Identity backed by FIDO2 authenticator. #4324
Replies: 2 comments 1 reply
-
As far as I know, it is not possible (at the SDK level) for FIDO2 to be used. It produces signatures in a specific format which the IC will not accept, unlike PKCS#11 which can produce any signature. If you have a Yubikey you want to use, the PKCS#11 HSM flow should work with it using ykcs11 or OpenSC. |
Beta Was this translation helpful? Give feedback.
-
@adamspofford-dfinity
And Yubikeys support COSE Algorithms Identifier -7, which I guess is the same algorithm used by the IC interface specs. Can you elaborate more on that, whether this is a SDK's limitation or the IC limitation itself? |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
Is anyone interested in supporting identities backed by FIDO2 authenticators, like a YubiKey?
OpenSSH
version 8.2 and newer support using security keys for authentication. This provides robust security, especially when working on a machine that you can't fully trust.It also comes with some drawbacks:
USB
transport is widely supported.BLE
andNFC
often present integration challenges.I see that the SDK supports
Hardware Security Modules
(HSMs), but the usage flow isn't as straightforward as the FIDO2 standard.This new type of identity could be a new storage mode. (
--storage-mode=fido2
)Let me know what you all think. I'm willing to help with this feature's development.
Beta Was this translation helpful? Give feedback.
All reactions