User Activity

  • Posted a comment on discussion General Discussion on StrongKey FIDO Server (SKFS)

    I'm sorry if SACL documentation did not make it clear, Struan; we will strive to improve it so others do not have to struggle with it as you did if FIDO security policies do not need such high levels of assurance. On 10/15/24 5:38 PM, Struan Henderson wrote: Yes, thank you for clarifying. I didn't fully appreciate that. We expected to be able to enforce attestation on all Android Devices, but seeing a significant number of devices seemingly unable to provide attestation due to the issue I included...

  • Posted a comment on discussion General Discussion on StrongKey FIDO Server (SKFS)

    Struan, If the device does not support AndroidKeystore attestation, the implication is that the device cannot be trusted to the extent SACL enables - the first line in the image of the message says it all. The whole point of using SACL is to leverage hardware-based protection with an attestation from the manufacturer of the device, so the business application can mitigate risks. If your business requirement is OK without any attestation for a registration, why use SACL at all? You could simply use...

  • Posted a comment on discussion General Discussion on StrongKey FIDO Server (SKFS)

    Hi Struan, Need to look into this. Will need to figure out if we have those specific devices with those versions of the OS. Give us until next week please. Thanks.

  • Created ticket #26054 on SourceForge Support

    Support for FIDO2 Security Keys

  • Posted a comment on discussion General Discussion on StrongKey FIDO Server (SKFS)

    Depends on what kind of code Keycloak supports for the "custom authenticator". If it supports redirects, then what you've desribed should be possible. Given that SKFS always responds with messages indicating success (or failure), your demo app should be able to tell Keycloak what happened (and provide proof of that with the JWT or SAML token signed by SKFS, if necessary). However, in the long run, my recommendation is to derisk your FIDO deployment environment and consider using the built-in IDP...

  • Posted a comment on discussion General Discussion on StrongKey FIDO Server (SKFS)

    This is more than likely Keycloak's policy for its own FIDO2 service implementation. Since the StrongKey FIDO Server (SKFS) requires a web-application (or an IAM system like Keycloak) to call explicit webservices on SKFS, it is highly unlikely that they have implemented something for SKFS. (There is another discussion on this topic at https://github.com/keycloak/keycloak/discussions/23101). You might want to ask the current developers from Keycloak if they know of any implementations that connect...

  • Posted a comment on discussion General Discussion on StrongKey FIDO Server (SKFS)

    If you are using strongkey.com FQDNs inside your network, then make sure that all the computers that need to communicate with the hosts that have strongkey.com FQDN have the IP address as well as the FQDN defined in their etc/hosts file. If you do not have that, then they will attempt to reach the internet through DNS to talk to the real strongkey.com hosts (if the FQDN exists).

  • Modified a comment on discussion General Discussion on StrongKey FIDO Server (SKFS)

    Hi, I have deployed the test application on a ubuntu which have the fqdn "fido2tutorial.strongkey.com" and i have deployed the SKFS on centos which have the fqdn "technometrics.ddns.net" adn the RPID is "strongkey.com" i am accessing the website from a different computer which is on the network and it is a windows pc. and the PEM key im using is the one that comes with the prefido test application im pasting the key.pem file below Paste your CERTIFICATE here, Ashfaqur - not your PRIVATE KEY

View All

Personal Data

Username:
arshadnoor
Joined:
2006-07-27 13:50:29
Location:
United States / PDT
Gender:
Male

Projects

This is a list of open source software projects that Arshad Noor is associated with:

  • CSRTool   Last Updated:
  • StrongKey   Last Updated:
  • Project Logo StrongKey CryptoCabinet FIDO-enabled, cloud file encryption with centralized key management. Last Updated:
  • Project Logo StrongKey CryptoEngine FIDO strong authentication, encryption, digital signature engine Last Updated:
  • Project Logo StrongKey FIDO Server (SKFS) FIDO® Certified StrongKey FIDO Server (SKFS) Last Updated:

Personal Tools