fido-authenticator

Crates.iofido-authenticator
lib.rsfido-authenticator
version0.1.1
sourcesrc
created_at2021-04-25 14:52:51.900633
updated_at2022-08-22 10:52:46.108073
descriptionFIDO authenticator Trussed app
homepage
repositoryhttps://github.com/solokeys/fido-authenticator
max_upload_size
id389317
size161,240
Markus Meissner (daringer)

documentation

https://docs.rs/fido-authenticator

README

fido-authenticator

FIDO authenticator Trussed® app.

Built with Trussed.

As used in the SoloKeys Solo 2 and Nitrokey 3.

Specifications

Setup

For attestation to work, the authenticator's state needs to be provisioned with a batch attestation key and certificate. They are expected in files /fido/sec/00 and /fido/x5c/00, respectively.

In the context of the SoloKeys Solo 2, "secure" devices are pre-provisioned; for "unlocked" devices, if the firmware contains the provisioner app, this can be done with the CLI:

solo2 pki dev fido batch.key batch.cert
solo2 app provision store-fido-batch-key batch.key
solo2 app provision store-fido-batch-cert batch.cert

License

fido-authenticator is fully open source.

All software, unless otherwise noted, is dual licensed under Apache 2.0 and MIT. You may use fido-authenticator software under the terms of either the Apache 2.0 license or MIT license.

Unless you explicitly state otherwise, any contribution intentionally submitted for inclusion in the work by you, as defined in the Apache-2.0 license, shall be dual licensed as above, without any additional terms or conditions.

All documentation, unless otherwise noted, is licensed under CC-BY-SA. You may use fido-authenticator documentation under the terms of the CC-BY-SA 4.0 license.

Commit count: 114

cargo fmt