{"id":62049,"date":"2014-12-23T11:32:13","date_gmt":"2014-12-23T16:32:13","guid":{"rendered":"https:\/\/fidodev.wpengine.com\/%ec%82%ac%ec%9a%a9%ec%9e%90-%ec%9d%b8%ec%a6%9d-%ec%82%ac%ec%96%91-%ea%b0%9c%ec%9a%94\/%ec%9d%b8%ec%a6%9d-%ec%82%ac%ec%96%91-%eb%8b%a4%ec%9a%b4%eb%a1%9c%eb%93%9c\/"},"modified":"2025-01-09T16:22:11","modified_gmt":"2025-01-09T21:22:11","slug":"download","status":"publish","type":"page","link":"https:\/\/fidoalliance.org\/specifications\/download\/?lang=ko","title":{"rendered":"\uc778\uc99d \uc0ac\uc591 \ub2e4\uc6b4\ub85c\ub4dc"},"content":{"rendered":"\n<p>FIDO Alliance \uc0ac\uc6a9\uc790 \uc778\uc99d \uc0ac\uc591\uc758 \ucd5c\uc2e0 \ubc84\uc804\uc740 \uc544\ub798\uc5d0\uc11c \ud655\uc778\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4. FIDO\ub97c \ucc98\uc74c \uc0ac\uc6a9\ud558\ub294 \uacbd\uc6b0, \uacc4\uc18d \uc9c4\ud589\ud558\uae30 \uc804\uc5d0 \uba3c\uc800 <a href=\"https:\/\/fidoalliance.org\/specifications\/?lang=ko\">\uc0ac\uc591 \uac1c\uc694\ub97c<\/a> \uac80\ud1a0\ud558\ub294 \uac83\uc774 \uc88b\uc2b5\ub2c8\ub2e4.<\/p>\n\n<p>FIDO Alliance\ub294 \uae30\uc220 \uc694\uad6c \uc0ac\ud56d\uc744 \ucda9\uc871\ud558\ub294 \uac83 \uc678\uc5d0\ub3c4 \uac01 \uc7a5\uce58\uc758 \ubcf4\uc548 \ubcf4\uc99d\uc744 \uac15\ud654\ud558\uae30 \uc704\ud574 \uad6c\ud604\ud574\uc57c \ud558\ub294 \ucd94\uac00 \ubcf4\uc548 \uc694\uad6c \uc0ac\ud56d\uc744 \uac1c\ubc1c\ud588\uc2b5\ub2c8\ub2e4. \uc774\ub7ec\ud55c \uc694\uad6c \uc0ac\ud56d\uc740 <a href=\"https:\/\/fidoalliance.org\/certification\/authenticator-certification-levels\/?lang=ko\" target=\"_blank\" rel=\"noreferrer noopener\">Certified Authenticator Levels<\/a> \ud398\uc774\uc9c0\uc5d0 \uc788\ub294 Authenticator Certification \ud504\ub85c\uadf8\ub7a8\uc5d0\uc11c \ub2e4\ub8f9\ub2c8\ub2e4. <\/p>\n\n<p>\uc774\uc804 \ubc84\uc804\uc758 \uc0ac\uc591\uc740 <a href=\"https:\/\/fidoalliance.org\/specs\/\" target=\"_blank\" rel=\"noopener noreferrer\">\uc0ac\uc591 \uc544\uce74\uc774\ube0c\uc5d0\uc11c<\/a> <a href=\"\/specs\/fido-uaf-v1.0-ps-20141208-cn.zip\" target=\"_blank\" rel=\"noopener noreferrer\">UAF 1.0 \uc0ac\uc591\uc758 \uc911\uad6d\uc5b4 \ubc88\uc5ed\ubcf8\uacfc<\/a> \ud568\uaed8 \ud655\uc778\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4. FIDO Alliance \uc0ac\uc591\uc758 FIDO \uc0ac\uc591 \uc0c1\ud0dc \ubc0f \uc9c0\uc801 \uc7ac\uc0b0\uad8c(IPR)\uc740 \uc5ec\uae30\uc5d0\uc11c \ud655\uc778\ud560 \uc218 <a href=\"#ipr\">\uc788\uc2b5\ub2c8\ub2e4<\/a>.<\/p>\n\n<hr class=\"wp-block-separator has-css-opacity is-style-wide\"\/>\n\n<p>FIDO \uc5bc\ub77c\uc774\uc5b8\uc2a4\ub294 \ubaa8\ub4e0 \uad6c\ud604\uc790\uac00 \ub2e4\uc6b4\ub85c\ub4dc\ud560 \uc218 \uc788\ub3c4\ub85d \ub2e4\uc74c \uae30\uc220 \uc0ac\uc591\uc744 \uac8c\uc2dc\ud569\ub2c8\ub2e4. \ub610\ud55c, \uc5bc\ub77c\uc774\uc5b8\uc2a4\ub294 \uacf5\uac1c \ud1a0\ub860 \ubaa9\ub85d( <a href=\"https:\/\/groups.google.com\/a\/fidoalliance.org\/forum\/#!forum\/fido-dev\" target=\"_blank\" rel=\"noopener noreferrer\">fido-dev@fidoalliance.org<\/a> )\uc744 \uc6b4\uc601\ud558\uc5ec FIDO \uc778\uc99d \uae30\uc220 \uad6c\ud604\uc744 \uc704\ud55c \uc9c0\uc6d0\uc744 \uc81c\uacf5\ud558\uace0 \uc788\uc2b5\ub2c8\ub2e4. FIDO \uc0ac\uc591 \uad6c\ud604\uacfc \uad00\ub828\ud558\uc5ec \uad81\uae08\ud55c \uc810\uc774 \uc788\uc73c\uba74 \ud574\ub2f9 \ud3ec\ub7fc\uc5d0 \uac8c\uc2dc\ud574 \uc8fc\uc138\uc694.<\/p>\n\n<p>FIDO Alliance\ub294 \ub3c5\uc790\uc758 \ud3b8\uc758\ub97c \uc704\ud574 PDF \ud615\uc2dd\uc758 \uc0ac\uc591\uc744 \uc0dd\uc131\ud558\uc9c0\ub9cc, PDF \ud615\uc2dd\uc758 \uc0ac\uc591\uc5d0\uc11c \ud615\uc2dd \ubb38\uc81c\uac00 \ubc1c\uc0dd\ud558\ub294 \uacbd\uc6b0 HTML \ud615\uc2dd\uc758 \uc0ac\uc591\uc744 \ucc38\uc870\ud558\ub294 \uac83\uc774 \uc88b\uc2b5\ub2c8\ub2e4. \uc544\uc9c1 FIDO \uc5bc\ub77c\uc774\uc5b8\uc2a4\uc758 \ud68c\uc6d0\uc774 \uc544\ub2c8\uba70 \uacf5\uac1c \uc0ac\uc591 \ucd08\uc548\uc5d0 \ub300\ud55c \uc758\uacac\uc774 \uc788\uc73c\uc2e0 \uacbd\uc6b0, <a href=\"https:\/\/fidoalliance.org\/contact\/?lang=ko\" target=\"_blank\" rel=\"noopener noreferrer\">\ubb38\uc758<\/a> \uc591\uc2dd\uc744 \uc774\uc6a9\ud574 \uc8fc\uc2dc\uae30 \ubc14\ub78d\ub2c8\ub2e4.<\/p>\n\n<div style=\"height:33px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<table id=\"tablepress-2\" class=\"tablepress tablepress-id-2\" cellpadding=\"10\">\n<thead>\n<tr class=\"row-1\">\n\t<th colspan=\"3\" class=\"column-1\" style=\"width:33%;\">FIDO2 Specifications<\/th>\n<\/tr>\n<\/thead>\n<tbody class=\"row-striping\">\n<tr class=\"row-2\">\n\t<td class=\"column-1\"><strong>CLIENT TO AUTHENTICATOR PROTOCOL (CTAP)<\/strong> This Proposed Standard document describes the Client-to-Authenticator Protocol (CTAP) which uses USB, NFC, and \/ or BLE for communication between browsers or platforms and FIDO2 authenticators.<br \/>\n<p><strong>CTAP 2.3 Review Draft: <\/strong><a href=\"https:\/\/fidoalliance.org\/specs\/fido-v2.3-rd-20251023\/fido-client-to-authenticator-protocol-v2.3-rd-20251023.html\" target=\"_blank\">HTML<\/a> | <a href=\"https:\/\/fidoalliance.org\/specs\/fido-v2.3-rd-20251023\/fido-client-to-authenticator-protocol-v2.3-rd-20251023.pdf\" target=\"_blank\">PDF<\/a><br \/>\n<p><strong>CTAP 2.2 Proposed Standard: <\/strong><a href=\"https:\/\/fidoalliance.org\/specs\/fido-v2.2-ps-20250714\/fido-client-to-authenticator-protocol-v2.2-ps-20250714.html\" target=\"_blank\">HTML<\/a> | <a href=\"https:\/\/fidoalliance.org\/specs\/fido-v2.2-ps-20250714\/fido-client-to-authenticator-protocol-v2.2-ps-20250714.pdf\" target=\"_blank\">PDF<\/a><br \/>\n<p><strong>CTAP 2.1 Proposed Standard: <\/strong><a href=\"https:\/\/fidoalliance.org\/specs\/fido-v2.1-ps-20210615\/fido-client-to-authenticator-protocol-v2.1-ps-20210615.html\" target=\"_blank\">HTML<\/a> | <a href=\"https:\/\/fidoalliance.org\/specs\/fido-v2.1-ps-20210615\/fido-client-to-authenticator-protocol-v2.1-ps-20210615.pdf\" target=\"_blank\">PDF<\/a><br \/>\n<p><strong>CTAP 2.1 Errata: <\/strong><a href=\"https:\/\/fidoalliance.org\/specs\/fido-v2.1-ps-20210615\/fido-client-to-authenticator-protocol-v2.1-errata-20220621.html\" target=\"_blank\">HTML<\/a> | <a href=\"https:\/\/fidoalliance.org\/wp-content\/uploads\/2025\/05\/errata-fido-client-to-authenticator-protocol-v2.1-errata-20220621.pdf\" target=\"_blank\">PDF<\/a><\/td><td class=\"column-2\"><strong>W3C - Web Authentication:<br \/>\nAn API for accessing Public Key Credentials<br \/>\nLevel 2 (Webauthn)<\/strong><br \/>\nThis specification defines an API enabling the creation and use of strong, attested, scoped, public key-based credentials by web applications, for the purpose of strongly authenticating users.<br \/>\n<br \/>\n<strong>Download:<\/strong> <a href=\"https:\/\/www.w3.org\/TR\/webauthn\/\" target=\"_blank\" rel=\"noopener noreferrer\">HTML<\/a><br \/>\n<\/td><td class=\"column-3\"><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<!-- #tablepress-2 from cache -->\n\n<table id=\"tablepress-17\" class=\"tablepress tablepress-id-17\" cellpadding=\"10\">\n<thead>\n<tr class=\"row-1\">\n\t<th colspan=\"3\" class=\"column-1\" style=\"width:33%;\">UAF Specifications<\/th>\n<\/tr>\n<\/thead>\n<tbody class=\"row-striping row-hover\">\n<tr class=\"row-2\">\n\t<td class=\"column-1\"><strong>FIDO UAF Complete Specifications<\/strong><br \/>\nThis is a zip file containing the FIDO Alliance Universal Authentication Framework (UAF) specification files:<br \/>\n<br \/>\nChange USB transport to conform to ISO7816-4<br \/>\nNFC (ISO7816-4) support<br \/>\nBluetooth Low Energy support<br \/>\nUpdated JavaScript 1.1 specification<br \/>\nTransports Extension specification<br \/>\nExpanded Metadata Service specification to include U2F<br \/>\n<br \/>\n<strong>1.1 Proposed Standard:<\/strong> <a href=\"https:\/\/fidoalliance.org\/specs\/fido-uaf-v1.1-ps-20170202.zip\">Files<\/a><br \/>\n<br \/>\n<strong>1.2 Proposed Standard:<\/strong> <a href=\"https:\/\/fidoalliance.org\/specs\/fido-uaf-v1.2-ps-20201020\/fido-uaf--v1.2-ps-20201020.zip\">Files<\/a><\/td><td class=\"column-2\"><strong>FIDO UAF Architectural Overview<\/strong> <br \/>\nThis overview document describes the various protocol design considerations in detail and also describes the user flows in detail. It describes the layering and intention of each of the detailed protocol documents.<br \/>\n<span style=\"color: #ff0000;\"><strong>You should read this document first if you are new to UAF.<\/strong><\/span><br \/>\n<br \/>\n<strong>1.1 Proposed Standard:<\/strong> <a href=\"https:\/\/fidoalliance.org\/specs\/fido-uaf-v1.1-ps-20170202\/fido-uaf-overview-v1.1-ps-20170202.html\" target=\"_blank\" rel=\"noopener noreferrer\">HTML<\/a> | <a href=\"https:\/\/fidoalliance.org\/specs\/fido-uaf-v1.1-ps-20170202\/fido-uaf-overview-v1.1-ps-20170202.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">PDF<\/a><br \/>\n<strong>1.2 Proposed Standard:<\/strong> <a href=\"https:\/\/fidoalliance.org\/specs\/fido-uaf-v1.2-ps-20201020\/fido-uaf-overview-v1.2-ps-20201020.html\">HTML<\/a> | <a href=\"https:\/\/fidoalliance.org\/specs\/fido-uaf-v1.2-ps-20201020\/fido-uaf-overview-v1.2-ps-20201020.pdf\">PDF<\/a><\/td><td class=\"column-3\"><strong>FIDO UAF Protocol Specification<\/strong> <br \/>\nThis document defines the message formats and processing rules for all UAF protocol messages.<br \/>\n<br \/>\n<strong>1.1 Proposed Standard:<\/strong> <a href=\"https:\/\/fidoalliance.org\/specs\/fido-uaf-v1.1-ps-20170202\/fido-uaf-protocol-v1.1-ps-20170202.html\" target=\"_blank\" rel=\"noopener noreferrer\">HTML<\/a> | <a href=\"https:\/\/fidoalliance.org\/specs\/fido-uaf-v1.1-ps-20170202\/fido-uaf-protocol-v1.1-ps-20170202.pdf\">PDF<\/a><br \/>\n<strong>1.2 Proposed Standard:<\/strong> <a href=\"https:\/\/fidoalliance.org\/specs\/fido-uaf-v1.2-ps-20201020\/fido-uaf-protocol-v1.2-ps-20201020.html\" target=\"_blank\" rel=\"noopener noreferrer\">HTML<\/a> | <a href=\"https:\/\/fidoalliance.org\/specs\/fido-uaf-v1.2-ps-20201020\/fido-uaf-protocol-v1.2-ps-20201020.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">PDF<\/a><\/td>\n<\/tr>\n<tr class=\"row-3\">\n\t<td class=\"column-1\"><strong>UAF Application API and Transport Binding Specification<\/strong> <br \/>\nThis document describes the client-side APIs and interoperability profile for client applications to utilize FIDO UAF.<br \/>\n<br \/>\n<strong>1.1 Proposed Standard:<\/strong> <a href=\"https:\/\/fidoalliance.org\/specs\/fido-uaf-v1.1-ps-20170202\/fido-uaf-client-api-transport-v1.1-ps-20170202.html\" target=\"_blank\" rel=\"noopener noreferrer\">HTML<\/a> | <a href=\"https:\/\/fidoalliance.org\/specs\/fido-uaf-v1.1-ps-20170202\/fido-uaf-client-api-transport-v1.1-ps-20170202.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">PDF<\/a><br \/>\n<strong>1.2 Proposed Standard:<\/strong> <a href=\"https:\/\/fidoalliance.org\/specs\/fido-uaf-v1.2-ps-20201020\/fido-uaf-client-api-transport-v1.2-ps-20201020.html\" target=\"_blank\" rel=\"noopener noreferrer\">HTML<\/a> | <a href=\"https:\/\/fidoalliance.org\/specs\/fido-uaf-v1.2-ps-20201020\/fido-uaf-client-api-transport-v1.2-ps-20201020.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">PDF<\/a><\/td><td class=\"column-2\"><strong>FIDO UAF Authenticator-specific Module API<\/strong> <br \/>\nThis document defines Authenticator-specific Modules and the API provided to the FIDO client by ASMs.<br \/>\n<br \/>\n<strong>1.1 Proposed Standard:<\/strong> <a href=\"https:\/\/fidoalliance.org\/specs\/fido-uaf-v1.1-ps-20170202\/fido-uaf-asm-api-v1.1-ps-20170202.html\" target=\"_blank\" rel=\"noopener noreferrer\">HTML<\/a> | <a href=\"https:\/\/fidoalliance.org\/specs\/fido-uaf-v1.1-ps-20170202\/fido-uaf-asm-api-v1.1-ps-20170202.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">PDF<\/a><br \/>\n<strong>1.2 Proposed Standard:<\/strong> <a href=\"https:\/\/fidoalliance.org\/specs\/fido-uaf-v1.2-ps-20201020\/fido-uaf-asm-api-v1.2-ps-20201020.html\" target=\"_blank\" rel=\"noopener noreferrer\">HTML<\/a> | <a href=\"https:\/\/fidoalliance.org\/specs\/fido-uaf-v1.2-ps-20201020\/fido-uaf-asm-api-v1.2-ps-20201020.pdf\">PDF<\/a><\/td><td class=\"column-3\"><strong>FIDO UAF Authenticator Commands<\/strong><br \/>\nThis document describes Low-level functionality that UAF Authenticators should implement to support the UAF protocol.<br \/>\n<br \/>\n<strong>1.1 Proposed Standard:<\/strong> <a href=\"https:\/\/fidoalliance.org\/specs\/fido-uaf-v1.1-ps-20170202\/fido-uaf-authnr-cmds-v1.1-ps-20170202.html\" target=\"_blank\" rel=\"&quot;noop noopener noreferrer\">HTML<\/a> | <a href=\"https:\/\/fidoalliance.org\/specs\/fido-uaf-v1.1-ps-20170202\/fido-uaf-authnr-cmds-v1.1-ps-20170202.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">PDF<\/a><br \/>\n<br \/>\n<strong>1.2 Proposed Standard:<\/strong> <a href=\"https:\/\/fidoalliance.org\/specs\/fido-uaf-v1.2-ps-20201020\/fido-uaf-authnr-cmds-v1.2-ps-20201020.html\" target=\"_blank\" rel=\"&quot;noop noopener noreferrer\">HTML<\/a> | <a href=\"https:\/\/fidoalliance.org\/specs\/fido-uaf-v1.2-ps-20201020\/fido-uaf-authnr-cmds-v1.2-ps-20201020.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">PDF<\/a><\/td>\n<\/tr>\n<tr class=\"row-4\">\n\t<td class=\"column-1\"><strong>FIDO ECDAA Algorithm<\/strong> <br \/>\nThis document describes how to use Elliptic Curve (EC) Direct Anonymous Attestation (DAA) as a form of secure and private attestation for authenticators.<br \/>\n<br \/>\n<strong>1.1 Proposed Standard:<\/strong> <a href=\"https:\/\/fidoalliance.org\/specs\/fido-uaf-v1.1-ps-20170202\/fido-ecdaa-algorithm-v1.1-ps-20170202.html\" target=\"_blank\" rel=\"noopener noreferrer\">HTML<\/a> | <a href=\"https:\/\/fidoalliance.org\/specs\/fido-uaf-v1.1-ps-20170202\/fido-ecdaa-algorithm-v1.1-ps-20170202.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">PDF<\/a><br \/>\n<br \/>\n<strong>1.2 Review Draft:<\/strong> <a href=\"https:\/\/fidoalliance.org\/specs\/fido-uaf-v1.2-rd-20171128\/fido-ecdaa-algorithm-v1.2-rd-20171128.html\" target=\"_blank\" rel=\"noopener noreferrer\">HTML<\/a> | <a href=\"https:\/\/fidoalliance.org\/specs\/fido-uaf-v1.2-rd-20171128\/fido-ecdaa-algorithm-v1.2-rd-20171128.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">PDF<\/a><br \/>\n<br \/>\n<strong>2.0 Implementation Draft:<\/strong> <a href=\"https:\/\/fidoalliance.org\/specs\/fido-v2.0-id-20180227\/fido-ecdaa-algorithm-v2.0-id-20180227.html\" target=\"_blank\" rel=\"noopener noreferrer\">HTML<\/a> | <a href=\"https:\/\/fidoalliance.org\/specs\/fido-v2.0-id-20180227\/fido-ecdaa-algorithm-v2.0-id-20180227.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">PDF<\/a><\/td><td class=\"column-2\"><strong>FIDO UAF APDU Commands<\/strong> <br \/>\nThis document defines a mapping of FIDO UAF Authenticator commands to Application Protocol Data Units (APDUs) thus facilitating UAF authenticators based on Secure Elements.<br \/>\n<br \/>\n<strong>1.1 Proposed Standard:<\/strong> <a href=\"https:\/\/fidoalliance.org\/specs\/fido-uaf-v1.1-ps-20170202\/fido-uaf-apdu-v1.1-ps-20170202.html\" target=\"_blank\" rel=\"noopener noreferrer\">HTML<\/a> | <a href=\"https:\/\/fidoalliance.org\/specs\/fido-uaf-v1.1-ps-20170202\/fido-uaf-apdu-v1.1-ps-20170202.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">PDF<\/a><br \/>\n<br \/>\n<strong>1.2 Proposed Standard:<\/strong> <a href=\"https:\/\/fidoalliance.org\/specs\/fido-uaf-v1.2-ps-20201020\/fido-uaf-apdu-v1.2-ps-20201020.html\" target=\"_blank\" rel=\"noopener noreferrer\">HTML<\/a> | <a href=\"https:\/\/fidoalliance.org\/specs\/fido-uaf-v1.2-ps-20201020\/fido-uaf-apdu-v1.2-ps-20201020.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">PDF<\/a><\/td><td class=\"column-3\"><strong>UAF Registry of Predefined Values<\/strong> <br \/>\nThis document describes implementation considerations and recommendations for creators of U2F devices and for relying parties implementing U2F support.<br \/>\n<br \/>\n<strong>1.1 Proposed Standard:<\/strong> <a href=\"https:\/\/fidoalliance.org\/specs\/fido-uaf-v1.1-ps-20170202\/fido-registry-v1.1-ps-20170202.html\" target=\"_blank\" rel=\"noopener noreferrer\">HTML<\/a> | <a href=\"https:\/\/fidoalliance.org\/specs\/fido-uaf-v1.1-ps-20170202\/fido-registry-v1.1-ps-20170202.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">PDF<\/a><br \/>\n<strong>1.2 Proposed Standard:<\/strong> <a href=\"https:\/\/fidoalliance.org\/specs\/fido-uaf-v1.2-ps-20201020\/fido-uaf-reg-v1.2-ps-20201020.html\" target=\"_blank\" rel=\"noopener noreferrer\">HTML<\/a> | <a href=\"https:\/\/fidoalliance.org\/specs\/fido-uaf-v1.2-ps-20201020\/fido-uaf-reg-v1.2-ps-20201020.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">PDF<\/a><\/td>\n<\/tr>\n<tr class=\"row-5\">\n\t<td class=\"column-1\"><strong>FIDO UAF Android This document defines the assertion format \"APCV1CBOR\" in order to use Android Protected Confirmation for FIDO UAF Transaction Confirmation.<br \/>\n<br \/>\n<strong>1.2 Proposed Standard:<\/strong> <a href=\"https:\/\/fidoalliance.org\/specs\/fido-uaf-v1.2-ps-20201020\/fido-uaf-apccbor-v1.2-ps-20201020.html\" target=\"_blank\" rel=\"noopener noreferrer\">HTML<\/a> | <a href=\"https:\/\/fidoalliance.org\/specs\/fido-uaf-v1.2-ps-20201020\/fido-uaf-apccbor-v1.2-ps-20201020.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">PDF<\/a><br \/>\n<strong><\/td><td class=\"column-2\"><strong>FIDO UAF WebAuthentication Assertion Format<\/strong> <br \/>\nThis document defines the assertion format \"WAV1CBOR\" in order to use Web Authentication assertions through the FIDO UAF protocol.<br \/>\n<br \/>\n<strong>1.2 Proposed Standard:<\/strong> <a href=\"https:\/\/fidoalliance.org\/specs\/fido-uaf-v1.2-ps-20201020\/fido-uaf-webauthn-v1.2-ps-20201020.html\" target=\"_blank\" rel=\"noopener noreferrer\">HTML<\/a> | <a href=\"https:\/\/fidoalliance.org\/specs\/fido-uaf-v1.2-ps-20201020\/fido-uaf-webauthn-v1.2-ps-20201020.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">PDF<\/a><br \/>\n<strong><\/td><td class=\"column-3\"><strong>FIDO UAF ERRATA<\/strong> <br \/>\nThis errata is being published to address certain issues that have been identified in the UAF v1.1 Specification. All Specifications and errata are required to be approved by the FIDO Board prior to publication.<br \/>\n<br \/>\n<strong>1.1 Implementation Draft:<\/strong> <a href=\"https:\/\/fidoalliance.org\/specs\/fido-uaf-v1.1-id-20170202\/FIDO-UAF-Errata-UAF-v1.1-Specification.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">PDF<\/a><br \/>\n<strong><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<!-- #tablepress-17 from cache -->\n\n<table id=\"tablepress-16\" class=\"tablepress tablepress-id-16\" cellpadding=\"10\">\n<thead>\n<tr class=\"row-1\">\n\t<th colspan=\"3\" class=\"column-1\" style=\"width:33%;\">FIDO Convenience Metadata Service<\/th>\n<\/tr>\n<\/thead>\n<tbody class=\"row-striping row-hover\">\n<tr class=\"row-2\">\n\t<td class=\"column-1\"><strong>FIDO Convenience Metadata Service<\/strong><br \/>\nFIDO Metadata Service providing convenience centric information about authenticators, like friendly names and icons.<br \/>\n<br \/>\n<strong>HTML:<\/strong> <a href=\"https:\/\/fidoalliance.org\/specs\/mds\/fido-convenience-metadata-service-v1.0-ps-20250521.html#sctn-cmds-details\" target=\"_blank\" rel=\"noopener noreferrer\">HTML<\/td><td class=\"column-2\"><\/td><td class=\"column-3\"><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<!-- #tablepress-16 from cache -->\n\n<table id=\"tablepress-15\" class=\"tablepress tablepress-id-15\" cellpadding=\"10\">\n<thead>\n<tr class=\"row-1\">\n\t<th colspan=\"2\" class=\"column-1\" style=\"width:33%;\">FIDO2 and UAF Common Files<\/th>\n<\/tr>\n<\/thead>\n<tbody class=\"row-striping row-hover\">\n<tr class=\"row-2\">\n\t<td class=\"column-1\"><strong>FIDO Registry of Predefined Values<\/strong> <br \/>\nThis document defines all the strings and constants common to all FIDO specifications.<br \/>\n<br \/>\n<strong>1.1 Proposed Standard:<\/strong> <a href=\"\/specs\/fido-uaf-v1.1-ps-20170202\/fido-uaf-reg-v1.1-ps-20170202.html\" target=\"_blank\" rel=\"noopener noreferrer\">HTML<\/a> | <a href=\"\/specs\/fido-uaf-v1.1-ps-20170202\/fido-uaf-reg-v1.1-ps-20170202.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">PDF<\/a><br \/>\n<br \/>\n<strong>2.2 Proposed Standard:<\/strong> <a href=\"https:\/\/fidoalliance.org\/specs\/common-specs\/fido-registry-v2.2-ps-20220523.html\" target=\"_blank\" rel=\"noopener noreferrer\">HTML<\/a> | <a href=\"https:\/\/fidoalliance.org\/specs\/common-specs\/fido-registry-v2.2-ps-20220523.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">PDF<\/a><\/td><td class=\"column-2\"><strong>FIDO AppID and Facet Specification<\/strong><br \/>\nThis document defines the scope of user credentials and how a trusted computing base that supports application isolation may make access control decisions about which keys can be used by which applications and web origins.<br \/>\n<br \/>\n<strong>1.1 Proposed Standard:<\/strong> <a href=\"\/specs\/fido-uaf-v1.1-ps-20170202\/fido-appid-and-facets-v1.1-ps-20170202.html\" target=\"_blank\" rel=\"noopener noreferrer\">HTML<\/a> | <a href=\"\/specs\/fido-uaf-v1.1-ps-20170202\/fido-appid-and-facets-v1.1-ps-20170202.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">PDF<\/a><br \/>\n<br \/>\n<strong>2.1 Proposed Standard:<\/strong> <a href=\"https:\/\/fidoalliance.org\/specs\/common-specs\/fido-appid-and-facets-v2.1-ps-20220523.html\" target=\"_blank\" rel=\"noopener noreferrer\">HTML<\/a> | <a href=\"https:\/\/fidoalliance.org\/specs\/common-specs\/fido-appid-and-facets-v2.1-ps-20220523.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">PDF<\/a><\/td>\n<\/tr>\n<tr class=\"row-3\">\n\t<td class=\"column-1\"><strong>FIDO Security Reference<\/strong> <br \/>\nProvides an analysis of FIDO security based on detailed analysis of security threats pertinent to the FIDO protocols based on its goals, assumptions, and inherent security measures.<br \/>\n<br \/>\n<strong>1.1 Proposed Standard:<\/strong> <a href=\"\/specs\/fido-uaf-v1.1-ps-20170202\/fido-security-ref-v1.1-ps-20170202.html\" target=\"_blank\" rel=\"noopener noreferrer\">HTML<\/a> | <a href=\"\/specs\/fido-uaf-v1.1-ps-20170202\/fido-security-ref-v1.1-ps-20170202.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">PDF<\/a><br \/>\n<br \/>\n<strong>2.1 Proposed Standard:<\/strong> <a href=\"https:\/\/fidoalliance.org\/specs\/common-specs\/fido-security-ref-v2.1-ps-20220523.html\" target=\"_blank\" rel=\"noopener noreferrer\">HTML<\/a> | <a href=\"https:\/\/fidoalliance.org\/specs\/common-specs\/fido-security-ref-v2.1-ps-20220523.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">PDF<\/a><\/td><td class=\"column-2\"><strong>FIDO Technical Glossary<\/strong> <br \/>\nDefines the technical terms and phrases used in FIDO Alliance specifications and documents.<br \/>\n<br \/>\n<strong>1.1 Proposed Standard:<\/strong> <a href=\"\/specs\/fido-uaf-v1.1-ps-20170202\/fido-glossary-v1.1-ps-20170202.html\" target=\"_blank\" rel=\"noopener noreferrer\">HTML<\/a> | <a href=\"\/specs\/fido-uaf-v1.1-ps-20170202\/fido-glossary-v1.1-ps-20170202.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">PDF<\/a><br \/>\n<br \/>\n<strong>2.1 Proposed Standard:<\/strong> <a href=\"https:\/\/fidoalliance.org\/specs\/common-specs\/fido-glossary-v2.1-ps-20220523.html\" target=\"_blank\" rel=\"noopener noreferrer\">HTML<\/a> | <a href=\"https:\/\/fidoalliance.org\/specs\/common-specs\/fido-glossary-v2.1-ps-20220523.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">PDF<\/a><\/td>\n<\/tr>\n<tr class=\"row-4\">\n\t<td class=\"column-1\"><strong>FIDO ECDAA Algorithm<\/strong><br><br \/>\nThis document describes how to use Elliptic Curve (EC) Direct Anonymous Attestation (DAA) as a form of secure and private attestation for authenticators.<br \/>\n<br \/>\n<strong>1.1 Proposed Standard:<\/strong> <a href=\"https:\/\/fidoalliance.org\/specs\/common-specs\/fido-ecdaa-algorithm-v2.1-ps-20220523.html\" target=\"_blank\" rel=\"noopener noreferrer\">HTML<\/a> | <a href=\"https:\/\/fidoalliance.org\/specs\/common-specs\/fido-ecdaa-algorithm-v2.1-ps-20220523.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">PDF<\/a><br \/>\n<br \/>\n<strong>2.1 Proposed Standard:<\/strong> <a href=\"\/specs\/fido-v2.0-id-20180227\/fido-ecdaa-algorithm-v2.0-id-20180227.html\" target=\"_blank\" rel=\"noopener noreferrer\">HTML<\/a> | <a href=\"\/specs\/fido-v2.0-id-20180227\/fido-ecdaa-algorithm-v2.0-id-20180227.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">PDF<\/a><\/td><td class=\"column-2\"><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<!-- #tablepress-15 from cache -->\n\n<table id=\"tablepress-19\" class=\"tablepress tablepress-id-19\" cellpadding=\"10\">\n<thead>\n<tr class=\"row-1\">\n\t<th colspan=\"3\" class=\"column-1\" style=\"width:33%;\">U2F SPECIFICATIONS<\/th>\n<\/tr>\n<\/thead>\n<tbody class=\"row-striping row-hover\">\n<tr class=\"row-2\">\n\t<td class=\"column-1\"><strong>FIDO U2F Complete Specifications<\/strong> <br \/>\nThis is a zip file containing the U2F 1.2 Specifications public snapshot of FIDO Alliance Universal 2nd Factor (U2F) specs approved July 11th, 2017. Included in the latest U2F 1.2 specifications are:<br \/>\n<br \/>\nChange USB transport to conform to ISO7816-4<br \/>\nNFC (ISO7816-4) support<br \/>\nBluetooth Low Energy support<br \/>\nUpdated JavaScript 1.1 specification<br \/>\nTransports Extension specification<br \/>\nExpanded Metadata Service specification to include U2F<br \/>\n<span style=\"color: #ff0000;\"><strong>You should read this document first if you are new to U2F.<\/strong><\/span><br \/>\n<br \/>\n<strong>1.2 Proposed Standard:<\/strong> <a href=\"https:\/\/web.archive.org\/web\/20220621122647\/https:\/\/fidoalliance.org\/specs\/fido-u2f-v1.2-ps-20170411\/\" target=\"_blank\" rel=\"noopener noreferrer\">Files<\/a><\/td><td class=\"column-2\"><strong>FIDO U2F Architectural Overview<\/strong> <br \/>\nThis overview document describes the various design considerations which go into the protocol in detail and describes the user flows in detail. It describes the layering and intention of each of the detailed protocol documents. It describes the various privacy considerations in the protocol design through the document and summarizes these at the end<br \/>\n<span style=\"color: #ff0000;\"><strong>You should read this document first if you are new to U2F.<\/strong><\/span><br \/>\n<br \/>\n<strong>1.0 Proposed Standard:<\/strong> <a href=\"https:\/\/web.archive.org\/web\/20220621122647\/https:\/\/fidoalliance.org\/specs\/fido-u2f-v1.0-ps-20141009\/fido-u2f-overview-ps-20141009.html\" target=\"_blank\" rel=\"noopener noreferrer\">HTML<\/a><br \/>\n<br \/>\n<strong>1.2 Proposed Standard:<\/strong> <a href=\"https:\/\/web.archive.org\/web\/20220621122647\/https:\/\/fidoalliance.org\/specs\/fido-u2f-v1.0-ps-20141009\/fido-u2f-overview-ps-20141009.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">PDF<\/a><br \/>\n<br \/>\n<strong>1.2 Proposed Standard:<\/strong> <a href=\"https:\/\/web.archive.org\/web\/20220621122647\/https:\/\/fidoalliance.org\/specs\/fido-u2f-v1.2-ps-20170411\/fido-u2f-overview-v1.2-ps-20170411.html\" target=\"_blank\" rel=\"noopener noreferrer\">HTML<\/a><br \/>\n<br \/>\n<strong>1.2 Proposed Standard:<\/strong> <a href=\"https:\/\/web.archive.org\/web\/20220621122647\/https:\/\/fidoalliance.org\/specs\/fido-u2f-v1.2-ps-20170411\/fido-u2f-overview-v1.2-ps-20170411.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">PDF<\/a><\/td><td class=\"column-3\"><strong>FIDO U2F JavaScript API<\/strong> <br \/>\nThis document describes the client side API in the web browser for accessing U2F capabilities. An online service or website can levearge U2F by using this API on the client side and pairing it with a server which can verify U2F messages on the server side. (Later specifications will describe APIs in non-browser contexts).<br \/>\n<span style=\"color: #ff0000;\"><strong><\/span><br \/>\n<br \/>\n<strong>1.0 Proposed Standard:<\/strong> <a href=\"https:\/\/web.archive.org\/web\/20220621122647\/https:\/\/fidoalliance.org\/specs\/fido-u2f-v1.0-ps-20141009\/fido-u2f-javascript-api-ps-20141009.html\" target=\"_blank\" rel=\"noopener noreferrer\">HTML<\/a><br \/>\n<br \/>\n<strong>1.2 Proposed Standard:<\/strong> <a href=\"https:\/\/web.archive.org\/web\/20220621122647\/https:\/\/fidoalliance.org\/specs\/fido-u2f-v1.0-ps-20141009\/fido-u2f-javascript-api-ps-20141009.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">PDF<\/a><br \/>\n<br \/>\n<strong>1.2 Proposed Standard:<\/strong> <a href=\"https:\/\/web.archive.org\/web\/20220621122647\/https:\/\/fidoalliance.org\/specs\/fido-u2f-v1.2-ps-20170411\/\" target=\"_blank\" rel=\"noopener noreferrer\">Files<\/a><br \/>\n<br \/>\n<strong>1.2 Proposed Standard:<\/strong> <a href=\"https:\/\/web.archive.org\/web\/20220621122647\/https:\/\/fidoalliance.org\/specs\/fido-u2f-v1.2-ps-20170411\/\" target=\"_blank\" rel=\"noopener noreferrer\">Files<\/a><\/td>\n<\/tr>\n<tr class=\"row-3\">\n\t<td class=\"column-1\"><strong>FIDO U2F Raw Message Formats<\/strong> <br \/>\nThis document describes the binary format of request messages which go from the FIDO U2F server to the FIDO U2F token and the binary format of the response messages from the token to the server. These messages are encoded by the browser (FIDO client) for communication over a particular transport (such as USB) to the cryptographic core of the token which performs key generation and signing. A header file with standard values is also specified.<br \/>\n<span style=\"color: #ff0000;\"><strong><\/span><br \/>\n<strong>1.0 Proposed Standard:<\/strong> <a href=\"https:\/\/web.archive.org\/web\/20220621122647\/https:\/\/fidoalliance.org\/specs\/fido-u2f-v1.0-ps-20141009\/fido-u2f-raw-message-formats-ps-20141009.html\" target=\"_blank\" rel=\"noopener noreferrer\">HTML<\/a><br \/>\n<br \/>\n<strong>1.2 Proposed Standard:<\/strong> <a href=\"https:\/\/web.archive.org\/web\/20220621122647\/https:\/\/fidoalliance.org\/specs\/fido-u2f-v1.0-ps-20141009\/fido-u2f-raw-message-formats-ps-20141009.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">PDF<\/a><br \/>\n<br \/>\n<strong>1.2 Proposed Standard:<\/strong> <a href=\"https:\/\/web.archive.org\/web\/20220621122647\/https:\/\/fidoalliance.org\/specs\/fido-u2f-v1.2-ps-20170411\/fido-u2f-raw-message-formats-v1.2-ps-20170411.html\" target=\"_blank\" rel=\"noopener noreferrer\">HTML<\/a><br \/>\n<br \/>\n<strong>1.2 Proposed Standard:<\/strong> <a href=\"https:\/\/web.archive.org\/web\/20220621122647\/https:\/\/fidoalliance.org\/specs\/fido-u2f-v1.2-ps-20170411\/fido-u2f-raw-message-formats-v1.2-ps-20170411.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">PDF<\/a><\/td><td class=\"column-2\"><strong>FIDO U2F HID Protocol<\/strong> <br \/>\nThis document describes how the browser (FIDO client) frames the binary raw messages coming from the javascript API for transport over USB-HID to a U2F token. The binary raw messages are described in the 'FIDO U2F Raw Message Formats' document. A header file with standard values is also specified. [Later specifications will specify how the javascript APIs frames raw messages over other (non-USB) transports].<br \/>\n<span style=\"color: #ff0000;\"><strong><\/span><br \/>\n<strong>1.0 Proposed Standard:<\/strong> <a href=\"https:\/\/web.archive.org\/web\/20220621122647\/https:\/\/fidoalliance.org\/specs\/fido-u2f-v1.0-ps-20141009\/fido-u2f-hid-protocol-ps-20141009.html\" target=\"_blank\" rel=\"noopener noreferrer\">HTML<\/a><br \/>\n<br \/>\n<strong>1.2 Proposed Standard:<\/strong> <a href=\"https:\/\/web.archive.org\/web\/20220621122647\/https:\/\/fidoalliance.org\/specs\/fido-u2f-v1.0-ps-20141009\/fido-u2f-hid-protocol-ps-20141009.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">PDF<\/a><br \/>\n<br \/>\n<strong>1.2 Proposed Standard:<\/strong> <a href=\"https:\/\/web.archive.org\/web\/20220621122647\/https:\/\/fidoalliance.org\/specs\/fido-u2f-v1.2-ps-20170411\/fido-u2f-hid-protocol-v1.2-ps-20170411.html\" target=\"_blank\" rel=\"noopener noreferrer\">HTML<\/a><br \/>\n<br \/>\n<strong>1.2 Proposed Standard:<\/strong> <a href=\"https:\/\/web.archive.org\/web\/20220621122647\/https:\/\/fidoalliance.org\/specs\/fido-u2f-v1.2-ps-20170411\/fido-u2f-hid-protocol-v1.2-ps-20170411.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">PDF<\/a><\/td><td class=\"column-3\"><strong>FIDO U2F Bluetooth\u00ae protocol<\/strong> <br \/>\nThis document describes the communication protocol between a FIDO client and FIDO authenticators over Bluetooth technology and Bluetooth Smart.<br \/>\n<span style=\"color: #ff0000;\"><strong><\/span><br \/>\n<strong>1.2 Proposed Standard:<\/strong> <a href=\"https:\/\/web.archive.org\/web\/20220621122647\/https:\/\/fidoalliance.org\/specs\/fido-u2f-v1.2-ps-20170411\/fido-u2f-bt-protocol-v1.2-ps-20170411.html\" target=\"_blank\" rel=\"noopener noreferrer\">HTML<\/a><br \/>\n<br \/>\n<strong>1.2 Proposed Standard:<\/strong> <a href=\"https:\/\/web.archive.org\/web\/20220621122647\/https:\/\/fidoalliance.org\/specs\/fido-u2f-v1.2-ps-20170411\/fido-u2f-bt-protocol-v1.2-ps-20170411.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">PDF<\/a><\/td>\n<\/tr>\n<tr class=\"row-4\">\n\t<td class=\"column-1\"><strong>FIDO U2F NFC Protocol<\/strong> <br \/>\nThis document describes the communication protocol between a FIDO client and FIDO authenticators over Near Field Communication (NFC).<br \/>\n<span style=\"color: #ff0000;\"><strong><\/span><br \/>\n<strong>1.2 Proposed Standard:<\/strong> <a href=\"https:\/\/web.archive.org\/web\/20220621122647\/https:\/\/fidoalliance.org\/specs\/fido-u2f-v1.2-ps-20170411\/fido-u2f-nfc-protocol-v1.2-ps-20170411.html\" target=\"_blank\" rel=\"noopener noreferrer\">HTML<\/a><br \/>\n<br \/>\n<strong>1.2 Proposed Standard:<\/strong> <a href=\"https:\/\/web.archive.org\/web\/20220621122647\/https:\/\/fidoalliance.org\/specs\/fido-u2f-v1.2-ps-20170411\/fido-u2f-nfc-protocol-v1.2-ps-20170411.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">PDF<\/a><\/td><td class=\"column-2\"><strong>FIDO U2F Transport Extensions<\/strong> <br \/>\nThis standard describes one way relying parties may learn which transports an authenticator supports, by allowing authenticator vendors to embed hardware features as an optional extension in the authenticator\u2019s attestation certificate.<br \/>\n<span style=\"color: #ff0000;\"><strong><\/span><br \/>\n<strong>1.2 Proposed Standard:<\/strong> <a href=\"https:\/\/web.archive.org\/web\/20220621122647\/https:\/\/fidoalliance.org\/specs\/fido-u2f-v1.2-ps-20170411\/fido-u2f-authenticator-transports-extension-v1.2-ps-20170411.html\" target=\"_blank\" rel=\"noopener noreferrer\">HTML<\/a><br \/>\n<br \/>\n<strong>1.2 Proposed Standard:<\/strong> <a href=\"https:\/\/web.archive.org\/web\/20220621122647\/https:\/\/fidoalliance.org\/specs\/fido-u2f-v1.2-ps-20170411\/fido-u2f-authenticator-transports-extension-v1.2-ps-20170411.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">PDF<\/a><\/td><td class=\"column-3\"><strong>FIDO U2F Implementation Considerations<\/strong> <br \/>\nThis document describes implementation considerations and recommendations for creators of U2F devices and for relying parties implementing U2F support.<br \/>\n<span style=\"color: #ff0000;\"><strong><\/span><br \/>\n<strong>1.0 Proposed Standard:<\/strong> <a href=\"https:\/\/web.archive.org\/web\/20220621122647\/https:\/\/fidoalliance.org\/specs\/fido-u2f-v1.0-ps-20141009\/fido-u2f-implementation-considerations-ps-20141009.html\" target=\"_blank\" rel=\"noopener noreferrer\">HTML<\/a><br \/>\n<br \/>\n<strong>1.0 Proposed Standard:<\/strong> <a href=\"https:\/\/web.archive.org\/web\/20220621122647\/https:\/\/fidoalliance.org\/specs\/fido-u2f-v1.0-ps-20141009\/fido-u2f-implementation-considerations-ps-20141009.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">PDF<\/a><br \/>\n<br \/>\n<strong>1.2 Proposed Standard:<\/strong> <a href=\"https:\/\/web.archive.org\/web\/20220621122647\/https:\/\/fidoalliance.org\/specs\/fido-u2f-v1.2-ps-20170411\/fido-u2f-implementation-considerations-v1.2-ps-20170411.html\" target=\"_blank\" rel=\"noopener noreferrer\">HTML<\/a><br \/>\n<br \/>\n<strong>1.2 Proposed Standard:<\/strong> <a href=\"https:\/\/web.archive.org\/web\/20220621122647\/https:\/\/fidoalliance.org\/specs\/fido-u2f-v1.2-ps-20170411\/fido-u2f-implementation-considerations-v1.2-ps-20170411.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">PDF<\/a><\/td>\n<\/tr>\n<tr class=\"row-5\">\n\t<td class=\"column-1\"><strong>FIDO AppID and Facet Specification<\/strong> <br \/>\nThis document defines the scope of user credentials and how a trusted computing base which supports application isolation may make access control decisions about which keys can be used by which applications and web origins.<br \/>\n<span style=\"color: #ff0000;\"><strong><\/span><br \/>\n<strong>1.0 Proposed Standard:<\/strong> <a href=\"https:\/\/web.archive.org\/web\/20220621122647\/https:\/\/fidoalliance.org\/specs\/fido-u2f-v1.0-ps-20141009\/fido-appid-and-facets-ps-20141009.html\" target=\"_blank\" rel=\"noopener noreferrer\">HTML<\/a><br \/>\n<br \/>\n<strong>1.0 Proposed Standard:<\/strong> <a href=\"https:\/\/web.archive.org\/web\/20220621122647\/https:\/\/fidoalliance.org\/specs\/fido-u2f-v1.0-ps-20141009\/fido-appid-and-facets-ps-20141009.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">PDF<\/a><br \/>\n<br \/>\n<strong>1.2 Proposed Standard:<\/strong> <a href=\"https:\/\/web.archive.org\/web\/20220621122647\/https:\/\/fidoalliance.org\/specs\/fido-u2f-v1.2-ps-20170411\/fido-appid-and-facets-v1.2-ps-20170411.html\" target=\"_blank\" rel=\"noopener noreferrer\">HTML<\/a><br \/>\n<br \/>\n<strong>1.2 Proposed Standard:<\/strong> <a href=\"https:\/\/web.archive.org\/web\/20220621122647\/https:\/\/fidoalliance.org\/specs\/fido-u2f-v1.2-ps-20170411\/fido-appid-and-facets-v1.2-ps-20170411.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">PDF<\/a><\/td><td class=\"column-2\"><strong>FIDO Security Reference<\/strong> <br \/>\nProvides an analysis of FIDO security based on detailed analysis of security threats pertinent to the FIDO protocols based on its goals, assumptions, and inherent security measures.<br \/>\n<span style=\"color: #ff0000;\"><strong><\/span><br \/>\n<strong>1.0 Proposed Standard:<\/strong> <a href=\"https:\/\/web.archive.org\/web\/20220621122647\/https:\/\/fidoalliance.org\/specs\/fido-u2f-v1.0-ps-20141009\/fido-security-ref-ps-20141009.html\" target=\"_blank\" rel=\"noopener noreferrer\">HTML<\/a><br \/>\n<br \/>\n<strong>1.0 Proposed Standard:<\/strong> <a href=\"https:\/\/web.archive.org\/web\/20220621122647\/https:\/\/fidoalliance.org\/specs\/fido-u2f-v1.0-ps-20141009\/fido-security-ref-ps-20141009.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">PDF<\/a><br \/>\n<br \/>\n<strong>1.2 Proposed Standard:<\/strong> <a href=\"https:\/\/web.archive.org\/web\/20220621122647\/https:\/\/fidoalliance.org\/specs\/fido-u2f-v1.2-ps-20170411\/fido-security-ref-v1.2-ps-20170411.html\" target=\"_blank\" rel=\"noopener noreferrer\">HTML<\/a><br \/>\n<br \/>\n<strong>1.2 Proposed Standard:<\/strong> <a href=\"https:\/\/web.archive.org\/web\/20220621122647\/https:\/\/fidoalliance.org\/specs\/fido-u2f-v1.2-ps-20170411\/fido-security-ref-v1.2-ps-20170411.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">PDF<\/a><\/td><td class=\"column-3\"><strong>FIDO Technical Glossary<\/strong> <br \/>\nDefines the technical terms and phrases used in FIDO Alliance specifications and documents.<br \/>\n<span style=\"color: #ff0000;\"><strong><\/span><br \/>\n<strong>1.0 Proposed Standard:<\/strong> <a href=\"https:\/\/web.archive.org\/web\/20220621122647\/https:\/\/fidoalliance.org\/specs\/fido-u2f-v1.0-ps-20141009\/fido-glossary-ps-20141009.html\" target=\"_blank\" rel=\"noopener noreferrer\">HTML<\/a><br \/>\n<br \/>\n<strong>1.0 Proposed Standard:<\/strong> <a href=\"https:\/\/web.archive.org\/web\/20220621122647\/https:\/\/fidoalliance.org\/specs\/fido-u2f-v1.0-ps-20141009\/fido-glossary-ps-20141009.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">PDF<\/a><br \/>\n<br \/>\n<strong>1.2 Proposed Standard:<\/strong> <a href=\"https:\/\/web.archive.org\/web\/20220621122647\/https:\/\/fidoalliance.org\/specs\/fido-u2f-v1.2-ps-20170411\/fido-glossary-v1.2-ps-20170411.html\" target=\"_blank\" rel=\"noopener noreferrer\">HTML<\/a><br \/>\n<br \/>\n<strong>1.2 Proposed Standard:<\/strong> <a href=\"https:\/\/web.archive.org\/web\/20220621122647\/https:\/\/fidoalliance.org\/specs\/fido-u2f-v1.2-ps-20170411\/fido-glossary-v1.2-ps-20170411.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">PDF<\/a><\/td>\n<\/tr>\n<tr class=\"row-6\">\n\t<td class=\"column-1\"><strong>FIDO U2F Readme<\/strong> <br \/>\nThis is a README for the U2F 1.2 Implementation Draft public snapshot of the Universal Second Factor (U2F) specs as of July 11, 2017.<br \/>\n<span style=\"color: #ff0000;\"><strong><\/span><br \/>\n<strong>1.0 Proposed Standard:<\/strong> <a href=\"https:\/\/web.archive.org\/web\/20220621122647\/https:\/\/fidoalliance.org\/specs\/fido-u2f-v1.0-ps-20141009\/fido-u2f-v1.0-ps-20141009-README.txt\" target=\"_blank\" rel=\"noopener noreferrer\">TXT<\/a><br \/>\n<br \/>\n<strong>1.2 Proposed Standard:<\/strong> <a href=\"https:\/\/web.archive.org\/web\/20220621122647\/https:\/\/fidoalliance.org\/specs\/fido-u2f-v1.2-ps-20170411\/fido-u2f-README-v1.2-ps-20170411.txt\" target=\"_blank\" rel=\"noopener noreferrer\">TXT<\/a><\/td><td class=\"column-2\"><\/td><td class=\"column-3\"><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<!-- #tablepress-19 from cache -->\n\n<h2 class=\"wp-block-heading subheading-vm\" id=\"ipr\">FIDO \uc0ac\uc591 \uc0c1\ud0dc \ubc0f \uc9c0\uc801 \uc7ac\uc0b0\uad8c(IPR) \uc815\ubcf4<\/h2>\n\n<p>\uc774 \uc0ac\uc774\ud2b8\uc758 \uc0ac\uc591\uc5d0 \ub300\ud55c \uc9c0\uc801\uc7ac\uc0b0\uad8c \ud604\ud669 \uc694\uc57d:<\/p>\n\n<table id=\"tablepress-3\" class=\"tablepress tablepress-id-3\" cellpadding=\"10\">\n<thead>\n<tr class=\"row-1\">\n\t<th class=\"column-1\" style=\"width:50%;\">Specification<\/th><th class=\"column-2\" style=\"width:50%;\">Specification Status<\/th>\n<\/tr>\n<\/thead>\n<tbody class=\"row-striping row-hover\">\n<tr class=\"row-2\">\n\t<td class=\"column-1\">U2F 1.0<\/td><td class=\"column-2\">Proposed Standard Expanded to the World<\/td>\n<\/tr>\n<tr class=\"row-3\">\n\t<td class=\"column-1\">U2F 1.1<br \/>\n\t<br \/>\n<\/td><td class=\"column-2\">Proposed Standard Expanded to the World<\/td>\n<\/tr>\n<tr class=\"row-4\">\n\t<td class=\"column-1\">U2F 1.2<\/td><td class=\"column-2\">Proposed Standard Expanded to the World<\/td>\n<\/tr>\n<tr class=\"row-5\">\n\t<td class=\"column-1\">UAF 1.0<\/td><td class=\"column-2\">Proposed Standard Expanded to the World<\/td>\n<\/tr>\n<tr class=\"row-6\">\n\t<td class=\"column-1\">UAF 1.1<\/td><td class=\"column-2\">Proposed Standard Expanded to the World<\/td>\n<\/tr>\n<tr class=\"row-7\">\n\t<td class=\"column-1\">FIDO2 Submission to W3C<\/td><td class=\"column-2\">Proposed Standard Expanded to the World<\/td>\n<\/tr>\n<tr class=\"row-8\">\n\t<td class=\"column-1\">FIDO2 CTAP<\/td><td class=\"column-2\">Proposed Standard Expanded to the World<\/td>\n<\/tr>\n<tr class=\"row-9\">\n\t<td class=\"column-1\">FIDO Device Onboard 1.0<\/td><td class=\"column-2\">Proposed Standard Expanded to the World<\/td>\n<\/tr>\n<tr class=\"row-10\">\n\t<td class=\"column-1\">FIDO Device Onboard 1.1<\/td><td class=\"column-2\">Proposed Standard Expanded to the World<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<!-- #tablepress-3 from cache -->\n\n<p>\uc9c0\uc801\uc7ac\uc0b0\uad8c \ud604\ud669\uc5d0 \ub300\ud55c \uc124\uba85 FIDO Alliance \uc0ac\uc591\uc740 \uc0ac\uc804 \ucd08\uc548, \uc791\uc5c5 \ucd08\uc548, \uac80\ud1a0 \ucd08\uc548 \ubc0f \uc81c\uc548\ub41c \ud45c\uc900\uc758 \uc5ec\ub7ec \ub2e8\uacc4\ub97c \uac70\uccd0 \uc9c4\ud589\ub429\ub2c8\ub2e4.\nFIDO Alliance \ud68c\uc6d0 \uae30\uad00\uc774 \uaddc\uc815\uc744 \uc900\uc218\ud558\ub294 \uad6c\ud604\uc744 \uc704\ud574 \ud2b9\ud5c8\uad8c\uc5d0 \ub300\ud55c \ub85c\uc5f4\ud2f0 \uc5c6\ub294 \ub77c\uc774\uc120\uc2a4\ub97c \ubd80\uc5ec\ud558\ub294 \uacc4\uc57d\uc778 \uc57d\uc18d\uc740 \uc0ac\uc591 \ub2e8\uacc4\uc5d0 \ub530\ub77c \ub2e4\ub974\uac8c \uc801\uc6a9\ub429\ub2c8\ub2e4.  \uc774 \uc57d\uc18d\uc740 \uc0ac\uc804 \ucd08\uc548, \uc791\uc5c5 \ucd08\uc548 \ubc0f \uac80\ud1a0 \ucd08\uc548 \uc0ac\uc591 \ub2e8\uacc4\uc5d0\ub294 \uc801\uc6a9\ub418\uc9c0 \uc54a\uc2b5\ub2c8\ub2e4. \ud45c\uc900 \uc81c\uc548 \ub2e8\uacc4\uc5d0\uc11c\ub294 \uad00\ub828 \uae30\uc220 \uc791\uc5c5\ubc18\uc758 \ubaa8\ub4e0 FIDO Alliance \ud68c\uc6d0\uc0ac\uac00 \uc804 \uc138\uacc4\uc5d0 \uc57d\uc18d\uc744 \uc81c\uacf5\ud569\ub2c8\ub2e4.\n2020\ub144 1\uc6d4 1\uc77c \uc774\uc804\uc5d0 \ud45c\uc900 \uc81c\uc548\uc73c\ub85c \ubc1c\ud45c\ub41c \ubaa8\ub4e0 FIDO Alliance FIDO Alliance \uc0ac\uc591\uc5d0 \ub300\ud574, \uc774 \uc57d\uc18d\uc740 \uc900\uc218\ud558\ub294 \uad6c\ud604\uc5d0 \ub300\ud574 \ud2b9\ud5c8\uad8c\uc744 \uc8fc\uc7a5\ud558\uc9c0 \uc54a\uaca0\ub2e4\ub294 \uc57d\uc18d\uc774\uba70, \ub2f9\uc2dc \ubaa8\ub4e0 FIDO Alliance \ud68c\uc6d0\uc0ac\uac00 \uc804 \uc138\uacc4\uc5d0 \uc81c\uacf5\ud569\ub2c8\ub2e4.\n\uc0c1\uae30 \ub0b4\uc6a9\uc740 \uac04\ub7b5\ud558\uac8c \uc694\uc57d\ud55c \uac83\uc774\uba70, \uc2e4\uc81c \uc57d\uad00\uc740 <a href=\"https:\/\/fidoalliance.org\/wp-content\/uploads\/2023\/07\/FIDO-Alliance-Membership-Agreement-Fillable.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">FIDO Alliance \ud68c\uc6d0 \uacc4\uc57d\uc11c\uc5d0<\/a> \uba85\uc2dc\ub418\uc5b4 \uc788\uc73c\ubbc0\ub85c \uad6c\uccb4\uc801\uc778 \uc0ac\uc548\uc5d0 \ub300\ud574\uc11c\ub294 \uc774\ub97c \ucc38\uc870\ud574\uc57c \ud569\ub2c8\ub2e4.  <\/p>\n\n<p>\ud2b9\ud5c8 \uace0\uc9c0 FIDO Alliance \uba64\ubc84\uc2ed \uacc4\uc57d\uc740 \ud68c\uc6d0\uc5d0\uac8c \ud2b9\uc815 \uc870\uac74 \ud558\uc5d0\uc11c Promise\uc5d0\uc11c \ubd80\uc5ec\ub41c \uccad\uad6c\ub97c \ucca0\ud68c\ud560 \uc218 \uc788\ub294 \uae30\ud68c\ub97c \uc81c\uacf5\ud569\ub2c8\ub2e4. \uad6c\uccb4\uc801\uc778 \uc870\uac74\uc5d0 \ub300\ud574\uc11c\ub294 <a href=\"https:\/\/fidoalliance.org\/wp-content\/uploads\/2023\/07\/FIDO-Alliance-Membership-Agreement-Fillable.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">FIDO Alliance Membership Agreement<\/a> \ub97c \ucc38\uc870\ud574\uc57c \ud569\ub2c8\ub2e4.  \uc704\uc6d0\ud68c\ub294 \uc774 \uc0ac\uc774\ud2b8\uc5d0 \uac8c\uc2dc\ub41c \uc0ac\uc591\uacfc \uad00\ub828\ud558\uc5ec \uadf8\ub7ec\ud55c \ud1b5\uc9c0\ub97c \ubc1b\uc740 \uc0ac\uc2e4\uc774 \uc5c6\uc74c\uc744 \ub300\uc911\uc5d0\uac8c \ubcf4\uace0\ud558\uac8c \ub418\uc5b4 \uae30\uc058\uac8c \uc0dd\uac01\ud569\ub2c8\ub2e4. \uc774\uac83\uc774 \uc758\ubbf8\ud558\ub294 \ubc14\uc5d0 \ub300\ud574 \uc790\uc138\ud788 \uc54c\uace0 \uc2f6\uc740 \uad6c\ud604\uc790\ub294 <a href=\"https:\/\/fidoalliance.org\/wp-content\/uploads\/2020\/01\/FIDO-IPR-flowchart-v4.1-W3C.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">IPR \uc694\uc57d<\/a> \ubc0f\/\ub610\ub294 FIDO Alliance \uba64\ubc84\uc2ed \uacc4\uc57d\uc758 \uc139\uc158 6\uc744 \uac80\ud1a0\ud558\ub294 \uac83\uc774 \uc88b\uc2b5\ub2c8\ub2e4.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>FIDO Alliance \uc0ac\uc6a9\uc790 \uc778\uc99d \uc0ac\uc591\uc758 \ucd5c\uc2e0 \ubc84\uc804\uc740 \uc544\ub798\uc5d0\uc11c \ud655\uc778\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4. FIDO\ub97c \ucc98\uc74c \uc0ac\uc6a9\ud558\ub294 \uacbd\uc6b0, \uacc4\uc18d \uc9c4\ud589\ud558\uae30 \uc804\uc5d0 \uba3c\uc800 \uc0ac\uc591 \uac1c\uc694\ub97c \uac80\ud1a0\ud558\ub294 \uac83\uc774 \uc88b\uc2b5\ub2c8\ub2e4. FIDO Alliance\ub294 \uae30\uc220 \uc694\uad6c \uc0ac\ud56d\uc744 \ucda9\uc871\ud558\ub294 [&hellip;]<\/p>\n","protected":false},"author":59250,"featured_media":0,"parent":61180,"menu_order":0,"comment_status":"open","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"_EventAllDay":false,"_EventTimezone":"","_EventStartDate":"","_EventEndDate":"","_EventStartDateUTC":"","_EventEndDateUTC":"","_EventShowMap":false,"_EventShowMapLink":false,"_EventURL":"","_EventCost":"","_EventCostDescription":"","_EventCurrencySymbol":"","_EventCurrencyCode":"","_EventCurrencyPosition":"","_EventDateTimeSeparator":"","_EventTimeRangeSeparator":"","_EventOrganizerID":[],"_EventVenueID":[],"_OrganizerEmail":"","_OrganizerPhone":"","_OrganizerWebsite":"","_VenueAddress":"","_VenueCity":"","_VenueCountry":"","_VenueProvince":"","_VenueState":"","_VenueZip":"","_VenuePhone":"","_VenueURL":"","_VenueStateProvince":"","_VenueLat":"","_VenueLng":"","_VenueShowMap":false,"_VenueShowMapLink":false,"footnotes":""},"content-type":[],"class_list":["post-62049","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/fidoalliance.org\/wp-json\/wp\/v2\/pages\/62049","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fidoalliance.org\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/fidoalliance.org\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/fidoalliance.org\/wp-json\/wp\/v2\/users\/59250"}],"replies":[{"embeddable":true,"href":"https:\/\/fidoalliance.org\/wp-json\/wp\/v2\/comments?post=62049"}],"version-history":[{"count":0,"href":"https:\/\/fidoalliance.org\/wp-json\/wp\/v2\/pages\/62049\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/fidoalliance.org\/wp-json\/wp\/v2\/pages\/61180"}],"wp:attachment":[{"href":"https:\/\/fidoalliance.org\/wp-json\/wp\/v2\/media?parent=62049"}],"wp:term":[{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/fidoalliance.org\/wp-json\/wp\/v2\/content-type?post=62049"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}