Secure access to online applications and services has evolved into a framework reliant on devices, public-key cryptography, and biometrics to replace the shared secrets of aging passwords. Since 2013, the FIDO Alliance has developed open and scalable advancements to eliminate phishing and other security attacks. To introduce these improvements and to educate employees throughout corporate management and IT security, the FIDO Alliance has established a series of best practices and how-to white papers that align the Alliance’s goals with the responsibilities and titles of technology professionals. This work is dedicated to eliminating passwords and securing the simple act of logging on within the enterprise.

This white paper targets IT administrators and Enterprise Security Architects considering deploying FIDO Authenticators across their enterprises and defining lifecycle management policies.


More

FIDO Device Onboard: A Specification for Automated, Secure IoT Provisioning Technology

In the world of IoT, the first thing referenced is often the size of the…

Read More →

White Paper: FIDO for SCA Delegation to Merchants or Wallet Providers

The authentication of consumers during remote transactions has undeniable benefits in terms of security and…

Read More →

White Paper: Considerations for Deploying FIDO Servers in the Enterprise

Today, secure access to online applications and services has evolved into a model based on…

Read More →