Authenticator Certification Level 3+ (L3+) evaluates FIDO Authenticator protection against moderate or high effort software and hardware attacks. The confidence in the Authenticator’s security properties is high and the risk for having a successful attack is mitigated.
At this level, an attacker should be hindered from performing successful attacks at the chip level (e.g. IC package opened/decapsulated and attack equipment can act directly on the silicon chip) with high professional electronic lab equipment within weeks to months.
For L3+, the Authenticator is required to conform to a solution included in FIDO Allowed Restricted Operating Environment and Allowed Cryptography lists as part of the Authenticator Security Requirements.
Examples of implementations that will meet Level 3+ Security Requirements:
- An authenticator implemented on a Common Criteria Certified Secure Element or TPM
If your implementation does not meet these requirements, please visit Authenticator Level 2.
Next Steps
Depending on your current implementation and the Level you wish to complete the process varies slightly. The scenarios below will help determine the next steps:
Client or Server Implementation
Certification levels are only for Authenticators; Clients and Servers can complete Functional Certification.
New Authenticator Implementation
If you are completing FIDO Certification for the first time for this implementation, the first step for certification is to start with Functional Certification.
Functional Certification tests conformance to the specifications and Interoperability with FIDO Clients and Servers.
No Security Requirements are tested during Interoperability Testing for L3+, but the Functional Certification steps are still required.
After Functional Certification, the implementation continues on to the process outlined in the Authenticator Certification Policy, and on the Authenticator Certification Levels page.
It is required that the Level 3+ Vendor Questionnaire be evaluated by a FIDO Accredited Security Laboratory as part of the Security Evaluation step of Authenticator Certification. The Vendor is responsible for choosing and working with one of the FIDO Accredited Security Laboratories to complete the Security Evaluation.
All L3+ implementers must create an account for FIDO Certification, you can request an account, or login.
Functionally Certified Authenticator Implementation
Functionally Certified Authenticators seeking L3+ Certification do not have added interoperability requirements as these were already met during the functional certification process. The next required step is to complete the Vendor Questionnaire – as is detailed in the Authenticator Certification Policy and on the Authenticator Certification Levels page.
It is required that the Level 3+ Vendor Questionnaire be evaluated by a FIDO Accredited Security Laboratory as part of the Security Evaluation step of Authenticator Certification. The Vendor is responsible for choosing and working with one of the FIDO Accredited Security Laboratories to complete the Security Evaluation.
Biometric Certification and Authenticator Certification Relationship
Implementations completing Authenticator Certification Level 3 or above that use biometric authentication is required to complete the Biometrics Certification prior to starting Authenticator Certification (including the Security Evaluation).
All L3+ implementers must create an account for FIDO Certification, you can request an account, or login.
Certification Fees
Fees are per implementation certified and must be paid before a Certificate will be issued.
For an overview of the different Certification options and fees, please review the Authenticator Certification Scenarios page.
For an overview of certification fee pricing for this level and all others, please review the User Authentication Certification Fees page.
Laboratory Security Evaluation Fees
There is no FIDO Alliance Fee for a Laboratory Evaluation. The cost for the Security Evaluation will depend on the Accredited Security Laboratory used by the Vendor.
Implementer Dashboard
Implementers can Login to view their Dashboard.