Skip to content

Commit

Permalink
added description of param mapping
Browse files Browse the repository at this point in the history
  • Loading branch information
rlin1 committed May 29, 2017
1 parent c7eee4a commit 2d5252f
Showing 1 changed file with 18 additions and 5 deletions.
23 changes: 18 additions & 5 deletions index.bs
Original file line number Diff line number Diff line change
Expand Up @@ -1540,11 +1540,17 @@ If the user refuses consent, the authenticator returns an appropriate error stat
</dd>
<dt>"public-key-uaf"</dt>
<dd>
Follow the procedure as specified in [[FIDO-UAF-Authenticator-Commands]] section 6.3.
On successful completion, the [=authenticator=] returns to the user agent:
- The identifier of the credential used to generate the signature.
- binary authenticator generated data according to the structure as specified in [[FIDO-UAF-Authenticator-Commands]] section 5.2.2.
- The assertion signature.
- Follow the procedure as specified in [[FIDO-UAF-Authenticator-Commands]] section 6.3. Using
* The caller's RP ID as "AppID"
* The [=hash of the serialized client data=] as "Final Challenge Hash".
* If present: The content of extension txAuthSimple (i.e. the string) or txAuthGeneric (i.e. the content bytes) as "Transaction Content".
* If a list of credentials acceptable to the [=[RP]=] was provided: Provide each {{PublicKeyCredential/rawId}} as "KeyHandle". If an empty list was provided do not provide any "KeyHandle".
* Provide a "KHAccessToken" as described in section 6.1. in [[FIDO-UAF-ASM]].
* Provide no "UserVerificationToken".
- On successful completion, the [=authenticator=] returns to the user agent:
* The identifier of the credential used to generate the signature.
* binary authenticator generated data according to the structure as specified in [[FIDO-UAF-Authenticator-Commands]] section 5.2.2.
* The assertion signature.

If the [=authenticator=] cannot find any credential corresponding to the specified [RP] that matches the specified criteria, it
terminates the operation and returns an error.
Expand Down Expand Up @@ -3451,6 +3457,13 @@ Axel Nennker, Kimberly Paulhamus, Adam Powers, Yaron Sheffer, Mike West, Jeffrey
"status": "FIDO Alliance Implementation Draft"
},

"FIDO-UAF-ASM": {
"authors": ["R. Lindemann", "J. Kemp", "D. Baghdasaryan", "B. Hill", "R. Sasson", "J. Hodges", "K. Yang"],
"title": "FIDO UAF Authenticator-Specific Module API",
"href": "https://fidoalliance.org/specs/fido-uaf-v1.1-id-20170202/fido-uaf-asm-api-v1.1-id-20170202.html",
"status": "FIDO Alliance Implementation Draft"
},

"FIDO-UAF-Protocol": {
"authors": ["R. Lindemann", "E. Tiffany", "D. Baghdasaryan", "D. Balfanz", "B. Hill", "J. Hodges", "K. Yang"],
"title": "FIDO UAF Protocol",
Expand Down

0 comments on commit 2d5252f

Please sign in to comment.