You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
* Webfont stylesheets (including versions for Bootstrap and Foundation) in CSS, LESS, SCSS and Stylus formats
@@ -33,7 +33,7 @@ We like SVGs and we think they're the way to display icons on the web. Since Ope
33
33
34
34
Open Iconic also comes in a SVG sprite which allows you to display all the icons in the set with a single request. It's like an icon font, without being a hack.
35
35
36
-
Adding an icon from an SVG sprite is a little different than what you're used to, but it's still a piece of cake. *Tip: To make your icons easily style able, we suggest adding a general class to the*`<svg>`*tag and a unique class name for each different icon in the*`<use>`*tag.*
36
+
Adding an icon from an SVG sprite is a little different than what you're used to, but it's still a piece of cake. *Tip: To make your icons easily style able, we suggest adding a general class to the*`<svg>`*tag and a unique class name for each different icon in the*`<use>`*tag.*
Copy file name to clipboardExpand all lines: README.md
+9-9
Original file line number
Diff line number
Diff line change
@@ -1,5 +1,5 @@
1
1
# FIDO2 .NET Library (WebAuthn)
2
-
A working implementation library + demo for [FIDO2](https://fidoalliance.org/fido2/) and [WebAuthn](https://www.w3.org/TR/webauthn/) using [.NET](https://dotnet.microsoft.com/)
2
+
A working implementation library + demo for [FIDO2](https://fidoalliance.org/fido2/) and [WebAuthn](https://www.w3.org/TR/webauthn/) using [.NET](https://dotnet.microsoft.com/)
[](https://opencollective.com/passwordless)
@@ -23,7 +23,7 @@ This project is part of the [.NET foundation](https://dotnetfoundation.org)
23
23
24
24
```Install-Package Fido2```
25
25
26
-
To use the asp.net helpers, install the asp.net-package.
26
+
To use the asp.net helpers, install the asp.net-package.
27
27
28
28
```Install-Package Fido2.AspNet```
29
29
@@ -33,28 +33,28 @@ To use the asp.net helpers, install the asp.net-package.
33
33
*[Code examples](#examples)
34
34
35
35
## What is FIDO2?
36
-
**The passwordless web is coming.**
36
+
**The passwordless web is coming.**
37
37
[FIDO2](https://fidoalliance.org/fido2/) / [WebAuthn](https://www.w3.org/TR/webauthn/) is a new open authentication standard, supported by [browsers](https://www.w3.org/Consortium/Member/List) and [many large tech companies](https://fidoalliance.org/members/) such as Microsoft, Google etc. The main driver is to allow a user to login without passwords, creating *passwordless flows* or strong MFA for user signup/login on websites. The standard is not limited to web applications with support coming to Active Directory and native apps. The technology builds on public/private keys, allowing authentication to happen without sharing a secret between the user & platform. This brings many benefits, such as easier and safer logins and makes phishing attempts extremely hard.
- ✅ [Face ID and Touch ID for the Web](https://webkit.org/blog/11312/meet-face-id-and-touch-id-for-the-web/) (aka "Apple Hello")
58
58
- ✅ All currently referenced cryptographic algorithms for FIDO2 Server ([spec](https://fidoalliance.org/specs/fido-v2.0-rd-20180702/fido-server-v2.0-rd-20180702.html#other))
59
59
- ✅ All current attestation formats: "packed", "tpm", "android-key", "android-safetynet", "fido-u2f", "apple", "apple-appattest", and "none" ([spec](https://www.iana.org/assignments/webauthn/webauthn.xhtml))
60
60
- ✅ FIDO2 Server attestation validation via FIDO Metadata Service V3 ([spec](https://fidoalliance.org/specs/mds/fido-metadata-service-v3.0-ps-20210518.html))
@@ -209,7 +209,7 @@ https://www.nuget.org/packages/Fido2/ and https://www.nuget.org/packages/Fido2.M
209
209
See [Contributing](CONTRIBUTING.md) for information about contributing to the project.
210
210
211
211
This project has adopted the code of conduct defined by the Contributor Covenant to clarify expected behavior in our community.
212
-
For more information see the [.NET Foundation Code of Conduct](https://dotnetfoundation.org/code-of-conduct).
212
+
For more information see the [.NET Foundation Code of Conduct](https://dotnetfoundation.org/code-of-conduct).
213
213
214
214
For security and penetration testing, please see our [Vulnerability Disclosure Program](./VDP.md)
Copy file name to clipboardExpand all lines: Src/Fido2.Ctap2/Commands/AuthenticatorMakeCredentialCommand.cs
+4-4
Original file line number
Diff line number
Diff line change
@@ -30,8 +30,8 @@ public AuthenticatorMakeCredentialCommand(
30
30
publicbyte[]ClientDataHash{get;}
31
31
32
32
/// <summary>
33
-
/// This PublicKeyCredentialRpEntity data structure describes a Relying Party with which the new public key credential will be associated.
34
-
/// It contains the Relying party identifier of type text string, (optionally) a human-friendly RP name of type text string, and (optionally) a URL of type text string, referencing a RP icon image.
33
+
/// This PublicKeyCredentialRpEntity data structure describes a Relying Party with which the new public key credential will be associated.
34
+
/// It contains the Relying party identifier of type text string, (optionally) a human-friendly RP name of type text string, and (optionally) a URL of type text string, referencing a RP icon image.
35
35
/// </summary>
36
36
[CborMember(0x02)]
37
37
publicPublicKeyCredentialRpEntityRp{get;}
@@ -46,7 +46,7 @@ public AuthenticatorMakeCredentialCommand(
46
46
publicPubKeyCredParam[]PubKeyCredParams{get;}
47
47
48
48
/// <summary>
49
-
/// The authenticator returns an error if the authenticator already contains one of the credentials enumerated in this sequence.
49
+
/// The authenticator returns an error if the authenticator already contains one of the credentials enumerated in this sequence.
50
50
/// This allows RPs to limit the creation of multiple credentials for the same account on a single authenticator.
51
51
/// </summary>
52
52
[CborMember(0x05)]
@@ -104,7 +104,7 @@ public AuthenticatorMakeCredentialCommand(
/// Total number of account credentials for the RP.This member is required when more than one account for the RP and the authenticator does not have a display.
43
+
/// Total number of account credentials for the RP.This member is required when more than one account for the RP and the authenticator does not have a display.
44
44
/// Omitted when returned for the authenticatorGetNextAssertion method.
45
45
/// </summary>
46
46
[CborMember(0x05)]
47
47
publicint?NumberOfCredentials{get;set;}
48
48
49
49
/// <summary>
50
-
/// Indicates that a credential was selected by the user via interaction directly with the authenticator, and thus the platform does not need to confirm the credential.
50
+
/// Indicates that a credential was selected by the user via interaction directly with the authenticator, and thus the platform does not need to confirm the credential.
51
51
/// MUST NOT be present in response to a request where an allowList was given, where numberOfCredentials is greater than one, nor in response to an authenticatorGetNextAssertion request.
Copy file name to clipboardExpand all lines: Src/Fido2.Development/StoredCredential.cs
+2-2
Original file line number
Diff line number
Diff line change
@@ -37,13 +37,13 @@ public class StoredCredential
37
37
publicboolIsBackedUp{get;set;}
38
38
39
39
/// <summary>
40
-
/// The value of the attestationObject attribute when the public key credential source was registered.
40
+
/// The value of the attestationObject attribute when the public key credential source was registered.
41
41
/// Storing this enables the Relying Party to reference the credential's attestation statement at a later time.
42
42
/// </summary>
43
43
publicbyte[]AttestationObject{get;set;}
44
44
45
45
/// <summary>
46
-
/// The value of the clientDataJSON attribute when the public key credential source was registered.
46
+
/// The value of the clientDataJSON attribute when the public key credential source was registered.
47
47
/// Storing this in combination with the above attestationObject item enables the Relying Party to re-verify the attestation signature at a later time.
0 commit comments