enterprise adoption of fido authentication

6
ENTERPRISE ADOPTION Darren Platt RSA

Upload: fido-alliance

Post on 11-Jan-2017

443 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: Enterprise Adoption of FIDO Authentication

ENTERPRISE ADOPTION

Darren PlattRSA

Page 2: Enterprise Adoption of FIDO Authentication

Enterprise Adoption Working Group

MissionTo identify challenges that enterprises face in the adoption of FIDO, and produce a set of guidelines, white papers and blue-prints for best practices to address those topics.

Membership• Technology Providers• Enterprises

Documents• Federation• Lifecycle

2All Rights Reserved | FIDO Alliance | Copyright 2016

Page 3: Enterprise Adoption of FIDO Authentication

FIDO and Federation

• They are complimentary!

• Multiple Federation Protocols

• Two Primary Use Cases • Relying Party/Service Provider asks for Fido Authentication

• Asserting Party/Identity Provider Informs Relying Party of Fido Authentication

3All Rights Reserved | FIDO Alliance | Copyright 2016

Page 4: Enterprise Adoption of FIDO Authentication

FIDO Lifecycle

Important Credential Lifecycle Events relevant to FIDO• Enrollment

• Centralized and De-Centralized

• Enterprise scenario typically involves 1 key pair for all applications

• Recovery• Lost, Stolen, or Broken Authenticators

• Profile-specific security considerations UAF vs. U2F, FIDO 2

• Native vs. External Authenticators

• Revocation• UAF vs. U2F/FIDO 2

4All Rights Reserved | FIDO Alliance | Copyright 2016

Page 5: Enterprise Adoption of FIDO Authentication

Call to Action

• Looking for more input. • What questions/concerns do you have when contemplating a FIDO

deployment?

• What lessons have you learned in your deployments?

• Join FIDO Alliance!

• Send us that info directly – [email protected], [email protected]

5All Rights Reserved | FIDO Alliance | Copyright 2016

Page 6: Enterprise Adoption of FIDO Authentication

Thank you!

[email protected]

6All Rights Reserved | FIDO Alliance | Copyright 2016