SlideShare a Scribd company logo
© FIDO Alliance 2024 Confidential
1
Choosing the right FDO
deployment model for
your application
Geoffrey Cooper, Intel Corporation
FIDO Alliance, IOT Technical Working Group, Co-Chair
April, 2024
FDO Deployment Issues
Device Manufacturer
Ownership
Voucher (OV)
FDO
Manufacturing
tool
FDO Client &
Credentials
Device Initialization (DI)
Target Cloud
FDO owner
Rendezvous
server (RV)
FDO Client &
credentials
TO0 & TO1
Device Discovers
Server
T02 protocol
Device Onboards
Onboarding
Data
→
• The Ownership Voucher is invalidated after the device onboards. The Target
Cloud gets a new OV, to allow only it to use FDO in the future.
Where is device?
Where to Send OV?
TO0 protocol
TO1 protocol
Device
shipped
Device
installed
Is Target Cloud on Prem / Internet?
Single- Multi-tenant?
We need Zero Trust → Ownership Voucher
• Ownership Voucher is a new concept in FDO
• Popular Zero trust security model is “never trust, always verify.”
• Problem for onboarding, device doesn’t know server yet!
• Ownership Voucher provides credentials for the device to trust,
because OV & Device both came from same factory
Target Cloud
FDO owner
FDO Client &
credentials
Onboarding
Data
→
Ownership
Voucher (OV)
SERVER
TRUST
FROM
FACTORY
CLIENT
TRUST
FROM
FACTORY
Zero Trust
Concept
in FDO
Verify Trust
Choosing the right FDO deployment model for
your application
FDO is very flexible. Several architectures are available.
Architectures are based on network configuration:
Single Cloud
Multi-Cloud
Closed Network
Cloud Service
Multi-Tenant Cloud
Service
X
In this presentation, we look at scenarios with
FDO deployments for different network configurations

Recommended for you

MT82 IoT Security Starts at Edge
MT82  IoT Security Starts at EdgeMT82  IoT Security Starts at Edge
MT82 IoT Security Starts at Edge

Building enterprise Internet of Things (IoT) systems must start with reviewing and strengthening your current IT security to prepare for potential additional risk exposure. Then, understanding the security posture of connected devices being added to the network determines what smarter edge architectural components, such as IoT gateways, are needed to establish and defend functional integrity and enable protection from risks of less capable connected sensors and legacy equipment. This session will discuss the unique security risks in IoT ecosystems and the strategies and tools for addressing them.

securityiot
Let soracom help your IoT devices connect to the cloud!
Let soracom help your IoT devices connect to the cloud! Let soracom help your IoT devices connect to the cloud!
Let soracom help your IoT devices connect to the cloud!

Soracom IoT SIM Card - Connectivity designed for IoT It's simple, secure, affordable and scalable Our features: GLOBAL SCALABILITY: Our secure IoT SIM Card can connect to 2G/3G/LTE/Cat1 data in over 120 countries. LoraWan and Sigfox are available as well. DEVICE CLOUD ACCESS: Perform encryption over the cloud, reduce device power consumption, and lower data transfer amount to lower your costs. Less power and data on your IoT/M2M devices. FULL CONTROL VIA CONSOLE/API: Even a single active IoT SIM Card can get you immediate access to our full suite of IoT cellular connectivity services with a full-featured user console and API and data pool for complete control of every connection. Monitor and manage the state of every connection, view active/inactive status, check data usage, adjust speed or even pause/restart or terminate any connection at any time. IDEAL FOR: Fast prototyping and full-scale deployment. Optimized for IoT/M2M data. Voice & SMS not supported. PAY AS YOU GO: Only pay for the data and services you use. No minimum commitments. Let Soracom help your IoT devices connect to the cloud! You can get a free Soracom IoT SIM Card to test your IoT/M2M devices: https://www.soracom.io/free-sim/

soracomsoracom iotsoracom sim
The Value of FIDO Certification
The Value of FIDO CertificationThe Value of FIDO Certification
The Value of FIDO Certification

This presentation details the FIDO Alliance Certification Program - including an overview of the programs, process and the value of certification for both vendors and relying parties.

fido alliancefidofido authentication
Scenario 1: Onboarding devices with direct
internet access, single cloud/platform
Cloud 1
Devices
Scenario 1: Onboarding devices with direct
internet access, single cloud/platform
Customer Cloud
Manufacturer
Manufacturer Server
• Sets FDO device
credentials
• Creates FDO Ownership
Voucher
FDO Device
Initialize (DI)
FDO Device under
manufacture
RV
Cloud Controller (FDO
Owner)
• Receives Ownership Vouchers
• Runs FDO server to onboard
• Runs cloud services
Ownership Vouchers
for each device
TO2
Protocol
FSIM’s download
configs, code,
data, keys, etc.
Device is drop-shipped
to customer location.
Device access
via Internet
TO1
Protocol After onboard,
access cloud
services
Manufacturer sends OV for each
device to same customer cloud
Scenario 2: Onboarding devices with direct
internet access, multiple clouds
Cloud 1
US
Cloud 2
Asia
Clouds can be in
different geographies
Same type of
hardware is
deployed to
different Clouds
Scenario 2: Onboarding devices with
direct internet access, multiple clouds
Customer Cloud 2
RV
Manufacturer
Manufacturer Server
• Sets FDO device
credentials
• Creates FDO Ownership
Voucher
FDO Device
Initialize (DI)
FDO Device under
manufacture
TO2
Protocol
FSIM’s download
configs, code, data,
keys, etc.
Devices drop-shipped to
customer locations. After onboard,
access cloud
services
Customer Cloud 1
RV
TO1 TO2 FSIM’s
Cloud Controller
(FDO Owner)
Cloud Controller
(FDO Owner)
Orders for each device
include cloud address to
send OV
Order Processing
Orders specify where to send OV
(e.g., by geography, by ordering
company)
Ownership Vouchers for
each device determine
which cloud onboards
TO0
Protocol

Recommended for you

End to End IoT projects with Zephyr.pdf
End to End IoT projects with Zephyr.pdfEnd to End IoT projects with Zephyr.pdf
End to End IoT projects with Zephyr.pdf

Developing IoT with Zephyr is a journey from hardware all the way to application. It involves multiple teams and expertise, from hardware to cloud and application development. This talk will cover the options for getting a Zephyr app connected (WiFi, Ethernet, Cellular), selecting the right data encoding (JSON/CBOR), securing the data transfer (DTLS/TLS), and choosing a protocol (HTTP/MQTT/COAP). But that’s not the end of the story, the cloud needs to manage devices allowed to connect, consume the data being received, open up options for using that data, and be aware of the continued state of the hardware. And once you have the data you need to build a user-facing application on top of it. Understanding this lifecycle will help us as developers to make good choices on what Zephyr provides, helping ensure successful IoT projects.

iotinternet of thingscloud
Overview of FIDO Security Requirements and Certifications
Overview of FIDO Security Requirements and CertificationsOverview of FIDO Security Requirements and Certifications
Overview of FIDO Security Requirements and Certifications

1) The FIDO Alliance authentication certification program evaluates and certifies authenticators at different security levels to create trust between relying parties and authenticators. 2) Higher certification levels provide defenses against more sophisticated attacks, with Level 3+ providing the highest security against physical attacks on authenticator devices. 3) The certification process involves security reviews and penetration testing conducted by accredited laboratories. Companion certification programs can reduce the cost and time of certification for vendors.

fido alliancefido authenticationfido certification
FIDO, Federation and the Internet of Things
 FIDO, Federation and the Internet of Things FIDO, Federation and the Internet of Things
FIDO, Federation and the Internet of Things

Learn how FIDO-based authentication can complement federated authentication - and why they are better together. The FIDO Alliance invites you to learn how simplify strong authentication for web services. FIDO specifications can help all organizations, especially service providers who want to scale these features for consumer services over the web. Essentially, FIDO offers a simple, low-cost way to improve security and the online experience.

federationstandardsonline security
Scenario 3: Onboarding devices: no direct internet access
(on-premises/Closed Network)
Customer Premise
Scenario 3: Onboarding devices without direct internet access
(on-premise/Closed Network)
Customer Premise
Manufacturer
Manufacturer Server
• Sets FDO device
credentials
• Creates FDO Ownership
Voucher
FDO Device
Initialize (DI)
FDO Device under
manufacture
RV
Cloud Controller (FDO
Owner)
• Receives Ownership Vouchers
• Runs FDO server to onboard
• Offers network services
Ownership Vouchers for
each device, sent to
customer
TO2
Protocol
FSIM’s
download
configs, code,
data, keys,
etc.
Device powers
on and
onboards using
FDO
Device is drop-shipped
to customer location.
Customer
Portal or
Email
Customer retrieves
Ownership Vouchers and
places them in FDO server
in closed network.
Manufacturer can send
Ownership Vouchers by
email instead of using a
portal.
After onboard,
access network
services
Customer distributes OV
Scenario 4: Onboarding devices –
some Local, Some Internet
Cloud 1 Cloud 2
Cloud 3
Scenario 4: Onboarding devices – some with and some
without direct internet access
Roaming Devices
Manufacturer
Manufacturer
Server
• Sets FDO device
credentials
• Creates FDO
Ownership Voucher
FDO
Device
Initialize
(DI)
FDO Device under
manufacture
TO2
Protocol
FSIM’s download
configs, code,
data, keys, etc.
Device is drop-
shipped to customer
location.
Customer
Premise
RV
Shared FDO Owner
• Receives Ownership
Vouchers
• Runs FDO server to onboard
• Application servers
Ownership
Vouchers
TO2 FSIM’s
etc
TO1
Protocol
TO1
After onboard,
access intranet
services

Recommended for you

Using FIDO Authenticator for IoT Devices
Using FIDO Authenticator for IoT DevicesUsing FIDO Authenticator for IoT Devices
Using FIDO Authenticator for IoT Devices

The document discusses using FIDO authenticators for IoT devices. It presents eWBM's biometric external FIDO authenticator and its security features. Potential applications of FIDO authentication for IoT are then described, including for device authentication over LoRa networks, drone control, and public WiFi access. The use of a BLE FIDO authenticator for personalized smart speaker services is also proposed. The conclusion recommends slimming down the FIDO client for embedded systems and achieving at least Security Level 2 certification for IoT authenticators.

fido alliancefido authenticationfido specifications
CIS14: FIDO 101 (What, Why and Wherefore of FIDO)
CIS14: FIDO 101 (What, Why and Wherefore of FIDO)CIS14: FIDO 101 (What, Why and Wherefore of FIDO)
CIS14: FIDO 101 (What, Why and Wherefore of FIDO)

Rajiv Dholakia, Nok Nok Labs Basics of how FIDO protocols work, how they fit into the broader identity ecosystem, the benefits of the design and the state of implementation/deployment in the market; appropriate for both technical and non-technical individuals, giving orientation before diving into the details of the specific FIDO protocols.

IoT Meets Security
IoT Meets SecurityIoT Meets Security
IoT Meets Security

The document discusses security considerations for IoT devices. It provides an overview of IoTivity, an open source project that implements the OIC standard to define security mechanisms for IoT. IoTivity addresses IoT security issues like device onboarding, provisioning, access control and privacy through features such as secure connectivity, hardware hardening and an access manager. The document also outlines threats to IoT devices from a physical, software and network perspective.

iotivitysecuritylinuxcon eu
Scenario 5: Onboarding devices with direct internet
access, single cloud/platform, multi-tenant
Cloud 1
Tenant 1
Tenant 2
Tenant 3
Customer 1
Customer 2
Customer 3
Scenario 5: Onboarding devices on internet,
single multi-tenant cloud
Multi-Tenant Host Cloud
Customer N
Premise
(= Tenant A)
Customer N
Infrastructur
e
Customer N
Infrastructur
e
Manufacturer
Manufacturer Server
• Sets FDO device credentials
• Creates FDO Ownership
Voucher
FDO Device
Initialize (DI)
FDO Device under
manufacture
Ownership Vouchers for each
device, labeled with Tenant ID
TO2
Protocol
FSIM’s download
configs, code, data,
keys, etc.
Device powers on
and onboards using
FDO. Device
connects to tenant
infrastructure within
Host Cloud
Device is drop-shipped to
customer location.
Orders with Tenant ID
Tenant A
Infrastructure
RV
Cloud Controller (FDO
Owner)
• Receives Ownership Vouchers
• Runs FDO server to onboard
TO1
Protocol
Tenants
Tenant
A
Tenant
B
Tenant
C
Scenario 6: Onboarding devices on internet and closed network,
single cloud/platform, Roaming customers and multi-tenant
Cloud 1
Tenant 1
Tenant 2
Tenant 3
Customer 1
Internet &
embedded cloud 2
Customer 2
Customer 3 (roaming)
Cloud 2
Scenario 6: Onboarding devices with internet access and Closed
Network, single cloud/platform, multi-tenant
Closed Network
Manufacturer
Manufacturer Server
• Sets FDO device
credentials
• Creates FDO
Ownership Voucher
FDO-DI
FDO Device under
manufacture
RV
Cloud Controller (FDO
Owner)
Services for all devices
Customer
Portal /
Email
FDO Protocols
Ownership Vouchers
Internet Multi-Tenant
Orders by Tenant ID
Ownership Vouchers with Tenant ID RV
Cloud Controller (FDO
Owner)
Tenant Servers
FDO Protocols
Tenant Services
Intranet + Roaming
RV
Cloud Controller (FDO
Owner)
Application Servers for
all users
FDO Protocols
Intranet + Roaming
FDO Protocols
Local Services
Intranet Services

Recommended for you

FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf

FIDO Alliance Osaka Seminar

Enterprise Mobility (Admin)
Enterprise Mobility (Admin)Enterprise Mobility (Admin)
Enterprise Mobility (Admin)

Fra få til mange typer af mobile devices. Lær hvordan du administrerer dine mobile devices via SystemCenter Config Mgr og Windows Intune. Præsentation af Kent Agerlund, CoreTech

#intune#windows server#enterprisemobility
FIDO2 and Microsoft
FIDO2 and MicrosoftFIDO2 and Microsoft
FIDO2 and Microsoft

This document summarizes a presentation given by Anthony Nadalin from Microsoft on FIDO2 and Microsoft implementations. It discusses the FIDO standards including CTAP2 and WebAuthn, and how Microsoft supports these standards in Windows 10, Microsoft Edge, and Microsoft Accounts. It provides an overview of authentication interactions and the different entities involved, such as relying parties, clients, authenticators, and platforms.

fido alliancefido authenticationfido specifications
Conclusion
 Ownership Voucher allows FDO to implement Zero Trust
 Many client configurations are supported by sending
Ownership Vouchers to servers using combinations of:
Single Cloud
Multi-Cloud
Closed Network
Cloud Service
Multi-Tenant Cloud Service
X
© FIDO Alliance 2024 Confidential
22
Thank you

More Related Content

Similar to Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at Intel.pdf

New FIDO Specifications Overview -FIDO Alliance -Tokyo Seminar -Nadalin
New FIDO Specifications Overview -FIDO Alliance -Tokyo Seminar -NadalinNew FIDO Specifications Overview -FIDO Alliance -Tokyo Seminar -Nadalin
New FIDO Specifications Overview -FIDO Alliance -Tokyo Seminar -Nadalin
FIDO Alliance
 
FIDO UAF 1.0 Specs: Overview and Insights
FIDO UAF 1.0 Specs: Overview and InsightsFIDO UAF 1.0 Specs: Overview and Insights
FIDO UAF 1.0 Specs: Overview and Insights
FIDO Alliance
 
Forti Gate Virtual Appliances Sales 201010
Forti Gate Virtual Appliances Sales 201010Forti Gate Virtual Appliances Sales 201010
Forti Gate Virtual Appliances Sales 201010
Alvaro Roldan Peral
 
MT82 IoT Security Starts at Edge
MT82  IoT Security Starts at EdgeMT82  IoT Security Starts at Edge
MT82 IoT Security Starts at Edge
Dell EMC World
 
Let soracom help your IoT devices connect to the cloud!
Let soracom help your IoT devices connect to the cloud! Let soracom help your IoT devices connect to the cloud!
Let soracom help your IoT devices connect to the cloud!
Soracom Global, Inc.
 
The Value of FIDO Certification
The Value of FIDO CertificationThe Value of FIDO Certification
The Value of FIDO Certification
FIDO Alliance
 
End to End IoT projects with Zephyr.pdf
End to End IoT projects with Zephyr.pdfEnd to End IoT projects with Zephyr.pdf
End to End IoT projects with Zephyr.pdf
Alvaro Viebrantz
 
Overview of FIDO Security Requirements and Certifications
Overview of FIDO Security Requirements and CertificationsOverview of FIDO Security Requirements and Certifications
Overview of FIDO Security Requirements and Certifications
FIDO Alliance
 
FIDO, Federation and the Internet of Things
 FIDO, Federation and the Internet of Things FIDO, Federation and the Internet of Things
FIDO, Federation and the Internet of Things
FIDO Alliance
 
Using FIDO Authenticator for IoT Devices
Using FIDO Authenticator for IoT DevicesUsing FIDO Authenticator for IoT Devices
Using FIDO Authenticator for IoT Devices
FIDO Alliance
 
CIS14: FIDO 101 (What, Why and Wherefore of FIDO)
CIS14: FIDO 101 (What, Why and Wherefore of FIDO)CIS14: FIDO 101 (What, Why and Wherefore of FIDO)
CIS14: FIDO 101 (What, Why and Wherefore of FIDO)
CloudIDSummit
 
IoT Meets Security
IoT Meets SecurityIoT Meets Security
IoT Meets Security
Samsung Open Source Group
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Enterprise Mobility (Admin)
Enterprise Mobility (Admin)Enterprise Mobility (Admin)
Enterprise Mobility (Admin)
Microsoft
 
FIDO2 and Microsoft
FIDO2 and MicrosoftFIDO2 and Microsoft
FIDO2 and Microsoft
FIDO Alliance
 
UAF Case Study by NTT Docomo
UAF Case Study by NTT DocomoUAF Case Study by NTT Docomo
UAF Case Study by NTT Docomo
FIDO Alliance
 
Open Source & The Internet of Things
Open Source & The Internet of ThingsOpen Source & The Internet of Things
Open Source & The Internet of Things
All Things Open
 
FIDO Technical Overview at FIDO KWG Hackathon
FIDO Technical Overview at FIDO KWG HackathonFIDO Technical Overview at FIDO KWG Hackathon
FIDO Technical Overview at FIDO KWG Hackathon
Ki-Eun Shin
 
CIS 2015 Extreme OpenID Connect - John Bradley
CIS 2015 Extreme OpenID Connect - John BradleyCIS 2015 Extreme OpenID Connect - John Bradley
CIS 2015 Extreme OpenID Connect - John Bradley
CloudIDSummit
 
SFScon 22 - Gabriele Sankalaite - Blockchain Smart Contracts and Multicast En...
SFScon 22 - Gabriele Sankalaite - Blockchain Smart Contracts and Multicast En...SFScon 22 - Gabriele Sankalaite - Blockchain Smart Contracts and Multicast En...
SFScon 22 - Gabriele Sankalaite - Blockchain Smart Contracts and Multicast En...
South Tyrol Free Software Conference
 

Similar to Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at Intel.pdf (20)

New FIDO Specifications Overview -FIDO Alliance -Tokyo Seminar -Nadalin
New FIDO Specifications Overview -FIDO Alliance -Tokyo Seminar -NadalinNew FIDO Specifications Overview -FIDO Alliance -Tokyo Seminar -Nadalin
New FIDO Specifications Overview -FIDO Alliance -Tokyo Seminar -Nadalin
 
FIDO UAF 1.0 Specs: Overview and Insights
FIDO UAF 1.0 Specs: Overview and InsightsFIDO UAF 1.0 Specs: Overview and Insights
FIDO UAF 1.0 Specs: Overview and Insights
 
Forti Gate Virtual Appliances Sales 201010
Forti Gate Virtual Appliances Sales 201010Forti Gate Virtual Appliances Sales 201010
Forti Gate Virtual Appliances Sales 201010
 
MT82 IoT Security Starts at Edge
MT82  IoT Security Starts at EdgeMT82  IoT Security Starts at Edge
MT82 IoT Security Starts at Edge
 
Let soracom help your IoT devices connect to the cloud!
Let soracom help your IoT devices connect to the cloud! Let soracom help your IoT devices connect to the cloud!
Let soracom help your IoT devices connect to the cloud!
 
The Value of FIDO Certification
The Value of FIDO CertificationThe Value of FIDO Certification
The Value of FIDO Certification
 
End to End IoT projects with Zephyr.pdf
End to End IoT projects with Zephyr.pdfEnd to End IoT projects with Zephyr.pdf
End to End IoT projects with Zephyr.pdf
 
Overview of FIDO Security Requirements and Certifications
Overview of FIDO Security Requirements and CertificationsOverview of FIDO Security Requirements and Certifications
Overview of FIDO Security Requirements and Certifications
 
FIDO, Federation and the Internet of Things
 FIDO, Federation and the Internet of Things FIDO, Federation and the Internet of Things
FIDO, Federation and the Internet of Things
 
Using FIDO Authenticator for IoT Devices
Using FIDO Authenticator for IoT DevicesUsing FIDO Authenticator for IoT Devices
Using FIDO Authenticator for IoT Devices
 
CIS14: FIDO 101 (What, Why and Wherefore of FIDO)
CIS14: FIDO 101 (What, Why and Wherefore of FIDO)CIS14: FIDO 101 (What, Why and Wherefore of FIDO)
CIS14: FIDO 101 (What, Why and Wherefore of FIDO)
 
IoT Meets Security
IoT Meets SecurityIoT Meets Security
IoT Meets Security
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Enterprise Mobility (Admin)
Enterprise Mobility (Admin)Enterprise Mobility (Admin)
Enterprise Mobility (Admin)
 
FIDO2 and Microsoft
FIDO2 and MicrosoftFIDO2 and Microsoft
FIDO2 and Microsoft
 
UAF Case Study by NTT Docomo
UAF Case Study by NTT DocomoUAF Case Study by NTT Docomo
UAF Case Study by NTT Docomo
 
Open Source & The Internet of Things
Open Source & The Internet of ThingsOpen Source & The Internet of Things
Open Source & The Internet of Things
 
FIDO Technical Overview at FIDO KWG Hackathon
FIDO Technical Overview at FIDO KWG HackathonFIDO Technical Overview at FIDO KWG Hackathon
FIDO Technical Overview at FIDO KWG Hackathon
 
CIS 2015 Extreme OpenID Connect - John Bradley
CIS 2015 Extreme OpenID Connect - John BradleyCIS 2015 Extreme OpenID Connect - John Bradley
CIS 2015 Extreme OpenID Connect - John Bradley
 
SFScon 22 - Gabriele Sankalaite - Blockchain Smart Contracts and Multicast En...
SFScon 22 - Gabriele Sankalaite - Blockchain Smart Contracts and Multicast En...SFScon 22 - Gabriele Sankalaite - Blockchain Smart Contracts and Multicast En...
SFScon 22 - Gabriele Sankalaite - Blockchain Smart Contracts and Multicast En...
 

More from FIDO Alliance

FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: LY-DOCOMO-KDDI-Mercari Panel.pdf
FIDO Alliance Osaka Seminar: LY-DOCOMO-KDDI-Mercari Panel.pdfFIDO Alliance Osaka Seminar: LY-DOCOMO-KDDI-Mercari Panel.pdf
FIDO Alliance Osaka Seminar: LY-DOCOMO-KDDI-Mercari Panel.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: NEC & Yubico Panel.pdf
FIDO Alliance Osaka Seminar: NEC & Yubico Panel.pdfFIDO Alliance Osaka Seminar: NEC & Yubico Panel.pdf
FIDO Alliance Osaka Seminar: NEC & Yubico Panel.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: CloudGate.pdf
FIDO Alliance Osaka Seminar: CloudGate.pdfFIDO Alliance Osaka Seminar: CloudGate.pdf
FIDO Alliance Osaka Seminar: CloudGate.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: PlayStation Passkey Deployment Case Study.pdf
FIDO Alliance Osaka Seminar: PlayStation Passkey Deployment Case Study.pdfFIDO Alliance Osaka Seminar: PlayStation Passkey Deployment Case Study.pdf
FIDO Alliance Osaka Seminar: PlayStation Passkey Deployment Case Study.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Welcome Slides.pdf
FIDO Alliance Osaka Seminar: Welcome Slides.pdfFIDO Alliance Osaka Seminar: Welcome Slides.pdf
FIDO Alliance Osaka Seminar: Welcome Slides.pdf
FIDO Alliance
 
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FIDO Alliance
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
FIDO Alliance
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
FIDO Alliance
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
FIDO Alliance
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
FIDO Alliance
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
FIDO Alliance
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
FIDO Alliance
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
FIDO Alliance
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
FIDO Alliance
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
FIDO Alliance
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
FIDO Alliance
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
FIDO Alliance
 

More from FIDO Alliance (20)

FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
FIDO Alliance Osaka Seminar: LY-DOCOMO-KDDI-Mercari Panel.pdf
FIDO Alliance Osaka Seminar: LY-DOCOMO-KDDI-Mercari Panel.pdfFIDO Alliance Osaka Seminar: LY-DOCOMO-KDDI-Mercari Panel.pdf
FIDO Alliance Osaka Seminar: LY-DOCOMO-KDDI-Mercari Panel.pdf
 
FIDO Alliance Osaka Seminar: NEC & Yubico Panel.pdf
FIDO Alliance Osaka Seminar: NEC & Yubico Panel.pdfFIDO Alliance Osaka Seminar: NEC & Yubico Panel.pdf
FIDO Alliance Osaka Seminar: NEC & Yubico Panel.pdf
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
FIDO Alliance Osaka Seminar: CloudGate.pdf
FIDO Alliance Osaka Seminar: CloudGate.pdfFIDO Alliance Osaka Seminar: CloudGate.pdf
FIDO Alliance Osaka Seminar: CloudGate.pdf
 
FIDO Alliance Osaka Seminar: PlayStation Passkey Deployment Case Study.pdf
FIDO Alliance Osaka Seminar: PlayStation Passkey Deployment Case Study.pdfFIDO Alliance Osaka Seminar: PlayStation Passkey Deployment Case Study.pdf
FIDO Alliance Osaka Seminar: PlayStation Passkey Deployment Case Study.pdf
 
FIDO Alliance Osaka Seminar: Welcome Slides.pdf
FIDO Alliance Osaka Seminar: Welcome Slides.pdfFIDO Alliance Osaka Seminar: Welcome Slides.pdf
FIDO Alliance Osaka Seminar: Welcome Slides.pdf
 
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 

Recently uploaded

BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdfBT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
Neo4j
 
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
Bert Blevins
 
Cookies program to display the information though cookie creation
Cookies program to display the information though cookie creationCookies program to display the information though cookie creation
Cookies program to display the information though cookie creation
shanthidl1
 
Best Practices for Effectively Running dbt in Airflow.pdf
Best Practices for Effectively Running dbt in Airflow.pdfBest Practices for Effectively Running dbt in Airflow.pdf
Best Practices for Effectively Running dbt in Airflow.pdf
Tatiana Al-Chueyr
 
Research Directions for Cross Reality Interfaces
Research Directions for Cross Reality InterfacesResearch Directions for Cross Reality Interfaces
Research Directions for Cross Reality Interfaces
Mark Billinghurst
 
20240704 QFM023 Engineering Leadership Reading List June 2024
20240704 QFM023 Engineering Leadership Reading List June 202420240704 QFM023 Engineering Leadership Reading List June 2024
20240704 QFM023 Engineering Leadership Reading List June 2024
Matthew Sinclair
 
What's New in Copilot for Microsoft365 May 2024.pptx
What's New in Copilot for Microsoft365 May 2024.pptxWhat's New in Copilot for Microsoft365 May 2024.pptx
What's New in Copilot for Microsoft365 May 2024.pptx
Stephanie Beckett
 
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
Kief Morris
 
INDIAN AIR FORCE FIGHTER PLANES LIST.pdf
INDIAN AIR FORCE FIGHTER PLANES LIST.pdfINDIAN AIR FORCE FIGHTER PLANES LIST.pdf
INDIAN AIR FORCE FIGHTER PLANES LIST.pdf
jackson110191
 
20240702 Présentation Plateforme GenAI.pdf
20240702 Présentation Plateforme GenAI.pdf20240702 Présentation Plateforme GenAI.pdf
20240702 Présentation Plateforme GenAI.pdf
Sally Laouacheria
 
Pigging Solutions Sustainability brochure.pdf
Pigging Solutions Sustainability brochure.pdfPigging Solutions Sustainability brochure.pdf
Pigging Solutions Sustainability brochure.pdf
Pigging Solutions
 
Implementations of Fused Deposition Modeling in real world
Implementations of Fused Deposition Modeling  in real worldImplementations of Fused Deposition Modeling  in real world
Implementations of Fused Deposition Modeling in real world
Emerging Tech
 
The Rise of Supernetwork Data Intensive Computing
The Rise of Supernetwork Data Intensive ComputingThe Rise of Supernetwork Data Intensive Computing
The Rise of Supernetwork Data Intensive Computing
Larry Smarr
 
Measuring the Impact of Network Latency at Twitter
Measuring the Impact of Network Latency at TwitterMeasuring the Impact of Network Latency at Twitter
Measuring the Impact of Network Latency at Twitter
ScyllaDB
 
How Social Media Hackers Help You to See Your Wife's Message.pdf
How Social Media Hackers Help You to See Your Wife's Message.pdfHow Social Media Hackers Help You to See Your Wife's Message.pdf
How Social Media Hackers Help You to See Your Wife's Message.pdf
HackersList
 
Best Programming Language for Civil Engineers
Best Programming Language for Civil EngineersBest Programming Language for Civil Engineers
Best Programming Language for Civil Engineers
Awais Yaseen
 
What’s New in Teams Calling, Meetings and Devices May 2024
What’s New in Teams Calling, Meetings and Devices May 2024What’s New in Teams Calling, Meetings and Devices May 2024
What’s New in Teams Calling, Meetings and Devices May 2024
Stephanie Beckett
 
DealBook of Ukraine: 2024 edition
DealBook of Ukraine: 2024 editionDealBook of Ukraine: 2024 edition
DealBook of Ukraine: 2024 edition
Yevgen Sysoyev
 
Manual | Product | Research Presentation
Manual | Product | Research PresentationManual | Product | Research Presentation
Manual | Product | Research Presentation
welrejdoall
 
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-In
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-InTrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-In
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-In
TrustArc
 

Recently uploaded (20)

BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdfBT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
 
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
 
Cookies program to display the information though cookie creation
Cookies program to display the information though cookie creationCookies program to display the information though cookie creation
Cookies program to display the information though cookie creation
 
Best Practices for Effectively Running dbt in Airflow.pdf
Best Practices for Effectively Running dbt in Airflow.pdfBest Practices for Effectively Running dbt in Airflow.pdf
Best Practices for Effectively Running dbt in Airflow.pdf
 
Research Directions for Cross Reality Interfaces
Research Directions for Cross Reality InterfacesResearch Directions for Cross Reality Interfaces
Research Directions for Cross Reality Interfaces
 
20240704 QFM023 Engineering Leadership Reading List June 2024
20240704 QFM023 Engineering Leadership Reading List June 202420240704 QFM023 Engineering Leadership Reading List June 2024
20240704 QFM023 Engineering Leadership Reading List June 2024
 
What's New in Copilot for Microsoft365 May 2024.pptx
What's New in Copilot for Microsoft365 May 2024.pptxWhat's New in Copilot for Microsoft365 May 2024.pptx
What's New in Copilot for Microsoft365 May 2024.pptx
 
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
 
INDIAN AIR FORCE FIGHTER PLANES LIST.pdf
INDIAN AIR FORCE FIGHTER PLANES LIST.pdfINDIAN AIR FORCE FIGHTER PLANES LIST.pdf
INDIAN AIR FORCE FIGHTER PLANES LIST.pdf
 
20240702 Présentation Plateforme GenAI.pdf
20240702 Présentation Plateforme GenAI.pdf20240702 Présentation Plateforme GenAI.pdf
20240702 Présentation Plateforme GenAI.pdf
 
Pigging Solutions Sustainability brochure.pdf
Pigging Solutions Sustainability brochure.pdfPigging Solutions Sustainability brochure.pdf
Pigging Solutions Sustainability brochure.pdf
 
Implementations of Fused Deposition Modeling in real world
Implementations of Fused Deposition Modeling  in real worldImplementations of Fused Deposition Modeling  in real world
Implementations of Fused Deposition Modeling in real world
 
The Rise of Supernetwork Data Intensive Computing
The Rise of Supernetwork Data Intensive ComputingThe Rise of Supernetwork Data Intensive Computing
The Rise of Supernetwork Data Intensive Computing
 
Measuring the Impact of Network Latency at Twitter
Measuring the Impact of Network Latency at TwitterMeasuring the Impact of Network Latency at Twitter
Measuring the Impact of Network Latency at Twitter
 
How Social Media Hackers Help You to See Your Wife's Message.pdf
How Social Media Hackers Help You to See Your Wife's Message.pdfHow Social Media Hackers Help You to See Your Wife's Message.pdf
How Social Media Hackers Help You to See Your Wife's Message.pdf
 
Best Programming Language for Civil Engineers
Best Programming Language for Civil EngineersBest Programming Language for Civil Engineers
Best Programming Language for Civil Engineers
 
What’s New in Teams Calling, Meetings and Devices May 2024
What’s New in Teams Calling, Meetings and Devices May 2024What’s New in Teams Calling, Meetings and Devices May 2024
What’s New in Teams Calling, Meetings and Devices May 2024
 
DealBook of Ukraine: 2024 edition
DealBook of Ukraine: 2024 editionDealBook of Ukraine: 2024 edition
DealBook of Ukraine: 2024 edition
 
Manual | Product | Research Presentation
Manual | Product | Research PresentationManual | Product | Research Presentation
Manual | Product | Research Presentation
 
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-In
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-InTrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-In
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-In
 

Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at Intel.pdf

  • 1. © FIDO Alliance 2024 Confidential 1 Choosing the right FDO deployment model for your application Geoffrey Cooper, Intel Corporation FIDO Alliance, IOT Technical Working Group, Co-Chair April, 2024
  • 2. FDO Deployment Issues Device Manufacturer Ownership Voucher (OV) FDO Manufacturing tool FDO Client & Credentials Device Initialization (DI) Target Cloud FDO owner Rendezvous server (RV) FDO Client & credentials TO0 & TO1 Device Discovers Server T02 protocol Device Onboards Onboarding Data → • The Ownership Voucher is invalidated after the device onboards. The Target Cloud gets a new OV, to allow only it to use FDO in the future. Where is device? Where to Send OV? TO0 protocol TO1 protocol Device shipped Device installed Is Target Cloud on Prem / Internet? Single- Multi-tenant?
  • 3. We need Zero Trust → Ownership Voucher • Ownership Voucher is a new concept in FDO • Popular Zero trust security model is “never trust, always verify.” • Problem for onboarding, device doesn’t know server yet! • Ownership Voucher provides credentials for the device to trust, because OV & Device both came from same factory Target Cloud FDO owner FDO Client & credentials Onboarding Data → Ownership Voucher (OV) SERVER TRUST FROM FACTORY CLIENT TRUST FROM FACTORY Zero Trust Concept in FDO Verify Trust
  • 4. Choosing the right FDO deployment model for your application FDO is very flexible. Several architectures are available. Architectures are based on network configuration: Single Cloud Multi-Cloud Closed Network Cloud Service Multi-Tenant Cloud Service X In this presentation, we look at scenarios with FDO deployments for different network configurations
  • 5. Scenario 1: Onboarding devices with direct internet access, single cloud/platform Cloud 1 Devices
  • 6. Scenario 1: Onboarding devices with direct internet access, single cloud/platform Customer Cloud Manufacturer Manufacturer Server • Sets FDO device credentials • Creates FDO Ownership Voucher FDO Device Initialize (DI) FDO Device under manufacture RV Cloud Controller (FDO Owner) • Receives Ownership Vouchers • Runs FDO server to onboard • Runs cloud services Ownership Vouchers for each device TO2 Protocol FSIM’s download configs, code, data, keys, etc. Device is drop-shipped to customer location. Device access via Internet TO1 Protocol After onboard, access cloud services Manufacturer sends OV for each device to same customer cloud
  • 7. Scenario 2: Onboarding devices with direct internet access, multiple clouds Cloud 1 US Cloud 2 Asia Clouds can be in different geographies Same type of hardware is deployed to different Clouds
  • 8. Scenario 2: Onboarding devices with direct internet access, multiple clouds Customer Cloud 2 RV Manufacturer Manufacturer Server • Sets FDO device credentials • Creates FDO Ownership Voucher FDO Device Initialize (DI) FDO Device under manufacture TO2 Protocol FSIM’s download configs, code, data, keys, etc. Devices drop-shipped to customer locations. After onboard, access cloud services Customer Cloud 1 RV TO1 TO2 FSIM’s Cloud Controller (FDO Owner) Cloud Controller (FDO Owner) Orders for each device include cloud address to send OV Order Processing Orders specify where to send OV (e.g., by geography, by ordering company) Ownership Vouchers for each device determine which cloud onboards TO0 Protocol
  • 9. Scenario 3: Onboarding devices: no direct internet access (on-premises/Closed Network) Customer Premise
  • 10. Scenario 3: Onboarding devices without direct internet access (on-premise/Closed Network) Customer Premise Manufacturer Manufacturer Server • Sets FDO device credentials • Creates FDO Ownership Voucher FDO Device Initialize (DI) FDO Device under manufacture RV Cloud Controller (FDO Owner) • Receives Ownership Vouchers • Runs FDO server to onboard • Offers network services Ownership Vouchers for each device, sent to customer TO2 Protocol FSIM’s download configs, code, data, keys, etc. Device powers on and onboards using FDO Device is drop-shipped to customer location. Customer Portal or Email Customer retrieves Ownership Vouchers and places them in FDO server in closed network. Manufacturer can send Ownership Vouchers by email instead of using a portal. After onboard, access network services Customer distributes OV
  • 11. Scenario 4: Onboarding devices – some Local, Some Internet Cloud 1 Cloud 2 Cloud 3
  • 12. Scenario 4: Onboarding devices – some with and some without direct internet access Roaming Devices Manufacturer Manufacturer Server • Sets FDO device credentials • Creates FDO Ownership Voucher FDO Device Initialize (DI) FDO Device under manufacture TO2 Protocol FSIM’s download configs, code, data, keys, etc. Device is drop- shipped to customer location. Customer Premise RV Shared FDO Owner • Receives Ownership Vouchers • Runs FDO server to onboard • Application servers Ownership Vouchers TO2 FSIM’s etc TO1 Protocol TO1 After onboard, access intranet services
  • 13. Scenario 5: Onboarding devices with direct internet access, single cloud/platform, multi-tenant Cloud 1 Tenant 1 Tenant 2 Tenant 3 Customer 1 Customer 2 Customer 3
  • 14. Scenario 5: Onboarding devices on internet, single multi-tenant cloud Multi-Tenant Host Cloud Customer N Premise (= Tenant A) Customer N Infrastructur e Customer N Infrastructur e Manufacturer Manufacturer Server • Sets FDO device credentials • Creates FDO Ownership Voucher FDO Device Initialize (DI) FDO Device under manufacture Ownership Vouchers for each device, labeled with Tenant ID TO2 Protocol FSIM’s download configs, code, data, keys, etc. Device powers on and onboards using FDO. Device connects to tenant infrastructure within Host Cloud Device is drop-shipped to customer location. Orders with Tenant ID Tenant A Infrastructure RV Cloud Controller (FDO Owner) • Receives Ownership Vouchers • Runs FDO server to onboard TO1 Protocol Tenants Tenant A Tenant B Tenant C
  • 15. Scenario 6: Onboarding devices on internet and closed network, single cloud/platform, Roaming customers and multi-tenant Cloud 1 Tenant 1 Tenant 2 Tenant 3 Customer 1 Internet & embedded cloud 2 Customer 2 Customer 3 (roaming) Cloud 2
  • 16. Scenario 6: Onboarding devices with internet access and Closed Network, single cloud/platform, multi-tenant Closed Network Manufacturer Manufacturer Server • Sets FDO device credentials • Creates FDO Ownership Voucher FDO-DI FDO Device under manufacture RV Cloud Controller (FDO Owner) Services for all devices Customer Portal / Email FDO Protocols Ownership Vouchers Internet Multi-Tenant Orders by Tenant ID Ownership Vouchers with Tenant ID RV Cloud Controller (FDO Owner) Tenant Servers FDO Protocols Tenant Services Intranet + Roaming RV Cloud Controller (FDO Owner) Application Servers for all users FDO Protocols Intranet + Roaming FDO Protocols Local Services Intranet Services
  • 17. Conclusion  Ownership Voucher allows FDO to implement Zero Trust  Many client configurations are supported by sending Ownership Vouchers to servers using combinations of: Single Cloud Multi-Cloud Closed Network Cloud Service Multi-Tenant Cloud Service X
  • 18. © FIDO Alliance 2024 Confidential 22 Thank you