FIDO in Practice
Facebook X LinkedIn

FIDO in Practice

Combined Session
Thursday, May 11, 2023 14:30—15:30
Location: A 05-06

FIDO2: The Train is Leaving the Station

The FIDO Alliance is working to change the nature of authentication with open standards that are more secure than passwords, simpler for consumers to use, and easier for service providers to deploy and manage. While initially focused on the consumer space FIDO2 holds advantages for the enterprise willing to break the mould on legacy authentication models.

This session will look at the components of a FIDO2 environment and investigate the options for FIDO deployments. A view of the possible future of FIDO will be discussed.

FIDO2: The Train is Leaving the Station
Event Recording
FIDO2: The Train is Leaving the Station
Click here to watch the recording of this session. Please note that this video is only available to event participants and subscribers. You'll need to log in to watch it.
FIDO2: The Train is Leaving the Station
Presentation deck
FIDO2: The Train is Leaving the Station
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
Graham Williamson
Graham Williamson
KuppingerCole
Graham Williamson is a senior Analyst at KuppingerCole. Graham has practical experience in the identity management and access control industry having completed assignments in the academic,...

Enforce a faster sign-in with Biometrics and Pin – even for legacy apps of a DAX company

Join this session if you want to learn how a globally operating science and technology company introduced a faster and phishing-resistant sign-in – driven by the open-industry standard FIDO.

Employees use Biometrics or Pin, instead of Password & SMS, Call or App.

A “Detached Authentication” feature enables apps without FIDO/WebAuthn support and allow us to globally enforce the phishing-resistant sign-in – without fallback to other MFA methods.

Identity Verification is required for the registration and recovery of Biometrics or Pin. SaaS or self-developed identity verification methods can be used and combined.

The infrastructure for authentication and registration of Biometrics and Pin runs in a self-hosted environment. It allows us to stay true to our principles: Own Identities, Credentials and Authentication.

# What makes it unique

Passwordless Sign-in
– Biometrics of device-in-use 

Biometrics sign-in available for all apps
Detached Authentication for apps without WebAuthn


Biometrics sign-in enforced for all users
No SMS, Call or Authentication Apps


Onboarding, Registration, Recovery, Password Reset
– Self-services secured with identity verification


Centrally stored FIDO-Credentials for multiple IdPs
Self-hosted infrastructure with IdP plugins

Enforce a faster sign-in with Biometrics and Pin – even for legacy apps of a DAX company
Event Recording
Enforce a faster sign-in with Biometrics and Pin – even for legacy apps of a DAX company
Click here to watch the recording of this session. Please note that this video is only available to event participants and subscribers. You'll need to log in to watch it.
Enforce a faster sign-in with Biometrics and Pin – even for legacy apps of a DAX company
Presentation deck
Enforce a faster sign-in with Biometrics and Pin – even for legacy apps of a DAX company
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
Dennis Kniep
Dennis Kniep
Merck KGaA, Darmstadt, Germany
Dennis is the Domain Architect of Identity and Access Management. He has a background as a software engineer and spent a decade as lead developer in IAM and security projects.  
Andreas Pellengahr
Andreas Pellengahr
Merck KGaA, Darmstadt, Germany
Andreas is passionately coordinating the IAM team in the Technology Office. He believes that Identities, Credentials and Authentication should be self-hosted and not in a cloud system.

FIDO for the Enterprise - Challenges & Rewards

Andreas Pellengahr
Andreas Pellengahr
Merck KGaA, Darmstadt, Germany
Andreas is passionately coordinating the IAM team in the Technology Office. He believes that Identities, Credentials and Authentication should be self-hosted and not in a cloud system.
Allen Storey
Allen Storey
Intercede
Allen has 30 years IT experience, including roles at Prima Software Solutions, Labinal Group and Corah Plc, with more than 20 years focusing on digital identity. As Chief Product Officer for...
Graham Williamson
Graham Williamson
KuppingerCole
Graham Williamson is a senior Analyst at KuppingerCole. Graham has practical experience in the identity management and access control industry having completed assignments in the academic,...
Subscribe for updates
Please provide your email address