SlideShare una empresa de Scribd logo
1 de 23
© FIDO Alliance 2021
1
Introducing
FIDO Device Onboard (FDO)
May 7, 2021
© FIDO Alliance 2021
2
© FIDO Alliance 2021
Today’s Speakers
Giri Mandyam
Senior Director for Technology
Qualcomm
Co-Chair, IoT TWG
Andrew Shikiar
Executive Director & CMO
FIDO Alliance
Richard Kerslake
General Manager Industrial
Controls and Robotics, IOT
Business Unit,
Intel
Co-Chair, IoT TWG
© FIDO Alliance 2021
4
How the FIDO Alliance is
Solving the IoT Onboarding
Challenge
© FIDO Alliance 2021
The FIDO Alliance brings together the world’s leading
technology companies to develop and promote the adoption
of a standardized, simpler, and more secure online experience
that installs trust and confidence in a digital world.
5
© FIDO Alliance 2021
+ Sponsor members + Associate members + Liaison members
6
© FIDO Alliance 2021
Track record of successful collaboration
7
Growing Platform Support
Hello
3 Sets of Specs Released
Increasing Market Adoption
© FIDO Alliance 2021
8
How long does it take
to manually onboard1 10,000
Gateways, Devices, Sensors?
Answer:
Over 2-man years2
1. Assumes out-of-box to securely streaming data to an IoT Platform
2. Kaiser Associates Research and Analysis, IoT study, August 2017
© FIDO Alliance 2021
The Onboarding Challenge
9
• Wide variety of IOT devices – hardware and Operating Systems
• Most devices headless (i.e. don’t have displays)
• Different connectivity – wired / wireless
• Manual installation adds cost and time to IOT deployments, impacting program ROI
• Manual installation requires trusted and skilled staff
© FIDO Alliance 2021
Onboarding solutions exist today, but don’t fully meet the needs of the industry
• Manual onboarding
• Slow
• Insecure
• Expensive
• Proprietary ‘zero touch’
• Linked to one cloud/platform
• Only one silicon provider
• Require programming of target platform/cloud/user at manufacture
Onboarding solutions today
10
© FIDO Alliance 2021
The FIDO Alliance launched
the IoT Technical Working
Group (IoT TWG) in June
2019 - members include
leading Cloud Service
Providers, semiconductor
manufacturers, security
specialists and OEMs.
The IoT TWG analyzed
multiple use cases, target
architectures and
specifications to develop as
clear set of requirements.
Intel contributed their
Secure Device Onboard
specification, which served
as the starting point for
FIDO’s IoT work - the TWG
modified and extended the
initial specification to meet
the defined requirements.
FIDO’s Approach to Secure IoT
11
NEWS - The FIDO Device Onboard specification is now available:
https://fidoalliance.org/specs/FDO/fido-device-onboard-v1.0-ps-20210323/fido-device-onboard-v1.0-ps-20210323.html
© FIDO Alliance 2021
Fast, Scalable Device Provisioning, Onboarding &
Activation
12
Drop ship device to
installation location
Power-up & connect
to Network
Auto-provisions, Onboards
to Cloud
BENEFITS1
• Zero touch onboarding – integrates readily with existing zero touch solutions
• Fast & more secure1 – ~1 minute
• Hardware flexibility – any hardware (from ARM MCU to Intel® Xeon® processors)
• Any cloud – internet & on-premise
• Late binding - of device to cloud greatly reduces number of SKUs vs. other zero touch
offerings
• Open - LF-Edge SDO project up and running, code now on GitHub
12
1. No product or component can be absolutely secure
© FIDO Alliance 2021
FIDO Device Onboard: Late Binding in Supply Chain
13
IoT Device Supply Chain
Device SKU 2
Device SKU 2
Device SKU 2
Device SKU 2
Device SKU 2
Device SKU 2
Device SKU
Customer 1
Custom SKUs
Custom SKUs
Custom SKUs
FDO Late Binding
Device Identity
Build-to-order
Manufacturing
Infrastructure
Build-to-plan
Manufacturing
Infrastructure
Binding info
Binding info
Devices
Customer 2
Devices
Customer n
Devices
Customer 1
Devices
Customer 2
Devices
Customer n
Devices
Zero Touch without FDO
IoT device software and security
customization happens during
manufacturing
Result:
Complicated build-to-order
manufacturing infrastructure,
many SKUs, small lot sizes, long
lead times, higher cost
Zero Touch with FDO
IoT device software and
security customization
happens at the end of the
supply chain
Benefits:
Simplified build-to-plan
manufacturing infrastructure,
fewer SKUs, large lot sizes,
enable stocking distributors,
low customization cost
Result: Increased supply chain
volume and velocity
IoT Device Supply Chain
Single SKU
Late binding reduces costs & complexity in supply chain – a single device SKU for all customers
© FIDO Alliance 2021
Aligning FIDO IOT to Use Case and Ecosystem
14
CSP & On-prem
Support
IoT Platform
ISV Suite
Silicon/device
Ecosystem
SI Ready
Connectivity
Support
Use cases where FIDO IOT delivers maximum value
• Industrial and Enterprise devices:
Gateways, servers, sensors, actuators, control systems, medical, etc.
• Multi-ecosystem applications and services:
not tied to specific cloud/platform framework
• Distributor sales:
deliver from stock, specify binding info after sale to customer
• Device resale / redeploy:
reset to factory conditions repeat onboarding process with new credentials
© FIDO Alliance 2021
How FDO Works
15
Build and Ship FDO
Enabled Devices
1
Register Ownership
to Target Platform
2
Register Device to
Rendezvous Service
3
Devices use FDO to
find owner location
4
Devices Authenticated
and Provisioned
5
Devices send sensor
data to IoT Platform
6
Device Recipient
3
Load Owner Voucher
at Procurement
Supply Chain
5
Late Binding Provisioning
1
Single SKU for Multiple
Target clouds
Registration
4
Target Cloud
(Device Management
System) with integrated
FDO Owner
Rendezvous
service
IoT Device
Device Manufacturer
2
6
© FIDO Alliance 2021
Processor
e.g. Intel, Arm
VARs
Distribution SI
Manufacturing Tool
(includes supply chain
tools)
Client for Arm, Intel,
other processors and
TPM
FDO Owner
(IoT Platform SDK)
Rendezvous server
(runs on Cloud or customer
premise)
FDO – Major Software Components
IOT Device
Reseller tool
IN
T
E
L
®
S
E
C
U
R
E
D
E
V
IC
E
O
N
B
O
A
R
D
FDO
Rendezvous
Server
Target Cloud
(Internet or on-premise)
2
1
5
3
4
© FIDO Alliance 2021
FDO/SDO: LF-Edge project & Open Source
17
The LF Edge Project is an open source implementation of the FDO
onboarding specification as a reference/gold implementation.
https://www.lfedge.org/projects/securedeviceonboard/
 Status
• LF Edge accepted Secure Device Onboard as a Phase 1 (At Large) project
• Project now active on LF-Edge web site.
• Code now Open Source https://github.com/secure-device-onboard
• Protocol testing release of FDO RD01; production release of FDO 1.0 2H21
© FIDO Alliance 2021
Drive industry adoption by building broad industry support across End
users, OEMs, ODMs, silicon partners, etc.
Launch FDO certification programs later this year.
• Functional certification testing
• Security certification testing
Continue work on v.next based on implementation feedback and to
address additional requirements
Goals for 2021
18
© FIDO Alliance 2021
o FIDO has an established security certification program for existing FIDO
authenticator specifications (UAF, U2F, FIDO 2.0/Webauthn)
o Levels that correspond to achievable security assurance
o L1 – Based on vendor questionnaire
o SW authenticators, e.g. from an app store
o L2 – Design documentation submitted by vendor and assessed by 3rd-party certification lab
o Authenticators developed in a trusted SW environment
o L3 – Sample device submitted to 3rd-party lab for verification of design and additional
penetration testing
o Authenticators instantiated in a secure element
Certification and Security
19
© FIDO Alliance 2021
o Multiple security certification levels also appropriate for IoT devices, given
large scope of achievable levels of security assurance
o Simple devices with
o Limited crypto capabilities
o No isolation of HW/SW required for security functionality
o More complex devices
o Advanced crypto capabilities (comparable to smartphones or PC’s)
o Isolation of security-impacting SW
o Special purpose HW for all secure operations related to onboarding
Certification (cont.)
20
© FIDO Alliance 2021
o FIDO is developing interoperability and security certification programs
o Anticipated rollout before end of year, 2021
o FIDO security certification will be assessed against regional regulatory
requirements
o Existing FIDO security certification leverages ‘companion’ programs
o e.g Common Criteria Protection Profiles
o FIDO expects to leverage existing IoT security certification programs as potential companion
programs
Certification (cont.)
21
© FIDO Alliance 2021
• The FIDO Alliance has a successful track record of bringing standards to market.
• FDO addresses the challenge of secure device onboarding – key to IoT growth
• FDO has been driven by Cloud, Semiconductor and Security leaders.
• FDO open-source software on LF-Edge; alpha code today, full release mid-21.
• You can download the specification and the software today to start using and
applying FDO.
• Interested in driving the evolution of FDO? Join FIDO Alliance today!
Summary
22
© FIDO Alliance 2021
Questions?
23

Más contenido relacionado

La actualidad más candente

モノリスからマイクロサービスへの移行 ~ストラングラーパターンの検証~(Spring Fest 2020講演資料)
モノリスからマイクロサービスへの移行 ~ストラングラーパターンの検証~(Spring Fest 2020講演資料)モノリスからマイクロサービスへの移行 ~ストラングラーパターンの検証~(Spring Fest 2020講演資料)
モノリスからマイクロサービスへの移行 ~ストラングラーパターンの検証~(Spring Fest 2020講演資料)NTT DATA Technology & Innovation
 
なぜOpenID Connectが必要となったのか、その歴史的背景
なぜOpenID Connectが必要となったのか、その歴史的背景なぜOpenID Connectが必要となったのか、その歴史的背景
なぜOpenID Connectが必要となったのか、その歴史的背景Tatsuo Kudo
 
Fido認証概要説明
Fido認証概要説明Fido認証概要説明
Fido認証概要説明FIDO Alliance
 
Cisco Security portfolio update
Cisco Security portfolio updateCisco Security portfolio update
Cisco Security portfolio updateAtanas Gergiminov
 
【BS3】Visual Studio 2022 と .NET 6 での Windows アプリ開発技術の紹介
【BS3】Visual Studio 2022 と .NET 6 での Windows アプリ開発技術の紹介 【BS3】Visual Studio 2022 と .NET 6 での Windows アプリ開発技術の紹介
【BS3】Visual Studio 2022 と .NET 6 での Windows アプリ開発技術の紹介 日本マイクロソフト株式会社
 
3分でわかるAzureでのService Principal
3分でわかるAzureでのService Principal3分でわかるAzureでのService Principal
3分でわかるAzureでのService PrincipalToru Makabe
 
Successfully Implement Your API Strategy with NGINX
Successfully Implement Your API Strategy with NGINXSuccessfully Implement Your API Strategy with NGINX
Successfully Implement Your API Strategy with NGINXNGINX, Inc.
 
Web開発者が始める .NET MAUI Blazor App
Web開発者が始める .NET MAUI Blazor AppWeb開発者が始める .NET MAUI Blazor App
Web開発者が始める .NET MAUI Blazor AppTomomitsuKusaba
 
「NIST SP 800-204C サービスメッシュを利用したマイクロサービスベースのアプリケーション向けDevSecOpsの展開」概説
「NIST SP 800-204C  サービスメッシュを利用したマイクロサービスベースのアプリケーション向けDevSecOpsの展開」概説「NIST SP 800-204C  サービスメッシュを利用したマイクロサービスベースのアプリケーション向けDevSecOpsの展開」概説
「NIST SP 800-204C サービスメッシュを利用したマイクロサービスベースのアプリケーション向けDevSecOpsの展開」概説Eiji Sasahara, Ph.D., MBA 笹原英司
 
IDaaS を正しく活用するための認証基盤設計
IDaaS を正しく活用するための認証基盤設計IDaaS を正しく活用するための認証基盤設計
IDaaS を正しく活用するための認証基盤設計Trainocate Japan, Ltd.
 
Azure API Management
Azure API ManagementAzure API Management
Azure API ManagementDaniel Toomey
 
Hybrid Azure AD Join 動作の仕組みを徹底解説
Hybrid Azure AD Join 動作の仕組みを徹底解説Hybrid Azure AD Join 動作の仕組みを徹底解説
Hybrid Azure AD Join 動作の仕組みを徹底解説Yusuke Kodama
 
ハイブリッド時代のID基盤構成の基礎
ハイブリッド時代のID基盤構成の基礎ハイブリッド時代のID基盤構成の基礎
ハイブリッド時代のID基盤構成の基礎Naohiro Fujie
 
KeycloakのDevice Flow、CIBAについて
KeycloakのDevice Flow、CIBAについてKeycloakのDevice Flow、CIBAについて
KeycloakのDevice Flow、CIBAについてHiroyuki Wada
 
Colt's evolution from MPLS to Cloud Networking
Colt's evolution from MPLS to Cloud Networking Colt's evolution from MPLS to Cloud Networking
Colt's evolution from MPLS to Cloud Networking Colt Technology Services
 

La actualidad más candente (20)

Introduction to CI/CD
Introduction to CI/CDIntroduction to CI/CD
Introduction to CI/CD
 
モノリスからマイクロサービスへの移行 ~ストラングラーパターンの検証~(Spring Fest 2020講演資料)
モノリスからマイクロサービスへの移行 ~ストラングラーパターンの検証~(Spring Fest 2020講演資料)モノリスからマイクロサービスへの移行 ~ストラングラーパターンの検証~(Spring Fest 2020講演資料)
モノリスからマイクロサービスへの移行 ~ストラングラーパターンの検証~(Spring Fest 2020講演資料)
 
なぜOpenID Connectが必要となったのか、その歴史的背景
なぜOpenID Connectが必要となったのか、その歴史的背景なぜOpenID Connectが必要となったのか、その歴史的背景
なぜOpenID Connectが必要となったのか、その歴史的背景
 
IDガバナンス&管理の基礎
IDガバナンス&管理の基礎IDガバナンス&管理の基礎
IDガバナンス&管理の基礎
 
Fido認証概要説明
Fido認証概要説明Fido認証概要説明
Fido認証概要説明
 
Cisco Security portfolio update
Cisco Security portfolio updateCisco Security portfolio update
Cisco Security portfolio update
 
【BS3】Visual Studio 2022 と .NET 6 での Windows アプリ開発技術の紹介
【BS3】Visual Studio 2022 と .NET 6 での Windows アプリ開発技術の紹介 【BS3】Visual Studio 2022 と .NET 6 での Windows アプリ開発技術の紹介
【BS3】Visual Studio 2022 と .NET 6 での Windows アプリ開発技術の紹介
 
3分でわかるAzureでのService Principal
3分でわかるAzureでのService Principal3分でわかるAzureでのService Principal
3分でわかるAzureでのService Principal
 
Successfully Implement Your API Strategy with NGINX
Successfully Implement Your API Strategy with NGINXSuccessfully Implement Your API Strategy with NGINX
Successfully Implement Your API Strategy with NGINX
 
Web開発者が始める .NET MAUI Blazor App
Web開発者が始める .NET MAUI Blazor AppWeb開発者が始める .NET MAUI Blazor App
Web開発者が始める .NET MAUI Blazor App
 
「NIST SP 800-204C サービスメッシュを利用したマイクロサービスベースのアプリケーション向けDevSecOpsの展開」概説
「NIST SP 800-204C  サービスメッシュを利用したマイクロサービスベースのアプリケーション向けDevSecOpsの展開」概説「NIST SP 800-204C  サービスメッシュを利用したマイクロサービスベースのアプリケーション向けDevSecOpsの展開」概説
「NIST SP 800-204C サービスメッシュを利用したマイクロサービスベースのアプリケーション向けDevSecOpsの展開」概説
 
IDaaS を正しく活用するための認証基盤設計
IDaaS を正しく活用するための認証基盤設計IDaaS を正しく活用するための認証基盤設計
IDaaS を正しく活用するための認証基盤設計
 
DevSecOps Jenkins Pipeline -Security
DevSecOps Jenkins Pipeline -SecurityDevSecOps Jenkins Pipeline -Security
DevSecOps Jenkins Pipeline -Security
 
Azure API Management
Azure API ManagementAzure API Management
Azure API Management
 
Hybrid Azure AD Join 動作の仕組みを徹底解説
Hybrid Azure AD Join 動作の仕組みを徹底解説Hybrid Azure AD Join 動作の仕組みを徹底解説
Hybrid Azure AD Join 動作の仕組みを徹底解説
 
私がなぜZscalerに?
私がなぜZscalerに?私がなぜZscalerに?
私がなぜZscalerに?
 
ハイブリッド時代のID基盤構成の基礎
ハイブリッド時代のID基盤構成の基礎ハイブリッド時代のID基盤構成の基礎
ハイブリッド時代のID基盤構成の基礎
 
KeycloakのDevice Flow、CIBAについて
KeycloakのDevice Flow、CIBAについてKeycloakのDevice Flow、CIBAについて
KeycloakのDevice Flow、CIBAについて
 
Introduction to Microservices
Introduction to MicroservicesIntroduction to Microservices
Introduction to Microservices
 
Colt's evolution from MPLS to Cloud Networking
Colt's evolution from MPLS to Cloud Networking Colt's evolution from MPLS to Cloud Networking
Colt's evolution from MPLS to Cloud Networking
 

Similar a Introducing FIDO Device Onboard (FDO)

Solving the IoT Challenge
Solving the IoT ChallengeSolving the IoT Challenge
Solving the IoT ChallengeFIDO Alliance
 
Webinar: Securing IoT with FIDO Authentication
Webinar: Securing IoT with FIDO AuthenticationWebinar: Securing IoT with FIDO Authentication
Webinar: Securing IoT with FIDO AuthenticationFIDO Alliance
 
MT82 IoT Security Starts at Edge
MT82  IoT Security Starts at EdgeMT82  IoT Security Starts at Edge
MT82 IoT Security Starts at EdgeDell EMC World
 
国际物联网安全标准与认证大解析
国际物联网安全标准与认证大解析国际物联网安全标准与认证大解析
国际物联网安全标准与认证大解析Onward Security
 
Supply Chain Security and Compliance for Embedded Devices & IoT
Supply Chain Security and Compliance for Embedded Devices & IoTSupply Chain Security and Compliance for Embedded Devices & IoT
Supply Chain Security and Compliance for Embedded Devices & IoTSource Code Control Limited
 
The Present and Future of IoT Cybersecurity
The Present and Future of IoT CybersecurityThe Present and Future of IoT Cybersecurity
The Present and Future of IoT CybersecurityOnward Security
 
Rapid industrial grade IoT prototyping with sierra wireless
Rapid industrial grade IoT prototyping with sierra wirelessRapid industrial grade IoT prototyping with sierra wireless
Rapid industrial grade IoT prototyping with sierra wirelesssierradeveloper
 
How to bootstrap your IoT project
How to bootstrap  your IoT projectHow to bootstrap  your IoT project
How to bootstrap your IoT projectEurotech
 
IoT and the Role of Platforms
IoT and the Role of PlatformsIoT and the Role of Platforms
IoT and the Role of PlatformsTiE Bangalore
 
Factors You Should Consider if Building an IIoT Solution
Factors You Should Consider if Building an IIoT SolutionFactors You Should Consider if Building an IIoT Solution
Factors You Should Consider if Building an IIoT SolutionLaird Connectivity
 
20090620 CWID EDI-gateway (EDI) Identity Management (IDM) US
20090620 CWID EDI-gateway (EDI) Identity Management (IDM) US20090620 CWID EDI-gateway (EDI) Identity Management (IDM) US
20090620 CWID EDI-gateway (EDI) Identity Management (IDM) USKim Holm
 
IoTSummit: Design and architect always disconnected iot system
IoTSummit: Design and architect always disconnected iot systemIoTSummit: Design and architect always disconnected iot system
IoTSummit: Design and architect always disconnected iot systemMarco Dal Pino
 
Build an azure connected io t device in 45 minutes (or less)
Build an azure connected io t device in 45 minutes (or less)Build an azure connected io t device in 45 minutes (or less)
Build an azure connected io t device in 45 minutes (or less)Marco Dal Pino
 
Track 4 session 6 - st dev con 2016 - samsung artik
Track 4   session 6 - st dev con 2016 - samsung artikTrack 4   session 6 - st dev con 2016 - samsung artik
Track 4 session 6 - st dev con 2016 - samsung artikST_World
 
Webinar: Catch Up with FIDO Plus AMA Session
Webinar: Catch Up with FIDO Plus AMA SessionWebinar: Catch Up with FIDO Plus AMA Session
Webinar: Catch Up with FIDO Plus AMA SessionFIDO Alliance
 
FIDO Alliance Webinar: Catch Up WIth FIDO
FIDO Alliance Webinar: Catch Up WIth FIDOFIDO Alliance Webinar: Catch Up WIth FIDO
FIDO Alliance Webinar: Catch Up WIth FIDOFIDO Alliance
 
Market Study on Mobile Authentication
Market Study on Mobile AuthenticationMarket Study on Mobile Authentication
Market Study on Mobile AuthenticationFIDO Alliance
 
FIWARE Global Summit - Building Production Grade IoT Platform Leveraging FIWARE
FIWARE Global Summit - Building Production Grade IoT Platform Leveraging FIWAREFIWARE Global Summit - Building Production Grade IoT Platform Leveraging FIWARE
FIWARE Global Summit - Building Production Grade IoT Platform Leveraging FIWAREFIWARE
 

Similar a Introducing FIDO Device Onboard (FDO) (20)

Solving the IoT Challenge
Solving the IoT ChallengeSolving the IoT Challenge
Solving the IoT Challenge
 
Webinar: Securing IoT with FIDO Authentication
Webinar: Securing IoT with FIDO AuthenticationWebinar: Securing IoT with FIDO Authentication
Webinar: Securing IoT with FIDO Authentication
 
FIDO Masterclass
FIDO MasterclassFIDO Masterclass
FIDO Masterclass
 
MT82 IoT Security Starts at Edge
MT82  IoT Security Starts at EdgeMT82  IoT Security Starts at Edge
MT82 IoT Security Starts at Edge
 
国际物联网安全标准与认证大解析
国际物联网安全标准与认证大解析国际物联网安全标准与认证大解析
国际物联网安全标准与认证大解析
 
Supply Chain Security and Compliance for Embedded Devices & IoT
Supply Chain Security and Compliance for Embedded Devices & IoTSupply Chain Security and Compliance for Embedded Devices & IoT
Supply Chain Security and Compliance for Embedded Devices & IoT
 
The Present and Future of IoT Cybersecurity
The Present and Future of IoT CybersecurityThe Present and Future of IoT Cybersecurity
The Present and Future of IoT Cybersecurity
 
Intel_IoT_gateway.pdf
Intel_IoT_gateway.pdfIntel_IoT_gateway.pdf
Intel_IoT_gateway.pdf
 
Rapid industrial grade IoT prototyping with sierra wireless
Rapid industrial grade IoT prototyping with sierra wirelessRapid industrial grade IoT prototyping with sierra wireless
Rapid industrial grade IoT prototyping with sierra wireless
 
How to bootstrap your IoT project
How to bootstrap  your IoT projectHow to bootstrap  your IoT project
How to bootstrap your IoT project
 
IoT and the Role of Platforms
IoT and the Role of PlatformsIoT and the Role of Platforms
IoT and the Role of Platforms
 
Factors You Should Consider if Building an IIoT Solution
Factors You Should Consider if Building an IIoT SolutionFactors You Should Consider if Building an IIoT Solution
Factors You Should Consider if Building an IIoT Solution
 
20090620 CWID EDI-gateway (EDI) Identity Management (IDM) US
20090620 CWID EDI-gateway (EDI) Identity Management (IDM) US20090620 CWID EDI-gateway (EDI) Identity Management (IDM) US
20090620 CWID EDI-gateway (EDI) Identity Management (IDM) US
 
IoTSummit: Design and architect always disconnected iot system
IoTSummit: Design and architect always disconnected iot systemIoTSummit: Design and architect always disconnected iot system
IoTSummit: Design and architect always disconnected iot system
 
Build an azure connected io t device in 45 minutes (or less)
Build an azure connected io t device in 45 minutes (or less)Build an azure connected io t device in 45 minutes (or less)
Build an azure connected io t device in 45 minutes (or less)
 
Track 4 session 6 - st dev con 2016 - samsung artik
Track 4   session 6 - st dev con 2016 - samsung artikTrack 4   session 6 - st dev con 2016 - samsung artik
Track 4 session 6 - st dev con 2016 - samsung artik
 
Webinar: Catch Up with FIDO Plus AMA Session
Webinar: Catch Up with FIDO Plus AMA SessionWebinar: Catch Up with FIDO Plus AMA Session
Webinar: Catch Up with FIDO Plus AMA Session
 
FIDO Alliance Webinar: Catch Up WIth FIDO
FIDO Alliance Webinar: Catch Up WIth FIDOFIDO Alliance Webinar: Catch Up WIth FIDO
FIDO Alliance Webinar: Catch Up WIth FIDO
 
Market Study on Mobile Authentication
Market Study on Mobile AuthenticationMarket Study on Mobile Authentication
Market Study on Mobile Authentication
 
FIWARE Global Summit - Building Production Grade IoT Platform Leveraging FIWARE
FIWARE Global Summit - Building Production Grade IoT Platform Leveraging FIWAREFIWARE Global Summit - Building Production Grade IoT Platform Leveraging FIWARE
FIWARE Global Summit - Building Production Grade IoT Platform Leveraging FIWARE
 

Más de FIDO Alliance

FIDO Alliance: Welcome and FIDO Update.pptx
FIDO Alliance: Welcome and FIDO Update.pptxFIDO Alliance: Welcome and FIDO Update.pptx
FIDO Alliance: Welcome and FIDO Update.pptxFIDO Alliance
 
IBM: Hey FIDO, Meet Passkey!.pptx
IBM: Hey FIDO, Meet Passkey!.pptxIBM: Hey FIDO, Meet Passkey!.pptx
IBM: Hey FIDO, Meet Passkey!.pptxFIDO Alliance
 
OTIS: Our Journey to Passwordless.pptx
OTIS: Our Journey to Passwordless.pptxOTIS: Our Journey to Passwordless.pptx
OTIS: Our Journey to Passwordless.pptxFIDO Alliance
 
FIDO Workshop-Demo Breakdown.pptx
FIDO Workshop-Demo Breakdown.pptxFIDO Workshop-Demo Breakdown.pptx
FIDO Workshop-Demo Breakdown.pptxFIDO Alliance
 
CISA: #MoreThanAPassword.pptx
CISA: #MoreThanAPassword.pptxCISA: #MoreThanAPassword.pptx
CISA: #MoreThanAPassword.pptxFIDO Alliance
 
FIDO Authentication: Unphishable MFA for All
FIDO Authentication: Unphishable MFA for AllFIDO Authentication: Unphishable MFA for All
FIDO Authentication: Unphishable MFA for AllFIDO Alliance
 
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.com
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.comConsumer Attitudes Toward Strong Authentication & LoginWithFIDO.com
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.comFIDO Alliance
 
新しい認証技術FIDOの最新動向
新しい認証技術FIDOの最新動向新しい認証技術FIDOの最新動向
新しい認証技術FIDOの最新動向FIDO Alliance
 
日立PBI技術を用いた「デバイスフリーリモートワーク」構想
日立PBI技術を用いた「デバイスフリーリモートワーク」構想日立PBI技術を用いた「デバイスフリーリモートワーク」構想
日立PBI技術を用いた「デバイスフリーリモートワーク」構想FIDO Alliance
 
Introduction to FIDO and eIDAS Services
Introduction to FIDO and eIDAS ServicesIntroduction to FIDO and eIDAS Services
Introduction to FIDO and eIDAS ServicesFIDO Alliance
 
富士通の生体認証ソリューションと提案
富士通の生体認証ソリューションと提案富士通の生体認証ソリューションと提案
富士通の生体認証ソリューションと提案FIDO Alliance
 
テレワーク本格導入におけるID認証考察
テレワーク本格導入におけるID認証考察テレワーク本格導入におけるID認証考察
テレワーク本格導入におけるID認証考察FIDO Alliance
 
「開けゴマ!」からYubiKeyへ
「開けゴマ!」からYubiKeyへ「開けゴマ!」からYubiKeyへ
「開けゴマ!」からYubiKeyへFIDO Alliance
 
YubiOnが目指す未来
YubiOnが目指す未来YubiOnが目指す未来
YubiOnが目指す未来FIDO Alliance
 
FIDO2導入してみたを考えてみた
FIDO2導入してみたを考えてみたFIDO2導入してみたを考えてみた
FIDO2導入してみたを考えてみたFIDO Alliance
 
中小企業によるFIDO導入事例
中小企業によるFIDO導入事例中小企業によるFIDO導入事例
中小企業によるFIDO導入事例FIDO Alliance
 
CloudGate UNOで安全便利なパスワードレスリモートワーク
CloudGate UNOで安全便利なパスワードレスリモートワークCloudGate UNOで安全便利なパスワードレスリモートワーク
CloudGate UNOで安全便利なパスワードレスリモートワークFIDO Alliance
 
数々の実績:迅速なFIDO認証の展開をサポート
数々の実績:迅速なFIDO認証の展開をサポート数々の実績:迅速なFIDO認証の展開をサポート
数々の実績:迅速なFIDO認証の展開をサポートFIDO Alliance
 
FIDO Alliance Research: Consumer Attitudes Towards Authentication
FIDO Alliance Research: Consumer Attitudes Towards AuthenticationFIDO Alliance Research: Consumer Attitudes Towards Authentication
FIDO Alliance Research: Consumer Attitudes Towards AuthenticationFIDO Alliance
 
20200303 ISR プライベートセミナー:パスワードのいらない世界へ
20200303 ISR プライベートセミナー:パスワードのいらない世界へ20200303 ISR プライベートセミナー:パスワードのいらない世界へ
20200303 ISR プライベートセミナー:パスワードのいらない世界へFIDO Alliance
 

Más de FIDO Alliance (20)

FIDO Alliance: Welcome and FIDO Update.pptx
FIDO Alliance: Welcome and FIDO Update.pptxFIDO Alliance: Welcome and FIDO Update.pptx
FIDO Alliance: Welcome and FIDO Update.pptx
 
IBM: Hey FIDO, Meet Passkey!.pptx
IBM: Hey FIDO, Meet Passkey!.pptxIBM: Hey FIDO, Meet Passkey!.pptx
IBM: Hey FIDO, Meet Passkey!.pptx
 
OTIS: Our Journey to Passwordless.pptx
OTIS: Our Journey to Passwordless.pptxOTIS: Our Journey to Passwordless.pptx
OTIS: Our Journey to Passwordless.pptx
 
FIDO Workshop-Demo Breakdown.pptx
FIDO Workshop-Demo Breakdown.pptxFIDO Workshop-Demo Breakdown.pptx
FIDO Workshop-Demo Breakdown.pptx
 
CISA: #MoreThanAPassword.pptx
CISA: #MoreThanAPassword.pptxCISA: #MoreThanAPassword.pptx
CISA: #MoreThanAPassword.pptx
 
FIDO Authentication: Unphishable MFA for All
FIDO Authentication: Unphishable MFA for AllFIDO Authentication: Unphishable MFA for All
FIDO Authentication: Unphishable MFA for All
 
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.com
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.comConsumer Attitudes Toward Strong Authentication & LoginWithFIDO.com
Consumer Attitudes Toward Strong Authentication & LoginWithFIDO.com
 
新しい認証技術FIDOの最新動向
新しい認証技術FIDOの最新動向新しい認証技術FIDOの最新動向
新しい認証技術FIDOの最新動向
 
日立PBI技術を用いた「デバイスフリーリモートワーク」構想
日立PBI技術を用いた「デバイスフリーリモートワーク」構想日立PBI技術を用いた「デバイスフリーリモートワーク」構想
日立PBI技術を用いた「デバイスフリーリモートワーク」構想
 
Introduction to FIDO and eIDAS Services
Introduction to FIDO and eIDAS ServicesIntroduction to FIDO and eIDAS Services
Introduction to FIDO and eIDAS Services
 
富士通の生体認証ソリューションと提案
富士通の生体認証ソリューションと提案富士通の生体認証ソリューションと提案
富士通の生体認証ソリューションと提案
 
テレワーク本格導入におけるID認証考察
テレワーク本格導入におけるID認証考察テレワーク本格導入におけるID認証考察
テレワーク本格導入におけるID認証考察
 
「開けゴマ!」からYubiKeyへ
「開けゴマ!」からYubiKeyへ「開けゴマ!」からYubiKeyへ
「開けゴマ!」からYubiKeyへ
 
YubiOnが目指す未来
YubiOnが目指す未来YubiOnが目指す未来
YubiOnが目指す未来
 
FIDO2導入してみたを考えてみた
FIDO2導入してみたを考えてみたFIDO2導入してみたを考えてみた
FIDO2導入してみたを考えてみた
 
中小企業によるFIDO導入事例
中小企業によるFIDO導入事例中小企業によるFIDO導入事例
中小企業によるFIDO導入事例
 
CloudGate UNOで安全便利なパスワードレスリモートワーク
CloudGate UNOで安全便利なパスワードレスリモートワークCloudGate UNOで安全便利なパスワードレスリモートワーク
CloudGate UNOで安全便利なパスワードレスリモートワーク
 
数々の実績:迅速なFIDO認証の展開をサポート
数々の実績:迅速なFIDO認証の展開をサポート数々の実績:迅速なFIDO認証の展開をサポート
数々の実績:迅速なFIDO認証の展開をサポート
 
FIDO Alliance Research: Consumer Attitudes Towards Authentication
FIDO Alliance Research: Consumer Attitudes Towards AuthenticationFIDO Alliance Research: Consumer Attitudes Towards Authentication
FIDO Alliance Research: Consumer Attitudes Towards Authentication
 
20200303 ISR プライベートセミナー:パスワードのいらない世界へ
20200303 ISR プライベートセミナー:パスワードのいらない世界へ20200303 ISR プライベートセミナー:パスワードのいらない世界へ
20200303 ISR プライベートセミナー:パスワードのいらない世界へ
 

Último

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 

Último (20)

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 

Introducing FIDO Device Onboard (FDO)

  • 1. © FIDO Alliance 2021 1 Introducing FIDO Device Onboard (FDO) May 7, 2021
  • 3. © FIDO Alliance 2021 Today’s Speakers Giri Mandyam Senior Director for Technology Qualcomm Co-Chair, IoT TWG Andrew Shikiar Executive Director & CMO FIDO Alliance Richard Kerslake General Manager Industrial Controls and Robotics, IOT Business Unit, Intel Co-Chair, IoT TWG
  • 4. © FIDO Alliance 2021 4 How the FIDO Alliance is Solving the IoT Onboarding Challenge
  • 5. © FIDO Alliance 2021 The FIDO Alliance brings together the world’s leading technology companies to develop and promote the adoption of a standardized, simpler, and more secure online experience that installs trust and confidence in a digital world. 5
  • 6. © FIDO Alliance 2021 + Sponsor members + Associate members + Liaison members 6
  • 7. © FIDO Alliance 2021 Track record of successful collaboration 7 Growing Platform Support Hello 3 Sets of Specs Released Increasing Market Adoption
  • 8. © FIDO Alliance 2021 8 How long does it take to manually onboard1 10,000 Gateways, Devices, Sensors? Answer: Over 2-man years2 1. Assumes out-of-box to securely streaming data to an IoT Platform 2. Kaiser Associates Research and Analysis, IoT study, August 2017
  • 9. © FIDO Alliance 2021 The Onboarding Challenge 9 • Wide variety of IOT devices – hardware and Operating Systems • Most devices headless (i.e. don’t have displays) • Different connectivity – wired / wireless • Manual installation adds cost and time to IOT deployments, impacting program ROI • Manual installation requires trusted and skilled staff
  • 10. © FIDO Alliance 2021 Onboarding solutions exist today, but don’t fully meet the needs of the industry • Manual onboarding • Slow • Insecure • Expensive • Proprietary ‘zero touch’ • Linked to one cloud/platform • Only one silicon provider • Require programming of target platform/cloud/user at manufacture Onboarding solutions today 10
  • 11. © FIDO Alliance 2021 The FIDO Alliance launched the IoT Technical Working Group (IoT TWG) in June 2019 - members include leading Cloud Service Providers, semiconductor manufacturers, security specialists and OEMs. The IoT TWG analyzed multiple use cases, target architectures and specifications to develop as clear set of requirements. Intel contributed their Secure Device Onboard specification, which served as the starting point for FIDO’s IoT work - the TWG modified and extended the initial specification to meet the defined requirements. FIDO’s Approach to Secure IoT 11 NEWS - The FIDO Device Onboard specification is now available: https://fidoalliance.org/specs/FDO/fido-device-onboard-v1.0-ps-20210323/fido-device-onboard-v1.0-ps-20210323.html
  • 12. © FIDO Alliance 2021 Fast, Scalable Device Provisioning, Onboarding & Activation 12 Drop ship device to installation location Power-up & connect to Network Auto-provisions, Onboards to Cloud BENEFITS1 • Zero touch onboarding – integrates readily with existing zero touch solutions • Fast & more secure1 – ~1 minute • Hardware flexibility – any hardware (from ARM MCU to Intel® Xeon® processors) • Any cloud – internet & on-premise • Late binding - of device to cloud greatly reduces number of SKUs vs. other zero touch offerings • Open - LF-Edge SDO project up and running, code now on GitHub 12 1. No product or component can be absolutely secure
  • 13. © FIDO Alliance 2021 FIDO Device Onboard: Late Binding in Supply Chain 13 IoT Device Supply Chain Device SKU 2 Device SKU 2 Device SKU 2 Device SKU 2 Device SKU 2 Device SKU 2 Device SKU Customer 1 Custom SKUs Custom SKUs Custom SKUs FDO Late Binding Device Identity Build-to-order Manufacturing Infrastructure Build-to-plan Manufacturing Infrastructure Binding info Binding info Devices Customer 2 Devices Customer n Devices Customer 1 Devices Customer 2 Devices Customer n Devices Zero Touch without FDO IoT device software and security customization happens during manufacturing Result: Complicated build-to-order manufacturing infrastructure, many SKUs, small lot sizes, long lead times, higher cost Zero Touch with FDO IoT device software and security customization happens at the end of the supply chain Benefits: Simplified build-to-plan manufacturing infrastructure, fewer SKUs, large lot sizes, enable stocking distributors, low customization cost Result: Increased supply chain volume and velocity IoT Device Supply Chain Single SKU Late binding reduces costs & complexity in supply chain – a single device SKU for all customers
  • 14. © FIDO Alliance 2021 Aligning FIDO IOT to Use Case and Ecosystem 14 CSP & On-prem Support IoT Platform ISV Suite Silicon/device Ecosystem SI Ready Connectivity Support Use cases where FIDO IOT delivers maximum value • Industrial and Enterprise devices: Gateways, servers, sensors, actuators, control systems, medical, etc. • Multi-ecosystem applications and services: not tied to specific cloud/platform framework • Distributor sales: deliver from stock, specify binding info after sale to customer • Device resale / redeploy: reset to factory conditions repeat onboarding process with new credentials
  • 15. © FIDO Alliance 2021 How FDO Works 15 Build and Ship FDO Enabled Devices 1 Register Ownership to Target Platform 2 Register Device to Rendezvous Service 3 Devices use FDO to find owner location 4 Devices Authenticated and Provisioned 5 Devices send sensor data to IoT Platform 6 Device Recipient 3 Load Owner Voucher at Procurement Supply Chain 5 Late Binding Provisioning 1 Single SKU for Multiple Target clouds Registration 4 Target Cloud (Device Management System) with integrated FDO Owner Rendezvous service IoT Device Device Manufacturer 2 6
  • 16. © FIDO Alliance 2021 Processor e.g. Intel, Arm VARs Distribution SI Manufacturing Tool (includes supply chain tools) Client for Arm, Intel, other processors and TPM FDO Owner (IoT Platform SDK) Rendezvous server (runs on Cloud or customer premise) FDO – Major Software Components IOT Device Reseller tool IN T E L ® S E C U R E D E V IC E O N B O A R D FDO Rendezvous Server Target Cloud (Internet or on-premise) 2 1 5 3 4
  • 17. © FIDO Alliance 2021 FDO/SDO: LF-Edge project & Open Source 17 The LF Edge Project is an open source implementation of the FDO onboarding specification as a reference/gold implementation. https://www.lfedge.org/projects/securedeviceonboard/  Status • LF Edge accepted Secure Device Onboard as a Phase 1 (At Large) project • Project now active on LF-Edge web site. • Code now Open Source https://github.com/secure-device-onboard • Protocol testing release of FDO RD01; production release of FDO 1.0 2H21
  • 18. © FIDO Alliance 2021 Drive industry adoption by building broad industry support across End users, OEMs, ODMs, silicon partners, etc. Launch FDO certification programs later this year. • Functional certification testing • Security certification testing Continue work on v.next based on implementation feedback and to address additional requirements Goals for 2021 18
  • 19. © FIDO Alliance 2021 o FIDO has an established security certification program for existing FIDO authenticator specifications (UAF, U2F, FIDO 2.0/Webauthn) o Levels that correspond to achievable security assurance o L1 – Based on vendor questionnaire o SW authenticators, e.g. from an app store o L2 – Design documentation submitted by vendor and assessed by 3rd-party certification lab o Authenticators developed in a trusted SW environment o L3 – Sample device submitted to 3rd-party lab for verification of design and additional penetration testing o Authenticators instantiated in a secure element Certification and Security 19
  • 20. © FIDO Alliance 2021 o Multiple security certification levels also appropriate for IoT devices, given large scope of achievable levels of security assurance o Simple devices with o Limited crypto capabilities o No isolation of HW/SW required for security functionality o More complex devices o Advanced crypto capabilities (comparable to smartphones or PC’s) o Isolation of security-impacting SW o Special purpose HW for all secure operations related to onboarding Certification (cont.) 20
  • 21. © FIDO Alliance 2021 o FIDO is developing interoperability and security certification programs o Anticipated rollout before end of year, 2021 o FIDO security certification will be assessed against regional regulatory requirements o Existing FIDO security certification leverages ‘companion’ programs o e.g Common Criteria Protection Profiles o FIDO expects to leverage existing IoT security certification programs as potential companion programs Certification (cont.) 21
  • 22. © FIDO Alliance 2021 • The FIDO Alliance has a successful track record of bringing standards to market. • FDO addresses the challenge of secure device onboarding – key to IoT growth • FDO has been driven by Cloud, Semiconductor and Security leaders. • FDO open-source software on LF-Edge; alpha code today, full release mid-21. • You can download the specification and the software today to start using and applying FDO. • Interested in driving the evolution of FDO? Join FIDO Alliance today! Summary 22
  • 23. © FIDO Alliance 2021 Questions? 23