Coder Social home page Coder Social logo

herrjemand / awesome-webauthn Goto Github PK

View Code? Open in Web Editor NEW
1.4K 49.0 113.0 159 KB

🔐 A curated list of awesome WebAuthn and Passkey resources

Home Page: https://bit.ly/AwesomeWebAuthn

License: Creative Commons Zero v1.0 Universal

awesome-list awesome webauthn fido2 authentication passkey passkeys passkeys-demo

awesome-webauthn's Introduction

🔐 WebAuthn Awesome Awesome

Curated list of tools and projects related to WebAuthn and Passkeys

WebAuthn is a W3C standard that allows users to authenticate to websites using their preferred device. WebAuthn is supported by most browsers and platforms, and can be used with FIDO2, CTAP, U2F, and other devices.

Passkey is an umbrella term that basically means FIDO.

Contributions welcome. Add links through pull requests or create an issue to start a discussion. Please read the contribution guidelines before contributing.

Contents

Demos

Server Libraries

Client Libraries

Software Authenticators

Hardware Authenticators

  • FIDO CERTIFIED™ SoloKeys - Solo is an open source FIDO2 security key, and you can get one at https://solokeys.com.
  • FIDO CONFORMANT Conor Patrick: U2F Zero - U2F Zero is an open source U2F token for 2 factor authentication.
  • Trezor - Trezor is an open source hardware wallet with FIDO/U2F and FIDO2/WebAuthn functionality.
  • Google: OpenSK - OpenSK is an open-source implementation for security keys written in Rust that supports both FIDO U2F and FIDO2 standards.
  • Nitrokey - Nitrokey is developing/producing different types of open source and open hardware FIDO2 security keys (check for the "Nitrokey FIDO2" and "Nitrokey 3" related repositories).
  • BryanJacobs: FIDO2Applet - FIDO2 CTAP2 Javacard Applet.
  • darconeous: u2f-javacard - A privacy-focused Java Card U2F Authenticator based on ledger-u2f-javacard (More recent fork of Ledger).

Dev tools

  • Shane B Weeden: FIDO2 Postman Clients - FIDO2 Postman clients to easily test your FIDO2 API endpoints.
  • MasterKale: WebAuthn Previewer - A simple website for previewing WebAuthn attestations and assertions.
  • Firstyear: Webauthn RS compatability tester - A webauthn device and browser stress tester that can identify flaws in implementations and has already found bugs in Firefox, Safari, Android and more.
  • Descope: VirtualWebAuthn Test Tool - A GO package to automate testing of a relying party WebAuthn server implementation without requiring a browser or an actual authenticator.
  • FIDO MDS Explorer - A user-friendly web UI to explore the FIDO Metadata Service repository, which contains detailed characteristics and attestation certificates of authenticators registered to the FIDO Alliance.
  • WebAuthn Playground - A web page (no server) to test WebAuthn operations with configurable parameters, and view/parse responses.

Tutorials

Articles

Slides

Books

Other

FAQ

What is FIDO CERTIFIED™?

FIDO CERTIFIED means that implementation has passed FIDO conformance tools, passed interoperability even, and has achieved official FIDO Alliance certification. A registered FIDO Alliance Trademark.

What is FIDO CONFORMANT?

FIDO CONFORMANT means that implementation has passed FIDO conformance tools (as reported by the author), thus can claim that it is conformant with FIDO2 specifications. If you want to get access to the conformance tools, you can do it here https://fidoalliance.org/certification/functional-certification/conformance/. If you have passed conformance tools, send me a DM or a tweet @herrjemand with a screenshot of passing the tests.

FIDO2 or WebAuthn?

FIDO2 is the name of the standard. WebAuthn is just browser JS API to talk to the authenticators. So correct way to call your server is "FIDO2 Server" and to say "Authentication with FIDO2".

I would like to advertise my company product here!

Please don't. The advertisement you can get is by writing a good, deep, technical article, or open sourcing your server or/and tools is much better for you, than cheap show off. People will buy your company product if you show them that you know what you are doing.

Otherwise we have strict no ads policy. We will only link to open source repos and actual articles. No company websites.

awesome-webauthn's People

Contributors

agektmr avatar aseigler avatar bdewater avatar bodik avatar dagnelies avatar e3b0c442 avatar elevenfive avatar elukewalker avatar harhitosw avatar inabajunmr avatar irew avatar ken5scal avatar kj84park avatar lurueger avatar madwizard-thomas avatar mark-robustelli avatar masterkale avatar meirwah avatar obsti8383 avatar opotonniee avatar pmlopes avatar prusnak avatar reynir avatar spomky avatar timbru31 avatar vanbukin avatar vincentdelitz avatar xarenard avatar yackermann avatar ynojima avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

awesome-webauthn's Issues

Add OpenAPI spec

Hi! Not a request but more of a todo list item for me. I have a fully conformant OpenAPI spec for WebAuthn painstakingly copied from the official specification. I'm keen to pull this out into its own resource so it can be valuable for others to use. Let me know if that would be useful and I can get it up into a standalone repo and maybe linked here in the coming weeks.

The WebAuthn API spec itself is buried inside the Storyden API spec for anyone who finds this via Google search: https://github.com/Southclaws/storyden/blob/main/api/openapi.yaml#L1107-L1333

go: duo webauthn natural successor

Hey there! The library github.com/duo-labs/webauthn has been archived (see here) and replaced by github.com/go-webauthn/webauthn. I am the principal maintainer of this org. With the help of several users this library now supports MDS3 (original only supports MDS2).

It should theoretically be as conformant as the original as it's a direct fork with mostly bug fixes and sensible feature additions, though we have not expressly completed any conformance testing.

How would you like to proceed with this? Would you like me to mark the original as deprecated (and how would you like this to appear) and add github.com/go-webauthn/webauthn under it as conformant or not mark it as such until we've completed formal conformance testing? Or do you want to handle this yourself?

Secure Payment Confirmation

fido-pay-li
Yuriy, you need to add https://github.com/rsolomakhin/secure-payment-confirmation to your list of awesome webauthn stuff since it is targeted to be the future for secure on-line payments.

Personally I believe this is giant mistake created by a very small group of people but since it is powered by Google this is probably = FIDO, right? I'm not aware of any other payment effort that are betting on 3DS/step-up authentication.

As you probably know EMV cards is the only real standard for secure payments. However, EMV never made it on the Web (except by keying in card numbers...). Therefore my suggestion is simply to create a Web-adapted version of EMV that unlike EMV also can work with most other payment networks including the EURO-zone's SEPA. That is, the proposed system is even more universal than EMV. The concept has been extensively tested but not with FIDO because that requires browser support.

Updates about the software authenticator mentioned in curated list

Software authenticator mentioned in the repository does not work to date

Hello @herrjemand , I have been trying to use the Damian Czaja: android-webauthn-token BLE authenticator mobile app , it does not work in any Android 11 or above platform , the Google Chrome Browser in the Mobile Phone works fine and helps in passwordless-logins to any websites . I also built the app on my Physical Device(based on Android 13) and tried using app to login but it didn't simply work . Just informing you as I feel that this app is trivial till date .

Hardware devices missing...

The section on hardware authenticators is quite empty

Basically everything Feitian, OnlyKey, Hapersecu, the Yubi stuff and similar things are missing. Not to talk about all the obscure Chinese "works but nobody can tell you how safe they are" USB devices.

Add passkeys.com

Hi, I have a very helpful passkeys resource to add: passkeys.com.
The only passkeys online debugger I know, and out of the box examples for quick start with passkeys implementation.
I opened a PR for it -
#81

WebAuthn.Net - open source .NET server library

My team and I have developed the WebAuthn.Net library for the .NET ecosystem.
It is open source under the MIT license and serves as an alternative to fido2-net-lib.
Our library passes all FIDO2 Server - MDS3 Tests (including all optional parameters) in the FIDO Conformance Tool 1.7.17.
We have submitted the test results using this tool.
The library includes a demonstration host and instructions on how to perform similar tests independently (if someone does not trust our results, they can perform a similar verification on their own).

I would like to know how we can be included in the Server Libraries list, and is there anything else we need to do for our library to be marked as FIDO CONFORMANT in this list?
Is it enough to make a PR to this repository, or are there any additional verification steps required?

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.