Integration of the FIDO UAF Client SDK
  • 11 Nov 2024
  • 1 Minute à lire
  • Sombre
    Lumière

Integration of the FIDO UAF Client SDK

  • Sombre
    Lumière

The content is currently unavailable in French. You are viewing the default English version.
Résumé de l’article

The integration of the OneSpan FIDO Authentication Solution involves the configuration of the FIDO Server and the integration of the FIDO authenticators on Android and iOS.

Configuration of the FIDO Server

To enable the integration of the FIDO UAF Client, the following tasks must be completed to properly configure the FIDO Server:

  1. Upload the Facet ID.
    iOSios:bundle-id:<app_bundle_id_lowercased>
    Android: android:apk-key-hash:<base64_encoded_sha1_hash-of-apk-signing-cert>

  2. Upload the Metadata provided in the product package. For more information on the included metadata, see Metadata for the Biometric Authenticators and Metadata for the Application PIN Authenticator.

Integration on Android

To integrate the FIDO Client SDK in an Android application

We strongly recommend using the dependencies from the same Mobile Security Suite package because they were tested together for compatibility.

  1. Add the following dependencies from the Mobile Security Suite package to your application project:

    • FidoUafClient.aar

  2. Implement the communication module between the application and the FIDO Server utilizing your preferred processes for communication, such as Kotlin Coroutines, Retrofit, etc. The FIDO Client SDK does not include the layer to communicate with the FIDO Server.

You are now ready to use the FIDO Client to process UAF messages and generate the appropriate UAF responses to be sent to your FIDO Server.

For more information about how to integrate the SDK, refer to the technical documentation included in the product package.

Integration on iOS

To integrate the FIDO Client SDK in an iOS application

  1. Link the following dependencies from the Mobile Security Suite package to your Xcode project and set to Embed & Sign:

    • MSSFidoUafClient.xcframework

      MSSFidoUafClient.xcframework must be set to Embed & Sign in your Xcode project or there is a risk of your application terminating unexpectedly.

  2. Implement the communication module between the application and the FIDO Server utilizing your preferred processes for communication. The FIDO Client SDK does not include the layer to communicate with the FIDO Server.

    If you do not intend to share the registrations between different applications, we recommend using the application's private AccessGroup for the initialization of the authenticator.

  3. Instantiate the authenticators you want to use and initialize the FIDO Client with those authenticators.

You are now ready to use the FIDO Client to process UAF messages and generate the appropriate UAF responses to be sent to your FIDO Server.

For more information about how to integrate the SDK, refer to the technical documentation included in the product package.


Cet article vous a-t-il été utile ?

What's Next
Changing your password will log you out immediately. Use the new password to log back in.
First name must have atleast 2 characters. Numbers and special characters are not allowed.
Last name must have atleast 1 characters. Numbers and special characters are not allowed.
Enter a valid email
Enter a valid password
Your profile has been successfully updated.
ESC

Ozzy, facilitant la découverte de connaissances grâce à l’intelligence conversationnelle