Security.com

FIDO (Fast Identity Online)

By David Strom

What is FIDO (Fast Identity Online)?

FIDO (Fast Identity Online) is a set of technology-agnostic security specifications for strong authentication. FIDO is developed by the FIDO Alliance, a nonprofit organization that seeks to standardize authentication at the client and protocol layers.

FIDO specifications support multifactor authentication (MFA) and public key cryptography. Unlike password databases, FIDO stores personally identifiable information, such as biometric authentication data, locally on the user's device to protect it. FIDO's local storage of biometrics and other personal identification is intended to ease user concerns about personal data stored on an external server in the cloud. By abstracting the protocol implementation with APIs, FIDO also reduces the work required for developers to create secure logins for mobile clients running different OSes on different types of hardware.

FIDO supports the Universal Authentication Framework (UAF), the Universal Second Factor (U2F) protocols and FIDO2. With UAF, the client device creates a new key pair during registration with an online service and retains the private key; the public key is registered with the online service. During authentication, the client device proves possession of the private key to the service by signing a challenge, which involves a user-friendly action, such as providing a fingerprint, entering a PIN, taking a selfie or speaking into a microphone.

With U2F, authentication requires a strong second factor such as a near field communication (NFC) tap or USB security token. The user is prompted to insert and touch their personal U2F device during login. The user's FIDO-enabled device creates a new key pair, and the public key is shared with the online service and associated with the user's account. The service can then authenticate the user by requesting that the registered device sign a challenge with the private key.

The history of the FIDO Alliance

In 2007, PayPal was trying to increase security by introducing MFA to its customers in the form of its one-time password (OTP) key fob: Secure Key. Although Secure Key was effective, adoption rates were low -- it was generally used only by few security-conscious individuals. The key fob complicated authentication, and most users just didn't feel the need to use it.

In talks exploring the idea of integrating finger-scanning technology into PayPal, Ramesh Kesanupalli (then CTO of Validity Sensors) spoke to Michael Barrett (then PayPal's CISO). It was Barrett’s opinion that an industry standard was needed that could support all authentication hardware. Kesanupalli set out from there to bring together industry peers with that end in mind.

The FIDO Alliance was founded as the result and went public in February 2013. Since that time, many companies have become members, including Google, Microsoft, Apple, ARM, Bank of America, Mastercard, Visa, Samsung, Dell and RSA.

Today, FIDO authentication is guided by three mandates: ease of use, standardization and privacy/security.

This article by David Strom was written in 2018. TechTarget editors revised it in 2023 to improve the reader experience.

20 Mar 2023

All Rights Reserved, Copyright 2000 - 2024, TechTarget | Read our Privacy Statement