Operations // Identity & Access Management
2/18/2014
11:16 AM
Connect Directly
RSS
E-Mail
50%
50%

FIDO Alliance Releases Authentication Standards, Unveils Products

Proponents say the new specifications will pave the way for the replacement of passwords, which are frequently lost, stolen, or hacked.

The Fast Identity Online (FIDO) Alliance, a consortium of nearly 100 security vendors and enterprises that proposes to create a standard method for user authentication, published its first specifications for industry review last Tuesday.

The first products to be built on the specifications, Nok Nok Labs' S3 Authentication Suite, were released on Thursday.

Proponents of the FIDO guidelines, which are designed to help systems find the most effective method of authenticating a user, say the new specifications will pave the way for the replacement of passwords, which are frequently lost, stolen, or hacked.

"One of the clear advantages of the FIDO approach is that it offers users a consistent experience across multiple services and user devices, a range of multi-factor schemes, and maintains privacy by using distinct authentication keys for different services," says Andrew Young, vice president of product management for authentication at SafeNet. "The FIDO Alliance, by helping to standardize multi-factor practices, will contribute to the formation of a broader identity framework based on greater trust and better security in both consumer and enterprise environments."

The FIDO Alliance proposes to create common "plumbing" for authentication, creating a single method for logging onto a secure system, regardless of the authentication technologies used. When an access request is received under FIDO, the systems involved seek out the most effective method of authentication that can be used by both the server and the client and trigger it, eliminating the need for all users to conform to a single authentication mechanism or rely on passwords.

Phillip Dunkelberger, president & CEO of Nok Nok Labs, tells InformationWeek why the time is ripe for a password free computing experience.

Read the rest of this article on Dark Reading.

Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-2227
Published: 2014-07-25
The default Flash cross-domain policy (crossdomain.xml) in Ubiquiti Networks UniFi Video (formerly AirVision aka AirVision Controller) before 3.0.1 does not restrict access to the application, which allows remote attackers to bypass the Same Origin Policy via a crafted SWF file.

CVE-2014-5027
Published: 2014-07-25
Cross-site scripting (XSS) vulnerability in Review Board 1.7.x before 1.7.27 and 2.0.x before 2.0.4 allows remote attackers to inject arbitrary web script or HTML via a query parameter to a diff fragment page.

CVE-2014-5100
Published: 2014-07-25
Multiple cross-site request forgery (CSRF) vulnerabilities in Omeka before 2.2.1 allow remote attackers to hijack the authentication of administrators for requests that (1) add a new super user account via a request to admin/users/add, (2) insert cross-site scripting (XSS) sequences via the api_key_...

CVE-2014-5101
Published: 2014-07-25
Multiple cross-site scripting (XSS) vulnerabilities in WeBid 1.1.1 allow remote attackers to inject arbitrary web script or HTML via the (1) TPL_name, (2) TPL_nick, (3) TPL_email, (4) TPL_year, (5) TPL_address, (6) TPL_city, (7) TPL_prov, (8) TPL_zip, (9) TPL_phone, (10) TPL_pp_email, (11) TPL_authn...

CVE-2014-5102
Published: 2014-07-25
SQL injection vulnerability in vBulletin 5.0.4 through 5.1.3 Alpha 5 allows remote attackers to execute arbitrary SQL commands via the criteria[startswith] parameter to ajax/render/memberlist_items.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Sara Peters hosts a conversation on Botnets and those who fight them.