Configure a FIDO2/WebAuthn authentication mechanism
The FIDO2/WebAuthn authentication mechanism prompts the user to sign a random challenge string with a FIDO2/WebAuthn authenticator provided during the authentication flow. The user must register a compatible FIDO2/WebAuthn authenticator.
Configure the FIDO2/WebAuthn mechanism and the corresponding properties to determine the operation of the mechanism.
- Log in to the local management interface.
- Click...
AAC > Policy > Authentication > Mechanisms > FIDO2/WebAuthn Authentication > Modify > Properties tab > property > Modify
- Enter the value for that property.
- Click OK.
- Take note of the properties for the mechanism.
Relying Party ID The relying party ID to use with this mechanism. The ID is a domain string that identifies the Relying Party and the Relying Party-specific configuration. The ID must be based on the origin the user accesses: The ID must be the registrable domain suffix of or equal to the origin's effective domain. Default value: Empty string
Example: webseal.com
Valid values: String, valid URI
- Click Save.
- Deploy pending changes
More advanced configuration can be configured for each Relying Party ID. See FIDO2 Configuration.
Parent topic: Authentication