Class AssertionExtensionInputs.AssertionExtensionInputsBuilder
- Enclosing class:
- AssertionExtensionInputs
-
Method Summary
Modifier and TypeMethodDescriptionThe input to the FIDO AppID Extension (appid
).The input to the FIDO AppID Extension (appid
).build()
Enable the Large blob storage extension (largeBlob
).Enable the Pseudo-random function extension (prf
).toString()
uvm()
Enable the User Verification Method Extension (uvm
).
-
Method Details
-
appid
public AssertionExtensionInputs.AssertionExtensionInputsBuilder appid(@NonNull @NonNull Optional<AppId> appid) The input to the FIDO AppID Extension (appid
).You usually do not need to call this method explicitly; if
RelyingParty.getAppId()
is present, thenRelyingParty.startAssertion(StartAssertionOptions)
will enable this extension automatically.This extension allows WebAuthn Relying Parties that have previously registered a credential using the legacy FIDO JavaScript APIs to request an assertion. The FIDO APIs use an alternative identifier for Relying Parties called an AppID, and any credentials created using those APIs will be scoped to that identifier. Without this extension, they would need to be re-registered in order to be scoped to an RP ID.
This extension does not allow FIDO-compatible credentials to be created. Thus, credentials created with WebAuthn are not backwards compatible with the FIDO JavaScript APIs.
- See Also:
-
appid
The input to the FIDO AppID Extension (appid
).You usually do not need to call this method explicitly; if
RelyingParty.getAppId()
is present, thenRelyingParty.startAssertion(StartAssertionOptions)
will enable this extension automatically.This extension allows WebAuthn Relying Parties that have previously registered a credential using the legacy FIDO JavaScript APIs to request an assertion. The FIDO APIs use an alternative identifier for Relying Parties called an AppID, and any credentials created using those APIs will be scoped to that identifier. Without this extension, they would need to be re-registered in order to be scoped to an RP ID.
This extension does not allow FIDO-compatible credentials to be created. Thus, credentials created with WebAuthn are not backwards compatible with the FIDO JavaScript APIs.
- See Also:
-
largeBlob
public AssertionExtensionInputs.AssertionExtensionInputsBuilder largeBlob(Extensions.LargeBlob.LargeBlobAuthenticationInput largeBlob) Enable the Large blob storage extension (largeBlob
).Suitable arguments can be obtained using
Extensions.LargeBlob.LargeBlobAuthenticationInput.read()
orExtensions.LargeBlob.LargeBlobAuthenticationInput.write(ByteArray)
. -
prf
public AssertionExtensionInputs.AssertionExtensionInputsBuilder prf(Extensions.Prf.PrfAuthenticationInput prf) Enable the Pseudo-random function extension (prf
).This extension allows a Relying Party to evaluate outputs from a pseudo-random function (PRF) associated with a credential.
Use the
Extensions.Prf.PrfAuthenticationInput
factory functions to construct the argument:- Use
Extensions.Prf.PrfAuthenticationInput.eval(Extensions.Prf.PrfValues)
to use the same PRF input for all credentials. - Use
Extensions.Prf.PrfAuthenticationInput.evalByCredential(Map)
to use different PRF inputs for different credentials. - Use
Extensions.Prf.PrfAuthenticationInput.evalByCredentialWithFallback(Map, Extensions.Prf.PrfValues)
to use different PRF inputs for different credentials, but with a "fallback" input for credentials without their own input.
- Use
-
uvm
Enable the User Verification Method Extension (uvm
). -
build
-
toString
-