Operations // Identity & Access Management
2/18/2014
11:16 AM
50%
50%

FIDO Alliance Releases Authentication Standards, Unveils Products

Proponents say the new specifications will pave the way for the replacement of passwords, which are frequently lost, stolen, or hacked.

The Fast Identity Online (FIDO) Alliance, a consortium of nearly 100 security vendors and enterprises that proposes to create a standard method for user authentication, published its first specifications for industry review last Tuesday.

The first products to be built on the specifications, Nok Nok Labs' S3 Authentication Suite, were released on Thursday.

Proponents of the FIDO guidelines, which are designed to help systems find the most effective method of authenticating a user, say the new specifications will pave the way for the replacement of passwords, which are frequently lost, stolen, or hacked.

"One of the clear advantages of the FIDO approach is that it offers users a consistent experience across multiple services and user devices, a range of multi-factor schemes, and maintains privacy by using distinct authentication keys for different services," says Andrew Young, vice president of product management for authentication at SafeNet. "The FIDO Alliance, by helping to standardize multi-factor practices, will contribute to the formation of a broader identity framework based on greater trust and better security in both consumer and enterprise environments."

The FIDO Alliance proposes to create common "plumbing" for authentication, creating a single method for logging onto a secure system, regardless of the authentication technologies used. When an access request is received under FIDO, the systems involved seek out the most effective method of authentication that can be used by both the server and the client and trigger it, eliminating the need for all users to conform to a single authentication mechanism or rely on passwords.

Phillip Dunkelberger, president & CEO of Nok Nok Labs, tells InformationWeek why the time is ripe for a password free computing experience.

Read the rest of this article on Dark Reading.

Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-6628
Published: 2015-05-28
Aruba Networks ClearPass Policy Manager (CPPM) before 6.5.0 allows remote administrators to execute arbitrary code via unspecified vectors.

CVE-2015-1389
Published: 2015-05-28
Cross-site scripting (XSS) vulnerability in Aruba Networks ClearPass Policy Manager (CPPM) before 6.4.5 allows remote attackers to inject arbitrary web script or HTML via the username parameter to tips/tipsLoginSubmit.action.

CVE-2015-1392
Published: 2015-05-28
Multiple SQL injection vulnerabilities in Aruba Networks ClearPass Policy Manager (CPPM) before 6.4.5 allow remote administrators to execute arbitrary SQL commands via unspecified vectors.

CVE-2015-1550
Published: 2015-05-28
Directory traversal vulnerability in Aruba Networks ClearPass Policy Manager (CPPM) before 6.4.5 allows remote administrators to execute arbitrary files via unspecified vectors.

CVE-2015-1551
Published: 2015-05-28
Directory traversal vulnerability in Aruba Networks ClearPass Policy Manager (CPPM) before 6.4.4 allows remote administrators to read arbitrary files via unspecified vectors.

Dark Reading Radio
Archived Dark Reading Radio
After a serious cybersecurity incident, everyone will be looking to you for answers -- but you’ll never have complete information and you’ll never have enough time. So in those heated moments, when a business is on the brink of collapse, how will you and the rest of the board room executives respond?