1127-25) Master ...
by
ExamCert App
PDF
Session 1/5: Enhancing Automation with Screenplay & Business Rules
by
suhanisingh58689
PDF
Explaining the flow of purpose-specific BOM
by
akipii ogaoga
PDF
final~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~.pdf
by
omarbishtawi04
PDF
Poročilo odbora CIS (CH08873) za leto 2025 na letni skupščini IEEE Slovenija ...
by
University of Maribor
From Artificial Intelligence to African Intelligence: Transforming Research &...
by
Moses Kemibaro
The new book “Marketing in the Metaverse” spotlights Scott M. Graffius’ research
by
Scott M. Graffius
Explaining specific examples of purpose-specific BOM
by
akipii ogaoga
Do You Control the AI, or Does the AI Control You?
by
medhateltoukhy
Chapter 5 Security Mechanisms iin computer security.pdf
by
Getnet Tigabie Askale -(GM)
GTM-and-Sales-Plan for a cyber security product
by
Ashish Jangir
The Emergence of Empathic XR: AWE Asia 2026 keynote
by
Mark Billinghurst
Spec-Driven Development with Kiro: Elevating Software Quality, Traceability, ...
by
Haim Michael
February 2026 Patch Tuesday hosted by Chris Goettl and Todd Schell
by
Ivanti
Celonis Optimizing your future with process
by
devjeremyappleyard
NTG -Company Profile_Software_Vendor_Company_in_MENA
by
Mustafa Kuğu
Traditional-Security-Models-No-Longer-Work.pptx (1).pdf
by
OhhproJunction
Workflow and decision Automation with Flowable
by
chakib ch
UiPath Modern Automation Playbook -Session 2
by
suhanisingh58689
How to Install XRDP on CentOS 10 .pdf
by
Green Webpage
Oracle Cloud Infrastructure 2025 Architect Professional (1Z0-1127-25) Master ...
by
ExamCert App
Session 1/5: Enhancing Automation with Screenplay & Business Rules
by
suhanisingh58689
Explaining the flow of purpose-specific BOM
by
akipii ogaoga
final~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~.pdf
by
omarbishtawi04
Poročilo odbora CIS (CH08873) za leto 2025 na letni skupščini IEEE Slovenija ...
by
University of Maribor
FIDO Seminar: Authentication for a Billion Consumers - Amazon.pptx
1.
© FIDO Alliance
2025 1 1 © FIDO Alliance 2025 Authentication for a Billion Consumers Mike Slaugh Principal Security Engineer
2.
© FIDO Alliance
2025 2 Scaling leads to more … Users 123456 Authenticators Complexity
3.
© FIDO Alliance
2025 3 3 © FIDO Alliance 2025 How do you scale an authentication system to a billion users?
4.
© FIDO Alliance
2025 4 Scaling leads to more … Users 123456 Authenticators Complexity Custom er Experience Sim plify Choice
5.
© FIDO Alliance
2025 5 #1 Customer Experience
6.
© FIDO Alliance
2025 6 Two Roles in Authentication Systems Security Owner Experience Owner
7.
© FIDO Alliance
2025 7 FRESH Security Certified
8.
© FIDO Alliance
2025 8 FRESH Experience Certified
9.
© FIDO Alliance
2025 9
10.
© FIDO Alliance
2025 10 FRESH Security Certified FRESH Experience Certified
11.
© FIDO Alliance
2025 11 Combine Roles? ?
12.
© FIDO Alliance
2025 12 Considerations for Customer Obsession Create a step-by-step experience to guide your customers through the authentication process Authenticate customers at one time. Avoid constantly redirecting the user back for more authentication Simple Create defaults and preferences based on historical usage Predict which authentication methods apply to the customer and have them ready Applicable Eliminate confusing terms and phrases that may only be meaningful only in certain languages or cultures. Accommodating
13.
© FIDO Alliance
2025 13 #2 Simplify
14.
© FIDO Alliance
2025 14 Authentication Taxonomy Verify An establishment of trust in an identity claim that facilitates downstream activities and events. Enroll An agreement between parties of the credentials that will be used going forward. Recover An event when a user no longer has access to the previously agreed upon credentials and needs another way to access their account. Authenticate A ceremony where credentials are presented and validated to quickly and easily reverify the user’s identity
15.
© FIDO Alliance
2025 15 Authenticator of Choice A1 A2 ID + AuthN Know • Password • PIN • Passphrase Have • Security Keys • Smart Card • One Time Codes • Device Recognition • TOTP • Authenticator Apps • Digital Certificate • Device Bound Passkey Are Biometrics • Touch • Face • Voice • User Name • Email Address • Phone Number • Customer Number Allow users to have multiple options and let them choose based on current situation Identifier Authentication • Multifactor Authentication • Single factor Authentication + =
16.
© FIDO Alliance
2025 16 #3 Choice
17.
© FIDO Alliance
2025 17 Which Authenticators should you use? 1 2 3 4 5 6 Trust Thresholds should determine which authenticators the program will support Authenticator High Trust Med Trust Security
18.
© FIDO Alliance
2025 18 Login Please sign in to continue. Email user123@gmail.com Don’t have an account? Sign Up Remember me NEXT Verify Please choose a verification method Password Passkey Send a code to my phone Use an authenticator app More Options? NEXT Password Please enter your password Password LOGIN
19.
© FIDO Alliance
2025 19 Trust Matrix • Choose Authenticators that are high trust • Don’t allow combination of lower trust authenticators A1 A2 High Med High Med Trust Thresholds should determine which authenticators the program will support
20.
© FIDO Alliance
2025 20 In Summary … Build experiences based on customer needs 1 Simplify the complexity of the ecosystem 2 Provide several options to authenticate 3
21.
© FIDO Alliance
2025 21 21 © FIDO Alliance 2025 Thank you
Editor's Notes
#2
Users Edge cases become use cases Different markets will have different capabilities Complexity Complexity is the enemy of scaling Authenticators There is no “one authenticator” rule them all
Download