FIDO Alliance Metadata Service

The FIDO Metadata Service (MDS) helps ensure you have the information necessary to successfully validate authenticators. As your organization deploys passkeys and FIDO authentication, it is critical to distinguish between trusted, certified authenticators and unverified implementations.

MDS supplies the information you need to validate all authenticators that connect to your service. For example, with MDS you can check attributes to verify whether authenticators come from a proven FIDO Certified device. MDS integration is designed to be low-maintenance and equips you with the ability to:

  • Verify provenance: Validate that an authenticator is FIDO Certified and distinguish legitimate passkey providers from unknown or non-compliant passkey providers.
  • Enforce policy: Allows you to permit or restrict decisions based on passkey provider’s specific capabilities (e.g., “Must have biometrics” or “Must be FIDO Certified to at least L3”).
  • Mitigate risk:  Stay up to date with the information your server needs to grant or deny devices access to your systems, which helps you achieve a rapid revocation of trust.
  • Optimize the UX: Use MDS data to recognize specific device models, display the correct authenticator icon, and tailor instructions based on the device’s actual capabilities (e.g., distinguishing between a biometrics-only platform and a USB security key).

How it Works

MDS acts as a global registry of passkey capabilities and equips your FIDO server with the intelligence needed to make data-driven decisions about which devices are allowed to access your systems.

Your FIDO server allows you to configure an automated download of the Metadata BLOB – a single, digitally signed file that contains the complete, up-to-date registry of all FIDO certified devices. When a user authenticates, your server validates their device against this local registry in real-time.

Get started

Access the resources you need to implement MDS with your FIDO server (relying party) or submit metadata if you are an authentication vendor. All licensing information can be found in HTML and PDF formats here.

For Relying Parties and Developers

The following FIDO Metadata Service resources are for service providers, relying parties, and developers that have implemented, or are implementing, FIDO Authentication.

MDS Implementation

  • Access the MDS3 BLOB This master registry file (JSON) contains metadata for all registered passkeys. We suggest downloading the BLOB once a month and then caching its content because the MDS data does not change often. This file is public and does not require an authorization token to fetch. https://mds3.fidoalliance.org/
  • Root Certificate The GlobalSign R3 root certificate is required to verify the BLOB’s digital signature. Relying Parties must validate the chain of trust against this root to ensure data integrity. https://valid.r3.roots.globalsign.com/
  • Metadata Convenience Service  Provides a subset of MDS data aimed at UX such as user friendly names for authenticators, and light and dark logo images that can be incorporated into user display. https://c-mds.fidoalliance.org/

Developer Resources

Policy and Licensing

For Authenticator Vendors
The following FIDO Metadata Service resources are for companies submitting device data to the FIDO Metadata Service.

  • Log in to Submit Metadata (MyMDS) The Submission Portal for authenticator vendors. Log in here to upload your Metadata Statements. Once approved, statements are automatically added to the global MDS3 BLOB. https://mymds.fidoalliance.org/

Policy

MDS Sign-Up

Subscribe to the FIDO newsletter

Stay Connected, Stay Engaged

Receive the latest news, events, research and implementation guidance from the FIDO Alliance. Learn about digital identity and fast, phishing-resistant authentication with passkeys.