{"id":38832,"date":"2022-12-08T10:55:00","date_gmt":"2022-12-08T15:55:00","guid":{"rendered":"https:\/\/fidodev.wpengine.com\/?page_id=38832"},"modified":"2025-12-12T13:15:41","modified_gmt":"2025-12-12T18:15:41","slug":"device-onboarding-overview","status":"publish","type":"page","link":"https:\/\/fidoalliance.org\/device-onboarding-overview\/","title":{"rendered":"Device Onboarding"},"content":{"rendered":"\n<p>Device onboarding is the process of installing secrets and configuration data into a device to enable it to connect and interact securely with cloud and edge device management platforms. Owners can then manage devices using the platform to patch security vulnerabilities, install or update software, retrieve sensor data, interact with actuators, etc.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What is the FIDO Device Onboard (FDO) standard?<\/h2>\n\n\n\n<p>FIDO Device Onboard (FDO) enables Edge and<a href=\"https:\/\/fidoalliance.org\/certification\/fido-device-onboard\/\"> IoT device onboarding<\/a> at scale and provides a comprehensive authentication framework for distributed devices in keeping with the fundamental mission of the FIDO Alliance \u2013<a href=\"https:\/\/fidoalliance.org\/passkeys\/\"> passwordless authentication<\/a>. Built on industry expertise, FDO delivers a zero-touch, zero-trust onboarding solution while providing hardware flexibility and late binding.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How FDO Works<\/h2>\n\n\n\n<p>The below graphic shows an FDO device moving through the supply chain lifecycle from manufacture to deployment with zero-touch provisioning in the client\u2019s environment.<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"536\" src=\"https:\/\/fidoalliance.org\/wp-content\/uploads\/2024\/12\/FDO-Provisioning-1024x536.png\" alt=\"FIDO Alliance\" class=\"wp-image-83418\" srcset=\"https:\/\/fidoalliance.org\/wp-content\/uploads\/2024\/12\/FDO-Provisioning-1024x536.png 1024w, https:\/\/fidoalliance.org\/wp-content\/uploads\/2024\/12\/FDO-Provisioning-300x157.png 300w, https:\/\/fidoalliance.org\/wp-content\/uploads\/2024\/12\/FDO-Provisioning-768x402.png 768w, https:\/\/fidoalliance.org\/wp-content\/uploads\/2024\/12\/FDO-Provisioning-1536x804.png 1536w, https:\/\/fidoalliance.org\/wp-content\/uploads\/2024\/12\/FDO-Provisioning-2048x1072.png 2048w, https:\/\/fidoalliance.org\/wp-content\/uploads\/2024\/12\/FDO-Provisioning-270x141.png 270w, https:\/\/fidoalliance.org\/wp-content\/uploads\/2024\/12\/FDO-Provisioning-400x209.png 400w, https:\/\/fidoalliance.org\/wp-content\/uploads\/2024\/12\/FDO-Provisioning-600x314.png 600w, https:\/\/fidoalliance.org\/wp-content\/uploads\/2024\/12\/FDO-Provisioning-1280x670.png 1280w, https:\/\/fidoalliance.org\/wp-content\/uploads\/2024\/12\/FDO-Provisioning-500x262.png 500w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p>Visit the<a href=\"https:\/\/fidoalliance.org\/specifications\/download-iot-specifications\/\"> FDO Specifications Download<\/a> page to access the<a href=\"https:\/\/fidoalliance.org\/specifications\/\"> FDO specifications<\/a>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">FDO Benefits<\/h2>\n\n\n\n<p>FDO offers a mechanism to automate secure device onboarding while meeting zero-trust and supply chain requirements. IT and Operations teams can quickly deploy edge and connected IoT devices at scale, while security teams can cryptographically verify device ownership and authenticate them. The benefits gained from an FDO deployment include increased efficiency, supply chain risk management, and zero-touch, secure device onboarding at scale. FDO can run on a wide range of processors and operating systems.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">FDO Application areas<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Industrial applications such as discrete and process automation<\/li>\n\n\n\n<li>Healthcare<\/li>\n\n\n\n<li>Retail&nbsp;<\/li>\n\n\n\n<li>Enterprise&nbsp;<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Late Binding of Devices<\/h3>\n\n\n\n<p>Unlike many \u2018zero-touch\u2019 onboarding solutions, FDO doesn\u2019t require that each device is pre-programmed specifically for its target end user or management platform. Instead, FDO uses a digital proof of ownership called the \u2018Ownership Voucher\u2019 to allow the owner to &#8216;prove&#8217; that they are the rightful owner of the device. This allows all devices to be manufactured in an identical fashion and then be \u2018late bound\u2019 to the chosen management platform. This reduces device SKUs and simplifies the manufacturing flow.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Certification<\/h3>\n\n\n\n<p>The<a href=\"https:\/\/fidoalliance.org\/\"> FIDO Alliance<\/a> offers a comprehensive FDO certification program so that users can purchase FDO enabled products with confidence that they meet the FDO standard specification, have passed security requirements and have been tested for interoperability.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Learn more about FDO<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Visit FIDO <a href=\"https:\/\/fidoalliance.org\/device-onboarding-overview\/device-onboarding-resources\/\" target=\"_blank\" rel=\"noreferrer noopener\">Device Onboarding Resources<\/a> for the adoption guide, technical white papers, and on-demand videos<\/li>\n\n\n\n<li>Discover <a href=\"https:\/\/fidoalliance.org\/certification\/fido-device-onboard\/fido-certified-products\/\" target=\"_blank\" rel=\"noreferrer noopener\">FIDO Certified FDO Products<\/a><\/li>\n\n\n\n<li>Get your product <a href=\"https:\/\/fidoalliance.org\/certification\/fido-device-onboard\/\" target=\"_blank\" rel=\"noreferrer noopener\">FDO Certified<\/a><\/li>\n\n\n\n<li>Get involved with a <a href=\"https:\/\/fidoalliance.org\/members\/become-a-member\/\">FIDO Alliance Membership<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Device onboarding is the process of installing secrets and configuration data into a device to enable it to connect and interact securely with cloud and edge device management platforms. Owners [&hellip;]<\/p>\n","protected":false},"author":72,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":true,"inline_featured_image":false,"_EventAllDay":false,"_EventTimezone":"","_EventStartDate":"","_EventEndDate":"","_EventStartDateUTC":"","_EventEndDateUTC":"","_EventShowMap":false,"_EventShowMapLink":false,"_EventURL":"","_EventCost":"","_EventCostDescription":"","_EventCurrencySymbol":"","_EventCurrencyCode":"","_EventCurrencyPosition":"","_EventDateTimeSeparator":"","_EventTimeRangeSeparator":"","_EventOrganizerID":[],"_EventVenueID":[],"_OrganizerEmail":"","_OrganizerPhone":"","_OrganizerWebsite":"","_VenueAddress":"","_VenueCity":"","_VenueCountry":"","_VenueProvince":"","_VenueState":"","_VenueZip":"","_VenuePhone":"","_VenueURL":"","_VenueStateProvince":"","_VenueLat":"","_VenueLng":"","_VenueShowMap":false,"_VenueShowMapLink":false,"footnotes":""},"content-type":[],"class_list":["post-38832","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/fidoalliance.org\/wp-json\/wp\/v2\/pages\/38832","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fidoalliance.org\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/fidoalliance.org\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/fidoalliance.org\/wp-json\/wp\/v2\/users\/72"}],"replies":[{"embeddable":true,"href":"https:\/\/fidoalliance.org\/wp-json\/wp\/v2\/comments?post=38832"}],"version-history":[{"count":0,"href":"https:\/\/fidoalliance.org\/wp-json\/wp\/v2\/pages\/38832\/revisions"}],"wp:attachment":[{"href":"https:\/\/fidoalliance.org\/wp-json\/wp\/v2\/media?parent=38832"}],"wp:term":[{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/fidoalliance.org\/wp-json\/wp\/v2\/content-type?post=38832"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}