FIDO アライアンスのユーザー認証仕様の最新版は、以下から入手できます。 FIDOを初めてお使いになる方は、先に進む前にまず「仕様の概要」をご覧になることをお勧めします。
FIDO アライアンスは、技術要件を満たすだけでなく、各デバイスのセキュリティ保証を強化するために実装する必要があるさらなるセキュリティ要件を開発しました。これらの要件は、認定認証器のレベル ページにある認証器認定プログラムでカバーされています。
旧バージョンの仕様書は、UAF1.0仕様書の中国語訳とともに 仕様書アーカイブで見ることができる。 FIDO アライアンス仕様のFIDO仕様ステータスと知的財産権(IPR)については、こちらをご覧ください。
FIDOアライアンスは、すべての実装者がダウンロードできるように、次の技術仕様を公開しています。 さらに、アライアンスは、fido-dev@fidoalliance.org公開ディスカッション・リストを運営することで、FIDO 認証技術の実装者を支援している。 FIDO仕様の実装に関する質問は、そのフォーラムに投稿してください。
FIDO アライアンスは、読者の便宜のためにPDF形式の仕様を作成していますが、PDF形式の仕様でフォーマットの問題が発生した場合は、HTML形式の仕様を参照することをお勧めします。 まだファイド・アライアンスのメンバーでない方で、公開ドラフト仕様書についてコメントを希望される方は、お問い合わせフォームをご利用ください。
FIDO2 Specifications | ||
---|---|---|
CLIENT TO AUTHENTICATOR PROTOCOL (CTAP) This Proposed Standard document describes the Client-to-Authenticator Protocol (CTAP) which uses USB, NFC, and / or BLE for communication between browsers or platforms and FIDO2 authenticators. CTAP 2.1 Proposed Standard with Errata: HTML | PDF CTAP 2.1 Errata: HTML | PDF CTAP 2.2 Review Draft 02: HTML | PDF | W3C – Web Authentication: An API for accessing Public Key Credentials Level 2 (Webauthn) This specification defines an API enabling the creation and use of strong, attested, scoped, public key-based credentials by web applications, for the purpose of strongly authenticating users. Download: HTML |
UAF Specifications | ||
---|---|---|
FIDO UAF Complete Specifications This is a zip file containing the FIDO Alliance Universal Authentication Framework (UAF) specification files: Change USB transport to conform to ISO7816-4 NFC (ISO7816-4) support Bluetooth Low Energy support Updated JavaScript 1.1 specification Transports Extension specification Expanded Metadata Service specification to include U2F 1.1 Proposed Standard: Files 1.2 Proposed Standard: Files | FIDO UAF Architectural Overview This overview document describes the various protocol design considerations in detail and also describes the user flows in detail. It describes the layering and intention of each of the detailed protocol documents. You should read this document first if you are new to UAF. 1.1 Proposed Standard: HTML | PDF 1.2 Proposed Standard: HTML | PDF | FIDO UAF Protocol Specification This document defines the message formats and processing rules for all UAF protocol messages. 1.1 Proposed Standard: HTML | PDF 1.2 Proposed Standard: HTML | PDF |
UAF Application API and Transport Binding Specification This document describes the client-side APIs and interoperability profile for client applications to utilize FIDO UAF. 1.1 Proposed Standard: HTML | PDF 1.2 Proposed Standard: HTML | PDF | FIDO UAF Authenticator-specific Module API This document defines Authenticator-specific Modules and the API provided to the FIDO client by ASMs. 1.1 Proposed Standard: HTML | PDF 1.2 Proposed Standard: HTML | PDF | FIDO UAF Authenticator Commands This document describes Low-level functionality that UAF Authenticators should implement to support the UAF protocol. 1.1 Proposed Standard: HTML | PDF 1.2 Proposed Standard: HTML | PDF |
FIDO ECDAA Algorithm This document describes how to use Elliptic Curve (EC) Direct Anonymous Attestation (DAA) as a form of secure and private attestation for authenticators. 1.1 Proposed Standard: HTML | PDF 1.2 Review Draft: HTML | PDF 2.0 Implementation Draft: HTML | PDF | FIDO UAF APDU Commands This document defines a mapping of FIDO UAF Authenticator commands to Application Protocol Data Units (APDUs) thus facilitating UAF authenticators based on Secure Elements. 1.1 Proposed Standard: HTML | PDF 1.2 Proposed Standard: HTML | PDF | UAF Registry of Predefined Values This document describes implementation considerations and recommendations for creators of U2F devices and for relying parties implementing U2F support. 1.1 Proposed Standard: HTML | PDF 1.2 Proposed Standard: HTML | PDF |
FIDO UAF Android This document defines the assertion format “APCV1CBOR” in order to use Android Protected Confirmation for FIDO UAF Transaction Confirmation. 1.2 Proposed Standard: HTML | PDF | FIDO UAF WebAuthentication Assertion Format This document defines the assertion format “WAV1CBOR” in order to use Web Authentication assertions through the FIDO UAF protocol. 1.2 Proposed Standard: HTML | PDF | FIDO UAF ERRATA This errata is being published to address certain issues that have been identified in the UAF v1.1 Specification. All Specifications and errata are required to be approved by the FIDO Board prior to publication. 1.1 Implementation Draft: PDF |
FIDO Metadata | ||
---|---|---|
FIDO Authenticator Metadata Statements This document defines the authenticator metadata. This metadata, in turn, describes FIDO authenticator form factors, characteristics, and capabilities. The metadata is used to inform relying party interactions with, and make policy decisions about, the authenticators. 1.1 Proposed Standard: HTML | PDF 3.0 Proposed Standard: HTML | PDF | FIDO Authenticator Metadata Service Baseline method for relying parties to obtain FIDO Metadata statements. 1.1 Proposed Standard: HTML | PDF 3.0 Proposed Standard: HTML | PDF |
FIDO2 and UAF Common Files | |
---|---|
FIDO Registry of Predefined Values This document defines all the strings and constants common to all FIDO specifications. 1.1 Proposed Standard: HTML | PDF 2.2 Proposed Standard: HTML | PDF | FIDO AppID and Facet Specification This document defines the scope of user credentials and how a trusted computing base that supports application isolation may make access control decisions about which keys can be used by which applications and web origins. 1.1 Proposed Standard: HTML | PDF 2.1 Proposed Standard: HTML | PDF |
FIDO Security Reference Provides an analysis of FIDO security based on detailed analysis of security threats pertinent to the FIDO protocols based on its goals, assumptions, and inherent security measures. 1.1 Proposed Standard: HTML | PDF 2.1 Proposed Standard: HTML | PDF | FIDO Technical Glossary Defines the technical terms and phrases used in FIDO Alliance specifications and documents. 1.1 Proposed Standard: HTML | PDF 2.1 Proposed Standard: HTML | PDF |
FIDO ECDAA Algorithm This document describes how to use Elliptic Curve (EC) Direct Anonymous Attestation (DAA) as a form of secure and private attestation for authenticators. 1.1 Proposed Standard: HTML | PDF 2.1 Proposed Standard: HTML | PDF |
U2F SPECIFICATIONS | ||
---|---|---|
FIDO U2F Complete Specifications This is a zip file containing the U2F 1.2 Specifications public snapshot of FIDO Alliance Universal 2nd Factor (U2F) specs approved July 11th, 2017. Included in the latest U2F 1.2 specifications are: Change USB transport to conform to ISO7816-4 NFC (ISO7816-4) support Bluetooth Low Energy support Updated JavaScript 1.1 specification Transports Extension specification Expanded Metadata Service specification to include U2F You should read this document first if you are new to U2F. 1.2 Proposed Standard: Files | FIDO U2F Architectural Overview This overview document describes the various design considerations which go into the protocol in detail and describes the user flows in detail. It describes the layering and intention of each of the detailed protocol documents. It describes the various privacy considerations in the protocol design through the document and summarizes these at the end You should read this document first if you are new to U2F. 1.0 Proposed Standard: HTML 1.2 Proposed Standard: PDF 1.2 Proposed Standard: HTML 1.2 Proposed Standard: PDF | FIDO U2F JavaScript API This document describes the client side API in the web browser for accessing U2F capabilities. An online service or website can levearge U2F by using this API on the client side and pairing it with a server which can verify U2F messages on the server side. (Later specifications will describe APIs in non-browser contexts). 1.0 Proposed Standard: HTML 1.2 Proposed Standard: PDF 1.2 Proposed Standard: Files 1.2 Proposed Standard: Files |
FIDO U2F Raw Message Formats This document describes the binary format of request messages which go from the FIDO U2F server to the FIDO U2F token and the binary format of the response messages from the token to the server. These messages are encoded by the browser (FIDO client) for communication over a particular transport (such as USB) to the cryptographic core of the token which performs key generation and signing. A header file with standard values is also specified. 1.0 Proposed Standard: HTML 1.2 Proposed Standard: PDF 1.2 Proposed Standard: HTML 1.2 Proposed Standard: PDF | FIDO U2F HID Protocol This document describes how the browser (FIDO client) frames the binary raw messages coming from the javascript API for transport over USB-HID to a U2F token. The binary raw messages are described in the ‘FIDO U2F Raw Message Formats’ document. A header file with standard values is also specified. [Later specifications will specify how the javascript APIs frames raw messages over other (non-USB) transports]. 1.0 Proposed Standard: HTML 1.2 Proposed Standard: PDF 1.2 Proposed Standard: HTML 1.2 Proposed Standard: PDF | FIDO U2F Bluetooth® protocol This document describes the communication protocol between a FIDO client and FIDO authenticators over Bluetooth technology and Bluetooth Smart. 1.2 Proposed Standard: HTML 1.2 Proposed Standard: PDF |
FIDO U2F NFC Protocol This document describes the communication protocol between a FIDO client and FIDO authenticators over Near Field Communication (NFC). 1.2 Proposed Standard: HTML 1.2 Proposed Standard: PDF | FIDO U2F Transport Extensions This standard describes one way relying parties may learn which transports an authenticator supports, by allowing authenticator vendors to embed hardware features as an optional extension in the authenticator’s attestation certificate. 1.2 Proposed Standard: HTML 1.2 Proposed Standard: PDF | FIDO U2F Implementation Considerations This document describes implementation considerations and recommendations for creators of U2F devices and for relying parties implementing U2F support. 1.0 Proposed Standard: HTML 1.0 Proposed Standard: PDF 1.2 Proposed Standard: HTML 1.2 Proposed Standard: PDF |
FIDO AppID and Facet Specification This document defines the scope of user credentials and how a trusted computing base which supports application isolation may make access control decisions about which keys can be used by which applications and web origins. 1.0 Proposed Standard: HTML 1.0 Proposed Standard: PDF 1.2 Proposed Standard: HTML 1.2 Proposed Standard: PDF | FIDO Security Reference Provides an analysis of FIDO security based on detailed analysis of security threats pertinent to the FIDO protocols based on its goals, assumptions, and inherent security measures. 1.0 Proposed Standard: HTML 1.0 Proposed Standard: PDF 1.2 Proposed Standard: HTML 1.2 Proposed Standard: PDF | FIDO Technical Glossary Defines the technical terms and phrases used in FIDO Alliance specifications and documents. 1.0 Proposed Standard: HTML 1.0 Proposed Standard: PDF 1.2 Proposed Standard: HTML 1.2 Proposed Standard: PDF |
FIDO U2F Readme This is a README for the U2F 1.2 Implementation Draft public snapshot of the Universal Second Factor (U2F) specs as of July 11, 2017. 1.0 Proposed Standard: TXT 1.2 Proposed Standard: TXT |
FIDOの仕様状況と知的財産権(IPR)について
本サイトに掲載されている仕様の知的財産権状況の概要です:
Specification | Specification Status |
---|---|
U2F 1.0 | Proposed Standard Expanded to the World |
U2F 1.1 | Proposed Standard Expanded to the World |
U2F 1.2 | Proposed Standard Expanded to the World |
UAF 1.0 | Proposed Standard Expanded to the World |
UAF 1.1 | Proposed Standard Expanded to the World |
FIDO2 Submission to W3C | Proposed Standard Expanded to the World |
FIDO2 CTAP | Proposed Standard Expanded to the World |
FIDO Device Onboard 1.0 | Proposed Standard Expanded to the World |
FIDO Device Onboard 1.1 | Proposed Standard Expanded to the World |
FIDO アライアンスの仕様は、プレドラフト、ワーキングドラフト、レビュードラフト、規格案など、さまざまな段階を経て進行するIPRステータスの説明。FIDO アライアンスメンバー組織が、準拠した実装に対して特許権のロイヤリティフリーライセンスを付与するために締結した契約であるPromiseは、仕様段階に基づいて異なる方法で適用されます。 プロミスは、プレドラフト、ワーキングドラフト、レビュードラフトの仕様段階には適用されない。 提案された標準段階では、関連する技術作業部会のすべての FIDO アライアンス メンバーによって、約束が全世界に提供されます。2020年1月1日より前に提案規格として発行された FIDO アライアンス の仕様については、この約束は、準拠した実装に対して特許権を主張しないという誓約であり、その時点での FIDO アライアンス メンバー全員によって全世界に提供されます。上記は簡単な要約であり、実際の条件は FIDO アライアンス メンバーシップ契約に規定されており、特定のケースについては参照する必要があると理解されています。
特許に関する通知 FIDO アライアンス メンバーシップ契約は、特定の条件下で、付与された請求を約束から取り消す機会をメンバーに提供します。具体的な条件については、 FIDO アライアンス メンバーシップ契約 を参照する必要があります。 取締役会は、本サイトに掲載されたいかなる仕様書に関しても、そのような通知を受け取っていないことを一般に報告する。 これが何を意味するのかについて詳しく知りたい実装者は、 当社のIPRサマリー および/または FIDO アライアンス メンバーシップ契約のセクション6を確認することをお勧めします。