27

Who… What… Why… · •Thought leadership, nurture ecosystem •The Alliance does not ship products! •Implementations left to commercial vendors. Identity & Authentication

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Who… What… Why… · •Thought leadership, nurture ecosystem •The Alliance does not ship products! •Implementations left to commercial vendors. Identity & Authentication
Page 2: Who… What… Why… · •Thought leadership, nurture ecosystem •The Alliance does not ship products! •Implementations left to commercial vendors. Identity & Authentication

Who… What… Why…

Page 3: Who… What… Why… · •Thought leadership, nurture ecosystem •The Alliance does not ship products! •Implementations left to commercial vendors. Identity & Authentication

Board Members

Page 4: Who… What… Why… · •Thought leadership, nurture ecosystem •The Alliance does not ship products! •Implementations left to commercial vendors. Identity & Authentication

Sponsors

Page 5: Who… What… Why… · •Thought leadership, nurture ecosystem •The Alliance does not ship products! •Implementations left to commercial vendors. Identity & Authentication

Associates

Page 6: Who… What… Why… · •Thought leadership, nurture ecosystem •The Alliance does not ship products! •Implementations left to commercial vendors. Identity & Authentication

To Change Authentication Online by:

(a) Developing unencumbered Specifications that

define interoperable mechanisms that supplant

reliance on passwords

(b) Operating programs to help ensure industry

adoption

(c) Submitting mature Specifications for formal

standardization

Page 7: Who… What… Why… · •Thought leadership, nurture ecosystem •The Alliance does not ship products! •Implementations left to commercial vendors. Identity & Authentication

FIDO Alliance’s Role…

• “Paper” Specifications

• Interoperability and Conformance testing

• Trademark licensing against criteria

• Thought leadership, nurture ecosystem

• The Alliance does not ship products!

• Implementations left to commercial vendors

Page 8: Who… What… Why… · •Thought leadership, nurture ecosystem •The Alliance does not ship products! •Implementations left to commercial vendors. Identity & Authentication

Identity & Authentication Building Blocks

©NOK NOK LABS – Used by Permission 8

Physical-to-digital identity

User Management

Authentication

Federation

SingleSign-On

E-Gov Payments Security

Passwords Risk-BasedStrong

MODERNAUTHENTICATION

Personalization

Page 9: Who… What… Why… · •Thought leadership, nurture ecosystem •The Alliance does not ship products! •Implementations left to commercial vendors. Identity & Authentication

Why Authentication is Cybersecurity Priority #1

Poor authentication mechanisms are a commonly exploited vector of attack by adversaries; the 2013 Data Breach Investigations Report (conducted by Verizon in concert with the U.S. Department of Homeland Security) noted that 76% of 2012 network intrusions exploited weak or stolen credentials.

-- NIST Roadmap for Improving Critical Infrastructure Cybersecurity,12-Feb-2014

Page 10: Who… What… Why… · •Thought leadership, nurture ecosystem •The Alliance does not ship products! •Implementations left to commercial vendors. Identity & Authentication

Today’s Passwords

REUSED PHISHED KEYLOGGED

Page 11: Who… What… Why… · •Thought leadership, nurture ecosystem •The Alliance does not ship products! •Implementations left to commercial vendors. Identity & Authentication

Today’s Password AlternativesOne Time Codes with SMS or Device

SMSUSABILITY

DEVICEUSABILITY

USEREXPERIENCE

STILLPHISHABLE

Coverage | Delay | Cost One per site | $$ | Fragile User find it hard Known attacks today

Page 12: Who… What… Why… · •Thought leadership, nurture ecosystem •The Alliance does not ship products! •Implementations left to commercial vendors. Identity & Authentication

Major Industry TrendSimpler, Stronger Local Device Auth

PERSONAL DEVICES LOCAL LOCKINGNEW WAVE: CONVENIENT

SECURITY

Carry Personal Data Pins & Patterns todaySimpler, Stronger local

authentication

Page 13: Who… What… Why… · •Thought leadership, nurture ecosystem •The Alliance does not ship products! •Implementations left to commercial vendors. Identity & Authentication

Putting It Together

The problem: Simpler, Stronger online

The trend: Simpler, Stronger local device auth

Why not:Use local device auth for online auth?

This is the core idea behind FIDO standards!

Page 14: Who… What… Why… · •Thought leadership, nurture ecosystem •The Alliance does not ship products! •Implementations left to commercial vendors. Identity & Authentication

FIDO ExperiencesLOCAL DEVICE AUTH SUCCESS ONLINE AUTH REQUEST

PASSWORDLESS EXPERIENCE (UAF standards)

SECOND FACTOR EXPERIENCE (U2F standards)

Show a biometricTransaction Detail Done

Login & Password Insert Dongle, Press button Done

Page 15: Who… What… Why… · •Thought leadership, nurture ecosystem •The Alliance does not ship products! •Implementations left to commercial vendors. Identity & Authentication

What Have We Done So Far...

Page 16: Who… What… Why… · •Thought leadership, nurture ecosystem •The Alliance does not ship products! •Implementations left to commercial vendors. Identity & Authentication

FIDO timeline

© 2014 FIDO Alliance

Alliance Announced

FIDO Ready Program

Specification Review Draft

First UAF and U2F Deployments

FIDO 1.0 FINALSpecification

Feb 2013 Feb 2014Dec 2013 Feb-Oct 2014 Dec 9 2014

ReviewDraft

1.0Final

Specs(UAF & U2F)

Page 17: Who… What… Why… · •Thought leadership, nurture ecosystem •The Alliance does not ship products! •Implementations left to commercial vendors. Identity & Authentication

© 2014 FIDO Alliance

UAF Deployments

Starting in April 2014, customers can use their finger to pay with PayPal from their new Samsung Galaxy S5 because the FIDO Ready™ software on the device securely communicates between the fingerprint sensor on their device and PayPal’s service in the cloud.In July 2014, Alibaba also launched FIDO-based payments using Samsung Galaxy S5.

● Stronger biometric-based authentication.

● Easy to deploy.● Biometric information never leaves the

device.● Provides a unique public and private key

pair for each application or service.

Clients available for these operating systems:

Software Authenticator Examples:Voice/Face recognition, PIN, QR Code, etc.

Aftermarket Hardware Authenticator Examples:USB fingerprint scanner, MicroSD Secure Element

Page 18: Who… What… Why… · •Thought leadership, nurture ecosystem •The Alliance does not ship products! •Implementations left to commercial vendors. Identity & Authentication

© 2014 FIDO Alliance

U2F Deployment

In late October, Google released support for U2F in its Chrome browser. In parallel, Yubico and Plug-Up introduced FIDO U2F Security Keys, public key hardware devices that provide high-security using strong authentication based on the FIDO U2F protocol.

● Stronger two-step verification (2SV) for Google Accounts users.

● Easy to deploy

● Works seamlessly on Windows, OSX and Linux.

● Security Key performs cryptographic functions.

● Provides a unique public and private key pair for each application it protects.

Page 19: Who… What… Why… · •Thought leadership, nurture ecosystem •The Alliance does not ship products! •Implementations left to commercial vendors. Identity & Authentication

© 2014 FIDO Alliance

FIDO ReadyTM Program

http://fidoalliance.org/adoption/fido-ready/

Entersekt, eyeLock, Feintian, Sonovation X

Nok Nok Labs X X X X X

plug-up X X X X

Samsung SDS X X

StrongAuth, SurePass ID, Yahoo! Japan X

Synaptics, Diamond Fortress, EgisTec, Go-Trust X X

Infineon, NXP X X

Agnitio, DDS, X

Yubico X X

Page 20: Who… What… Why… · •Thought leadership, nurture ecosystem •The Alliance does not ship products! •Implementations left to commercial vendors. Identity & Authentication

Key Benefit for Service Providers

Page 21: Who… What… Why… · •Thought leadership, nurture ecosystem •The Alliance does not ship products! •Implementations left to commercial vendors. Identity & Authentication

© 2014 FIDO Alliance

Privacy & Security Design

● No 3rd Party in the Protocol

● No Secrets on the Server side

● Biometric data (if used) never leaves device

● No link-ability between Services

● No link-ability between Accounts

Page 22: Who… What… Why… · •Thought leadership, nurture ecosystem •The Alliance does not ship products! •Implementations left to commercial vendors. Identity & Authentication

© 2014 FIDO Alliance

Summary of FIDO today...

● Final 1.0 spec announced

● Explosive growth in Alliance membership

● First products are shipping

● First deployments are live

● Great momentum heading into 2015

To learn more about membership visit:

https://fidoalliance.org/membership/how-to-join

Page 23: Who… What… Why… · •Thought leadership, nurture ecosystem •The Alliance does not ship products! •Implementations left to commercial vendors. Identity & Authentication

How it works

Page 24: Who… What… Why… · •Thought leadership, nurture ecosystem •The Alliance does not ship products! •Implementations left to commercial vendors. Identity & Authentication

FIDO Registration

REGISTRATION BEGINS USER APPROVAL

REGISTRATION COMPLETE NEW KEY CREATED

USER APPROVAL

KEY REGISTERED

1 2

Using Public key

Cryptography

4 3

Page 25: Who… What… Why… · •Thought leadership, nurture ecosystem •The Alliance does not ship products! •Implementations left to commercial vendors. Identity & Authentication

FIDO Login

LOGIN USER APPROVAL

LOGIN COMPLETE KEY SELECTED

LOGIN CHALLENGE

LOGIN RESPONSE

1 2

4 3

Login

Using Public key

Cryptography

Page 26: Who… What… Why… · •Thought leadership, nurture ecosystem •The Alliance does not ship products! •Implementations left to commercial vendors. Identity & Authentication

Decouple User Verification Method from Authentication Protocol

LOGIN USER APPROVAL

REGISTRATION COMPLETE KEY SELECTED

LOGIN CHALLENGE

LOGIN RESPONSE

1 2

4 3

Leverage public key cryptography

ONLINE SECURITY PROTOCOL

PLUGGABLE LOCAL AUTH

Page 27: Who… What… Why… · •Thought leadership, nurture ecosystem •The Alliance does not ship products! •Implementations left to commercial vendors. Identity & Authentication

© 2014 FIDO Alliance

THANK YOU

Brett McDowell | [email protected]