LogoLogo
HomeIntegrityControlSolutionsManagement Center
3.1.0 - Access
3.1.0 - Access
  • Introduction
  • The Service
    • Overview
    • About this release
      • Release notes
      • Breaking changes
    • Architecture
      • Modules
      • Folder structure
      • Startup
    • Getting started
    • Installation
      • Container
      • Linux
      • Windows
    • Operations
      • Configuration
      • Metrics
      • Health check
      • Logging
        • System logging
        • Event logging
      • SBOM & license material
  • Modules
    • External modules
    • Internal modules
      • SAMLModule
      • OIDC
        • OpenID Configuration endpoint
        • JWKS endpoint
        • Authorization endpoint
        • Token endpoint
          • Authorization code
          • Refresh token
        • User info endpoint
        • Introspection endpoint
        • End session endpoint
  • Configuration reference
    • Introduction
    • Terms and abbreviations
    • Property expansion
    • File inclusion
    • Secrets management
    • Examples
  • Authenticators
    • Introduction
    • Common configuration
    • Web Authenticator API
    • Flow control
      • Selector
      • AuthController
      • SSO Authenticator
      • Chain
      • Impersonate
      • Impersonate With Search
    • Credential validators
      • SITHS eID
        • With QR or "app-switch"
      • BankID
        • On another device
        • On mobile device
      • Freja e-ID
        • With user input
        • With QR or "app-switch"
      • Mobile ID
        • With QR or "app-switch"
      • Header based
        • Certificate
      • Pointsharp Net iD Access server
        • On another device
        • On same device
      • Integrated windows login, IWA
      • User name & password
      • User lookup
      • OTP validator
      • Passkey validator
      • Exposed metrics
      • Test
        • Static SAML
        • No operation
    • Protocol managers
      • SAML
        • SAML IDP
        • SAML SP
        • IDP Discovery Service
      • OIDC
        • Authorization Code Flow
        • Implicit Flow
        • OIDC Relying Party
    • UI
Powered by GitBook
On this page
  • Configuration
  • Logging
  • Global state
  • API
  • Begin authentication
  • Translation keys
  1. Authenticators
  2. Credential validators

Passkey validator

PreviousOTP validatorNextExposed metrics

Other components that this module uses or need:

  • Web -> WebAuthnValidation To authenticate users using a Passkey you need to have a database connection.

  • Enrollment -> Check out the Enrollment documentation. To be able to authenticate you must have enrolled for a token.

Configuration

Authenticator type: Passkey

Common Authenticator configuration can be found .

Name
Description
Default value
Mandatory

namespace

username_parameter

username

webroot_dir

See common authenticator configuration

web/authenticator/webauthn

{
  "id": "passkey",
  "type": "Passkey",
  "config": {
    "namespace": "default",
    "base_path": "/saml/authn",
    "context_path": "/saml/authn/webauthn",
    "webroot_dir": "web/authenticator/webauthn",
    "username_parameter": "username"
  }
}

Property base_path should not contain the full path when used in conjunction with the Selector, instead, the full URI will be handled by the selector. The full path will be base_path + / + id.

Logging

  • WEB_100022("Passkey validated")

    • IDENTIFIER (user trace id)

    • CUSTOMER_IDENTIFIER (if configured)

    • SOURCE_ADDRESS (ip of the remote session)

  • WEB_100023("Passkey validation failed")

    • IDENTIFIER (user trace id)

    • CUSTOMER_IDENTIFIER (if configured)

    • SOURCE_ADDRESS (ip of the remote session)

Global state

After successful authentiation, the authenticator populates the configured username property with the user identifier obtained during the Web Authentication process.

API

Begin authentication

Initialize a new authentication with the following request to the authenticator API:

{
    "type": "options"
}
{
    "type": "verification",
    "data": {
        "assertion": <AuthenticatorAssertionResponse>
    }
}

The server responds with AUTHORIZED or UNAUTHORIZED:

{
    "status": "AUTHORIZED|UNAUTHORIZED"
}

Translation keys

{
  "webauthn.start_validate": "Login",
  "webauthn.verifying": "Verifying passkey",
  "webauthn.verified": "Passkey verified",
  "webauthn.redirecting": "Redirecting...",
  "webauthn.validation_error.authenticator_failure": "Passkey authentication failed",
  "webauthn.validation_error.verification_failure": "Passkey verification failed",
  "webauthn.validation_error.unknown_error": "Unknown error",
  "webauthn.reset_button": "Go back",
  "allow-cookies-body": "To save your language settings on this device you need to approve a language cookie.",
  "allow-cookies-button": "Approve language cookie",
  "change_language": "Change language"
}
{
  "webauthn.start_validate": "Logga in",
  "webauthn.verifying": "Säkerhetsnyckel verifieras...",
  "webauthn.verified": "Säkerhetsnyckel verifierad",
  "webauthn.redirecting": "Omdirigerar...",
  "webauthn.validation_error.authenticator_failure": "Autenticering med säkerhetsnyckel misslyckades",
  "webauthn.validation_error.verification_failure": "Verifiering av säkerhetsnyckel misslyckades",
  "webauthn.validation_error.unknown_error": "Okänt fel inträffade",
  "webauthn.reset_button": "Gå tillbaka",
  "allow-cookies-body": "Vill du spara dina språkinställningar på denna enhet behövs ett godkännande av  språk-cookie.",
  "allow-cookies-button": "Godkänn språk-cookie",
  "change_language": "Byt språk"
}

The following documentation contains links to the document .

The server responds with a . Use the response to obtain a , according to the Web Authentication specification, and return the assertion to the authenticator API:

https://docs.fortifiedid.se/tokens/
here
Web Authentication: An API for accessing Public Key Credentials Level 2, W3C Recommendation, 8 April 2021
PublicKeyCredentialRequestOptions
AuthenticatorAssertionResponse