SlideShare a Scribd company logo
Jackie Comp,VPWorldwide Sales
FIDO in Action:
Real World Deployment Case Studies
What Experience Do Consumers Want?
NokNokDemos
Today, in most cases hitting “next” brings you to a password…
A Consistent Passwordless Experience Across Any
Channel
NokNokDemos
With Nok Nok’s FIDO solution, you can get rid of passwords
A Consistent Passwordless Experience Across Any
Channel
NokNokDemos
• Same experience in mobile and web applications
• Turn biometrics into 2 factors
2 Examples: Business to Consumer Case Studies
©2018 Nok Nok Labs — Confidential — Do not distribute 5
• 9,000 employees worldwide
• 19 locations in 9 countries
• $6.0 billion in revenue
• 77M+ Million customers
• More than 51K employees worldwide
• Un-carrier CUSTOMER FIRST
philosophy
• Has led the industry in YoY growth for
18 consecutive quarters
©2018 Nok Nok Labs — Confidential — Do not distribute 6
Intuit and T-Mobile
Discuss Their FIDO
Deployments
Journey to Passwordless for Consumers
Phase 1
Mobile First Strategy
(Phase out SMS-OTP)
Phase 2
Add Web Support
Phase 3
Fully Deprecate
Passwords
©2018 Nok Nok Labs — Confidential — Do not distribute 8
Business Goals:
• Mobile first strategy using native
authenticators
• Reduce use of passwords
• Reduce cost of support for login related
issues
• Standardize across brands migrating from
Touch ID to FIDO
• Improve security controls
• Reduce overhead of developing
proprietary approaches
• Leverage best industry standard
• Rapidly support new native device
authenticators and all associated flows
Capabilities Needed:
• FIDO compliant technology
• Support all current and future FIDO protocols
• Private cloud hosting (on premise solution)
• Maintain standard for high availability and
performance
• Industry standards for security controls (e.g.
encryption key rotation)
• Durability: Partner fully invested in FIDO
today and in the future
• Lightweight integration with native apps and
backend services
• Quick turnaround on any required patches
©2018 Nok Nok Labs — Confidential — Do not distribute 9
Implementation Overview:
• Educate internal product teams on new
approach
• Scaled service deployment across multiple
cloud hosting zones and regions to meet
availability requirements
• Integrate risk screening as part of
authentication event
• Scale solution in phases: smaller user base
apps leading to TurboTax
• Controlled user rollout with iOS first
• Require use of FIDO authentication with
upgraded app
Why FIDO:
• Strong, multi-factor security model
• Industry standard, future proof
• Convenience for users
• Lower operational costs
Alternatives Considered:
• Buy versus build (context vs. core)
• Leverage best industry standard (FIDO)
with proven partner
©2018 Nok Nok Labs — Confidential — Do not distribute 10
Results:
• 99.9% % authentication success vs.
80-85% using SMS OTP
• Authentication time reduced by 20%
• No disruption and continued high adoption
rate
• Eliminated development costs of
maintaining proprietary solution
• Platform in place to rapidly support
additional use cases
Next Steps:
• Move to AWS Aurora
• Continue roll out to additional products
• Expand use cases including passwordless
browser login
“We have improved our security controls while providing our customers with
seamless access to their online financial data.”
- Antonio Fuentes, Principal Product Manager
©2018 Nok Nok Labs — Confidential — Do not distribute 11
Business Goals:
• Reduce pain point of passwords on phone
• Increase confidence of right user
• Implement a scalable, future-proof
approach to authentication
Why FIDO:
• Strong, multi-factor authentication and
biometrics
• Industry standard plug and play approach
today and in future
• Public private key pair trust model
• Lower operational costs
Capabilities Needed:
• Universal Server
• Integrate with existing IDP
• Carrier-grade platform and scalability
Alternatives Considered:
• Several evaluated including “Build Your
Own”
• Determined finding a partner to get to
desired state was more cost effective and
minimized risk
©2018 Nok Nok Labs — Confidential — Do not distribute 12
Implementation Overview:
• Design flows for Use Cases
• Determine UX terminology and experience
• Integrate with MyTMO native mobile app
• Integrate with in-house virtualized and
modular Ericsson IAM
• 6 month project from solution design to
launch
• Roll out to users in waves of 1M over 1
month period
• “Soft” push for registration
– remind users once/month 4 times
Results:
• Reduced password resets by 65% to 7%
• 50% adoption in first 5 months with
“soft” rollout
• Supported FaceID Day 1 with no
additional work
• “Flawless” implementation with no
service issues
• Expanding across applications including
authentication to Call Center
©2018 Nok Nok Labs — Confidential — Do not distribute 13
Next Steps:
• Roll out to additional products
• Push notification for quick authentication
into call center
• Leverage Nok Nok/FIDO for user
authentication for cross-carrier initiative
(CCID)
Lessons Learned:
• Important to be clear on which users to
target
• Determine the user experience you want
to accomplish
– Do you provide choice or simplify experience?
– Default to TMOs desired authenticator
“By implementing Nok Nok’s FIDO authentication platform we have achieved our
goal of providing T-Mobile customers a secure, frictionless experience for
accessing our services today and in the future.”
- Michael Engan, Principal Technology Architect
14
Nok Nok
Who’s
There?
Next-Generation Authentication
Simple, Secure

More Related Content

What's hot

FIDO Biometric Certification Program
FIDO Biometric Certification ProgramFIDO Biometric Certification Program
FIDO Biometric Certification Program
FIDO Alliance
 
FIDO UAF and PKI in Asia: A Case Study and Recommendations
FIDO UAF and PKI in Asia: A Case Study and RecommendationsFIDO UAF and PKI in Asia: A Case Study and Recommendations
FIDO UAF and PKI in Asia: A Case Study and Recommendations
FIDO Alliance
 
FIDO Authentication in Hong Kong
FIDO Authentication in Hong KongFIDO Authentication in Hong Kong
FIDO Authentication in Hong Kong
FIDO Alliance
 
FIDO Certification Program Updates
FIDO Certification Program UpdatesFIDO Certification Program Updates
FIDO Certification Program Updates
FIDO Alliance
 
FIDO and the Future of User Authentication
FIDO and the Future of User AuthenticationFIDO and the Future of User Authentication
FIDO and the Future of User Authentication
FIDO Alliance
 
Ask FIDO About Anything: Certification
Ask FIDO About Anything: CertificationAsk FIDO About Anything: Certification
Ask FIDO About Anything: Certification
FIDO Alliance
 
Market Study on Mobile Authentication
Market Study on Mobile AuthenticationMarket Study on Mobile Authentication
Market Study on Mobile Authentication
FIDO Alliance
 
WebAuthn & FIDO2
WebAuthn & FIDO2WebAuthn & FIDO2
WebAuthn & FIDO2
Leonard Moustacchis
 
Technical Principles of FIDO Authentication
Technical Principles of FIDO AuthenticationTechnical Principles of FIDO Authentication
Technical Principles of FIDO Authentication
FIDO Alliance
 
Going Passwordless with Microsoft
Going Passwordless with MicrosoftGoing Passwordless with Microsoft
Going Passwordless with Microsoft
FIDO Alliance
 
Go passwordless with fido2
Go passwordless with fido2Go passwordless with fido2
Go passwordless with fido2
Rob Dudley
 
FIDO Alliance Webinar: Intuit's Journey with FIDO Authentication
FIDO Alliance Webinar: Intuit's Journey with FIDO AuthenticationFIDO Alliance Webinar: Intuit's Journey with FIDO Authentication
FIDO Alliance Webinar: Intuit's Journey with FIDO Authentication
FIDO Alliance
 
Lifecycle Consideration for Security Key Deployments
Lifecycle Consideration for Security Key DeploymentsLifecycle Consideration for Security Key Deployments
Lifecycle Consideration for Security Key Deployments
FIDO Alliance
 
FIDO UAF and PKI in Asia - Case Study and Recommendations
FIDO UAF and PKI in Asia - Case Study and RecommendationsFIDO UAF and PKI in Asia - Case Study and Recommendations
FIDO UAF and PKI in Asia - Case Study and Recommendations
FIDO Alliance
 
Tatyana-Arnaudova - English
Tatyana-Arnaudova - EnglishTatyana-Arnaudova - English
Tatyana-Arnaudova - English
Tatyana Arnaudova
 
The Future is Flying Cars and Digital Driver's Licenses on Our Phones - Scott...
The Future is Flying Cars and Digital Driver's Licenses on Our Phones - Scott...The Future is Flying Cars and Digital Driver's Licenses on Our Phones - Scott...
The Future is Flying Cars and Digital Driver's Licenses on Our Phones - Scott...
IdentityNorthEvents
 
Secure Mobile Banking
Secure Mobile BankingSecure Mobile Banking
Secure Mobile Banking
Veridium
 
CIS14: Filling the “authentication goes here” Hole in Identity
CIS14: Filling the “authentication goes here” Hole in IdentityCIS14: Filling the “authentication goes here” Hole in Identity
CIS14: Filling the “authentication goes here” Hole in Identity
CloudIDSummit
 
Mobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best PracticesMobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best Practices
Cisco Canada
 

What's hot (19)

FIDO Biometric Certification Program
FIDO Biometric Certification ProgramFIDO Biometric Certification Program
FIDO Biometric Certification Program
 
FIDO UAF and PKI in Asia: A Case Study and Recommendations
FIDO UAF and PKI in Asia: A Case Study and RecommendationsFIDO UAF and PKI in Asia: A Case Study and Recommendations
FIDO UAF and PKI in Asia: A Case Study and Recommendations
 
FIDO Authentication in Hong Kong
FIDO Authentication in Hong KongFIDO Authentication in Hong Kong
FIDO Authentication in Hong Kong
 
FIDO Certification Program Updates
FIDO Certification Program UpdatesFIDO Certification Program Updates
FIDO Certification Program Updates
 
FIDO and the Future of User Authentication
FIDO and the Future of User AuthenticationFIDO and the Future of User Authentication
FIDO and the Future of User Authentication
 
Ask FIDO About Anything: Certification
Ask FIDO About Anything: CertificationAsk FIDO About Anything: Certification
Ask FIDO About Anything: Certification
 
Market Study on Mobile Authentication
Market Study on Mobile AuthenticationMarket Study on Mobile Authentication
Market Study on Mobile Authentication
 
WebAuthn & FIDO2
WebAuthn & FIDO2WebAuthn & FIDO2
WebAuthn & FIDO2
 
Technical Principles of FIDO Authentication
Technical Principles of FIDO AuthenticationTechnical Principles of FIDO Authentication
Technical Principles of FIDO Authentication
 
Going Passwordless with Microsoft
Going Passwordless with MicrosoftGoing Passwordless with Microsoft
Going Passwordless with Microsoft
 
Go passwordless with fido2
Go passwordless with fido2Go passwordless with fido2
Go passwordless with fido2
 
FIDO Alliance Webinar: Intuit's Journey with FIDO Authentication
FIDO Alliance Webinar: Intuit's Journey with FIDO AuthenticationFIDO Alliance Webinar: Intuit's Journey with FIDO Authentication
FIDO Alliance Webinar: Intuit's Journey with FIDO Authentication
 
Lifecycle Consideration for Security Key Deployments
Lifecycle Consideration for Security Key DeploymentsLifecycle Consideration for Security Key Deployments
Lifecycle Consideration for Security Key Deployments
 
FIDO UAF and PKI in Asia - Case Study and Recommendations
FIDO UAF and PKI in Asia - Case Study and RecommendationsFIDO UAF and PKI in Asia - Case Study and Recommendations
FIDO UAF and PKI in Asia - Case Study and Recommendations
 
Tatyana-Arnaudova - English
Tatyana-Arnaudova - EnglishTatyana-Arnaudova - English
Tatyana-Arnaudova - English
 
The Future is Flying Cars and Digital Driver's Licenses on Our Phones - Scott...
The Future is Flying Cars and Digital Driver's Licenses on Our Phones - Scott...The Future is Flying Cars and Digital Driver's Licenses on Our Phones - Scott...
The Future is Flying Cars and Digital Driver's Licenses on Our Phones - Scott...
 
Secure Mobile Banking
Secure Mobile BankingSecure Mobile Banking
Secure Mobile Banking
 
CIS14: Filling the “authentication goes here” Hole in Identity
CIS14: Filling the “authentication goes here” Hole in IdentityCIS14: Filling the “authentication goes here” Hole in Identity
CIS14: Filling the “authentication goes here” Hole in Identity
 
Mobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best PracticesMobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best Practices
 

Similar to FIDO in Action: Real World Development Case Studies

Concept of Hybrid Applications
Concept of Hybrid ApplicationsConcept of Hybrid Applications
Concept of Hybrid Applications
Skytap Cloud
 
Managing User Experience During Cloud Migrations
Managing User Experience During Cloud MigrationsManaging User Experience During Cloud Migrations
Managing User Experience During Cloud Migrations
eG Innovations
 
DevOps for Enterprise Systems : Innovate like a Startup
DevOps for Enterprise Systems : Innovate like a StartupDevOps for Enterprise Systems : Innovate like a Startup
DevOps for Enterprise Systems : Innovate like a Startup
DevOps for Enterprise Systems
 
Dronahq one app platform 7.0
Dronahq   one app platform 7.0Dronahq   one app platform 7.0
Dronahq one app platform 7.0
Jinen Dedhia
 
Move Auth, Policy, and Resilience to the Platform
Move Auth, Policy, and Resilience to the PlatformMove Auth, Policy, and Resilience to the Platform
Move Auth, Policy, and Resilience to the Platform
Christian Posta
 
Cloud webinar final
Cloud webinar finalCloud webinar final
Cloud webinar final
Ness Technologies
 
Startup InsurTech Award - Galileo Platforms
Startup InsurTech Award - Galileo PlatformsStartup InsurTech Award - Galileo Platforms
Startup InsurTech Award - Galileo Platforms
The Digital Insurer
 
Deploying FIDO Authentication - Business Considerations
Deploying FIDO Authentication  - Business ConsiderationsDeploying FIDO Authentication  - Business Considerations
Deploying FIDO Authentication - Business Considerations
FIDO Alliance
 
Making iot deliver business value v4
Making iot deliver business value v4Making iot deliver business value v4
Making iot deliver business value v4
Kellton Tech Solutions Ltd
 
IAUG Converge2013 Avaya CEO Kevin Kennedy June 4 2013 Keynote
IAUG Converge2013 Avaya CEO Kevin Kennedy June 4 2013 KeynoteIAUG Converge2013 Avaya CEO Kevin Kennedy June 4 2013 Keynote
IAUG Converge2013 Avaya CEO Kevin Kennedy June 4 2013 Keynote
Avaya Inc.
 
myGPcloud Partner Brochure
myGPcloud Partner BrochuremyGPcloud Partner Brochure
myGPcloud Partner Brochure
myGPCloud - Dynamics GP On-Demand
 
CloudFIT_CSF_in_cloud_aug16
CloudFIT_CSF_in_cloud_aug16CloudFIT_CSF_in_cloud_aug16
CloudFIT_CSF_in_cloud_aug16
Dennis. Lee
 
La Digital Transformation ha un nuovo alleato: Value Stream Management
La Digital Transformation ha un nuovo alleato: Value Stream ManagementLa Digital Transformation ha un nuovo alleato: Value Stream Management
La Digital Transformation ha un nuovo alleato: Value Stream Management
Emerasoft, solutions to collaborate
 
Codestrong 2012 breakout session creating a mobile strategy
Codestrong 2012 breakout session   creating a mobile strategyCodestrong 2012 breakout session   creating a mobile strategy
Codestrong 2012 breakout session creating a mobile strategy
Axway Appcelerator
 
Application Development Services - Codetru
Application Development Services - CodetruApplication Development Services - Codetru
Application Development Services - Codetru
CODETRU Software Solutions
 
corporate.ppt
corporate.pptcorporate.ppt
corporate.ppt
Arti Gupta
 
corporate (1).ppt
corporate (1).pptcorporate (1).ppt
corporate (1).ppt
Arti Gupta
 
Office 365 Migration
Office 365 MigrationOffice 365 Migration
Office 365 Migration
microlandland
 
Belgian visual studio launch 2013
Belgian visual studio launch 2013Belgian visual studio launch 2013
UniqueSoft Overview
UniqueSoft OverviewUniqueSoft Overview
UniqueSoft Overview
bmskelly
 

Similar to FIDO in Action: Real World Development Case Studies (20)

Concept of Hybrid Applications
Concept of Hybrid ApplicationsConcept of Hybrid Applications
Concept of Hybrid Applications
 
Managing User Experience During Cloud Migrations
Managing User Experience During Cloud MigrationsManaging User Experience During Cloud Migrations
Managing User Experience During Cloud Migrations
 
DevOps for Enterprise Systems : Innovate like a Startup
DevOps for Enterprise Systems : Innovate like a StartupDevOps for Enterprise Systems : Innovate like a Startup
DevOps for Enterprise Systems : Innovate like a Startup
 
Dronahq one app platform 7.0
Dronahq   one app platform 7.0Dronahq   one app platform 7.0
Dronahq one app platform 7.0
 
Move Auth, Policy, and Resilience to the Platform
Move Auth, Policy, and Resilience to the PlatformMove Auth, Policy, and Resilience to the Platform
Move Auth, Policy, and Resilience to the Platform
 
Cloud webinar final
Cloud webinar finalCloud webinar final
Cloud webinar final
 
Startup InsurTech Award - Galileo Platforms
Startup InsurTech Award - Galileo PlatformsStartup InsurTech Award - Galileo Platforms
Startup InsurTech Award - Galileo Platforms
 
Deploying FIDO Authentication - Business Considerations
Deploying FIDO Authentication  - Business ConsiderationsDeploying FIDO Authentication  - Business Considerations
Deploying FIDO Authentication - Business Considerations
 
Making iot deliver business value v4
Making iot deliver business value v4Making iot deliver business value v4
Making iot deliver business value v4
 
IAUG Converge2013 Avaya CEO Kevin Kennedy June 4 2013 Keynote
IAUG Converge2013 Avaya CEO Kevin Kennedy June 4 2013 KeynoteIAUG Converge2013 Avaya CEO Kevin Kennedy June 4 2013 Keynote
IAUG Converge2013 Avaya CEO Kevin Kennedy June 4 2013 Keynote
 
myGPcloud Partner Brochure
myGPcloud Partner BrochuremyGPcloud Partner Brochure
myGPcloud Partner Brochure
 
CloudFIT_CSF_in_cloud_aug16
CloudFIT_CSF_in_cloud_aug16CloudFIT_CSF_in_cloud_aug16
CloudFIT_CSF_in_cloud_aug16
 
La Digital Transformation ha un nuovo alleato: Value Stream Management
La Digital Transformation ha un nuovo alleato: Value Stream ManagementLa Digital Transformation ha un nuovo alleato: Value Stream Management
La Digital Transformation ha un nuovo alleato: Value Stream Management
 
Codestrong 2012 breakout session creating a mobile strategy
Codestrong 2012 breakout session   creating a mobile strategyCodestrong 2012 breakout session   creating a mobile strategy
Codestrong 2012 breakout session creating a mobile strategy
 
Application Development Services - Codetru
Application Development Services - CodetruApplication Development Services - Codetru
Application Development Services - Codetru
 
corporate.ppt
corporate.pptcorporate.ppt
corporate.ppt
 
corporate (1).ppt
corporate (1).pptcorporate (1).ppt
corporate (1).ppt
 
Office 365 Migration
Office 365 MigrationOffice 365 Migration
Office 365 Migration
 
Belgian visual studio launch 2013
Belgian visual studio launch 2013Belgian visual studio launch 2013
Belgian visual studio launch 2013
 
UniqueSoft Overview
UniqueSoft OverviewUniqueSoft Overview
UniqueSoft Overview
 

More from FIDO Alliance

FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: LY-DOCOMO-KDDI-Mercari Panel.pdf
FIDO Alliance Osaka Seminar: LY-DOCOMO-KDDI-Mercari Panel.pdfFIDO Alliance Osaka Seminar: LY-DOCOMO-KDDI-Mercari Panel.pdf
FIDO Alliance Osaka Seminar: LY-DOCOMO-KDDI-Mercari Panel.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: NEC & Yubico Panel.pdf
FIDO Alliance Osaka Seminar: NEC & Yubico Panel.pdfFIDO Alliance Osaka Seminar: NEC & Yubico Panel.pdf
FIDO Alliance Osaka Seminar: NEC & Yubico Panel.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: CloudGate.pdf
FIDO Alliance Osaka Seminar: CloudGate.pdfFIDO Alliance Osaka Seminar: CloudGate.pdf
FIDO Alliance Osaka Seminar: CloudGate.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: PlayStation Passkey Deployment Case Study.pdf
FIDO Alliance Osaka Seminar: PlayStation Passkey Deployment Case Study.pdfFIDO Alliance Osaka Seminar: PlayStation Passkey Deployment Case Study.pdf
FIDO Alliance Osaka Seminar: PlayStation Passkey Deployment Case Study.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Welcome Slides.pdf
FIDO Alliance Osaka Seminar: Welcome Slides.pdfFIDO Alliance Osaka Seminar: Welcome Slides.pdf
FIDO Alliance Osaka Seminar: Welcome Slides.pdf
FIDO Alliance
 
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FIDO Alliance
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
FIDO Alliance
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
FIDO Alliance
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
FIDO Alliance
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
FIDO Alliance
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
FIDO Alliance
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
FIDO Alliance
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
FIDO Alliance
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
FIDO Alliance
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
FIDO Alliance
 

More from FIDO Alliance (20)

FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
FIDO Alliance Osaka Seminar: LY-DOCOMO-KDDI-Mercari Panel.pdf
FIDO Alliance Osaka Seminar: LY-DOCOMO-KDDI-Mercari Panel.pdfFIDO Alliance Osaka Seminar: LY-DOCOMO-KDDI-Mercari Panel.pdf
FIDO Alliance Osaka Seminar: LY-DOCOMO-KDDI-Mercari Panel.pdf
 
FIDO Alliance Osaka Seminar: NEC & Yubico Panel.pdf
FIDO Alliance Osaka Seminar: NEC & Yubico Panel.pdfFIDO Alliance Osaka Seminar: NEC & Yubico Panel.pdf
FIDO Alliance Osaka Seminar: NEC & Yubico Panel.pdf
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
FIDO Alliance Osaka Seminar: CloudGate.pdf
FIDO Alliance Osaka Seminar: CloudGate.pdfFIDO Alliance Osaka Seminar: CloudGate.pdf
FIDO Alliance Osaka Seminar: CloudGate.pdf
 
FIDO Alliance Osaka Seminar: PlayStation Passkey Deployment Case Study.pdf
FIDO Alliance Osaka Seminar: PlayStation Passkey Deployment Case Study.pdfFIDO Alliance Osaka Seminar: PlayStation Passkey Deployment Case Study.pdf
FIDO Alliance Osaka Seminar: PlayStation Passkey Deployment Case Study.pdf
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
FIDO Alliance Osaka Seminar: Welcome Slides.pdf
FIDO Alliance Osaka Seminar: Welcome Slides.pdfFIDO Alliance Osaka Seminar: Welcome Slides.pdf
FIDO Alliance Osaka Seminar: Welcome Slides.pdf
 
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 

Recently uploaded

Jorge Cabrera - eCommerce Day Perú 2024
Jorge Cabrera  -  eCommerce Day Perú 2024Jorge Cabrera  -  eCommerce Day Perú 2024
Jorge Cabrera - eCommerce Day Perú 2024
eCommerce Institute
 
2024-06-09 Transformed: Changed from the Inside Out 02.pptx
2024-06-09 Transformed: Changed from the Inside Out 02.pptx2024-06-09 Transformed: Changed from the Inside Out 02.pptx
2024-06-09 Transformed: Changed from the Inside Out 02.pptx
Dale Wells
 
Workshop Wednesday with SaaStr CEO Jason Lemkin - VC Workshop
Workshop Wednesday with SaaStr CEO Jason Lemkin - VC WorkshopWorkshop Wednesday with SaaStr CEO Jason Lemkin - VC Workshop
Workshop Wednesday with SaaStr CEO Jason Lemkin - VC Workshop
saastr
 
Presentation on Digital documentation...
Presentation on Digital documentation...Presentation on Digital documentation...
Presentation on Digital documentation...
pintuyadav51914
 
@Call @Girls Mohanlalganj Lucknow 8923113531 Priya Sharma Beautiful And Cute ...
@Call @Girls Mohanlalganj Lucknow 8923113531 Priya Sharma Beautiful And Cute ...@Call @Girls Mohanlalganj Lucknow 8923113531 Priya Sharma Beautiful And Cute ...
@Call @Girls Mohanlalganj Lucknow 8923113531 Priya Sharma Beautiful And Cute ...
sabiyatanaparveenmum
 
(Amausi ) @Call @Girls Lucknow +91-8923113531 (MONIKA) - High Profile Unlimit...
(Amausi ) @Call @Girls Lucknow +91-8923113531 (MONIKA) - High Profile Unlimit...(Amausi ) @Call @Girls Lucknow +91-8923113531 (MONIKA) - High Profile Unlimit...
(Amausi ) @Call @Girls Lucknow +91-8923113531 (MONIKA) - High Profile Unlimit...
parichopra4
 
climate control MCPIR - René Corsten Delphy.pdf
climate control  MCPIR - René Corsten Delphy.pdfclimate control  MCPIR - René Corsten Delphy.pdf
climate control MCPIR - René Corsten Delphy.pdf
René Corsten
 
(Aminabad ) @Call @Girls Lucknow +91-8923113531 (MONIKA) - High Profile Unlim...
(Aminabad ) @Call @Girls Lucknow +91-8923113531 (MONIKA) - High Profile Unlim...(Aminabad ) @Call @Girls Lucknow +91-8923113531 (MONIKA) - High Profile Unlim...
(Aminabad ) @Call @Girls Lucknow +91-8923113531 (MONIKA) - High Profile Unlim...
parichopra4
 
Green Synthesis of Magnetic Nanoparticles and Their Biological application.pptx
Green Synthesis of Magnetic Nanoparticles and Their Biological application.pptxGreen Synthesis of Magnetic Nanoparticles and Their Biological application.pptx
Green Synthesis of Magnetic Nanoparticles and Their Biological application.pptx
AhmedSaeed181245
 
( Call  ) Girls Mayur Vihar 9873777170 High Profile beauty lady
( Call  ) Girls Mayur Vihar 9873777170 High Profile beauty lady( Call  ) Girls Mayur Vihar 9873777170 High Profile beauty lady
( Call  ) Girls Mayur Vihar 9873777170 High Profile beauty lady
Hyderabad Escorts Agency
 
2024-06-30 Transformed: Changed from the Inside Out 05.pptx
2024-06-30 Transformed: Changed from the Inside Out 05.pptx2024-06-30 Transformed: Changed from the Inside Out 05.pptx
2024-06-30 Transformed: Changed from the Inside Out 05.pptx
Dale Wells
 
Air New Zealand OSL Terminal (1). PDF...
Air New Zealand OSL Terminal (1). PDF...Air New Zealand OSL Terminal (1). PDF...
Air New Zealand OSL Terminal (1). PDF...
argen tina
 
(Nishatganj ) @Call @Girls Lucknow +91-8923113531 (MONIKA) - High Profile Unl...
(Nishatganj ) @Call @Girls Lucknow +91-8923113531 (MONIKA) - High Profile Unl...(Nishatganj ) @Call @Girls Lucknow +91-8923113531 (MONIKA) - High Profile Unl...
(Nishatganj ) @Call @Girls Lucknow +91-8923113531 (MONIKA) - High Profile Unl...
saroohilakhatariroy
 
Peripheral Smear technique and reporting
Peripheral Smear technique and reportingPeripheral Smear technique and reporting
Peripheral Smear technique and reporting
AreejiffatHaque
 
Effective-Recruitment-Strategies and leveraging linkedin
Effective-Recruitment-Strategies and leveraging linkedinEffective-Recruitment-Strategies and leveraging linkedin
Effective-Recruitment-Strategies and leveraging linkedin
DivyaMehta193660
 
JadenL_PersonalBrandExplorationPowerpoint
JadenL_PersonalBrandExplorationPowerpointJadenL_PersonalBrandExplorationPowerpoint
JadenL_PersonalBrandExplorationPowerpoint
mp4byqh8ss
 
presentation love your mothers MCPIR René Corsten Delphy.pdf
presentation love your mothers  MCPIR René Corsten Delphy.pdfpresentation love your mothers  MCPIR René Corsten Delphy.pdf
presentation love your mothers MCPIR René Corsten Delphy.pdf
René Corsten
 
Pengukuran berat badan anak dan tinggi badan anak
Pengukuran berat badan anak dan tinggi badan anakPengukuran berat badan anak dan tinggi badan anak
Pengukuran berat badan anak dan tinggi badan anak
DeviDamayanti53
 
Plantillas de presentación de intensamente
Plantillas de presentación de intensamentePlantillas de presentación de intensamente
Plantillas de presentación de intensamente
MariaSchauer
 
Mirabilis_Presentation_DAC_June_2024.pptx
Mirabilis_Presentation_DAC_June_2024.pptxMirabilis_Presentation_DAC_June_2024.pptx
Mirabilis_Presentation_DAC_June_2024.pptx
Deepak Shankar
 

Recently uploaded (20)

Jorge Cabrera - eCommerce Day Perú 2024
Jorge Cabrera  -  eCommerce Day Perú 2024Jorge Cabrera  -  eCommerce Day Perú 2024
Jorge Cabrera - eCommerce Day Perú 2024
 
2024-06-09 Transformed: Changed from the Inside Out 02.pptx
2024-06-09 Transformed: Changed from the Inside Out 02.pptx2024-06-09 Transformed: Changed from the Inside Out 02.pptx
2024-06-09 Transformed: Changed from the Inside Out 02.pptx
 
Workshop Wednesday with SaaStr CEO Jason Lemkin - VC Workshop
Workshop Wednesday with SaaStr CEO Jason Lemkin - VC WorkshopWorkshop Wednesday with SaaStr CEO Jason Lemkin - VC Workshop
Workshop Wednesday with SaaStr CEO Jason Lemkin - VC Workshop
 
Presentation on Digital documentation...
Presentation on Digital documentation...Presentation on Digital documentation...
Presentation on Digital documentation...
 
@Call @Girls Mohanlalganj Lucknow 8923113531 Priya Sharma Beautiful And Cute ...
@Call @Girls Mohanlalganj Lucknow 8923113531 Priya Sharma Beautiful And Cute ...@Call @Girls Mohanlalganj Lucknow 8923113531 Priya Sharma Beautiful And Cute ...
@Call @Girls Mohanlalganj Lucknow 8923113531 Priya Sharma Beautiful And Cute ...
 
(Amausi ) @Call @Girls Lucknow +91-8923113531 (MONIKA) - High Profile Unlimit...
(Amausi ) @Call @Girls Lucknow +91-8923113531 (MONIKA) - High Profile Unlimit...(Amausi ) @Call @Girls Lucknow +91-8923113531 (MONIKA) - High Profile Unlimit...
(Amausi ) @Call @Girls Lucknow +91-8923113531 (MONIKA) - High Profile Unlimit...
 
climate control MCPIR - René Corsten Delphy.pdf
climate control  MCPIR - René Corsten Delphy.pdfclimate control  MCPIR - René Corsten Delphy.pdf
climate control MCPIR - René Corsten Delphy.pdf
 
(Aminabad ) @Call @Girls Lucknow +91-8923113531 (MONIKA) - High Profile Unlim...
(Aminabad ) @Call @Girls Lucknow +91-8923113531 (MONIKA) - High Profile Unlim...(Aminabad ) @Call @Girls Lucknow +91-8923113531 (MONIKA) - High Profile Unlim...
(Aminabad ) @Call @Girls Lucknow +91-8923113531 (MONIKA) - High Profile Unlim...
 
Green Synthesis of Magnetic Nanoparticles and Their Biological application.pptx
Green Synthesis of Magnetic Nanoparticles and Their Biological application.pptxGreen Synthesis of Magnetic Nanoparticles and Their Biological application.pptx
Green Synthesis of Magnetic Nanoparticles and Their Biological application.pptx
 
( Call  ) Girls Mayur Vihar 9873777170 High Profile beauty lady
( Call  ) Girls Mayur Vihar 9873777170 High Profile beauty lady( Call  ) Girls Mayur Vihar 9873777170 High Profile beauty lady
( Call  ) Girls Mayur Vihar 9873777170 High Profile beauty lady
 
2024-06-30 Transformed: Changed from the Inside Out 05.pptx
2024-06-30 Transformed: Changed from the Inside Out 05.pptx2024-06-30 Transformed: Changed from the Inside Out 05.pptx
2024-06-30 Transformed: Changed from the Inside Out 05.pptx
 
Air New Zealand OSL Terminal (1). PDF...
Air New Zealand OSL Terminal (1). PDF...Air New Zealand OSL Terminal (1). PDF...
Air New Zealand OSL Terminal (1). PDF...
 
(Nishatganj ) @Call @Girls Lucknow +91-8923113531 (MONIKA) - High Profile Unl...
(Nishatganj ) @Call @Girls Lucknow +91-8923113531 (MONIKA) - High Profile Unl...(Nishatganj ) @Call @Girls Lucknow +91-8923113531 (MONIKA) - High Profile Unl...
(Nishatganj ) @Call @Girls Lucknow +91-8923113531 (MONIKA) - High Profile Unl...
 
Peripheral Smear technique and reporting
Peripheral Smear technique and reportingPeripheral Smear technique and reporting
Peripheral Smear technique and reporting
 
Effective-Recruitment-Strategies and leveraging linkedin
Effective-Recruitment-Strategies and leveraging linkedinEffective-Recruitment-Strategies and leveraging linkedin
Effective-Recruitment-Strategies and leveraging linkedin
 
JadenL_PersonalBrandExplorationPowerpoint
JadenL_PersonalBrandExplorationPowerpointJadenL_PersonalBrandExplorationPowerpoint
JadenL_PersonalBrandExplorationPowerpoint
 
presentation love your mothers MCPIR René Corsten Delphy.pdf
presentation love your mothers  MCPIR René Corsten Delphy.pdfpresentation love your mothers  MCPIR René Corsten Delphy.pdf
presentation love your mothers MCPIR René Corsten Delphy.pdf
 
Pengukuran berat badan anak dan tinggi badan anak
Pengukuran berat badan anak dan tinggi badan anakPengukuran berat badan anak dan tinggi badan anak
Pengukuran berat badan anak dan tinggi badan anak
 
Plantillas de presentación de intensamente
Plantillas de presentación de intensamentePlantillas de presentación de intensamente
Plantillas de presentación de intensamente
 
Mirabilis_Presentation_DAC_June_2024.pptx
Mirabilis_Presentation_DAC_June_2024.pptxMirabilis_Presentation_DAC_June_2024.pptx
Mirabilis_Presentation_DAC_June_2024.pptx
 

FIDO in Action: Real World Development Case Studies

  • 1. Jackie Comp,VPWorldwide Sales FIDO in Action: Real World Deployment Case Studies
  • 2. What Experience Do Consumers Want? NokNokDemos Today, in most cases hitting “next” brings you to a password…
  • 3. A Consistent Passwordless Experience Across Any Channel NokNokDemos With Nok Nok’s FIDO solution, you can get rid of passwords
  • 4. A Consistent Passwordless Experience Across Any Channel NokNokDemos • Same experience in mobile and web applications • Turn biometrics into 2 factors
  • 5. 2 Examples: Business to Consumer Case Studies ©2018 Nok Nok Labs — Confidential — Do not distribute 5 • 9,000 employees worldwide • 19 locations in 9 countries • $6.0 billion in revenue • 77M+ Million customers • More than 51K employees worldwide • Un-carrier CUSTOMER FIRST philosophy • Has led the industry in YoY growth for 18 consecutive quarters
  • 6. ©2018 Nok Nok Labs — Confidential — Do not distribute 6 Intuit and T-Mobile Discuss Their FIDO Deployments
  • 7. Journey to Passwordless for Consumers Phase 1 Mobile First Strategy (Phase out SMS-OTP) Phase 2 Add Web Support Phase 3 Fully Deprecate Passwords
  • 8. ©2018 Nok Nok Labs — Confidential — Do not distribute 8 Business Goals: • Mobile first strategy using native authenticators • Reduce use of passwords • Reduce cost of support for login related issues • Standardize across brands migrating from Touch ID to FIDO • Improve security controls • Reduce overhead of developing proprietary approaches • Leverage best industry standard • Rapidly support new native device authenticators and all associated flows Capabilities Needed: • FIDO compliant technology • Support all current and future FIDO protocols • Private cloud hosting (on premise solution) • Maintain standard for high availability and performance • Industry standards for security controls (e.g. encryption key rotation) • Durability: Partner fully invested in FIDO today and in the future • Lightweight integration with native apps and backend services • Quick turnaround on any required patches
  • 9. ©2018 Nok Nok Labs — Confidential �� Do not distribute 9 Implementation Overview: • Educate internal product teams on new approach • Scaled service deployment across multiple cloud hosting zones and regions to meet availability requirements • Integrate risk screening as part of authentication event • Scale solution in phases: smaller user base apps leading to TurboTax • Controlled user rollout with iOS first • Require use of FIDO authentication with upgraded app Why FIDO: • Strong, multi-factor security model • Industry standard, future proof • Convenience for users • Lower operational costs Alternatives Considered: • Buy versus build (context vs. core) • Leverage best industry standard (FIDO) with proven partner
  • 10. ©2018 Nok Nok Labs — Confidential — Do not distribute 10 Results: • 99.9% % authentication success vs. 80-85% using SMS OTP • Authentication time reduced by 20% • No disruption and continued high adoption rate • Eliminated development costs of maintaining proprietary solution • Platform in place to rapidly support additional use cases Next Steps: • Move to AWS Aurora • Continue roll out to additional products • Expand use cases including passwordless browser login “We have improved our security controls while providing our customers with seamless access to their online financial data.” - Antonio Fuentes, Principal Product Manager
  • 11. ©2018 Nok Nok Labs — Confidential — Do not distribute 11 Business Goals: • Reduce pain point of passwords on phone • Increase confidence of right user • Implement a scalable, future-proof approach to authentication Why FIDO: • Strong, multi-factor authentication and biometrics • Industry standard plug and play approach today and in future • Public private key pair trust model • Lower operational costs Capabilities Needed: • Universal Server • Integrate with existing IDP • Carrier-grade platform and scalability Alternatives Considered: • Several evaluated including “Build Your Own” • Determined finding a partner to get to desired state was more cost effective and minimized risk
  • 12. ©2018 Nok Nok Labs — Confidential — Do not distribute 12 Implementation Overview: • Design flows for Use Cases • Determine UX terminology and experience • Integrate with MyTMO native mobile app • Integrate with in-house virtualized and modular Ericsson IAM • 6 month project from solution design to launch • Roll out to users in waves of 1M over 1 month period • “Soft” push for registration – remind users once/month 4 times Results: • Reduced password resets by 65% to 7% • 50% adoption in first 5 months with “soft” rollout • Supported FaceID Day 1 with no additional work • “Flawless” implementation with no service issues • Expanding across applications including authentication to Call Center
  • 13. ©2018 Nok Nok Labs — Confidential — Do not distribute 13 Next Steps: • Roll out to additional products • Push notification for quick authentication into call center • Leverage Nok Nok/FIDO for user authentication for cross-carrier initiative (CCID) Lessons Learned: • Important to be clear on which users to target • Determine the user experience you want to accomplish – Do you provide choice or simplify experience? – Default to TMOs desired authenticator “By implementing Nok Nok’s FIDO authentication platform we have achieved our goal of providing T-Mobile customers a secure, frictionless experience for accessing our services today and in the future.” - Michael Engan, Principal Technology Architect