Update user.html
This commit is contained in:
@@ -1,542 +1,106 @@
|
||||
<!DOCTYPE html>
|
||||
<html>
|
||||
<head>
|
||||
<title>lbuchs/WebAuthn Test</title>
|
||||
<meta charset="UTF-8">
|
||||
<script>
|
||||
<head>
|
||||
<title>lbuchs/WebAuthn Test</title>
|
||||
<meta charset="UTF-8">
|
||||
</head>
|
||||
<body>
|
||||
<h1>lbuchs/WebAuthn</h1>
|
||||
<div>
|
||||
<button type="button" onclick="createRegistration()">Register</button>
|
||||
<button type="button" onclick="checkRegistration()">Login</button>
|
||||
</div>
|
||||
|
||||
/**
|
||||
* creates a new FIDO2 registration
|
||||
* @returns {undefined}
|
||||
*/
|
||||
<script>
|
||||
async function createRegistration() {
|
||||
try {
|
||||
|
||||
// check browser support
|
||||
if (!window.fetch || !navigator.credentials || !navigator.credentials.create) {
|
||||
throw new Error('Browser not supported.');
|
||||
}
|
||||
|
||||
// get create args
|
||||
let rep = await window.fetch('server.php?fn=getCreateArgs' + getGetParams(), {method:'GET', cache:'no-cache'});
|
||||
let rep = await window.fetch('server.php?fn=getCreateArgs', { method: 'GET', cache: 'no-cache' });
|
||||
const createArgs = await rep.json();
|
||||
|
||||
// error handling
|
||||
if (createArgs.success === false) {
|
||||
throw new Error(createArgs.msg || 'unknown error occured');
|
||||
throw new Error(createArgs.msg || 'Unknown error occurred');
|
||||
}
|
||||
|
||||
// replace binary base64 data with ArrayBuffer. a other way to do this
|
||||
// is the reviver function of JSON.parse()
|
||||
recursiveBase64StrToArrayBuffer(createArgs);
|
||||
|
||||
// create credentials
|
||||
const cred = await navigator.credentials.create(createArgs);
|
||||
|
||||
// create object
|
||||
const authenticatorAttestationResponse = {
|
||||
transports: cred.response.getTransports ? cred.response.getTransports() : null,
|
||||
clientDataJSON: cred.response.clientDataJSON ? arrayBufferToBase64(cred.response.clientDataJSON) : null,
|
||||
transports: cred.response.getTransports ? cred.response.getTransports() : null,
|
||||
clientDataJSON: cred.response.clientDataJSON ? arrayBufferToBase64(cred.response.clientDataJSON) : null,
|
||||
attestationObject: cred.response.attestationObject ? arrayBufferToBase64(cred.response.attestationObject) : null
|
||||
};
|
||||
|
||||
// check auth on server side
|
||||
rep = await window.fetch('server.php?fn=processCreate' + getGetParams(), {
|
||||
method : 'POST',
|
||||
body : JSON.stringify(authenticatorAttestationResponse),
|
||||
cache : 'no-cache'
|
||||
rep = await window.fetch('server.php?fn=processCreate', {
|
||||
method: 'POST',
|
||||
body: JSON.stringify(authenticatorAttestationResponse),
|
||||
cache: 'no-cache'
|
||||
});
|
||||
const authenticatorAttestationServerResponse = await rep.json();
|
||||
|
||||
// prompt server response
|
||||
if (authenticatorAttestationServerResponse.success) {
|
||||
reloadServerPreview();
|
||||
window.alert(authenticatorAttestationServerResponse.msg || 'registration success');
|
||||
|
||||
window.alert(authenticatorAttestationServerResponse.msg || 'Registration success');
|
||||
} else {
|
||||
throw new Error(authenticatorAttestationServerResponse.msg);
|
||||
}
|
||||
|
||||
} catch (err) {
|
||||
reloadServerPreview();
|
||||
window.alert(err.message || 'unknown error occured');
|
||||
window.alert(err.message || 'Unknown error occurred');
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
/**
|
||||
* checks a FIDO2 registration
|
||||
* @returns {undefined}
|
||||
*/
|
||||
async function checkRegistration() {
|
||||
try {
|
||||
|
||||
if (!window.fetch || !navigator.credentials || !navigator.credentials.create) {
|
||||
throw new Error('Browser not supported.');
|
||||
}
|
||||
|
||||
// get check args
|
||||
let rep = await window.fetch('server.php?fn=getGetArgs' + getGetParams(), {method:'GET',cache:'no-cache'});
|
||||
let rep = await window.fetch('server.php?fn=getGetArgs', { method: 'GET', cache: 'no-cache' });
|
||||
const getArgs = await rep.json();
|
||||
|
||||
// error handling
|
||||
if (getArgs.success === false) {
|
||||
throw new Error(getArgs.msg);
|
||||
}
|
||||
|
||||
// replace binary base64 data with ArrayBuffer. a other way to do this
|
||||
// is the reviver function of JSON.parse()
|
||||
recursiveBase64StrToArrayBuffer(getArgs);
|
||||
|
||||
// check credentials with hardware
|
||||
const cred = await navigator.credentials.get(getArgs);
|
||||
|
||||
// create object for transmission to server
|
||||
const authenticatorAttestationResponse = {
|
||||
id: cred.rawId ? arrayBufferToBase64(cred.rawId) : null,
|
||||
clientDataJSON: cred.response.clientDataJSON ? arrayBufferToBase64(cred.response.clientDataJSON) : null,
|
||||
clientDataJSON: cred.response.clientDataJSON ? arrayBufferToBase64(cred.response.clientDataJSON) : null,
|
||||
authenticatorData: cred.response.authenticatorData ? arrayBufferToBase64(cred.response.authenticatorData) : null,
|
||||
signature: cred.response.signature ? arrayBufferToBase64(cred.response.signature) : null,
|
||||
userHandle: cred.response.userHandle ? arrayBufferToBase64(cred.response.userHandle) : null
|
||||
};
|
||||
|
||||
// send to server
|
||||
rep = await window.fetch('server.php?fn=processGet' + getGetParams(), {
|
||||
method:'POST',
|
||||
rep = await window.fetch('server.php?fn=processGet', {
|
||||
method: 'POST',
|
||||
body: JSON.stringify(authenticatorAttestationResponse),
|
||||
cache:'no-cache'
|
||||
cache: 'no-cache'
|
||||
});
|
||||
const authenticatorAttestationServerResponse = await rep.json();
|
||||
|
||||
// check server response
|
||||
if (authenticatorAttestationServerResponse.success) {
|
||||
reloadServerPreview();
|
||||
window.alert(authenticatorAttestationServerResponse.msg || 'login success');
|
||||
window.alert(authenticatorAttestationServerResponse.msg || 'Login success');
|
||||
} else {
|
||||
throw new Error(authenticatorAttestationServerResponse.msg);
|
||||
}
|
||||
|
||||
} catch (err) {
|
||||
reloadServerPreview();
|
||||
window.alert(err.message || 'unknown error occured');
|
||||
window.alert(err.message || 'Unknown error occurred');
|
||||
}
|
||||
}
|
||||
|
||||
function clearRegistration() {
|
||||
window.fetch('server.php?fn=clearRegistrations' + getGetParams(), {method:'GET',cache:'no-cache'}).then(function(response) {
|
||||
return response.json();
|
||||
|
||||
}).then(function(json) {
|
||||
if (json.success) {
|
||||
reloadServerPreview();
|
||||
window.alert(json.msg);
|
||||
} else {
|
||||
throw new Error(json.msg);
|
||||
}
|
||||
}).catch(function(err) {
|
||||
reloadServerPreview();
|
||||
window.alert(err.message || 'unknown error occured');
|
||||
});
|
||||
}
|
||||
|
||||
|
||||
function queryFidoMetaDataService() {
|
||||
window.fetch('server.php?fn=queryFidoMetaDataService' + getGetParams(), {method:'GET',cache:'no-cache'}).then(function(response) {
|
||||
return response.json();
|
||||
|
||||
}).then(function(json) {
|
||||
if (json.success) {
|
||||
window.alert(json.msg);
|
||||
} else {
|
||||
throw new Error(json.msg);
|
||||
}
|
||||
}).catch(function(err) {
|
||||
window.alert(err.message || 'unknown error occured');
|
||||
});
|
||||
}
|
||||
|
||||
/**
|
||||
* convert RFC 1342-like base64 strings to array buffer
|
||||
* @param {mixed} obj
|
||||
* @returns {undefined}
|
||||
*/
|
||||
function recursiveBase64StrToArrayBuffer(obj) {
|
||||
let prefix = '=?BINARY?B?';
|
||||
let suffix = '?=';
|
||||
if (typeof obj === 'object') {
|
||||
for (let key in obj) {
|
||||
if (typeof obj[key] === 'string') {
|
||||
let str = obj[key];
|
||||
if (str.substring(0, prefix.length) === prefix && str.substring(str.length - suffix.length) === suffix) {
|
||||
str = str.substring(prefix.length, str.length - suffix.length);
|
||||
|
||||
let binary_string = window.atob(str);
|
||||
let len = binary_string.length;
|
||||
let bytes = new Uint8Array(len);
|
||||
for (let i = 0; i < len; i++) {
|
||||
bytes[i] = binary_string.charCodeAt(i);
|
||||
}
|
||||
obj[key] = bytes.buffer;
|
||||
}
|
||||
} else {
|
||||
recursiveBase64StrToArrayBuffer(obj[key]);
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
* Convert a ArrayBuffer to Base64
|
||||
* @param {ArrayBuffer} buffer
|
||||
* @returns {String}
|
||||
*/
|
||||
function arrayBufferToBase64(buffer) {
|
||||
let binary = '';
|
||||
let bytes = new Uint8Array(buffer);
|
||||
let len = bytes.byteLength;
|
||||
for (let i = 0; i < len; i++) {
|
||||
binary += String.fromCharCode( bytes[ i ] );
|
||||
binary += String.fromCharCode(bytes[i]);
|
||||
}
|
||||
return window.btoa(binary);
|
||||
}
|
||||
|
||||
/**
|
||||
* Get URL parameter
|
||||
* @returns {String}
|
||||
*/
|
||||
function getGetParams() {
|
||||
let url = '';
|
||||
|
||||
url += '&apple=' + (document.getElementById('cert_apple').checked ? '1' : '0');
|
||||
url += '&yubico=' + (document.getElementById('cert_yubico').checked ? '1' : '0');
|
||||
url += '&solo=' + (document.getElementById('cert_solo').checked ? '1' : '0');
|
||||
url += '&hypersecu=' + (document.getElementById('cert_hypersecu').checked ? '1' : '0');
|
||||
url += '&google=' + (document.getElementById('cert_google').checked ? '1' : '0');
|
||||
url += 'µsoft=' + (document.getElementById('cert_microsoft').checked ? '1' : '0');
|
||||
url += '&mds=' + (document.getElementById('cert_mds').checked ? '1' : '0');
|
||||
|
||||
url += '&requireResidentKey=' + (document.getElementById('requireResidentKey').checked ? '1' : '0');
|
||||
|
||||
url += '&type_usb=' + (document.getElementById('type_usb').checked ? '1' : '0');
|
||||
url += '&type_nfc=' + (document.getElementById('type_nfc').checked ? '1' : '0');
|
||||
url += '&type_ble=' + (document.getElementById('type_ble').checked ? '1' : '0');
|
||||
url += '&type_int=' + (document.getElementById('type_int').checked ? '1' : '0');
|
||||
url += '&type_hybrid=' + (document.getElementById('type_hybrid').checked ? '1' : '0');
|
||||
|
||||
url += '&fmt_android-key=' + (document.getElementById('fmt_android-key').checked ? '1' : '0');
|
||||
url += '&fmt_android-safetynet=' + (document.getElementById('fmt_android-safetynet').checked ? '1' : '0');
|
||||
url += '&fmt_apple=' + (document.getElementById('fmt_apple').checked ? '1' : '0');
|
||||
url += '&fmt_fido-u2f=' + (document.getElementById('fmt_fido-u2f').checked ? '1' : '0');
|
||||
url += '&fmt_none=' + (document.getElementById('fmt_none').checked ? '1' : '0');
|
||||
url += '&fmt_packed=' + (document.getElementById('fmt_packed').checked ? '1' : '0');
|
||||
url += '&fmt_tpm=' + (document.getElementById('fmt_tpm').checked ? '1' : '0');
|
||||
|
||||
url += '&rpId=' + encodeURIComponent(document.getElementById('rpId').value);
|
||||
|
||||
url += '&userId=' + encodeURIComponent(document.getElementById('userId').value);
|
||||
url += '&userName=' + encodeURIComponent(document.getElementById('userName').value);
|
||||
url += '&userDisplayName=' + encodeURIComponent(document.getElementById('userDisplayName').value);
|
||||
|
||||
if (document.getElementById('userVerification_required').checked) {
|
||||
url += '&userVerification=required';
|
||||
|
||||
} else if (document.getElementById('userVerification_preferred').checked) {
|
||||
url += '&userVerification=preferred';
|
||||
|
||||
} else if (document.getElementById('userVerification_discouraged').checked) {
|
||||
url += '&userVerification=discouraged';
|
||||
}
|
||||
|
||||
return url;
|
||||
}
|
||||
|
||||
function reloadServerPreview() {
|
||||
let iframe = document.getElementById('serverPreview');
|
||||
iframe.src = iframe.src;
|
||||
}
|
||||
|
||||
function setAttestation(attestation) {
|
||||
let inputEls = document.getElementsByTagName('input');
|
||||
for (const inputEl of inputEls) {
|
||||
if (inputEl.id && inputEl.id.match(/^(fmt|cert)\_/)) {
|
||||
inputEl.disabled = !attestation;
|
||||
}
|
||||
if (inputEl.id && inputEl.id.match(/^fmt\_/)) {
|
||||
inputEl.checked = attestation ? inputEl.id !== 'fmt_none' : inputEl.id === 'fmt_none';
|
||||
}
|
||||
if (inputEl.id && inputEl.id.match(/^cert\_/)) {
|
||||
inputEl.checked = attestation ? inputEl.id === 'cert_mds' : false;
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
* force https on load
|
||||
* @returns {undefined}
|
||||
*/
|
||||
window.onload = function() {
|
||||
if (location.protocol !== 'https:' && location.host !== 'localhost') {
|
||||
location.href = location.href.replace('http', 'https');
|
||||
}
|
||||
if (!document.getElementById('rpId').value) {
|
||||
document.getElementById('rpId').value = location.hostname;
|
||||
}
|
||||
|
||||
if (!document.getElementById('attestation_yes').checked) {
|
||||
setAttestation(false);
|
||||
}
|
||||
}
|
||||
|
||||
</script>
|
||||
<style>
|
||||
body {
|
||||
font-family:sans-serif;
|
||||
margin: 0 20px;
|
||||
padding: 0;
|
||||
}
|
||||
.splitter {
|
||||
display: flex;
|
||||
flex-direction: row;
|
||||
flex-wrap: wrap;
|
||||
margin: 0;
|
||||
padding: 0;
|
||||
}
|
||||
.splitter > .form {
|
||||
flex: 1;
|
||||
min-width: 600px;
|
||||
}
|
||||
.splitter > .serverPreview {
|
||||
width: 740px;
|
||||
min-height: 700px;
|
||||
margin: 0;
|
||||
padding: 0;
|
||||
border: 1px solid grey;
|
||||
display: flex;
|
||||
flex-direction: column;
|
||||
}
|
||||
|
||||
.splitter > .serverPreview iframe {
|
||||
width: 700px;
|
||||
flex: 1;
|
||||
border: 0;
|
||||
}
|
||||
|
||||
</style>
|
||||
</head>
|
||||
<body>
|
||||
<h1 style="margin: 40px 10px 2px 0;">lbuchs/WebAuthn</h1>
|
||||
<div style="font-style: italic;">A simple PHP WebAuthn (FIDO2) server library.</div>
|
||||
<div class="splitter">
|
||||
<div class="form">
|
||||
<div> </div>
|
||||
<div> </div>
|
||||
<div>Simple working demo for the <a href="https://github.com/lbuchs/WebAuthn">lbuchs/WebAuthn</a> library.</div>
|
||||
<div>
|
||||
<div> </div>
|
||||
<table>
|
||||
<tbody><tr>
|
||||
<td>
|
||||
<button type="button" onclick="createRegistration()">➕ new registration</button>
|
||||
</td>
|
||||
<td>
|
||||
<button type="button" onclick="checkRegistration()">❔ check registration</button>
|
||||
</td>
|
||||
<td>
|
||||
<button type="button" onclick="clearRegistration()">␡ clear all registrations</button>
|
||||
</td>
|
||||
</tr>
|
||||
</tbody>
|
||||
</table>
|
||||
<div> </div>
|
||||
|
||||
<div>
|
||||
<input type="checkbox" id="requireResidentKey" name="requireResidentKey">
|
||||
<label for="requireResidentKey">Use Client-side discoverable Credentials / Passkeys
|
||||
<i style="font-size: 0.8em;">Warning: most client-side modules and authenticators don't allow to delete single client side credentials.
|
||||
You have to reset the full device to remove the credentials again.</i>
|
||||
</label>
|
||||
</div>
|
||||
|
||||
<div> </div>
|
||||
<div style="font-weight: bold">Relying Party</div>
|
||||
<p style="margin:0 0 5px 0;font-size:0.9em;font-style: italic;">A valid domain string that identifies the
|
||||
WebAuthn Relying Party<br/>on whose behalf a given registration or authentication ceremony is being performed.</p>
|
||||
<div>
|
||||
<label for="rpId">RP ID:</label>
|
||||
<input type="text" id="rpId" name="rpId" value="">
|
||||
</div>
|
||||
|
||||
<div> </div>
|
||||
<div style="font-weight: bold">User</div>
|
||||
<div style="margin-bottom:12px">
|
||||
<label for="userId">User ID (Hex):</label>
|
||||
<input type="text" id="userId" name="userId" value="64656d6f64656d6f" required pattern="[0-9a-fA-F]{2,}">
|
||||
<i style="font-size: 0.8em;">You get the user ID back when checking registration (as userHandle), if you're using client-side discoverable credentials.
|
||||
You can identify with this ID the user who wants to login.
|
||||
A user handle is an opaque byte sequence with a maximum size of 64 bytes, and is not meant to be displayed to the user.
|
||||
The user handle MUST NOT contain personally identifying information about the user, such as a username or e-mail address.</i>
|
||||
</div>
|
||||
<div style="margin-bottom:12px">
|
||||
<label for="userName">User Name:</label>
|
||||
<input type="text" id="userName" name="userName" value="demo" required pattern="[0-9a-zA-Z]{2,}">
|
||||
<i style="font-size: 0.8em;">only for display, i.e., aiding the user in determining the difference between user accounts with similar display names.</i>
|
||||
</div>
|
||||
<div style="margin-bottom:6px">
|
||||
<label for="userDisplayName">User Display Name:</label>
|
||||
<input type="text" id="userDisplayName" name="userDisplayName" value="Demo Demolin" required>
|
||||
<i style="font-size: 0.8em;">A human-palatable name for the user account, intended only for display.</i>
|
||||
</div>
|
||||
|
||||
<div> </div>
|
||||
<div style="font-weight: bold">user verification</div>
|
||||
<div>
|
||||
<input type="radio" id="userVerification_required" name="userVerification">
|
||||
<label for="userVerification_required">required <i style="font-size: 0.8em;">User verification is required (e.g. by pin), the operation will fail if the response does not have the UV flag.</i></label>
|
||||
</div>
|
||||
|
||||
<div>
|
||||
<input type="radio" id="userVerification_preferred" name="userVerification">
|
||||
<label for="userVerification_preferred">preferred <i style="font-size: 0.8em;">user verification is prefered, the operation will not fail if the response does not have the UV flag.</i></label>
|
||||
</div>
|
||||
|
||||
<div>
|
||||
<input type="radio" id="userVerification_discouraged" name="userVerification" checked>
|
||||
<label for="userVerification_discouraged">discouraged <i style="font-size: 0.8em;">user verification should not be employed as to minimize the user interaction during the process.</i></label>
|
||||
</div>
|
||||
|
||||
<div> </div>
|
||||
<div style="font-weight: bold">type of authenticator</div>
|
||||
<div>
|
||||
<input type="checkbox" id="type_usb" name="type_usb" checked>
|
||||
<label for="type_usb">USB</label>
|
||||
</div>
|
||||
<div>
|
||||
<input type="checkbox" id="type_nfc" name="type_nfc" checked>
|
||||
<label for="type_nfc">NFC</label>
|
||||
</div>
|
||||
<div>
|
||||
<input type="checkbox" id="type_ble" name="type_ble" checked>
|
||||
<label for="type_ble">BLE</label>
|
||||
</div>
|
||||
<div>
|
||||
<input type="checkbox" id="type_hybrid" name="type_hybrid" checked>
|
||||
<label for="type_hybrid">hybrid <i style="font-size: 0.8em;">Passkeys via mobile device, ...</i></label>
|
||||
</div>
|
||||
<div>
|
||||
<input type="checkbox" id="type_int" name="type_int" checked>
|
||||
<label for="type_int">internal <i style="font-size: 0.8em;">Passkeys on the device, Windows Hello, Android SafetyNet, Apple, ...</i></label>
|
||||
</div>
|
||||
|
||||
<div> </div>
|
||||
<div style="font-weight: bold">attestation</div>
|
||||
<div>
|
||||
<input type="radio" id="attestation_yes" value="yes" name="attestation" onchange="setAttestation(this.value === 'yes')" checked>
|
||||
<label for="attestation_yes">yes</label>
|
||||
</div>
|
||||
<div>
|
||||
<input type="radio" id="attestation_no" value="no" name="attestation" onchange="setAttestation(this.value === 'yes')">
|
||||
<label for="attestation_no">no</label>
|
||||
</div>
|
||||
|
||||
<div> </div>
|
||||
<div style="font-weight: bold">attestation statement format</div>
|
||||
<div>
|
||||
<input type="checkbox" id="fmt_android-key" name="fmt_android-key" checked>
|
||||
<label for="fmt_android-key">android-key</label>
|
||||
</div>
|
||||
|
||||
<div>
|
||||
<input type="checkbox" id="fmt_android-safetynet" name="fmt_android-safetynet" checked>
|
||||
<label for="fmt_android-safetynet">android-safetynet</label>
|
||||
</div>
|
||||
|
||||
<div>
|
||||
<input type="checkbox" id="fmt_apple" name="fmt_apple" checked>
|
||||
<label for="fmt_apple">apple</label>
|
||||
</div>
|
||||
|
||||
<div>
|
||||
<input type="checkbox" id="fmt_fido-u2f" name="fmt_fido-u2f" checked>
|
||||
<label for="fmt_fido-u2f">fido-u2f</label>
|
||||
</div>
|
||||
|
||||
<div>
|
||||
<input type="checkbox" id="fmt_none" name="fmt_none">
|
||||
<label for="fmt_none">none</label>
|
||||
</div>
|
||||
|
||||
<div>
|
||||
<input type="checkbox" id="fmt_packed" name="fmt_packed" checked>
|
||||
<label for="fmt_packed">packed</label>
|
||||
</div>
|
||||
|
||||
<div>
|
||||
<input type="checkbox" id="fmt_tpm" name="fmt_tpm" checked>
|
||||
<label for="fmt_tpm">tpm</label>
|
||||
</div>
|
||||
|
||||
|
||||
<div> </div>
|
||||
<div style="font-weight: bold">attestation root certificates</div>
|
||||
|
||||
<div>
|
||||
<input type="checkbox" id="cert_mds" name="mds" checked>
|
||||
<label for="cert_mds">Accept keys signed by <a href="https://fidoalliance.org/metadata/" target="_blank">FIDO Alliance Metadata Service</a></label>
|
||||
</div>
|
||||
|
||||
<div>
|
||||
<input type="checkbox" id="cert_apple" name="apple">
|
||||
<label for="cert_apple">Accept keys signed by apple root ca</label>
|
||||
</div>
|
||||
|
||||
<div>
|
||||
<input type="checkbox" id="cert_yubico" name="yubico">
|
||||
<label for="cert_yubico">Accept keys signed by yubico root ca</label>
|
||||
</div>
|
||||
|
||||
<div>
|
||||
<input type="checkbox" id="cert_solo" name="solo">
|
||||
<label for="cert_solo">Accept keys signed by solokeys root ca</label>
|
||||
</div>
|
||||
|
||||
<div>
|
||||
<input type="checkbox" id="cert_hypersecu" name="hypersecu">
|
||||
<label for="cert_hypersecu">Accept keys signed by hypersecu root ca</label>
|
||||
</div>
|
||||
|
||||
<div>
|
||||
<input type="checkbox" id="cert_google" name="google">
|
||||
<label for="cert_google">Accept keys signed by google root ca</label>
|
||||
</div>
|
||||
|
||||
<div>
|
||||
<input type="checkbox" id="cert_microsoft" name="microsoft">
|
||||
<label for="cert_microsoft">Accept keys signed by Microsofts collection of trusted TPM root ca</label>
|
||||
</div>
|
||||
|
||||
<div style="font-size: 0.7em">(Nothing checked = accept all)</div>
|
||||
<div> </div>
|
||||
|
||||
<div>
|
||||
<button type="button" onclick="queryFidoMetaDataService()">🗘 update root certificates from FIDO Alliance Metadata Service (MDS)</button>
|
||||
</div>
|
||||
|
||||
<div> </div>
|
||||
<div>If you select a root ca, direct attestation is required to validate your client with the root.<br>
|
||||
The browser may warn you that he will provide informations about your device.<br>
|
||||
When not checking against any root ca (deselect all certificates),
|
||||
the client may change the assertion from the authenticator (for instance, using an anonymization CA),<br>
|
||||
the browser may not warn about providing informations about your device.
|
||||
</div>
|
||||
<div style="margin-top:20px;font-size: 0.7em;font-style: italic">
|
||||
Copyright © 2023 Lukas Buchs - <a href="https://raw.githubusercontent.com/lbuchs/WebAuthn/master/LICENSE">license therms</a>
|
||||
</div>
|
||||
|
||||
</div>
|
||||
</div>
|
||||
<div class="serverPreview">
|
||||
<p style="margin-left:10px;font-weight: bold;">Here you can see what's saved on the server:</p>
|
||||
<iframe src="server.php?fn=getStoredDataHtml" id="serverPreview"></iframe>
|
||||
</div>
|
||||
<div>
|
||||
</body>
|
||||
</html>
|
||||
</script>
|
||||
</body>
|
||||
</html>
|
||||
|
||||
Reference in New Issue
Block a user