SlideShare a Scribd company logo
Fast Identity Online
/FIDO/
Tatyana Arnaudova
Contents:
- Introduction
- How FIDO works?
- What Makes FIDO
Different ?
– Advantages and
Disadvantages
FIDO's aim is that its
specifications will support a
full range of authentication
technologies, including biometrics
such as fingerprint and iris
scanners, voice and facial
recognition, as well as existing
solutions and communications
standards, such as Trusted Platform
Modules (TPM), USB security
tokens, embedded Secure Elements
(eSE), smart cards, and near field
communication (NFC).
The USB security token
device may be used to
authenticate using a
simple password or by
pressing a button.
Authentication over the
wire happens using
public-key cryptography.
The user's device
registers the user to a
server by registering a
public key. To
authenticate the user,
the device signs a
challenge from the server
using the private key
that it holds.The keys on
the device are unlocked
by a local user gesture
such as a biometric or
pressing a button.
FIDO Registration
1. User choose an
available FIDO
authenticator
2. User unlocks the
FIDO authenticator
3. User’s device
creates a new
public/private key
pair unique for the
local device, online
service and user’s
account.
4. Public key is sent to
the online service
FIDO Login
1. Login
2. User unlocks the
FIDO authenticator
using the same
method as at
Registration time
3. Device uses the
user’s account
identifier provided by
the service to select
the correct key and
sign the service’s
challenge
4. Login complete
- User registers their device to the online
service by selecting a local authentication
mechanism such as swiping a finger, looking
at the camera, speaking into the mic,
entering a PIN, etc.
Universal Authentication Framework
(UAF) Protocol
- Once registered, the user simply repeats
the local authentication action whenever
they need to authenticate to the service.
UAF also allows experiences that combine
multiple authentication mechanisms such
as fingerprint + PIN.
Universal Authentication Framework (UAF) Protocol
U2F – User Second Factor Protocol
- U2F allows
online services
to increase the
security of their
existing
password
infrastructure by
adding a strong
second factor to
user login. This
factor allows the
service to
simplify its
passwords (e.g.
4–digit PIN)
without
compromising
security.
-The user can
use their FIDO
U2F device
across all online
services that
support the
protocol
leveraging built–
in support in web
browsers.
U2F – User Second Factor Protocol
Tatyana-Arnaudova - English
The Mission of the FIDO Alliance is to change the nature of
online authentication by: Developing technical specifications
that define an open, scalable, interoperable set of
mechanisms that reduce the reliance on passwords to
authenticate users. Operating industry programs to help
ensure successful worldwide adoption of the Specifications.
Submitting mature technical Specification(s) to recognized
standards development organization(s) for formal
standardization.
Disadvantages:
- We need appropriate hardware;
- Forget the device;
Advantages:
- Choice based on standards;
- Users don't need to use complex
password, deal with complex strong
password rules and or go through recovery
procedures when they forget a password;
- Waterproof USB-Security Key device;
Tatyana-Arnaudova - English
Sources:
1. https://fidoalliance.org
2. https://en.wikipedia.org/wiki/FIDO_Alliance
3. http://zonese7en.com/ostp-could-this-lead-
to-the-elimination-of-passwords/
4.http://searchsecurity.techtarget.com/definiti
on/FIDO-Fast-Identity-Online
Thank you for your attention!
Tatyana-Arnaudova - English

More Related Content

PDF
FIDO Enablement Workshop: How to FIDO-enable web applications using FIDO prot...
PPTX
FIDO Authentication: Unphishable MFA for All
PDF
FIDO Alliance Today: Status and News
PPTX
Fido U2F Protocol by Ather Ali
PPTX
Webinar: Securing IoT with FIDO Authentication
PDF
Google Case Study: Strong Authentication for Employees and Consumers
PDF
Microsoft's Path to Passwordless - FIDO Authentication for Windows & Azure Ac...
PDF
Deployment Case Study: Login.gov & FIDO2
FIDO Enablement Workshop: How to FIDO-enable web applications using FIDO prot...
FIDO Authentication: Unphishable MFA for All
FIDO Alliance Today: Status and News
Fido U2F Protocol by Ather Ali
Webinar: Securing IoT with FIDO Authentication
Google Case Study: Strong Authentication for Employees and Consumers
Microsoft's Path to Passwordless - FIDO Authentication for Windows & Azure Ac...
Deployment Case Study: Login.gov & FIDO2

What's hot (19)

PDF
2019 FIDO Tokyo Seminar - LINE PayへのFIDO2実装
PDF
Introduction to the FIDO Alliance
PDF
Technical Principles of FIDO Authentication
PPTX
Introduction to the FIDO Alliance: Vision & Status
PDF
FIDO2 & Microsoft
PDF
Market Study on Mobile Authentication
PDF
Protecting IDAAS with FIDO Authentication
PDF
FIDO Authentication Technical Overview
PDF
FIDO and Adaptive Authentication
PPTX
Webinar: Catch Up with FIDO Plus AMA Session
PDF
FIDO, Federation & Facebook Social Login
PPTX
Going Passwordless with Microsoft
PPTX
2019 FIDO Seoul Seminar - Moving Beyond Passwords
PDF
FIDO Alliance Vision and Status
PDF
Modern Authentication for a Connected World
PPTX
Authenticate 2021: Welcome Address
PDF
FIDO, Federation & Facebook Social login
PDF
Overview of FIDO Security Requirements and Certifications
PDF
Authentication and ID Proofing in Education
2019 FIDO Tokyo Seminar - LINE PayへのFIDO2実装
Introduction to the FIDO Alliance
Technical Principles of FIDO Authentication
Introduction to the FIDO Alliance: Vision & Status
FIDO2 & Microsoft
Market Study on Mobile Authentication
Protecting IDAAS with FIDO Authentication
FIDO Authentication Technical Overview
FIDO and Adaptive Authentication
Webinar: Catch Up with FIDO Plus AMA Session
FIDO, Federation & Facebook Social Login
Going Passwordless with Microsoft
2019 FIDO Seoul Seminar - Moving Beyond Passwords
FIDO Alliance Vision and Status
Modern Authentication for a Connected World
Authenticate 2021: Welcome Address
FIDO, Federation & Facebook Social login
Overview of FIDO Security Requirements and Certifications
Authentication and ID Proofing in Education
Ad

Similar to Tatyana-Arnaudova - English (20)

PPTX
Fido U2F PROTOCOL
PPTX
Hardware Authentication
PPTX
FIDO Munich Seminar FIDO Automotive Apps.pptx
PDF
Fido uaf-overview-v1.1-rd-20161005
PDF
Fast IDentity Online New wave of open authentication standards
PDF
IRJET- Verbal Authentication for Personal Digital Assistants
PDF
Datasheet two factor-authenticationx
PPTX
FIDOAlliance
PDF
FIDO, Federation and the Internet of Things
PDF
CIS14: FIDO 101 (What, Why and Wherefore of FIDO)
PPTX
Introducing FIDO Device Onboard (FDO)
PDF
IRJET- Technical Review of different Methods for Multi Factor Authentication
PDF
Bolstering the security of iiot applications – how to go about it
PDF
Top Benefits of Using a FIDO2 Security Key for Online Access.pdf
PDF
FIDO's Role in the Global Regulatory Landscape for Strong Authentication
PDF
2FYSH: two-factor authentication you should have for password replacement
PDF
FIDO & PSD2 – Achieving Strong Customer Authentication Compliance
PPTX
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
PDF
Passwordless Mobile Banking.pdf
DOCX
This paper is included in the Proceedings of the 24th USENIX.docx
Fido U2F PROTOCOL
Hardware Authentication
FIDO Munich Seminar FIDO Automotive Apps.pptx
Fido uaf-overview-v1.1-rd-20161005
Fast IDentity Online New wave of open authentication standards
IRJET- Verbal Authentication for Personal Digital Assistants
Datasheet two factor-authenticationx
FIDOAlliance
FIDO, Federation and the Internet of Things
CIS14: FIDO 101 (What, Why and Wherefore of FIDO)
Introducing FIDO Device Onboard (FDO)
IRJET- Technical Review of different Methods for Multi Factor Authentication
Bolstering the security of iiot applications – how to go about it
Top Benefits of Using a FIDO2 Security Key for Online Access.pdf
FIDO's Role in the Global Regulatory Landscape for Strong Authentication
2FYSH: two-factor authentication you should have for password replacement
FIDO & PSD2 – Achieving Strong Customer Authentication Compliance
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
Passwordless Mobile Banking.pdf
This paper is included in the Proceedings of the 24th USENIX.docx
Ad

Tatyana-Arnaudova - English

  • 2. Contents: - Introduction - How FIDO works? - What Makes FIDO Different ? – Advantages and Disadvantages
  • 3. FIDO's aim is that its specifications will support a full range of authentication technologies, including biometrics such as fingerprint and iris scanners, voice and facial recognition, as well as existing solutions and communications standards, such as Trusted Platform Modules (TPM), USB security tokens, embedded Secure Elements (eSE), smart cards, and near field communication (NFC).
  • 4. The USB security token device may be used to authenticate using a simple password or by pressing a button. Authentication over the wire happens using public-key cryptography. The user's device registers the user to a server by registering a public key. To authenticate the user, the device signs a challenge from the server using the private key that it holds.The keys on the device are unlocked by a local user gesture such as a biometric or pressing a button.
  • 5. FIDO Registration 1. User choose an available FIDO authenticator 2. User unlocks the FIDO authenticator 3. User’s device creates a new public/private key pair unique for the local device, online service and user’s account. 4. Public key is sent to the online service
  • 6. FIDO Login 1. Login 2. User unlocks the FIDO authenticator using the same method as at Registration time 3. Device uses the user’s account identifier provided by the service to select the correct key and sign the service’s challenge 4. Login complete
  • 7. - User registers their device to the online service by selecting a local authentication mechanism such as swiping a finger, looking at the camera, speaking into the mic, entering a PIN, etc. Universal Authentication Framework (UAF) Protocol - Once registered, the user simply repeats the local authentication action whenever they need to authenticate to the service. UAF also allows experiences that combine multiple authentication mechanisms such as fingerprint + PIN.
  • 9. U2F – User Second Factor Protocol - U2F allows online services to increase the security of their existing password infrastructure by adding a strong second factor to user login. This factor allows the service to simplify its passwords (e.g. 4–digit PIN) without compromising security. -The user can use their FIDO U2F device across all online services that support the protocol leveraging built– in support in web browsers.
  • 10. U2F – User Second Factor Protocol
  • 12. The Mission of the FIDO Alliance is to change the nature of online authentication by: Developing technical specifications that define an open, scalable, interoperable set of mechanisms that reduce the reliance on passwords to authenticate users. Operating industry programs to help ensure successful worldwide adoption of the Specifications. Submitting mature technical Specification(s) to recognized standards development organization(s) for formal standardization.
  • 13. Disadvantages: - We need appropriate hardware; - Forget the device; Advantages: - Choice based on standards; - Users don't need to use complex password, deal with complex strong password rules and or go through recovery procedures when they forget a password; - Waterproof USB-Security Key device;
  • 15. Sources: 1. https://fidoalliance.org 2. https://en.wikipedia.org/wiki/FIDO_Alliance 3. http://zonese7en.com/ostp-could-this-lead- to-the-elimination-of-passwords/ 4.http://searchsecurity.techtarget.com/definiti on/FIDO-Fast-Identity-Online
  • 16. Thank you for your attention!