Product Documentation

The allowed RSA algorithms for the digital signature used by the Authenticator during registration. The rsa and signatures options pertain to the same functionality; the signing of the responses sent return by the Authenticator. By design all EC algorithms are prioritized over rsa if both are set. Accepting RSA or EC algorithms can be avoided by using none as the desired option. If rsa has a value of none then EC must have one or more accepted algorithms, and vice versa. Allowed values:

  • all: All of the following algorithms
  • rsassa-pkcs1-v1_5-sha1
  • rsassa-pkcs1-v1_5-sha256
  • rsassa-pkcs1-v1_5-sha384
  • rsassa-pkcs1-v1_5-sha512
  • rsassa-pss-sha256
  • rsassa-pss-sha384
  • rsassa-pss-sha512
  • none: None of the above algorithms