fido2.ctap2.config
Classes
Implementation of the CTAP2.1 Authenticator Config API. |
Module Contents
- class fido2.ctap2.config.Config(ctap, pin_uv_protocol=None, pin_uv_token=None)[source]
Implementation of the CTAP2.1 Authenticator Config API.
- Parameters:
ctap (fido2.ctap2.base.Ctap2) – An instance of a CTAP2 object.
pin_uv_protocol (Optional[fido2.ctap2.pin.PinProtocol]) – An instance of a PinUvAuthProtocol.
pin_uv_token (Optional[bytes]) – A valid PIN/UV Auth Token for the current CTAP session.
- class CMD[source]
Bases:
enum.IntEnum
Enum where members are also (and must be) ints
- ENABLE_ENTERPRISE_ATT = 1
- TOGGLE_ALWAYS_UV = 2
- SET_MIN_PIN_LENGTH = 3
- VENDOR_PROTOTYPE = 255
- class PARAM[source]
Bases:
enum.IntEnum
Enum where members are also (and must be) ints
- NEW_MIN_PIN_LENGTH = 1
- MIN_PIN_LENGTH_RPIDS = 2
- FORCE_CHANGE_PIN = 3
- static is_supported(info)[source]
- Parameters:
info (fido2.ctap2.base.Info)
- Return type:
- ctap
- pin_uv
- enable_enterprise_attestation()[source]
Enables Enterprise Attestation.
If already enabled, this command is ignored.
- Return type:
None
- toggle_always_uv()[source]
Toggle the alwaysUV setting.
When true, the Authenticator always requires UV for credential assertion.
- Return type:
None
- set_min_pin_length(min_pin_length=None, rp_ids=None, force_change_pin=False)[source]
Set the minimum PIN length allowed when setting/changing the PIN.
- Parameters:
min_pin_length (Optional[int]) – The minimum PIN length the Authenticator should allow.
rp_ids (Optional[List[str]]) – A list of RP IDs which should be allowed to get the current minimum PIN length.
force_change_pin (bool) – True if the Authenticator should enforce changing the PIN before the next use.
- Return type:
None