This document is intended to highlight areas where FIDO offers the best value to address U.S. Government use cases as an enhancement of existing infrastructure, while minimizing rework as U.S. Government Agencies advance their zero trust strategies with phishing-resistant authentication tied to enterprise identity as the foundation.

For any questions or comments, please contact feedback@fidoalliance.org.

Note this white paper has been revised – March 2025.


More

White Paper: DBSC/DPOP as Complementary Technologies to FIDO Authentication

Editors Shane Weeden, IBMAn Ho, IBM Abstract Session hijacking is a growing initial attack vector…

Read More →

Passkeys: The Journey to Prevent Phishing Attacks

This white paper is part of a three-part series on preventing phishing attacks through passkey…

Read More →

Onboarding the Future: Guide for Edge Deployment with FIDO Device Onboard (FDO)

Why You Should Consider the FDO Standard for Zero-Trust Device Onboarding 1. Executive Summary IoT…

Read More →


12315 Next