1
CAN HARDWARE MFA MOVE FROM MEH TO AHA?
Stina Ehrensvard
CEO & Founder, Yubico
2
Stats Protecting identities
4
Phone authenticator
5
Driverless authenticator
6
PKI without the “I” - No drivers, no client
- No limits on number of supported services
- No shared secrets
- No heavyweight CA
7
U2F sample login
1. Enter password 2. Insert U2F Key 3. Touch device
8
Sample authenticators
9
Identity ecosystem
RP RP
IDP
RP RP
10
A User owned identities