@nevis-security/nevis-mobile-authentication-sdk-react
Version:
React Native plugin for Nevis Mobile Authentication SDK. Supports only mobile.
310 lines • 14.8 kB
TypeScript
/**
* Copyright © 2023-2024 Nevis Security AG. All rights reserved.
*/
import { HttpOperation, HttpOperationImpl } from './HttpOperation';
import type { PasswordEnroller } from './password/PasswordEnroller';
import type { PinEnroller } from './pin/PinEnroller';
import type { AuthenticatorSelector } from './selection/AuthenticatorSelector';
import type { BiometricUserVerifier } from './userverification/BiometricUserVerifier';
import type { DevicePasscodeUserVerifier } from './userverification/DevicePasscodeUserVerifier';
import type { FingerprintUserVerifier } from './userverification/FingerprintUserVerifier';
import { AuthorizationProvider } from '../authorization/AuthorizationProvider';
import { OperationError } from '../error/operation/OperationError';
import { DeviceInformation } from '../localData/DeviceInformation';
/**
* The object that can be used to trigger a registration operation.
*
* Usage example:
* ```ts
* class AuthenticatorSelectorImpl extends AuthenticatorSelector {
* async selectAuthenticator(
* context: AuthenticatorSelectionContext,
* handler: AuthenticatorSelectionHandler
* ): Promise<void> {
* await handler.aaid(aaid).catch(console.error);
* }
* }
*
* class BiometricUserVerifierImpl extends BiometricUserVerifier {
* async verifyBiometric(
* context: BiometricUserVerificationContext,
* handler: BiometricUserVerificationHandler
* ): Promise<void> {
* await handler
* .listenForOsCredentials(
* BiometricPromptOptions.create(
* 'Biometric authentication required',
* 'Cancel',
* 'Please identify yourself.'
* )
* )
* .catch(console.error);
* }
* }
*
* async register(
* client: MobileAuthenticationClient,
* username: string,
* deviceInformation: DeviceInformation
* ): Promise<void> {
* await client.operations.registration
* .username(username)
* .deviceInformation(deviceInformation)
* .authenticatorSelector(new AuthenticatorSelectorImpl())
* .biometricUserVerifier(new BiometricUserVerifierImpl())
* .onSuccess(() => {
* // handle success
* })
* .onError((_error) => {
* // handle error
* })
* .execute();
* }
* ```
*
* The biometric, device passcode and fingerprint authenticators are enrolled at the OS level. That is why,
* if one of them must be registered, the user must authenticate through {@link BiometricUserVerifier},
* {@link DevicePasscodeUserVerifier} or {@link FingerprintUserVerifier}.
* In the case of the PIN and password, the credentials are enrolled during
* registration, so no authentication is needed.
*
* @see {@link Operations.registration}
*/
export declare abstract class Registration extends HttpOperation<Registration> {
/**
* Specifies the username that must be used to register.
*
* **IMPORTANT** \
* Providing the username is required.
*
* **WARNING** \
* The username is the technical user identifier defined by the relaying party.
* Do not provide the login identifier (for example the users e-mail address) here.
*
* @param username the username.
* @returns a {@link Registration} object.
*/
abstract username(username: string): Registration;
/**
* Specifies the base URL of the server where the registration should be made.
*
* **NOTE** \
* If no server base URL is provided, then the base URL defined in {@link ConfigurationBuilder.baseUrl}
* will be used.
*
* **IMPORTANT** \
* It is assumed that all the servers have the same endpoints, thus only the scheme, hostname and
* port of the URL will be taken into account.
*
* Examples of base URL resolution in registration:
* | Configuration base URL | Provided server URL in Registration | Resulting Server URL |
* | --- | --- | --- |
* | https://server/path | https://other.server | https://other.server/path |
* | https://server:443/path | https://other.server/path | https://other.server/path |
* | https://server/path | http://other.server:80/otherpath | http://other.server:80/path |
*
* @param serverUrl the server URL.
* @returns a {@link Registration} object.
*/
abstract serverUrl(serverUrl: string): Registration;
/**
* Specifies the device information to be used.
*
* The {@link DeviceInformation} is required only if you require support for encrypted out-of-band
* payloads or push notifications. If a {@link DeviceInformation} was already provided in an
* existing registration, the provided value will be ignored.
*
* @param deviceInformation the device information.
* @returns a {@link Registration} object.
*/
abstract deviceInformation(deviceInformation: DeviceInformation): Registration;
/**
* Specifies the authorization provider that must be used to register the authenticator.
*
* @param authorizationProvider the {@link AuthorizationProvider}.
* @returns a {@link Registration} object.
*/
abstract authorizationProvider(authorizationProvider: AuthorizationProvider): Registration;
/**
* Specifies whether [Class 2 (formerly weak)](https://source.android.com/docs/security/features/biometric/measure#biometric-classes)
* biometric sensors are allowed if the biometric authenticator is selected.
*
* **IMPORTANT** \
* This method is Android specific and will be ignored on iOS platform.
*
* By default, the SDK will only allow to use Class 3 (formerly strong) sensors. Using Class 2
* sensors is less secure and discouraged. When a Class 2 sensor is used, the FIDO UAF keys are
* not protected by the operating system by requiring user authentication.
*
* If the SDK detects that only Class 3 (strong) biometric sensors are available in the mobile
* device, even if Class 2 sensors are allowed, the FIDO UAF credentials will be protected by
* the operating system by requiring user authentication.
*
* However, in some cases it may be acceptable for the sake of end-user convenience. Allowing
* Class 2 sensors will enable for instance the use of face recognition in some Samsung devices.
*
* @param allowClass2AndroidSensors specifies whether Class 2 biometric sensors are allowed if
* the biometric authenticator is selected.
* @returns a {@link Registration} object.
*/
abstract allowClass2AndroidSensors(allowClass2AndroidSensors: boolean): Registration;
/**
* Specifies whether the OS device passcode can be used as fallback during biometric authentication.
*
* If not specified, the device passcode cannot be used as fallback.
*
* @param allowDevicePasscodeAsFallback indicates whether the device passcode can be used as fallback.
* @returns a {@link Registration} object.
*/
abstract allowDevicePasscodeAsFallback(allowDevicePasscodeAsFallback: boolean): Registration;
/**
* Specifies whether the authenticator must be invalidated if the user adds new biometric
* credentials in the OS settings. If the authenticator has been invalidated, and you try to
* authenticate with it, an error with code {@link FidoErrorCodeType.KeyDisappearedPermanently}
* will be returned by the authentication operation.
*
* This setting only applies to biometric {@link Aaid.BIOMETRIC} and fingerprint {@link Aaid.FINGERPRINT}
* authenticators.
* By setting this parameter to `true`, you increase the security but there is a loss of
* convenience: adding a new OS biometric credential does not imply necessarily that there is a
* security risk, but if the end-user does it, a new registration will be required, because an
* invalidated authenticator cannot be recovered.
*
* If not specified, the authenticator will be invalidated when the user adds a new biometric
* credential in the OS settings.
*
* @param invalidateOnNewOsBiometrics indicates whether an addition of biometric credentials in
* the OS should invalidate this authenticator.
* @returns a {@link Registration} object.
*/
abstract invalidateOnNewOsBiometrics(invalidateOnNewOsBiometrics: boolean): Registration;
/**
* Specifies the object that will take care of the selection of the authenticator to be used.
*
* **IMPORTANT** \
* Providing the authenticator selector is required.
*
* @param authenticatorSelector the {@link AuthenticatorSelector}.
* @returns a {@link Registration} object.
*/
abstract authenticatorSelector(authenticatorSelector: AuthenticatorSelector): Registration;
/**
* Specifies the object that will take care of enrolling the PIN of the authenticator.
* It must be provided only if a PIN authenticator must be registered.
*
* **IMPORTANT** \
* Providing at least one of the {@link PinEnroller},{@link PasswordEnroller},
* {@link BiometricUserVerifier}, {@link DevicePasscodeUserVerifier} or {@link FingerprintUserVerifier}
* is required.
*
* @param pinEnroller the {@link PinEnroller}.
* @returns a {@link Registration} object.
*/
abstract pinEnroller(pinEnroller: PinEnroller): Registration;
/**
* Specifies the object that will take care of enrolling the password of the authenticator.
* It must be provided only if a password authenticator must be registered.
*
* **IMPORTANT** \
* Providing at least one of the {@link PinEnroller},{@link PasswordEnroller},
* {@link BiometricUserVerifier}, {@link DevicePasscodeUserVerifier} or {@link FingerprintUserVerifier}
* is required.
*
* @param passwordEnroller the {@link PasswordEnroller}.
* @returns a {@link Registration} object.
*/
abstract passwordEnroller(passwordEnroller: PasswordEnroller): Registration;
/**
* Specifies the object that will take care of the biometric user verification.
* It must be provided only if a biometric authenticator must be registered.
*
* **IMPORTANT** \
* Providing at least one of the {@link PinEnroller},{@link PasswordEnroller},
* {@link BiometricUserVerifier}, {@link DevicePasscodeUserVerifier} or {@link FingerprintUserVerifier}
* is required.
*
* @param biometricUserVerifier the {@link BiometricUserVerifier}.
* @returns a {@link Registration} object.
*/
abstract biometricUserVerifier(biometricUserVerifier: BiometricUserVerifier): Registration;
/**
* Specifies the object that will take care of the device passcode user verification.
* It must be provided only if a device passcode authenticator must be registered.
*
* **IMPORTANT** \
* Providing at least one of the {@link PinEnroller},{@link PasswordEnroller},
* {@link BiometricUserVerifier}, {@link DevicePasscodeUserVerifier} or {@link FingerprintUserVerifier}
* is required.
*
* @param devicePasscodeUserVerifier the {@link DevicePasscodeUserVerifier}.
* @returns a {@link Registration} object.
*/
abstract devicePasscodeUserVerifier(devicePasscodeUserVerifier: DevicePasscodeUserVerifier): Registration;
/**
* Specifies the object that will take care of the fingerprint user verification.
* It must be provided only if a fingerprint authenticator must be registered.
*
* **IMPORTANT** \
* Providing at least one of the {@link PinEnroller},{@link PasswordEnroller},
* {@link BiometricUserVerifier}, {@link DevicePasscodeUserVerifier} or {@link FingerprintUserVerifier}
* is required.
*
* @param fingerprintUserVerifier the {@link FingerprintUserVerifier}.
* @returns a {@link Registration} object.
*/
abstract fingerprintUserVerifier(fingerprintUserVerifier: FingerprintUserVerifier): Registration;
/**
* Specifies the object that will be invoked if the registration completed successfully.
*
* **IMPORTANT** \
* Providing the {@link onSuccess} is required.
*
* @param onSuccess the callback which is invoked on successful registration.
* @returns a {@link Registration} object.
*/
abstract onSuccess(onSuccess: () => void): Registration;
/**
* Specifies the object that will be invoked if the registration failed.
*
* **IMPORTANT** \
* Providing the {@link onError} is required.
*
* @param onError the callback which receives an {@link OperationError}.
* @returns a {@link Registration} object.
*/
abstract onError(onError: (error: OperationError) => void): Registration;
}
export declare class RegistrationImpl extends HttpOperationImpl<Registration> implements Registration {
private _username?;
private _serverUrl?;
private _deviceInformation?;
private _authorizationProvider?;
private _allowClass2AndroidSensors?;
private _allowDevicePasscodeAsFallback?;
private _invalidateOnNewOsBiometrics?;
private _authenticatorSelector?;
private _pinEnroller?;
private _passwordEnroller?;
private _biometricUserVerifier?;
private _devicePasscodeUserVerifier?;
private _fingerprintUserVerifier?;
private _onSuccess?;
private _onError?;
username(username: string): Registration;
serverUrl(serverUrl: string): Registration;
deviceInformation(deviceInformation: DeviceInformation): Registration;
authorizationProvider(authorizationProvider: AuthorizationProvider): Registration;
allowClass2AndroidSensors(allowClass2AndroidSensors: boolean): Registration;
allowDevicePasscodeAsFallback(allowDevicePasscodeAsFallback: boolean): Registration;
invalidateOnNewOsBiometrics(invalidateOnNewOsBiometrics: boolean): Registration;
authenticatorSelector(authenticatorSelector: AuthenticatorSelector): Registration;
pinEnroller(pinEnroller: PinEnroller): Registration;
passwordEnroller(passwordEnroller: PasswordEnroller): Registration;
biometricUserVerifier(biometricUserVerifier: BiometricUserVerifier): Registration;
devicePasscodeUserVerifier(devicePasscodeUserVerifier: DevicePasscodeUserVerifier): Registration;
fingerprintUserVerifier(fingerprintUserVerifier: FingerprintUserVerifier): Registration;
onSuccess(onSuccess: () => void): Registration;
onError(onError: (error: OperationError) => void): Registration;
execute(): Promise<void>;
}
//# sourceMappingURL=Registration.d.ts.map