Enabling Any Relying Parties to Create FIDO UAF (1.1 or later) Client Apps

This paper introduces the details of a hardware-backed Keystore authenticators (HKA) implementation approach, based on the first commercial deployment. It takes advantage of secure Android Keystore with key attestation and fingerprint sensors in hardware on standard off-the-shelf Android 8.0 or later mobile devices. Since it is enabled only by Android applications, any RPs and application developers can develop their own secure FIDO UAF 1.1 authenticators.


More

White Paper: DBSC/DPOP as Complementary Technologies to FIDO Authentication

Editors Shane Weeden, IBMAn Ho, IBM Abstract Session hijacking is a growing initial attack vector…

Read More →

Passkeys: The Journey to Prevent Phishing Attacks

This white paper is part of a three-part series on preventing phishing attacks through passkey…

Read More →

White Paper: FIDO Alliance Guidance for U.S. Government Agency Deployment of FIDO Authentication

This document is intended to highlight areas where FIDO offers the best value to address…

Read More →


12315 Next