fido2.ctap2.config

Classes

Config

Implementation of the CTAP2.1 Authenticator Config API.

Module Contents

class fido2.ctap2.config.Config(ctap, pin_uv_protocol=None, pin_uv_token=None)[source]

Implementation of the CTAP2.1 Authenticator Config API.

Parameters:
class CMD[source]

Bases: enum.IntEnum

Enum where members are also (and must be) ints

ENABLE_ENTERPRISE_ATT = 1
TOGGLE_ALWAYS_UV = 2
SET_MIN_PIN_LENGTH = 3
VENDOR_PROTOTYPE = 255
class PARAM[source]

Bases: enum.IntEnum

Enum where members are also (and must be) ints

NEW_MIN_PIN_LENGTH = 1
MIN_PIN_LENGTH_RPIDS = 2
FORCE_CHANGE_PIN = 3
static is_supported(info)[source]
Parameters:

info (fido2.ctap2.base.Info)

Return type:

bool

ctap
pin_uv
enable_enterprise_attestation()[source]

Enables Enterprise Attestation.

If already enabled, this command is ignored.

Return type:

None

toggle_always_uv()[source]

Toggle the alwaysUV setting.

When true, the Authenticator always requires UV for credential assertion.

Return type:

None

set_min_pin_length(min_pin_length=None, rp_ids=None, force_change_pin=False)[source]

Set the minimum PIN length allowed when setting/changing the PIN.

Parameters:
  • min_pin_length (Optional[int]) – The minimum PIN length the Authenticator should allow.

  • rp_ids (Optional[List[str]]) – A list of RP IDs which should be allowed to get the current minimum PIN length.

  • force_change_pin (bool) – True if the Authenticator should enforce changing the PIN before the next use.

Return type:

None