{"id":6791,"date":"2017-05-24T02:05:46","date_gmt":"2017-05-24T06:05:46","guid":{"rendered":"https:\/\/fidodev.wpengine.com\/?page_id=6791"},"modified":"2026-02-24T14:40:56","modified_gmt":"2026-02-24T19:40:56","slug":"authenticator-certification-levels","status":"publish","type":"page","link":"https:\/\/fidoalliance.org\/certification\/authenticator-certification-levels\/","title":{"rendered":"Certified Authenticator Levels"},"content":{"rendered":"\n<p>The Authenticator Certification Levels introduce Authenticator Security Requirements to the<a href=\"https:\/\/fidoalliance.org\/certification\/\"> FIDO Certification<\/a> Program. Authenticators must be certified to <strong>at least<\/strong> Authenticator Certification Level 1 (L1) for<a href=\"https:\/\/fidoalliance.org\/specs\/fido-uaf-v1.1-id-20170202\/fido-uaf-overview-v1.1-id-20170202.html\"> UAF<\/a>,<a href=\"https:\/\/fidoalliance.org\/specs\/u2f-specs-master\/fido-u2f-overview.html\"> U2F<\/a>, and FIDO2 certification.<br><\/p>\n\n\n\n<p>The Levels build on each other, so L2 includes all the requirements for L1, plus additional requirements for L2.<\/p>\n\n\n\n<div style=\"height:16px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image alignleft size-large\"><a href=\"https:\/\/fidoalliance.org\/specs\/fido-security-requirements\/fido-authenticator-allowed-restricted-operating-environments-list-v1.2-fd-20201102.html\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"267\" src=\"https:\/\/fidoalliance.org\/wp-content\/uploads\/2021\/07\/CHART-2-1024x267.png\" alt=\"FIDO Alliance\" class=\"wp-image-34836\" srcset=\"https:\/\/fidoalliance.org\/wp-content\/uploads\/2021\/07\/CHART-2-1024x267.png 1024w, https:\/\/fidoalliance.org\/wp-content\/uploads\/2021\/07\/CHART-2-300x78.png 300w, https:\/\/fidoalliance.org\/wp-content\/uploads\/2021\/07\/CHART-2-768x201.png 768w, https:\/\/fidoalliance.org\/wp-content\/uploads\/2021\/07\/CHART-2-1536x401.png 1536w, https:\/\/fidoalliance.org\/wp-content\/uploads\/2021\/07\/CHART-2-2048x535.png 2048w, https:\/\/fidoalliance.org\/wp-content\/uploads\/2021\/07\/CHART-2-270x71.png 270w, https:\/\/fidoalliance.org\/wp-content\/uploads\/2021\/07\/CHART-2-400x104.png 400w, https:\/\/fidoalliance.org\/wp-content\/uploads\/2021\/07\/CHART-2-600x157.png 600w, https:\/\/fidoalliance.org\/wp-content\/uploads\/2021\/07\/CHART-2-1280x334.png 1280w, https:\/\/fidoalliance.org\/wp-content\/uploads\/2021\/07\/CHART-2-500x131.png 500w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\n\n<div style=\"height:31px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image alignleft size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"640\" src=\"https:\/\/fidoalliance.org\/wp-content\/uploads\/2021\/12\/FINALCharts_Certified-Authenticator-Examples-1-1024x640.png\" alt=\"FIDO Alliance\" class=\"wp-image-35735\" srcset=\"https:\/\/fidoalliance.org\/wp-content\/uploads\/2021\/12\/FINALCharts_Certified-Authenticator-Examples-1-1024x640.png 1024w, https:\/\/fidoalliance.org\/wp-content\/uploads\/2021\/12\/FINALCharts_Certified-Authenticator-Examples-1-300x187.png 300w, https:\/\/fidoalliance.org\/wp-content\/uploads\/2021\/12\/FINALCharts_Certified-Authenticator-Examples-1-768x480.png 768w, https:\/\/fidoalliance.org\/wp-content\/uploads\/2021\/12\/FINALCharts_Certified-Authenticator-Examples-1-1536x959.png 1536w, https:\/\/fidoalliance.org\/wp-content\/uploads\/2021\/12\/FINALCharts_Certified-Authenticator-Examples-1-2048x1279.png 2048w, https:\/\/fidoalliance.org\/wp-content\/uploads\/2021\/12\/FINALCharts_Certified-Authenticator-Examples-1-270x169.png 270w, https:\/\/fidoalliance.org\/wp-content\/uploads\/2021\/12\/FINALCharts_Certified-Authenticator-Examples-1-400x250.png 400w, https:\/\/fidoalliance.org\/wp-content\/uploads\/2021\/12\/FINALCharts_Certified-Authenticator-Examples-1-600x375.png 600w, https:\/\/fidoalliance.org\/wp-content\/uploads\/2021\/12\/FINALCharts_Certified-Authenticator-Examples-1-1280x799.png 1280w, https:\/\/fidoalliance.org\/wp-content\/uploads\/2021\/12\/FINALCharts_Certified-Authenticator-Examples-1-500x312.png 500w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Currently, the supported Certification Levels are:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"\/?page_id=6744\" target=\"_blank\" rel=\"noreferrer noopener\">Level 1<\/a><\/li>\n\n\n\n<li><a href=\"\/?page_id=35641\" target=\"_blank\" rel=\"noreferrer noopener\">Level 1+<\/a><\/li>\n\n\n\n<li><a href=\"\/?page_id=6746\" target=\"_blank\" rel=\"noreferrer noopener\">Level 2<\/a><\/li>\n\n\n\n<li><a href=\"\/?page_id=13344\" target=\"_blank\" rel=\"noreferrer noopener\">Level 3<\/a><\/li>\n\n\n\n<li><a href=\"\/?page_id=13349\" target=\"_blank\" rel=\"noreferrer noopener\">Level 3+<\/a><\/li>\n<\/ul>\n\n\n\n<p>This page contains the <a href=\"\/?page_id=6791#Docs\" target=\"_blank\" rel=\"noreferrer noopener\">Policy and Requirements Documents<\/a> and the <a href=\"\/?page_id=6791#Process\" target=\"_blank\" rel=\"noreferrer noopener\">Authenticator Certification Process<\/a>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Policy and Requirements Documents<\/strong><\/h2>\n\n\n\n<p>The documents for\u00a0Authenticator Certification\u00a0include:<\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<div class=\"wp-block-group is-layout-flow wp-block-group-is-layout-flow\">\n<figure class=\"wp-block-table is-style-regular\"><table><tbody><tr><td><strong>FIDO Authenticator Certification Policy<\/strong>\u00a0<p>This policy governs the Authenticator Certification Levels as part of the FIDO Certification Program.<strong>Download:<\/strong> <a href=\"https:\/\/fidoalliance.org\/wp-content\/uploads\/2020\/12\/FIDO-Authenticator_Certification_Program_policy_v1.3_FINAL_September2020.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">PDF<\/a><\/p><\/td><\/tr><tr><td><strong>FIDO Authenticator Privacy Policy<\/strong><br>This policy governs the Authenticator Certification Levels as part of the FIDO Certification Program and more generally all FIDO technical specifications.<br><br><strong>Download:<\/strong> <a href=\"https:\/\/fidoalliance.org\/wp-content\/uploads\/2021\/02\/FIDO-Privacy-Principles.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">PDF<\/a><\/td><\/tr><tr><td><strong>FIDO Authenticator Security and Privacy Requirements<\/strong>\u00a0<p>This document outlines the Authenticator Security and Privacy Requirements for the Authenticator Certification Levels. Example: Implementations seeking L1 Certification must meet the requirements labeled \u201cL1 and higher\u201d, Implementations seeking L2 Certification must meet the requirements labeled \u201cL1 and higher\u201d and \u201cL2 and higher\u201d, and so forth depending on Certification level seeking. This document also includes the Vendor Questionnaire (for Levels L1 and L2), the Mapping Table (for Levels L3 and L3+) and the Test Procedure instructions for each requirement.<\/p><strong>Download v1.6 (ACTIVE):<\/strong>\u00a0<a href=\"https:\/\/fidoalliance.org\/specs\/fido-security-requirements\/fido-authenticator-security-requirements-v1.6-fd-20250312.html\" target=\"_blank\" rel=\"noreferrer noopener\">HTML<\/a>\u00a0|\u00a0<a href=\"https:\/\/fidoalliance.org\/specs\/fido-security-requirements\/fido-authenticator-security-requirements-v1.6-fd-20250312.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">PDF<\/a><br><br><strong>Download: v1.5.1 (ACTIVE with No Expiry)<\/strong>\u00a0<a href=\"https:\/\/fidoalliance.org\/specs\/fido-security-requirements\/fido-authenticator-security-requirements-v1.5.1-fd-20251016.html\" target=\"_blank\" rel=\"noreferrer noopener\">HTML<\/a>\u00a0|\u00a0<a href=\"https:\/\/fidoalliance.org\/specs\/fido-security-requirements\/fido-authenticator-security-requirements-v1.5.1-fd-20251016.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">PDF<\/a><br>v1.5.1 MUST be used when certifying to L3 or L3+ and is excluded from the FIDO Authenticator Sunset Policy. See additional documentation on L3 and L3+ mapping tables below.<br><strong>\u00a0<\/strong><br><strong>FIDO Allowed Cryptography List:<\/strong>\u00a0This document defines Allowed Cryptography referenced in the Authenticator Security and Privacy Requirements.<br><strong>\u00a0<\/strong><br><strong>Download v1.6:<\/strong>\u00a0<a href=\"https:\/\/fidoalliance.org\/specs\/fido-security-requirements\/fido-authenticator-allowed-cryptography-list-v1.6-fd-20250312.html\" target=\"_blank\" rel=\"noreferrer noopener\">HTML<\/a>\u00a0|\u00a0<a href=\"https:\/\/fidoalliance.org\/specs\/fido-security-requirements\/fido-authenticator-allowed-cryptography-list-v1.6-fd-20250312.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">PDF<\/a><br><strong>Download: v1.5.1 (ACTIVE with No Expiry)<\/strong>\u00a0<a href=\"https:\/\/fidoalliance.org\/specs\/fido-security-requirements\/fido-authenticator-allowed-cryptography-list-v1.5.1-fd-20251016.html\" target=\"_blank\" rel=\"noreferrer noopener\">HTML<\/a>\u00a0|\u00a0<a href=\"https:\/\/fidoalliance.org\/specs\/fido-security-requirements\/fido-authenticator-allowed-cryptography-list-v1.5.1-fd-20251016.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">PDF<\/a><br><strong>\u00a0<\/strong><br><strong>FIDO Allowed Restricted Operating Environments List:<\/strong>\u00a0This document defines the Allowed Restricted Operating Environments referenced in the Authenticator Security and Privacy Requirements.<br><strong>Download v1.6:<\/strong>\u00a0<a href=\"https:\/\/fidoalliance.org\/specs\/fido-security-requirements\/fido-authenticator-allowed-restricted-operating-environments-list-v1.6-fd-20250312.html\" target=\"_blank\" rel=\"noreferrer noopener\">HTML<\/a>\u00a0|\u00a0<a href=\"https:\/\/fidoalliance.org\/specs\/fido-security-requirements\/fido-authenticator-allowed-restricted-operating-environments-list-v1.6-fd-20250312.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">PDF<\/a><br><strong>Download: v1.5.1 (ACTIVE with No Expiry)<\/strong>\u00a0<a href=\"https:\/\/fidoalliance.org\/specs\/fido-security-requirements\/fido-authenticator-allowed-restricted-operating-environments-list-v1.5.1-fd-20251016.html\" target=\"_blank\" rel=\"noreferrer noopener\">HTML<\/a>\u00a0|\u00a0<a href=\"https:\/\/fidoalliance.org\/specs\/fido-security-requirements\/fido-authenticator-allowed-restricted-operating-environments-list-v1.5.1-fd-20251016.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">PDF<\/a><br>\u00a0<br><strong>FIDO Authenticator Metadata Requirements:<\/strong>\u00a0This document defines the Authenticator Metadata Requirements referenced in the Authenticator Security and Privacy Requirements.<br><strong>Download v1.6:<\/strong>\u00a0<a href=\"https:\/\/fidoalliance.org\/specs\/fido-security-requirements\/fido-authenticator-metadata-requirements-v1.6-fd-20250312.html\" target=\"_blank\" rel=\"noreferrer noopener\">HTML<\/a>\u00a0|\u00a0<a href=\"https:\/\/fidoalliance.org\/specs\/fido-security-requirements\/fido-authenticator-metadata-requirements-v1.6-fd-20250312.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">PDF<\/a><br><strong>Download: v1.5.1 (ACTIVE with No Expiry)<\/strong>\u00a0<a href=\"https:\/\/fidoalliance.org\/specs\/fido-security-requirements\/fido-authenticator-metadata-requirements-v1.5.1-fd-20251016.html\" target=\"_blank\" rel=\"noreferrer noopener\">HTML<\/a>\u00a0|\u00a0<a href=\"https:\/\/fidoalliance.org\/specs\/fido-security-requirements\/fido-authenticator-metadata-requirements-v1.5.1-fd-20251016.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">PDF<\/a><br>\u00a0<br>Download v1.5 (ACTIVE until Sunset Date of 10 Apr 2026):\u00a0<a href=\"https:\/\/fidoalliance.org\/specs\/fido-security-requirements\/fido-authenticator-security-requirements-v1.5-fd-20211102.html\" target=\"_blank\" rel=\"noreferrer noopener\">HTML<\/a>\u00a0|\u00a0<a href=\"https:\/\/fidoalliance.org\/specs\/fido-security-requirements\/fido-authenticator-security-requirements-v1.5-fd-20211102.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">PDF<\/a><br>Download v1.4.1 (Sunset):\u00a0<a href=\"https:\/\/fidoalliance.org\/specs\/fido-security-requirements\/fido-authenticator-security-requirements-v1.4.1-fd-20210510.html\" target=\"_blank\" rel=\"noreferrer noopener\">HTML<\/a>\u00a0|\u00a0<a href=\"https:\/\/fidoalliance.org\/specs\/fido-security-requirements\/fido-authenticator-security-requirements-v1.4.1-fd-20210510.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">PDF<\/a><br>Download v1.3 (Sunset):\u00a0<a href=\"https:\/\/fidoalliance.org\/specs\/fido-security-requirements\/fido-authenticator-security-requirements-v1.3-fd-20180905.html\" target=\"_blank\" rel=\"noreferrer noopener\">HTML<\/a>\u00a0|\u00a0<a href=\"https:\/\/fidoalliance.org\/specs\/fido-security-requirements\/fido-authenticator-security-requirements-v1.3-fd-20180905.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">PDF<\/a><\/td><\/tr><tr><td><strong>Vendor Questionnaire Worksheets<\/strong>\u00a0\u00a0Non-normative\u00a0 worksheets of the Vendor Questionnaires are available to assist Authenticator Vendors (Implementers) completing Authenticator Certification at L1 or L2.<br><br><strong>Download:<\/strong> <a href=\"https:\/\/fidoalliance.org\/wp-content\/uploads\/2025\/10\/FIDO_Authenticator_Certification-L1_VQ_20250827_RELEASE.xlsx\" target=\"_blank\" rel=\"noreferrer noopener\">Level 1<\/a> | <a href=\"https:\/\/fidoalliance.org\/wp-content\/uploads\/2025\/10\/FIDO_Authenticator_Certification-L1-_VQ_20250827_RELEASE.xlsx\" target=\"_blank\" rel=\"noreferrer noopener\">Level 1+<\/a> | <a href=\"https:\/\/fidoalliance.org\/wp-content\/uploads\/2025\/10\/FIDO_Authenticator_Certification-L2_VQ_20250827_RELEASE.xlsx\" target=\"_blank\" rel=\"noreferrer noopener\">Level 2<\/a> |\u00a0<a href=\"https:\/\/fidoalliance.org\/wp-content\/uploads\/2019\/01\/Authenticator_Sample_VQ_Answers.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Sample Vendor Questionnaire<\/a>. This sample should be used as a reference only. It is being provided as a guide for completing the Vendor Questionnaire and to help make the evaluation process more efficient and effective.<\/td><\/tr><tr><td><strong><strong>FIDO\u00a0L3\/L3+\u00a0Mapping Table Non-normative\u00a0Worksheets<\/strong><\/strong><br><br>These worksheets are available to assist Authenticator Vendors (implementers) in completing Authenticator Certification at L3 or L3+, depending on the selected Companion Program.<br><br><strong>Download: <a href=\"https:\/\/fidoalliance.org\/wp-content\/uploads\/2025\/10\/FIDO_Authenticator_Certification-L3L3_VQ_20250827_RELEASE.xlsx\" target=\"_blank\" rel=\"noreferrer noopener\">Level 3\/3+<\/a><\/strong><\/td><\/tr><tr><td><strong>FIDO Impact Analysis Report (FIAR)<\/strong>\u00a0This document defines the FIDO Impact Analysis Report (FIAR) template listing the scope and the structure of the expected contents. It describes the requirements for when changes are made to the authenticator and helps determine whether the authenticator is eligible for Derivative or Delta certification. This report must be completed by Authenticator Vendors (Implementers) and submitted to the FIDO Security Secretariat.<br><br><strong>Download:<\/strong> <a href=\"https:\/\/fidoalliance.org\/wp-content\/uploads\/2019\/03\/FIDO_IAR_v1.0_RELEASE.docx\" target=\"_blank\" rel=\"noreferrer noopener\">FIDO Impact Analysis Report (FIAR)<\/a><\/td><\/tr><\/tbody><\/table><\/figure>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Authenticator Certification Process<\/strong><\/h2>\n\n\n\n<p>The Authenticator Certification follows the<a href=\"https:\/\/fidoalliance.org\/certification\/functional-certification\/\"> Functional Certification<\/a> process, and the Authenticator Certification process adds the evaluation of a completed Vendor Questionnaire at L1 or L2, or a completed Mapping Table at L3 or L3+. The Vendor Questionnaire is how a vendor documents their implementation meets the Authenticator Security Requirements.<\/p>\n\n\n\n<p>If you already have a certified authenticator and made modifications, or are trying to obtain a Derivative certification, please refer to our <a href=\"\/?page_id=27887\" target=\"_blank\" rel=\"noreferrer noopener\">Certification Maintenance and Updates<\/a> page for the correct process to follow. Otherwise, please follow the steps below for Authenticator Certification.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">High-Level Process Steps<\/h2>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Preparation<\/li>\n\n\n\n<li>Functional Certification Requirements<\/li>\n\n\n\n<li>Authenticator Certification Application (for all Authenticators)<\/li>\n\n\n\n<li>Security Evaluation\n<ul class=\"wp-block-list\">\n<li>Vendor Questionnaire<\/li>\n\n\n\n<li>Security Secretariat (L1) or Accredited Security Laboratory (L2, L3, or L3+) Security Evaluation &amp; FIDO Evaluation Report<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>Report Review<\/li>\n\n\n\n<li>Certification Issuance<\/li>\n\n\n\n<li>(Optional)&nbsp;<a href=\"https:\/\/fidoalliance.org\/certification\/mark-usage\/\" target=\"_blank\" rel=\"noreferrer noopener\">Trademark Usage<\/a><\/li>\n\n\n\n<li>(Optional) Metadata Submission to FIDO MDS<\/li>\n<\/ol>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Preparation<\/strong><\/h4>\n\n\n\n<p>Implementations seeking FIDO Certification must fulfill the requirements specified in the documents above.<\/p>\n\n\n\n<p>All Authenticator Vendors seeking Authenticator Certification must create an account for FIDO Certification, you can <a href=\"\/?page_id=7161\" target=\"_blank\" rel=\"noreferrer noopener\">request an account<\/a>, or <a href=\"\/?page_id=7169\" target=\"_blank\" rel=\"noreferrer noopener\">login<\/a>.<\/p>\n\n\n\n<p>For Level 2 and higher, it is recommended that the Vendor contact a <a href=\"\/?page_id=6740\" target=\"_blank\" rel=\"noreferrer noopener\">FIDO Accredited Security Laboratory<\/a> early to work out contract and NDA details so the Vendor and the Lab are ready for the Security Evaluation process, and so the Accredited Security Laboratory can be listed as part of the Authenticator Certification Application step.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Functional Certification Requirements<\/strong><\/h4>\n\n\n\n<p>Vendors must complete FIDO Functional Certification requirements for Authenticators, including the Conformance Self-Validation and Interoperability Testing, prior to submitting an application for FIDO Authenticator Certification.<\/p>\n\n\n\n<p>For L1, this includes the L1 Interoperability Requirements which&nbsp; must be verified during Interoperability Testing.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Authenticator Certification Application<\/strong><\/h4>\n\n\n\n<p>To begin FIDO Authenticator Certification, the Vendor completes the Authenticator Certification Application (through the <a href=\"\/?page_id=7169\" target=\"_blank\" rel=\"noreferrer noopener\">Implementer Dashboard<\/a>).<\/p>\n\n\n\n<p>The Certification Secretariat is responsible for reviewing and approving the Authenticator Certification Application and, if approved as complete, returning it to the Vendor.<\/p>\n\n\n\n<p>The Authenticator Certification Application must be approved before the Security Evaluation step can begin.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Security Evaluation<\/strong><\/h4>\n\n\n\n<p>The Security Evaluation step includes the Vendor\u2019s attestation of how the implementation meets the Security Requirements, and the Security Evaluation performed by the FIDO Security Secretariat or a FIDO Accredited Security Laboratory.&nbsp; The Vendor Questionnaire is reviewed&nbsp; at levels L1 and L2, or the Mapping Table at levels L3 or L3+, and completes the Test Procedures.<\/p>\n\n\n\n<p>For L1, The Vendor Questionnaire is completed in two steps:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>L1 Interoperability Requirements are verified during an <a href=\"https:\/\/fidoalliance.org\/certification\/interoperability-testing\/\" target=\"_blank\" rel=\"noreferrer noopener\">Interoperability Event<\/a> for a subset of the L1 Security Requirements. (This must be completed prior to the Authenticator Certification Application).<\/li>\n\n\n\n<li>The Vendor completes the L1 Vendor Questionnaire by providing a rationale for the remainder of the requirements not verified at the Interoperability Event.<\/li>\n<\/ol>\n\n\n\n<p>Once the Vendor Questionnaire is complete, it is submitted to the Security Secretariat. The Security Evaluation is performed by the Security Secretariat who reviews&nbsp; the completed Vendor Questionnaire and performs the Security Test Procedures. The Security Secretariat will prepare the FIDO Evaluation Report.<\/p>\n\n\n\n<p>For L2,&nbsp;the Authenticator Vendor (Implementer) chooses a <a href=\"\/?page_id=6740\" target=\"_blank\" rel=\"noreferrer noopener\">FIDO Accredited Security Laboratory<\/a> to perform the Security Evaluation. The Authenticator Vendor (Implementer) submits&nbsp; the L2 Vendor Questionnaire to the FIDO Accredited Security Laboratory and an Approved Evaluator performs the Security Test Procedures. The Approved Evaluator submits&nbsp; a FIDO Evaluation Report to the Security Secretariat.<\/p>\n\n\n\n<p>For L3 and L3+,&nbsp;the Authenticator Vendor (Implementer) chooses&nbsp; a <a href=\"\/?page_id=6740\" target=\"_blank\" rel=\"noreferrer noopener\">FIDO Accredited Security Laboratory<\/a> to perform Security Evaluation. The Authenticator Vendor (Implementer) submits the Mapping Table to the FIDO Accredited Security Laboratory and an Approved Evaluator performs the Security Test Procedures. The Approved Evaluator submits a FIDO Evaluation Report to the Security Secretariat.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Report Review<\/strong><\/h4>\n\n\n\n<p>Once complete, the Authenticator Vendor (Implementer) reviews the FIDO Evaluation Report prepared by the FIDO Security Secretariat or Accredited Security Laboratory and submits to the Security Secretariat (through the <a href=\"\/?page_id=7169\" target=\"_blank\" rel=\"noreferrer noopener\">Implementer Dashboard<\/a>).<\/p>\n\n\n\n<p>For L1, the approved Vendor Questionnaire and FIDO Evaluation Report must be submitted to the Security Secretariat.<\/p>\n\n\n\n<p>For L2 and higher, only the FIDO Evaluation Report must be submitted to the Security Secretariat.<\/p>\n\n\n\n<p>The FIDO Evaluation Report must be approved by the Security Secretariat before the Authenticator Vendor (Implementer) can complete the Certification Request.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Certification Issuance<\/strong><\/h4>\n\n\n\n<p>As part of submitting the required documents to FIDO, the Authenticator Vendor (Implementer) will also submit the Certification Request. The Certification Request is evaluated by the Certification Secretariat to ensure all requirements are met.<\/p>\n\n\n\n<p>The Authenticator Vendor (Implementer) must pay the Authenticator Certification Fees before a Certificate is issued.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Trademark Usage (Optional)<\/strong><\/h4>\n\n\n\n<p>After executing the Trademark License Agreement (TMLA), Authenticator Vendors (Implementers) may use the FIDO\u00ae Certified mark and logo on their product, packaging, and marketing literature.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Metadata Submission to MDS (Optional)<\/strong><\/h4>\n\n\n\n<p>The Authenticator Vendor (Implementer) has the option to submit Metadata to the <a href=\"\/?page_id=3165\" target=\"_blank\" rel=\"noreferrer noopener\">FIDO Metadata Service (MDS)<\/a>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Implementer Dashboard<\/strong><\/h2>\n\n\n\n<p>Authenticator Vendors (Implementers) can <a href=\"\/?page_id=7169\" target=\"_blank\" rel=\"noreferrer noopener\">Login<\/a> to view their Dashboard.<\/p>\n\n\n\n<p><a href=\"\/?page_id=7169\" target=\"_blank\" rel=\"noreferrer noopener\"><button class=\"btn\" type=\"button\">Login<\/button><\/a><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Authenticator Certification Levels introduce Authenticator Security Requirements to the FIDO Certification Program. Authenticators must be certified to at least Authenticator Certification Level 1 (L1) for UAF, U2F, and FIDO2 [&hellip;]<\/p>\n","protected":false},"author":59250,"featured_media":0,"parent":15865,"menu_order":3,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"_EventAllDay":false,"_EventTimezone":"","_EventStartDate":"","_EventEndDate":"","_EventStartDateUTC":"","_EventEndDateUTC":"","_EventShowMap":false,"_EventShowMapLink":false,"_EventURL":"","_EventCost":"","_EventCostDescription":"","_EventCurrencySymbol":"","_EventCurrencyCode":"","_EventCurrencyPosition":"","_EventDateTimeSeparator":"","_EventTimeRangeSeparator":"","_EventOrganizerID":[],"_EventVenueID":[],"_OrganizerEmail":"","_OrganizerPhone":"","_OrganizerWebsite":"","_VenueAddress":"","_VenueCity":"","_VenueCountry":"","_VenueProvince":"","_VenueState":"","_VenueZip":"","_VenuePhone":"","_VenueURL":"","_VenueStateProvince":"","_VenueLat":"","_VenueLng":"","_VenueShowMap":false,"_VenueShowMapLink":false,"footnotes":""},"content-type":[],"class_list":["post-6791","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/fidoalliance.org\/wp-json\/wp\/v2\/pages\/6791","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fidoalliance.org\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/fidoalliance.org\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/fidoalliance.org\/wp-json\/wp\/v2\/users\/59250"}],"replies":[{"embeddable":true,"href":"https:\/\/fidoalliance.org\/wp-json\/wp\/v2\/comments?post=6791"}],"version-history":[{"count":0,"href":"https:\/\/fidoalliance.org\/wp-json\/wp\/v2\/pages\/6791\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/fidoalliance.org\/wp-json\/wp\/v2\/pages\/15865"}],"wp:attachment":[{"href":"https:\/\/fidoalliance.org\/wp-json\/wp\/v2\/media?parent=6791"}],"wp:term":[{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/fidoalliance.org\/wp-json\/wp\/v2\/content-type?post=6791"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}