Product Documents and Release Notes

The following are required to successfully use the FIDO2 server:

  • A FIDO® Certified U2F Authenticator; check this list for vendors of compatible FIDO2 devices
  • browser release that supports the WebAuthn protocol
  • A computer with Microsoft Windows, macOS, or CentOS Linux installed

Linux Users

Linux PCs require the following task to be completed before beginning the demo:

  1. Using sudomodify the /etc/udev/rules.d/70-u2f.rules file. If it doesn't already exist, create it.
  2. Add the following text to the file:
    ACTION!="add|change", GOTO="u2f_end", KERNEL=="hidraw*", SUBSYSTEM=="hidraw", ATTRS{idVendor}=="*", ATTRS{idProduct}=="*", TAG+="uaccess", LABEL="u2f_end"
  3. Reboot the Linux PC.

Prerequisites for the Proof-of-Concept Java Application

This service provider web application example must have a means of connecting with a StrongKey FIDO Server. You can install SKFS either on the same machine as your service provider web application or a different one.

     You must have a Java web application server. These instructions assume you are using Payara (GlassFish).

     The instructions assume the default ports for all the applications installed; Payara runs HTTPS on port 8181 by default, so make sure all firewall rules allow that port to be accessible.