
The Passkey Pledge is a voluntary pledge for online service providers and authentication product and service vendors. Individuals are not scoped in the pledge, though are encouraged to voice their support for passkeys through their preferred channels.
Participation in this pledge means that service providers and vendors commit to make a good-faith effort to work towards the stated goals throughout the year. Companies that make measurable progress towards the pledged goal should publicly document their achievements within one year of signing the pledge. Companies that do not make measurable progress are still encouraged to share their efforts, challenges, and approaches within the same timeframe so that others can learn. This pledge is voluntary and not legally binding.
The FIDO Alliance recognizes and appreciates service providers and vendors who have already implemented passkey support for sign-ins or in their products. Companies that already support passkeys should publicly state their implementation methods and the resulting impacts, if possible.
Take the Passkey Pledge
Companies taking the pledge commit to make a good-faith effort to work towards these stated goals throughout the year:
For service providers that have an active implementation of passkeys for sign-in
Within one year of signing the pledge, demonstrate actions taken to measurably increase the use of passkeys by users when signing into the company’s services.
For service providers that are in the process of implementing passkeys for sign-in
Within one year of signing the pledge, demonstrate measurable actions taken to enable passkeys for signing into the company’s services.
For vendors with a FIDO-based products and/or service
Within one year of signing the pledge, demonstrate actions taken to measurably increase the use of passkeys through adoption of the company’s products and/or services.
For vendors developing FIDO-based products and/or services
Within one year of signing the pledge, demonstrate measurable actions to FIDO certify its products and launch a product or service with passkey sign-in support.
For industry associations and standards organizations
Within one year of signing the pledge, demonstrate actions to increase the visibility and benefits of passkey sign-ins.
Taking Action: Resources to Help Organizations to Fulfill the Pledge
The FIDO Alliance has resources and best practices for Passkey Pledge organizations to take action, including:
- Sharing their commitment to the Passkey Pledge via external communications channels
- Leveraging the guidance on passkeycentral.org for guidance to plan, implement and expand their passkey rollouts
- Implementing the FIDO Design Guidelines, data-driven UX best practices for passkey rollouts
- Getting their products FIDO Certified, to demonstrate that their products are compliant, interoperable and secure
- Releasing case studies on their or their customers behalf, to share implementation journeys and business outcomes. Organizations can reach out to info@fidoalliance.org to submit case studies directly to the FIDO Alliance.
- Taking part in the FIDO Alliance member activities and working groups to further drive passkey optimization and adoption
- Planning and/or taking steps to remove passwords as a sign-in option.
Take the Pledge Today
Submit this form to sign the pledge. Signers of the pledge agree to have their company name (and not logo) included on marketing materials relating to the pledge. While we collect the names and emails of signatories, they will not be made public.
签署通行密钥承诺倡议
通行密钥承诺倡议是面向在线服务提供商以及身份验证产品和服务供应商的自愿性承诺倡议。 个人虽不在此承诺倡议的参与范围内,但我们鼓励个人通过其首选渠道发声支持通行密钥。
加入此承诺倡议表示服务提供商和供应商承诺将在一年内以最大诚意推进实现既定目标。 对于在实现承诺目标过程中取得显著成果的公司,应在签署此承诺倡议一年内公开发文记录其取得的成就。 对于未取得显著成果的公司,我们仍鼓励其在签署承诺倡议一年内分享其付诸的努力、面临的挑战和应对方式,以供他人借鉴。 此承诺倡议是自愿签署的,不具有法律约束力。
FIDO Alliance 对已支持采用通行密钥登录或将通行密钥技术加入其产品的服务提供商和供应商表示认可并致谢。 已支持通行密钥的公司应尽可能公开其实现方法和取得的成果。
签署通行密钥承诺倡议
签署此承诺倡议的公司承诺将在一年内以最大诚意推进实现以下既定目标:
对于现已实现通行密钥登录的服务提供商
在签署本承诺倡议一年内,采取具体行动显著提升用户登录公司服务时使用通行密钥的占比。
对于正在实现通行密钥登录的服务提供商
在签署本承诺倡议一年内,通过可量化的行动在公司服务中实现通行密钥登录。
对于提供基于 FIDO 的产品和/或服务的供应商
在签署本承诺倡议一年内,采取具体行动在公司产品和/或服务中采用通行密钥,以显著提升通行密钥的使用率。
对于正在开发基于 FIDO 的产品和/或服务的供应商
在签署本承诺倡议一年内,采取可量化的行动完成 FIDO 产品认证,并推出支持通行密钥登录的产品或服务。
对于行业协会和标准组织
在签署本承诺倡议一年内,采取具体行动提升通行密钥登录的可见性和优势。
立即签署通行密钥承诺倡议
承诺倡议签署方同意将公司名称(不包含徽标)列入与本承诺倡议相关的宣传材料中。 我们收集签署方的名称与电子邮件地址,但不会将其对外公开。
Why should my company consider joining the FIDO Alliance?
There are significant benefits to taking part in FIDO Alliance as a member, whether your company is a vendor looking to bring FIDO-based solutions to market, or if your organization is a service provider seeking to understand the most effective ways to deploy FIDO Authentication to your customers and/or employees. You can learn more here.
What’s the process for joining the FIDO Alliance?
Please see the required steps on the FIDO Alliance membership web page.
How does FIDO compare with PKI?
FIDO takes a “lightweight” approach to asymmetric public-key cryptography, which offers service providers a way to extend the security benefits of public-key cryptography to a wider array of applications, domains, and devices – especially where traditional PKI has proven difficult or impossible. FIDO is not a replacement for PKI but rather complements it, enabling a greater number of users and applications to be protected using asymmetric encryption. This is especially important in situations where the alternative has been a username and password.
What devices and platforms have FIDO support?
The FIDO Alliance developed its FIDO2 specifications with the W3C to enable FIDO Authentication capabilities to be built into a wider array of devices, platforms, and web browsers. FIDO is currently supported in Google Chrome, Mozilla Firefox, Microsoft Edge, and Apple Safari (MacOS), iOS web browsers, as well as Windows 10 and Android platforms.
What are some examples of FIDO being deployed in-market today?
Many leading organizations around the world have deployed FIDO Authentication to their employees and users, reducing their security risks and improving user experience. Check out our homepage under “who’s using FIDO” for a sample.
Why did FIDO publish multiple specifications? What are the differences?
The FIDO Alliance has published three sets of specifications for simpler, stronger authentication – FIDO U2F, FIDO UAF and FIDO2 – in order to provide for the widest range of use cases and deployment scenarios:
When were the FIDO specifications published?
From its inception, the FIDO Alliance stated intentions to change the nature of authentication by developing specifications that define an open, scalable, interoperable set of mechanisms that supplant reliance on passwords to securely authenticate users of online services. Two years after its inception, the Alliance delivered the final 1.0 specifications on December 2014 to enable that vision. This was an important milestone on the industry’s road to ubiquitous simpler, stronger authentication, and many deployments brought FIDO Authentication to users around the globe. To further add support for FIDO Authentication across devices and platforms, FIDO Alliance published its second set of specifications, FIDO2, in March 2019. See “Why did the FIDO Alliance see the need for FIDO2?” for more information.
What are the FIDO specifications?
The FIDO Alliance has published three sets of specifications for simpler, stronger authentication: FIDO Universal Second Factor (FIDO U2F), FIDO Universal Authentication Framework (FIDO UAF) and the Client to Authenticator Protocols (CTAP). CTAP is complementary to the W3C’s Web Authentication (WebAuthn) specification; together, they are known as FIDO2.
What’s the best way to follow FIDO’s progress?
The FIDO Alliance website provides comprehensive information about the Alliance, its specifications, FIDO Certified products, a knowledge base of resources and best practices and general progress. You can also sign up to receive updates and invitations to future events, many of which are open to the public. You can also follow @FIDOalliance on Twitter and/or on LinkedIn.
Is the FIDO Alliance a non-profit organization? What is the scope?
The FIDO (Fast IDentity Online) Alliance is a 501(c)6 non-profit organization incorporated in mid-2012 to develop standards that address the lack of interoperability among strong authentication devices as well as the problems users face with creating and remembering multiple usernames and passwords. To learn more about the FIDO Alliance governance and structure, please refer to the About FIDO page and the Membership Details page.
Do the FIDO specifications enable anyone to begin using the specs to develop and offer FIDO certified products?
FIDO’s specifications are public and available for anyone to read and analyze. But only FIDO Alliance Members benefit from “the promise” to not assert patent rights against other members’ implementations (see the FIDO Alliance Membership Agreement for details). Anyone may join the FIDO Alliance; we encourage even very small companies with a very low cost to join at the entry level. Members at all levels not only benefit from the mutual non-assert protection but also participate with FIDO Alliance members, activities, and developments; Associates have more limited participation benefits (https://fidoalliance.org/members/membership-benefits/). All are invited to join the FIDO Alliance and participate.
Is one FIDO token/dongle/device better than another? How can I choose which to buy?
FIDO specifications are device-agnostic and support a full range of authentication technologies, including FIDO Security Keys and biometrics such as fingerprint and iris scanners, voice and facial recognition, as well as PIN or pattern-protected microSD cards. FIDO specifications will also enable existing solutions and communications standards, such as Trusted Platform Module (TPM), USB Security Tokens, embedded Secure Elements (eSE), Smart Cards, Bluetooth Low Energy (BLE), and Near Field Communication (NFC). Because FIDO specifications are open, they are designed to be extensible and to accommodate future innovation, as well as protect existing investments.
Has FIDO made implementation rights available to anyone?
FIDO Alliance members have all committed to the promise contained within our Membership Agreement to not assert their patents against any other member implementation of FIDO 1.0 final specifications (referred to as “Proposed Standard” in our Membership Agreement). Anyone interested in deploying a FIDO compliant solution can do so without joining the Alliance, and they are strongly encouraged to use FIDO Certified products to enable that deployment.
How can I be sure that the product I’m buying conforms to FIDO standards?
The FIDO Alliance Certification Working Group is responsible for testing products for conformance to FIDO specifications and interoperability between those implementations. You can learn more about the FIDO® Certified program here.
Why are standards important?
Open industry standards assure that existing and future products and offerings are compatible and that anyone can evaluate the technology. Users can depend on their FIDO devices working wherever FIDO authentication is supported. Service providers and enterprises can accommodate various devices and services without having to make new investments or reverting to proprietary configurations.
Can’t someone break into an account if they steal a device?
No. In order to break into an account, the criminal would need not only the user’s device that was registered as a FIDO Authenticator to the account but also the ability to defeat the user identification challenge used by the Authenticator to protect the private keys – such as a username and PIN or a biometric. This makes it extremely difficult to break into a FIDO-enabled account.
How does the FIDO approach to biometric authentication make a user safer? Could anyone steal my biometric information from a device or online service?
When used in FIDO Authentication, user biometric data never leaves the device and is never stored on a central server where it could be stolen in a breach. FIDO’s on-device model for authentication eliminates the risk of a remote attack. If a would-be attacker had access to the user’s actual device, a successful spoof would be quite difficult. First, the attacker must obtain a perfectly formed, complete latent print that is also enrolled on the target user’s device. Then, the attacker must gain access to the user’s device in order to control only that one device. The single spoof, even if accomplished, doesn’t approach the potential harm done by today’s typical mass-scale attack, which can result in harvesting millions and hundreds of millions of users’ credentials.
How does FIDO Authentication make users safer on the web?
Unlike current password-based authentication models that have proven vulnerable to mass-scale attacks and fraud, FIDO authentication credentials are never shared or stored in centralized databases. FIDO credentials are known and maintained only by the user’s own device. All that is ever stored by the service provider are the public keys paired to the user’s device where the private keys are stored. For additional security and privacy, biometrics used in FIDO Authentication never leave the device. This security model eliminates the risks of phishing, all forms of password theft and replay attacks. A would-be attacker would need the user’s physical device to even attempt a hack (see below, “can’t someone break into an account if they steal a device?” for more information). The password ecosystem has afforded attackers with great return on investment with relatively limited risk; the FIDO ecosystem is far more difficult, expensive and risky for attackers to profit from.
How do you protect against root kits and malware attacks on the embedded fingerprint sensor?
The FIDO Alliance recently launched the Authenticator Certification Program. This program introduces Authenticator Security Requirements to the FIDO Certification Program specifically for authenticators. Each authenticator that is certified under the FIDO Certification program is validated to meet specific security assurance levels depending on the level of security the vendor is seeking. The higher the level, the greater the security assurance. More information about this program can be found here: https://fidoalliance.org/certification/authenticator-certification-levels/.
If I use the same device with multiple websites, can one site know that I use it with another site?
No, this type of information exchange is prevented with FIDO Authentication. Each device/website pairing requires separate registration and a separate cryptographic key pair. Once registered, a user can easily authenticate to multiple sites from the same device, yet each site has no knowledge of the user interactions with other sites. FIDO does not introduce any new tracking mechanism that could be used to correlate user activity online.
Does FIDO get any of my personal information?
No. FIDO Alliance only specifies standards for strong authentication and tests implementations for compliance to those standards; the Alliance does not provide services or equip devices or sites. Device manufacturers, online service providers, enterprises, and developers use the FIDO specifications to build products, provide services, and enable sites and browsers with FIDO authentication. Under FIDO specifications, the user’s credentials must remain on the user’s device, and they are never shared with a provider or service.
How can companies get involved in the FIDO Alliance’s new work areas?
The IDWG and IoT TWG are now open to industry participants. Participation in FIDO Alliance working groups is open to all board and sponsor level members of the FIDO Alliance. For more information on joining the Alliance, visit https://fidoalliance.org/members/membership-benefits.
What will the IoT Technical Working Group do?
The IoT TWG will provide a comprehensive authentication framework for IoT devices in keeping with the fundamental mission of the Alliance – passwordless authentication. The IoT TWG will develop use cases, target architectures and specifications covering: IoT device attestation/authentication profiles to enable interoperability between service providers and IoT devices; automated onboarding, and binding of applications and/or users to IoT devices; and IoT device authentication and provisioning via smart routers and IoT hubs.
What will the Identity Verification and Binding Working Group do?
The FIDO Alliance has identified newer remote, possession-based techniques including biometric “selfie” matching and government-issued identity document authentication as having the potential to greatly improve the quality of identity assurance for new account onboarding and account recovery. The IDWG will define criteria for this type of remote identity verification, as well as others, and develop a certification program and educational materials to support the adoption of that criteria.
How will the Alliance fulfill these new standards and certification initiatives?
The Alliance has formed two new working groups: the Identity Verification and Binding Working Group (IDWG) and the IoT Technical Working Group (IoT TWG) to establish guidelines and certification criteria in these areas. The FIDO Alliance will continue to focus on development and adoption of its user authentication standards and related programs and use them as a foundation for this expanded work, with contributions from current members and new industry participants.
How do these new areas related to user authentication?
Identity verification and IoT security are both adjacent to the FIDO Alliance core focus on user authentication. For accounts protected by FIDO Authentication, identity verification for the account recovery process when a FIDO device is lost or stolen becomes critical to maintaining the integrity of the user’s account. With IoT devices, typical industry practices is to ship them with default password credentials and manual onboarding, which leaves them open to attack. The security gaps in both of these areas can most effectively addressed through industry collaboration and standardization rather than siloed, proprietary approaches.
What is the FIDO Alliance trying to achieve with these new initiatives?
Ultimately, the Alliance is striving to increase the efficacy and market adoption of FIDO Authentication by addressing adjacent technology areas that leave security vulnerabilities on the web. There is a gap between the high assurance provided by FIDO Authentication standards and the lower assurance methods used in identity verification for account recovery and IoT authentication. The Alliance aims to strengthen identity verification assurance to support better account recovery and automate secure device onboarding to remove password use from IoT.
What are the FIDO Alliance new work areas?
The Alliance announced new work areas to develop standards and certification programs in identity verification and the Internet of Things (IoT).
What is next for the FIDO Alliance and FIDO standards?
FIDO Alliance’s work is just beginning. The specifications and certification programs are continuing to evolve, and our deployment work is taking on even greater importance. Additionally, the Alliance has just launched new work areas in IoT and identity verification, which leverage the Alliance’s broad coalition of leading organizations from around the world to help standardize technologies adjacent to user authentication. For more information on these work areas, read https://fidoalliance.org/fido-alliance-announces-id-and-iot-initiatives/.
How does the FIDO Alliance ensure interoperability with FIDO2?
FIDO Alliance provides interoperability testing and certification for servers, clients, and authenticators adhering to FIDO2 specifications. Additionally, the Alliance has introduced a new Universal Server certification for servers that interoperate with all FIDO Authenticator types (UAF, U2F, CTAP). As a best practice, the FIDO Alliance recommends online services and enterprises deploy a Universal Server to ensure support for all FIDO Certified Authenticators.
Does FIDO2 mean that FIDO U2F is dead?
Not at all. FIDO U2F capabilities have merged into FIDO2’s CTAP2 protocol, and FIDO U2F security keys will continue to work with services that support U2F authentication as well as those that have support FIDO2 authentication.
Does FIDO2 replace the FIDO U2F and FIDO UAF specifications?
The specifications under FIDO2 support existing passwordless FIDO UAF and FIDO U2F use cases and specifications and expand the availability of FIDO Authentication. Users that already have external FIDO-compliant devices, such as FIDO U2F security keys, will be able to continue to use these devices with web applications that support WebAuthn. Existing FIDO UAF devices can still be used with pre-existing services as well as new service offerings based on the FIDO UAF protocols.
What is the status of FIDO2 browser and platform implementation?
Current adoption status is available here.
What is the status of FIDO2 specifications development?
FIDO2 standards are published and available for implementation today. WebAuthn reached W3C’s final Recommendation status in March 2019 and is an official web standard. CTAP is a final FIDO Alliance specification.
Why did FIDO Alliance submit specifications to the W3C?
FIDO Alliance partnered with W3C to standardize FIDO Authentication for the entire web platform so the FIDO ecosystem could grow by an entire community of web browsers and web application servers supporting the standard. W3C is where the web community produces their standards, so it was more practical to work in that forum.
What is the relationship between FIDO2 and W3C’s WebAuthn?
A good rule of thumb is to remember this simple equation:
FIDO2 = W3C WebAuthn + CTAP
This is the full story of FIDO2’s development:
After the release of the FIDO UAF and FIDO U2F specifications, FIDO Alliance focused on making FIDO Authentication more accessible to users worldwide. The Alliance developed three technical specifications that defined one web-based API, enabling FIDO Authentication to be built directly into browsers and platforms. These specifications were submitted to the W3C, the international standards organization for the World Wide Web, in November of 2015. FIDO Alliance member companies worked within the W3C’s Web Authentication Working Group to finalize the API, which became known as WebAuthn. WebAuthn was officially recognized as a W3C web standard in March 2019.
In the same time period, the FIDO Alliance created and finalized a complementary specification to WebAuthn: the Client to Authenticator Protocol (CTAP). CTAP makes WebAuthn even more accessible to users by allowing them to use the devices they already own, such as their mobile phone, security key or Windows 10 PC to authenticate to WebAuthn-enabled browsers and platforms.
Together, WebAuthn and CTAP are called FIDO2. The FIDO Alliance manages and maintains the certification program to ensure interoperability of all the FIDO2 implementations in the market – clients, servers and authentication devices.
Why did the FIDO Alliance see the need for FIDO2?
The FIDO Alliance goal has always been ubiquitous strong authentication across the web. That means building support for FIDO Authentication into every device that people use every day. The Alliance made notable progress with its initial FIDO U2F and FIDO UAF specifications, especially on mobile platforms. FIDO2 expands the reach of FIDO Authentication by making it a built-in feature across browsers and web platforms, which is a significant step toward the Alliance’s overall goal.
Is it “FIDO2” or “FIDO 2.0”?
FIDO2 is the official name for the complete set of FIDO’s latest standards.
What specifications are included in FIDO2?
FIDO2 includes two specifications:
What is FIDO2?
FIDO2 is the overarching term for FIDO Alliance’s newest set of strong authentication standards. FIDO2 includes two specifications: W3C’s Web Authentication (WebAuthn) and FIDO Alliance’s Client to Authenticator Protocol (CTAP).
Can I use the same FIDO device with multiple websites? Can I use multiple FIDO devices with the same website?
Yes, you can use multiple websites from one FIDO device. Each device/website pairing requires a separate registration and a separate cryptographic key pair. Once registered, a user can easily authenticate to multiple sites from the same device, yet each site has no knowledge of the user interactions with other sites.
If a user acquires a new device or wants to use multiple FIDO devices, the user needs only register each of the devices at the sites where he wants to use them. Once a device is registered at a site, it will be recognized whenever the user needs to authenticate at that site. When a user visits a site with a new device that hasn’t been registered, and thus isn’t automatically recognized, the user will be prompted to register the new FIDO device to enable FIDO authentication with the new device at that site.
Will FIDO devices work when I don’t have Internet connectivity?
The purpose of the FIDO model is to provide a secure and simple authentication experience for online services. The authentication involves a user with a device connecting to a service over a network.
What is the Certificate number format of the FIDO Alliance issued Certificates?
The FIDO Alliance Certificate number format is: AA-NNNNN-SSSSS, where AA is the Program Identifier, NNNNN is the Certification number, and SSSSS is the Product Identifier. The Program Identifier corresponds to the certification program under which the Certificate was issued.
What is the audit process for products in the market?
The FIDO Alliance staff will audit on a monthly basis the usage of FIDO Certified logos and published claims of certification. Auditing of actual implementations will be driven by market feedback. Should any concerns arise, feedback can be submitted through the Certified Logo Violation form.
Must I certify a product in order to market it?
No. But a product must be certified to claim to be FIDO Certified and use the FIDO Certified logo.
How does the FIDO Alliance certify derivative products?
Derivative certification was created to streamline the certification process for implementers that have a large volume of certifications that are essentially all based on the same implementation. In this case, implementers may certify one implementation and the rest may be registered as “derivatives” of that base certification. Derivatives don’t require attending interoperability events to achieve certification, but they do require that the derivative implementation run and pass conformance testing. The implementation cannot change in any substantial way from the original certification earned via our test tools and interoperability testing. If there are changes to the implementation, then it will need to go through the FIDO Impact Analysis to determine if the implementation requires a Delta Certification or Recertification.
How often do testing events occur?
Interoperability events occur at least every 90 days, but may occur more frequently based on implementer demand.
What are the costs associated with certification?
Fees are per implementation certified and must be paid before a Certificate will be issued.
For an overview of the FIDO Certification Fees per program, please go to the Certification Fees page.
Can I become FIDO Certified if I am not a FIDO Alliance Member?
Yes. Non-members are welcome to certify their implementations.
What is a Vendor ID and who needs one?
The UAF authenticator specification defines an AAID field that is half Vendor ID and half Device ID used to uniquely identify each authenticator. The Vendor ID is a unique identifier assigned by FIDO to each company implementing a UAF authenticator. The other half of the AAID field, the Device ID, is assigned to the authenticator by the implementing company. Only UAF Authenticators require a Vendor ID.
How long is a product certified, and is recertification required when protocols change?
A product is certified indefinitely as long as the code base of its FIDO implementation doesn’t change in any substantial way. Certification can only be terminated in rare instances, such as determining that an implementation improperly passed test tools or interoperability events. Certification only applies to a specific specification and implementation class (i.e. “UAF Authenticator”). If new major versions of specifications are released (as determined by the FIDO Certification Working Group) and an implementation would like to claim conformance with that specification, new certification will be required.
Is there a Trademark License Agreement (TMLA) requirement for logo use?
Use of the FIDO Certified logo will require signing a TMLA. There is a streamlined process for Relying Parties that wish to use the certification logo on their websites, which includes a “clickless” license agreement.
Will there be a FIDO Certified logo?
Yes. There is a recognizable FIDO Certified logo for vendors to include with their websites, product materials, packaging, etc.
How do I get started?
Start by making sure your implementation passes the conformance tests (registration required). After you’ve validated your implementation, register for an Interoperability event and you’re on your way to certifying your product.
What is the FIDO Alliance Metadata Service?
The FIDO Alliance Metadata Service (MDS) is a web-based tool where FIDO authenticator vendors can publish metadata statements for FIDO servers to download. This provides organizations deploying FIDO servers with a centralized and trusted source of information about FIDO authenticators.
What kinds of companies should get involved?
Vendor companies looking to bring FIDO-based solutions to market and/or organization service providers seeking to understand the most effective ways to deploy FIDO Authentication will benefit the most from participating in FIDO Alliance working groups.
How do companies benefit from joining the working groups?
By taking part in FIDO Alliance’s technical working groups, members have the ability to shape and have early visibility into FIDO’s technical output – which can help accelerate product and service development. Participating in the working groups will also enable your team to get peer-based feedback to aid with your own implementations, while also creating an opportunity to have your company’s vision reflected in deployment guidelines and recommendations.
Can you describe the functional testing process?
There are four major testing steps:
How is the testing done?
Certification starts with self-assessment of specification conformance through the use of FIDO Alliance provided test tools, followed by interoperability testing with at least three test partners at FIDO Alliance-proctored test events. At this time, there is no lab aspect to the certification program, but the Certification Working Group is currently reviewing requirements to develop and implement a Functional Lab Accreditation program. See the Getting Started web page to learn more.
Are there separate submission fees for testing against each of the FIDO Alliance specifications?
Yes. Implementations must request certification (and pay the certification fees) for each implementation class they are seeking to certify. For example, if an implementation certifies for both a FIDO UAF Server and a FIDO2 Server, that implementation must follow the certification process for both (and pay the certification fees for both). The implementation would ultimately receive two certifications. The primary difference between testing for different specifications is they have different test tools and the different interoperability events.
Our company just built a new product but we haven’t gotten it certified yet. Can we say that it is FIDO Certified while we are working on achieving our certification?
No. Only products that have passed through FIDO Certification program and have been granted a certification number can claim to be FIDO Certified.
What is the Certificate number format of the FIDO Alliance issued Certificates?
The FIDO Alliance issued Certificates have the following numerical format:
SSSXYZAYYYYMMDD####
SSS – Specification number (UAF or U2F)
X – Specification number
Y – Specification minor number
Z – Specification revision number
A – Specification errata number
YYYY – Year issued
MM – Month issued
DD – Day issued
#### – The number of the certificate issued today
What is the audit process for products in the market?
The FIDO Alliance staff will audit on a monthly basis the usage of FIDO Certified logos and published claims of certification. Auditing of actual implementations will be driven by market feedback. Should any concerns arise, feedback can be submitted through the Certified Logo Violation form.
Must I certify a product in order to market it?
No. But a product must be certified to claim to be FIDO Certified and use the FIDO Certified logo.
How does the FIDO Alliance certify derivative products?
Derivative certification was created to streamline the certification process for implementers that have a large volume of certifications that are essentially all based on the same implementation. In this case, implementers may certify one implementation and the rest may be registered as “derivatives” of that base certification. Derivatives don’t require attending interoperability events to achieve certification, but they do require that the derivative implementation run and pass conformance testing. The implementation cannot change in any substantial way from the original certification earned via our test tools and interoperability testing. If there are changes to the implementation, then it will need to go through the FIDO Impact Analysis to determine if the implementation requires a Delta Certification or Recertification.
How often do testing events occur?
Interoperability events occur at least every 90 days, but may occur more frequently based on implementer demand.
What are the costs associated with certification?
Fees are per implementation certified and must be paid before a Certificate will be issued.
Can I become FIDO Certified if I am not a FIDO Alliance Member?
Yes. Non-members are welcome to certify their implementations.
What is a Vendor ID and who needs one?
The UAF authenticator specification defines an AAID field that is half Vendor ID and half Device ID used to uniquely identify each authenticator. The Vendor ID is a unique identifier assigned by FIDO to each company implementing a UAF authenticator. The other half of the AAID field, the Device ID, is assigned to the authenticator by the implementing company. Only UAF Authenticators require a Vendor ID.
How long is a product certified, and is recertification required when protocols change?
A product is certified indefinitely as long as the code base of its FIDO implementation doesn’t change in any substantial way. Certification can only be terminated in rare instances, such as determining that an implementation improperly passed test tools or interoperability events. Certification only applies to a specific specification and implementation class (i.e. “UAF Authenticator”). If new major versions of specifications are released (as determined by the FIDO Certification Working Group) and an implementation would like to claim conformance with that specification, new certification will be required.
Is there a Trademark License Agreement (TMLA) requirement for logo use?
Use of the FIDO Certified logo will require signing a TMLA. There is a streamlined process for Relying Parties that wish to use the certification logo on their websites, which includes a “clickless” license agreement.
Will there be a FIDO Certified logo?
Yes. There is a recognizable FIDO Certified logo for vendors to include with their websites, product materials, packaging, etc.
How do I get started?
Start by making sure your implementation passes the conformance tests (registration required). After you’ve validated your implementation, register for an Interoperability event and you’re on your way to certifying your product.
What is the FIDO Alliance Metadata Service?
The FIDO Alliance Metadata Service (MDS) is a web-based tool where FIDO authenticator vendors can publish metadata statements for FIDO servers to download. This provides organizations deploying FIDO servers with a centralized and trusted source of information about FIDO authenticators.
What kinds of companies should get involved?
Vendor companies looking to bring FIDO-based solutions to market and/or organization service providers seeking to understand the most effective ways to deploy FIDO Authentication will benefit the most from participating in FIDO Alliance working groups.
パスキー宣言
パスキー宣言とは、オンラインサービスプロバイダーおよび認証に関する製品・サービスプロバイダー・ベンダーを対象とする自主的な宣言です。 個人は本宣言の対象ではありませんが、お好みのチャネルを通じてパスキーに対するサポートを表明することが推奨されています。
本宣言に参加することで、サービスプロバイダーとベンダーは掲げられた目標に向かって1年間、誠心誠意取り組むことを約束します。 約束した目標に対して目に見える具体的な進捗を達成した企業は、宣言に署名してから1年以内にその成果を公表する必要があります。 具体的な進捗が得られなかった企業も、同期間内に実施した取り組みや課題、アプローチを共有することが奨励されています。これにより、他の企業が学ぶ機会を得ることができます。 本宣言はあくまでも自主的なものであり、法的拘束力を有するものではありません。
FIDOアライアンスは、サインイン機能または自社製品に対して既にパスキーを導入しているサービスプロバイダーとベンダーを評価しており、感謝の意を表したいと思います。 既にパスキーに対応している企業は、可能であれば、その実装手段や影響の結果について公開していただけますと幸いです。
パスキー宣言に参加する
本宣言に参加する企業は、以下に掲げる目標に向けて1年間、誠心誠意取り組むことを約束するものとします。
対象:既にサインインにパスキーを実装しているサービスプロバイダー
本宣言に署名してから1年以内に、ユーザーが自社サービスにサインインする際のパスキー利用率を具体的に向上させるために実施した行動を示す。
対象:サインインにパスキーの実装を試みているサービスプロバイダー
本宣言に署名してから1年以内に、自社サービスのサインインにパスキーを導入するために実施した測定可能な行動を示す。
対象:FIDOベースの製品やサービスを提供するプロバイダー
本宣言に署名してから1年以内に、自社の製品やサービスでのパスキーの採用を通じてパスキー利用率を具体的に拡大させるために実施した行動を示す。
対象:FIDOベースの製品やサービスを開発するベンダー
本宣言に署名してから1年以内に、自社製品をFIDO認証(パスキー認証)に対応し、パスキーでのサインインに対応した備えた製品またはサービスを開始するために実施した測定可能な行動を示す。
対象:業界団体および標準化団体
本宣言に署名してから1年以内に、パスキーによるサインインの認知度と利点を向上させるために実施した行動を示す。
今すぐパスキー誓約に署名する
本宣言の署名者は、本取組に関連するマーケティング資料に企業名(ロゴは含まない)を掲載することに同意するものとします。
当団体では署名者の氏名およびメールアドレスを収集しますが、これらが公開されることはありません。
패스키 서약
패스키 서약은 온라인 서비스 제공업체와 인증 관련 솔루션/서비스 공급업체를 위한 자발적인 서약입니다. 개인은 서약 대상에는 포함되지 않지만, 선호하는 채널을 통해 패스키에 대한 지지를 표명하는 것이 권장됩니다.
이 서약에 참여한다는 것은, 서비스 제공업체와 공급업체가 1년 동안 명시된 목표를 향해 성실하게 노력할 것을 약속한다는 의미입니다. 서약 목표에 대해 측정 가능한 진전을 이룬 기업은 서약일로부터 1년 이내에 그 성과를 공개적으로 문서화해야 합니다. 측정 가능한 진전을 이루지 못한 기업도 동일한 기간 내에 자사의 노력, 직면한 과제, 접근 방식을 공유하여 다른 기업들이 배울 수 있도록 하는 것이 권장됩니다. 이 서약은 자발적인 참여를 기반으로 하며, 법적 구속력은 없습니다.
FIDO 얼라이언스는 이미 패스키 로그인을 지원하거나 자사 제품에 도입한 서비스 제공업체 및 솔루션 제공 업체의 노력을 높이 평가합니다. 이미 패스키를 지원하고 있는 기업은, 가능한 경우, 구현 방식과 그로 인한 효과를 공개적으로 명시해 주시기 바랍니다.
패스키 서약 참여
서약에 참여한 기업은, 1년 동안 다음의 명시된 목표를 향해 선의의 노력을 기울일 것을 약속합니다.
패스키 기반 로그인 기능을 이미 구현한 서비스 제공업체의 경우
서약일로부터 1년 이내에 회사 서비스에 로그인할 때 사용자의 패스키 사용률을 측정 가능한 방식으로 증가시키기 위해 취한 조치들을 공유해야 합니다.
패스키 기반 로그인 기능을 구현을 준비중인 서비스 제공업체의 경우
서약일로부터 1년 이내에, 자사 서비스에 패스키 로그인을 활성화하기 위해 취한 측정 가능한 조치를 공유해야 합니다.
FIDO 기반 제품 및/또는 서비스를 보유한 솔루션 공급업체의 경우
서약일로부터 1년 이내에, 자사의 솔루션 및/또는 서비스를 통한 패스키 사용 확대를 위해 취한 조치를 입증해야 합니다.
FIDO 기반 제품 및/또는 서비스를 개발 중인 솔루션 공급업체의 경우
서약일로부터 1년 이내에, 제품의 FIDO 시험인증을 획득하고, 패스키 로그인을 지원하는 제품 또는 서비스를 출시하기 위해 취한 측정 가능한 조치를 공유해야 합니다.
업계 협회 및 표준화 기구의 경우
서약일로부터 1년 이내에, 패스키 로그인의 인지도와 혜택을 높이기 위해 취한 조치를 공유해야 합니다.
지금 패스키 서약에 참여하세요
서약에 서명한 기업은, 회사명(로고는 미포함)이 해당 서약 관련 마케팅 자료에 포함되는 것에 동의하게 됩니다. 서명자의 이름과 이메일 주소는 수집되지만 공개되지 않습니다.
Complete the form
Why should my company consider joining the FIDO Alliance?
There are significant benefits to taking part in FIDO Alliance as a member, whether your company is a vendor looking to bring FIDO-based solutions to market, or if your organization is a service provider seeking to understand the most effective ways to deploy FIDO Authentication to your customers and/or employees. You can learn more here.
What’s the process for joining the FIDO Alliance?
Please see the required steps on the FIDO Alliance membership web page.
How does FIDO compare with PKI?
FIDO takes a “lightweight” approach to asymmetric public-key cryptography, which offers service providers a way to extend the security benefits of public-key cryptography to a wider array of applications, domains, and devices – especially where traditional PKI has proven difficult or impossible. FIDO is not a replacement for PKI but rather complements it, enabling a greater number of users and applications to be protected using asymmetric encryption. This is especially important in situations where the alternative has been a username and password.
What devices and platforms have FIDO support?
The FIDO Alliance developed its FIDO2 specifications with the W3C to enable FIDO Authentication capabilities to be built into a wider array of devices, platforms, and web browsers. FIDO is currently supported in Google Chrome, Mozilla Firefox, Microsoft Edge, and Apple Safari (MacOS), iOS web browsers, as well as Windows 10 and Android platforms.
What are some examples of FIDO being deployed in-market today?
Many leading organizations around the world have deployed FIDO Authentication to their employees and users, reducing their security risks and improving user experience. Check out our homepage under “who’s using FIDO” for a sample.
Why did FIDO publish multiple specifications? What are the differences?
The FIDO Alliance has published three sets of specifications for simpler, stronger authentication – FIDO U2F, FIDO UAF and FIDO2 – in order to provide for the widest range of use cases and deployment scenarios:
When were the FIDO specifications published?
From its inception, the FIDO Alliance stated intentions to change the nature of authentication by developing specifications that define an open, scalable, interoperable set of mechanisms that supplant reliance on passwords to securely authenticate users of online services. Two years after its inception, the Alliance delivered the final 1.0 specifications on December 2014 to enable that vision. This was an important milestone on the industry’s road to ubiquitous simpler, stronger authentication, and many deployments brought FIDO Authentication to users around the globe. To further add support for FIDO Authentication across devices and platforms, FIDO Alliance published its second set of specifications, FIDO2, in March 2019. See “Why did the FIDO Alliance see the need for FIDO2?” for more information.
What are the FIDO specifications?
The FIDO Alliance has published three sets of specifications for simpler, stronger authentication: FIDO Universal Second Factor (FIDO U2F), FIDO Universal Authentication Framework (FIDO UAF) and the Client to Authenticator Protocols (CTAP). CTAP is complementary to the W3C’s Web Authentication (WebAuthn) specification; together, they are known as FIDO2.
What’s the best way to follow FIDO’s progress?
The FIDO Alliance website provides comprehensive information about the Alliance, its specifications, FIDO Certified products, a knowledge base of resources and best practices and general progress. You can also sign up to receive updates and invitations to future events, many of which are open to the public. You can also follow @FIDOalliance on Twitter and/or on LinkedIn.
Is the FIDO Alliance a non-profit organization? What is the scope?
The FIDO (Fast IDentity Online) Alliance is a 501(c)6 non-profit organization incorporated in mid-2012 to develop standards that address the lack of interoperability among strong authentication devices as well as the problems users face with creating and remembering multiple usernames and passwords. To learn more about the FIDO Alliance governance and structure, please refer to the About FIDO page and the Membership Details page.
Do the FIDO specifications enable anyone to begin using the specs to develop and offer FIDO certified products?
FIDO’s specifications are public and available for anyone to read and analyze. But only FIDO Alliance Members benefit from “the promise” to not assert patent rights against other members’ implementations (see the FIDO Alliance Membership Agreement for details). Anyone may join the FIDO Alliance; we encourage even very small companies with a very low cost to join at the entry level. Members at all levels not only benefit from the mutual non-assert protection but also participate with FIDO Alliance members, activities, and developments; Associates have more limited participation benefits (https://fidoalliance.org/members/membership-benefits/). All are invited to join the FIDO Alliance and participate.
Is one FIDO token/dongle/device better than another? How can I choose which to buy?
FIDO specifications are device-agnostic and support a full range of authentication technologies, including FIDO Security Keys and biometrics such as fingerprint and iris scanners, voice and facial recognition, as well as PIN or pattern-protected microSD cards. FIDO specifications will also enable existing solutions and communications standards, such as Trusted Platform Module (TPM), USB Security Tokens, embedded Secure Elements (eSE), Smart Cards, Bluetooth Low Energy (BLE), and Near Field Communication (NFC). Because FIDO specifications are open, they are designed to be extensible and to accommodate future innovation, as well as protect existing investments.
Has FIDO made implementation rights available to anyone?
FIDO Alliance members have all committed to the promise contained within our Membership Agreement to not assert their patents against any other member implementation of FIDO 1.0 final specifications (referred to as “Proposed Standard” in our Membership Agreement). Anyone interested in deploying a FIDO compliant solution can do so without joining the Alliance, and they are strongly encouraged to use FIDO Certified products to enable that deployment.
How can I be sure that the product I’m buying conforms to FIDO standards?
The FIDO Alliance Certification Working Group is responsible for testing products for conformance to FIDO specifications and interoperability between those implementations. You can learn more about the FIDO® Certified program here.
Why are standards important?
Open industry standards assure that existing and future products and offerings are compatible and that anyone can evaluate the technology. Users can depend on their FIDO devices working wherever FIDO authentication is supported. Service providers and enterprises can accommodate various devices and services without having to make new investments or reverting to proprietary configurations.
Can’t someone break into an account if they steal a device?
No. In order to break into an account, the criminal would need not only the user’s device that was registered as a FIDO Authenticator to the account but also the ability to defeat the user identification challenge used by the Authenticator to protect the private keys – such as a username and PIN or a biometric. This makes it extremely difficult to break into a FIDO-enabled account.
How does the FIDO approach to biometric authentication make a user safer? Could anyone steal my biometric information from a device or online service?
When used in FIDO Authentication, user biometric data never leaves the device and is never stored on a central server where it could be stolen in a breach. FIDO’s on-device model for authentication eliminates the risk of a remote attack. If a would-be attacker had access to the user’s actual device, a successful spoof would be quite difficult. First, the attacker must obtain a perfectly formed, complete latent print that is also enrolled on the target user’s device. Then, the attacker must gain access to the user’s device in order to control only that one device. The single spoof, even if accomplished, doesn’t approach the potential harm done by today’s typical mass-scale attack, which can result in harvesting millions and hundreds of millions of users’ credentials.
How does FIDO Authentication make users safer on the web?
Unlike current password-based authentication models that have proven vulnerable to mass-scale attacks and fraud, FIDO authentication credentials are never shared or stored in centralized databases. FIDO credentials are known and maintained only by the user’s own device. All that is ever stored by the service provider are the public keys paired to the user’s device where the private keys are stored. For additional security and privacy, biometrics used in FIDO Authentication never leave the device. This security model eliminates the risks of phishing, all forms of password theft and replay attacks. A would-be attacker would need the user’s physical device to even attempt a hack (see below, “can’t someone break into an account if they steal a device?” for more information). The password ecosystem has afforded attackers with great return on investment with relatively limited risk; the FIDO ecosystem is far more difficult, expensive and risky for attackers to profit from.
How do you protect against root kits and malware attacks on the embedded fingerprint sensor?
The FIDO Alliance recently launched the Authenticator Certification Program. This program introduces Authenticator Security Requirements to the FIDO Certification Program specifically for authenticators. Each authenticator that is certified under the FIDO Certification program is validated to meet specific security assurance levels depending on the level of security the vendor is seeking. The higher the level, the greater the security assurance. More information about this program can be found here: https://fidoalliance.org/certification/authenticator-certification-levels/.
If I use the same device with multiple websites, can one site know that I use it with another site?
No, this type of information exchange is prevented with FIDO Authentication. Each device/website pairing requires separate registration and a separate cryptographic key pair. Once registered, a user can easily authenticate to multiple sites from the same device, yet each site has no knowledge of the user interactions with other sites. FIDO does not introduce any new tracking mechanism that could be used to correlate user activity online.
Does FIDO get any of my personal information?
No. FIDO Alliance only specifies standards for strong authentication and tests implementations for compliance to those standards; the Alliance does not provide services or equip devices or sites. Device manufacturers, online service providers, enterprises, and developers use the FIDO specifications to build products, provide services, and enable sites and browsers with FIDO authentication. Under FIDO specifications, the user’s credentials must remain on the user’s device, and they are never shared with a provider or service.
How can companies get involved in the FIDO Alliance’s new work areas?
The IDWG and IoT TWG are now open to industry participants. Participation in FIDO Alliance working groups is open to all board and sponsor level members of the FIDO Alliance. For more information on joining the Alliance, visit https://fidoalliance.org/members/membership-benefits.
What will the IoT Technical Working Group do?
The IoT TWG will provide a comprehensive authentication framework for IoT devices in keeping with the fundamental mission of the Alliance – passwordless authentication. The IoT TWG will develop use cases, target architectures and specifications covering: IoT device attestation/authentication profiles to enable interoperability between service providers and IoT devices; automated onboarding, and binding of applications and/or users to IoT devices; and IoT device authentication and provisioning via smart routers and IoT hubs.
What will the Identity Verification and Binding Working Group do?
The FIDO Alliance has identified newer remote, possession-based techniques including biometric “selfie” matching and government-issued identity document authentication as having the potential to greatly improve the quality of identity assurance for new account onboarding and account recovery. The IDWG will define criteria for this type of remote identity verification, as well as others, and develop a certification program and educational materials to support the adoption of that criteria.
How will the Alliance fulfill these new standards and certification initiatives?
The Alliance has formed two new working groups: the Identity Verification and Binding Working Group (IDWG) and the IoT Technical Working Group (IoT TWG) to establish guidelines and certification criteria in these areas. The FIDO Alliance will continue to focus on development and adoption of its user authentication standards and related programs and use them as a foundation for this expanded work, with contributions from current members and new industry participants.
How do these new areas related to user authentication?
Identity verification and IoT security are both adjacent to the FIDO Alliance core focus on user authentication. For accounts protected by FIDO Authentication, identity verification for the account recovery process when a FIDO device is lost or stolen becomes critical to maintaining the integrity of the user’s account. With IoT devices, typical industry practices is to ship them with default password credentials and manual onboarding, which leaves them open to attack. The security gaps in both of these areas can most effectively addressed through industry collaboration and standardization rather than siloed, proprietary approaches.
What is the FIDO Alliance trying to achieve with these new initiatives?
Ultimately, the Alliance is striving to increase the efficacy and market adoption of FIDO Authentication by addressing adjacent technology areas that leave security vulnerabilities on the web. There is a gap between the high assurance provided by FIDO Authentication standards and the lower assurance methods used in identity verification for account recovery and IoT authentication. The Alliance aims to strengthen identity verification assurance to support better account recovery and automate secure device onboarding to remove password use from IoT.
What are the FIDO Alliance new work areas?
The Alliance announced new work areas to develop standards and certification programs in identity verification and the Internet of Things (IoT).
What is next for the FIDO Alliance and FIDO standards?
FIDO Alliance’s work is just beginning. The specifications and certification programs are continuing to evolve, and our deployment work is taking on even greater importance. Additionally, the Alliance has just launched new work areas in IoT and identity verification, which leverage the Alliance’s broad coalition of leading organizations from around the world to help standardize technologies adjacent to user authentication. For more information on these work areas, read https://fidoalliance.org/fido-alliance-announces-id-and-iot-initiatives/.
How does the FIDO Alliance ensure interoperability with FIDO2?
FIDO Alliance provides interoperability testing and certification for servers, clients, and authenticators adhering to FIDO2 specifications. Additionally, the Alliance has introduced a new Universal Server certification for servers that interoperate with all FIDO Authenticator types (UAF, U2F, CTAP). As a best practice, the FIDO Alliance recommends online services and enterprises deploy a Universal Server to ensure support for all FIDO Certified Authenticators.
Does FIDO2 mean that FIDO U2F is dead?
Not at all. FIDO U2F capabilities have merged into FIDO2’s CTAP2 protocol, and FIDO U2F security keys will continue to work with services that support U2F authentication as well as those that have support FIDO2 authentication.
Does FIDO2 replace the FIDO U2F and FIDO UAF specifications?
The specifications under FIDO2 support existing passwordless FIDO UAF and FIDO U2F use cases and specifications and expand the availability of FIDO Authentication. Users that already have external FIDO-compliant devices, such as FIDO U2F security keys, will be able to continue to use these devices with web applications that support WebAuthn. Existing FIDO UAF devices can still be used with pre-existing services as well as new service offerings based on the FIDO UAF protocols.
What is the status of FIDO2 browser and platform implementation?
Current adoption status is available here.
What is the status of FIDO2 specifications development?
FIDO2 standards are published and available for implementation today. WebAuthn reached W3C’s final Recommendation status in March 2019 and is an official web standard. CTAP is a final FIDO Alliance specification.
Why did FIDO Alliance submit specifications to the W3C?
FIDO Alliance partnered with W3C to standardize FIDO Authentication for the entire web platform so the FIDO ecosystem could grow by an entire community of web browsers and web application servers supporting the standard. W3C is where the web community produces their standards, so it was more practical to work in that forum.
What is the relationship between FIDO2 and W3C’s WebAuthn?
A good rule of thumb is to remember this simple equation:
FIDO2 = W3C WebAuthn + CTAP
This is the full story of FIDO2’s development:
After the release of the FIDO UAF and FIDO U2F specifications, FIDO Alliance focused on making FIDO Authentication more accessible to users worldwide. The Alliance developed three technical specifications that defined one web-based API, enabling FIDO Authentication to be built directly into browsers and platforms. These specifications were submitted to the W3C, the international standards organization for the World Wide Web, in November of 2015. FIDO Alliance member companies worked within the W3C’s Web Authentication Working Group to finalize the API, which became known as WebAuthn. WebAuthn was officially recognized as a W3C web standard in March 2019.
In the same time period, the FIDO Alliance created and finalized a complementary specification to WebAuthn: the Client to Authenticator Protocol (CTAP). CTAP makes WebAuthn even more accessible to users by allowing them to use the devices they already own, such as their mobile phone, security key or Windows 10 PC to authenticate to WebAuthn-enabled browsers and platforms.
Together, WebAuthn and CTAP are called FIDO2. The FIDO Alliance manages and maintains the certification program to ensure interoperability of all the FIDO2 implementations in the market – clients, servers and authentication devices.
Why did the FIDO Alliance see the need for FIDO2?
The FIDO Alliance goal has always been ubiquitous strong authentication across the web. That means building support for FIDO Authentication into every device that people use every day. The Alliance made notable progress with its initial FIDO U2F and FIDO UAF specifications, especially on mobile platforms. FIDO2 expands the reach of FIDO Authentication by making it a built-in feature across browsers and web platforms, which is a significant step toward the Alliance’s overall goal.
Is it “FIDO2” or “FIDO 2.0”?
FIDO2 is the official name for the complete set of FIDO’s latest standards.
What specifications are included in FIDO2?
FIDO2 includes two specifications:
What is FIDO2?
FIDO2 is the overarching term for FIDO Alliance’s newest set of strong authentication standards. FIDO2 includes two specifications: W3C’s Web Authentication (WebAuthn) and FIDO Alliance’s Client to Authenticator Protocol (CTAP).
Can I use the same FIDO device with multiple websites? Can I use multiple FIDO devices with the same website?
Yes, you can use multiple websites from one FIDO device. Each device/website pairing requires a separate registration and a separate cryptographic key pair. Once registered, a user can easily authenticate to multiple sites from the same device, yet each site has no knowledge of the user interactions with other sites.
If a user acquires a new device or wants to use multiple FIDO devices, the user needs only register each of the devices at the sites where he wants to use them. Once a device is registered at a site, it will be recognized whenever the user needs to authenticate at that site. When a user visits a site with a new device that hasn’t been registered, and thus isn’t automatically recognized, the user will be prompted to register the new FIDO device to enable FIDO authentication with the new device at that site.
Will FIDO devices work when I don’t have Internet connectivity?
The purpose of the FIDO model is to provide a secure and simple authentication experience for online services. The authentication involves a user with a device connecting to a service over a network.
What is the Certificate number format of the FIDO Alliance issued Certificates?
The FIDO Alliance Certificate number format is: AA-NNNNN-SSSSS, where AA is the Program Identifier, NNNNN is the Certification number, and SSSSS is the Product Identifier. The Program Identifier corresponds to the certification program under which the Certificate was issued.
What is the audit process for products in the market?
The FIDO Alliance staff will audit on a monthly basis the usage of FIDO Certified logos and published claims of certification. Auditing of actual implementations will be driven by market feedback. Should any concerns arise, feedback can be submitted through the Certified Logo Violation form.
Must I certify a product in order to market it?
No. But a product must be certified to claim to be FIDO Certified and use the FIDO Certified logo.
How does the FIDO Alliance certify derivative products?
Derivative certification was created to streamline the certification process for implementers that have a large volume of certifications that are essentially all based on the same implementation. In this case, implementers may certify one implementation and the rest may be registered as “derivatives” of that base certification. Derivatives don’t require attending interoperability events to achieve certification, but they do require that the derivative implementation run and pass conformance testing. The implementation cannot change in any substantial way from the original certification earned via our test tools and interoperability testing. If there are changes to the implementation, then it will need to go through the FIDO Impact Analysis to determine if the implementation requires a Delta Certification or Recertification.
How often do testing events occur?
Interoperability events occur at least every 90 days, but may occur more frequently based on implementer demand.
What are the costs associated with certification?
Fees are per implementation certified and must be paid before a Certificate will be issued.
For an overview of the FIDO Certification Fees per program, please go to the Certification Fees page.
Can I become FIDO Certified if I am not a FIDO Alliance Member?
Yes. Non-members are welcome to certify their implementations.
What is a Vendor ID and who needs one?
The UAF authenticator specification defines an AAID field that is half Vendor ID and half Device ID used to uniquely identify each authenticator. The Vendor ID is a unique identifier assigned by FIDO to each company implementing a UAF authenticator. The other half of the AAID field, the Device ID, is assigned to the authenticator by the implementing company. Only UAF Authenticators require a Vendor ID.
How long is a product certified, and is recertification required when protocols change?
A product is certified indefinitely as long as the code base of its FIDO implementation doesn’t change in any substantial way. Certification can only be terminated in rare instances, such as determining that an implementation improperly passed test tools or interoperability events. Certification only applies to a specific specification and implementation class (i.e. “UAF Authenticator”). If new major versions of specifications are released (as determined by the FIDO Certification Working Group) and an implementation would like to claim conformance with that specification, new certification will be required.
Is there a Trademark License Agreement (TMLA) requirement for logo use?
Use of the FIDO Certified logo will require signing a TMLA. There is a streamlined process for Relying Parties that wish to use the certification logo on their websites, which includes a “clickless” license agreement.
Will there be a FIDO Certified logo?
Yes. There is a recognizable FIDO Certified logo for vendors to include with their websites, product materials, packaging, etc.
How do I get started?
Start by making sure your implementation passes the conformance tests (registration required). After you’ve validated your implementation, register for an Interoperability event and you’re on your way to certifying your product.
What is the FIDO Alliance Metadata Service?
The FIDO Alliance Metadata Service (MDS) is a web-based tool where FIDO authenticator vendors can publish metadata statements for FIDO servers to download. This provides organizations deploying FIDO servers with a centralized and trusted source of information about FIDO authenticators.
What kinds of companies should get involved?
Vendor companies looking to bring FIDO-based solutions to market and/or organization service providers seeking to understand the most effective ways to deploy FIDO Authentication will benefit the most from participating in FIDO Alliance working groups.
How do companies benefit from joining the working groups?
By taking part in FIDO Alliance’s technical working groups, members have the ability to shape and have early visibility into FIDO’s technical output – which can help accelerate product and service development. Participating in the working groups will also enable your team to get peer-based feedback to aid with your own implementations, while also creating an opportunity to have your company’s vision reflected in deployment guidelines and recommendations.
Can you describe the functional testing process?
There are four major testing steps:
How is the testing done?
Certification starts with self-assessment of specification conformance through the use of FIDO Alliance provided test tools, followed by interoperability testing with at least three test partners at FIDO Alliance-proctored test events. At this time, there is no lab aspect to the certification program, but the Certification Working Group is currently reviewing requirements to develop and implement a Functional Lab Accreditation program. See the Getting Started web page to learn more.
Are there separate submission fees for testing against each of the FIDO Alliance specifications?
Yes. Implementations must request certification (and pay the certification fees) for each implementation class they are seeking to certify. For example, if an implementation certifies for both a FIDO UAF Server and a FIDO2 Server, that implementation must follow the certification process for both (and pay the certification fees for both). The implementation would ultimately receive two certifications. The primary difference between testing for different specifications is they have different test tools and the different interoperability events.
Our company just built a new product but we haven’t gotten it certified yet. Can we say that it is FIDO Certified while we are working on achieving our certification?
No. Only products that have passed through FIDO Certification program and have been granted a certification number can claim to be FIDO Certified.
What is the Certificate number format of the FIDO Alliance issued Certificates?
The FIDO Alliance issued Certificates have the following numerical format:
SSSXYZAYYYYMMDD####
SSS – Specification number (UAF or U2F)
X – Specification number
Y – Specification minor number
Z – Specification revision number
A – Specification errata number
YYYY – Year issued
MM – Month issued
DD – Day issued
#### – The number of the certificate issued today
What is the audit process for products in the market?
The FIDO Alliance staff will audit on a monthly basis the usage of FIDO Certified logos and published claims of certification. Auditing of actual implementations will be driven by market feedback. Should any concerns arise, feedback can be submitted through the Certified Logo Violation form.
Must I certify a product in order to market it?
No. But a product must be certified to claim to be FIDO Certified and use the FIDO Certified logo.
How does the FIDO Alliance certify derivative products?
Derivative certification was created to streamline the certification process for implementers that have a large volume of certifications that are essentially all based on the same implementation. In this case, implementers may certify one implementation and the rest may be registered as “derivatives” of that base certification. Derivatives don’t require attending interoperability events to achieve certification, but they do require that the derivative implementation run and pass conformance testing. The implementation cannot change in any substantial way from the original certification earned via our test tools and interoperability testing. If there are changes to the implementation, then it will need to go through the FIDO Impact Analysis to determine if the implementation requires a Delta Certification or Recertification.
How often do testing events occur?
Interoperability events occur at least every 90 days, but may occur more frequently based on implementer demand.
What are the costs associated with certification?
Fees are per implementation certified and must be paid before a Certificate will be issued.
Can I become FIDO Certified if I am not a FIDO Alliance Member?
Yes. Non-members are welcome to certify their implementations.
What is a Vendor ID and who needs one?
The UAF authenticator specification defines an AAID field that is half Vendor ID and half Device ID used to uniquely identify each authenticator. The Vendor ID is a unique identifier assigned by FIDO to each company implementing a UAF authenticator. The other half of the AAID field, the Device ID, is assigned to the authenticator by the implementing company. Only UAF Authenticators require a Vendor ID.
How long is a product certified, and is recertification required when protocols change?
A product is certified indefinitely as long as the code base of its FIDO implementation doesn’t change in any substantial way. Certification can only be terminated in rare instances, such as determining that an implementation improperly passed test tools or interoperability events. Certification only applies to a specific specification and implementation class (i.e. “UAF Authenticator”). If new major versions of specifications are released (as determined by the FIDO Certification Working Group) and an implementation would like to claim conformance with that specification, new certification will be required.
Is there a Trademark License Agreement (TMLA) requirement for logo use?
Use of the FIDO Certified logo will require signing a TMLA. There is a streamlined process for Relying Parties that wish to use the certification logo on their websites, which includes a “clickless” license agreement.
Will there be a FIDO Certified logo?
Yes. There is a recognizable FIDO Certified logo for vendors to include with their websites, product materials, packaging, etc.
How do I get started?
Start by making sure your implementation passes the conformance tests (registration required). After you’ve validated your implementation, register for an Interoperability event and you’re on your way to certifying your product.
What is the FIDO Alliance Metadata Service?
The FIDO Alliance Metadata Service (MDS) is a web-based tool where FIDO authenticator vendors can publish metadata statements for FIDO servers to download. This provides organizations deploying FIDO servers with a centralized and trusted source of information about FIDO authenticators.
What kinds of companies should get involved?
Vendor companies looking to bring FIDO-based solutions to market and/or organization service providers seeking to understand the most effective ways to deploy FIDO Authentication will benefit the most from participating in FIDO Alliance working groups.
See Who Has Signed the Pledge
- 1Password
- A4 Technology Pty Ltd
- ABANCA
- ALLEN TATE
- Allthenticate
- City of Phoenix
- Dashlane
- FEITIAN Technologies US
- Finartz
- HYPR
- IDEMIA Public Security
- Juspay
- KSI Keyboards
- Next Identity
- Nok Nok
- Nura
- OneSpan
- Pos Digicert Sdn Bhd
- Rakuten Group Inc.
- Reliable Identities, Inc.
- Secfense
- Starfish & Co.
- Technic
- ToothPic
- Transmit Security
- U.S. Army Corps of Engineers
- VicRoads
- Whirly