FIDO Alliance Releases Authentication Standards, Unveils ProductsFIDO Alliance Releases Authentication Standards, Unveils Products
Proponents say the new specifications will pave the way for the replacement of passwords, which are frequently lost, stolen, or hacked.
February 18, 2014
The Fast Identity Online (FIDO) Alliance, a consortium of nearly 100 security vendors and enterprises that proposes to create a standard method for user authentication, published its first specifications for industry review last Tuesday.
The first products to be built on the specifications, Nok Nok Labs' S3 Authentication Suite, were released on Thursday.
Proponents of the FIDO guidelines, which are designed to help systems find the most effective method of authenticating a user, say the new specifications will pave the way for the replacement of passwords, which are frequently lost, stolen, or hacked.
"One of the clear advantages of the FIDO approach is that it offers users a consistent experience across multiple services and user devices, a range of multi-factor schemes, and maintains privacy by using distinct authentication keys for different services," says Andrew Young, vice president of product management for authentication at SafeNet. "The FIDO Alliance, by helping to standardize multi-factor practices, will contribute to the formation of a broader identity framework based on greater trust and better security in both consumer and enterprise environments."
The FIDO Alliance proposes to create common "plumbing" for authentication, creating a single method for logging onto a secure system, regardless of the authentication technologies used. When an access request is received under FIDO, the systems involved seek out the most effective method of authentication that can be used by both the server and the client and trigger it, eliminating the need for all users to conform to a single authentication mechanism or rely on passwords.
Phillip Dunkelberger, president & CEO of Nok Nok Labs, tells InformationWeek why the time is ripe for a password free computing experience.
Read the rest of this article on Dark Reading.
About the Author(s)
You May Also Like
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023
What's In Your Cloud?Nov 30, 2023
Everything You Need to Know About DNS AttacksNov 30, 2023
9 Traits You Need to Succeed as a Cybersecurity Leader
The Ultimate Guide to the CISSP
The Evolving Ransomware Threat: What Business Leaders Should Know About Data Leakage
Protecting Critical Infrastructure: The 2021 Energy, Utilities, and Industrials Cyber Threat Landscape Report
2021 Banking and Financial Services Industry Cyber Threat Landscape Report