@@ -57,9 +57,8 @@ In addition to the main `webauthn-server-core` module, there are also:
57
57
interface, which by default comes preloaded with attestation metadata for Yubico devices.
58
58
59
59
- `webauthn-server-core-minimal`: Alternative distribution of `webauthn-server-core`,
60
- without a dependency on BouncyCastle.
61
- If depending on this module instead of `webauthn-server-core`,
62
- you may have to add your own JCA providers to support some signature algorithms.
60
+ not dependent on BouncyCastle.
61
+ Using it means you may have to add your own JCA providers to support some signature algorithms.
63
62
In particular, OpenJDK 14 and earlier does not include providers for the EdDSA family of algorithms.
64
63
65
64
@@ -81,7 +80,7 @@ In addition to the main `webauthn-server-core` module, there are also:
81
80
=== Non-features
82
81
83
82
This library has no concept of accounts, sessions, permissions or identity
84
- federation, and it's not an authentication framework; it only deals with
83
+ federation, and it is not an authentication framework; it only deals with
85
84
executing the WebAuthn authentication mechanism. Sessions, account management
86
85
and other higher level concepts can make use of this authentication mechanism,
87
86
but the authentication mechanism alone does not make a security system.
@@ -110,7 +109,7 @@ The client side involves:
110
109
1. Call `navigator.credentials.create()` or `.get()`,
111
110
passing the result from `RelyingParty.startRegistration(...)` or `.startAssertion(...)` as the argument.
112
111
2. Encode the result of the successfully resolved promise and return it to the server.
113
- For this you'll need some way to encode `Uint8Array` values;
112
+ For this you need some way to encode `Uint8Array` values;
114
113
this guide will assume use of link:https://github.com/beatgammit/base64-js[base64-js].
115
114
However the built-in parser methods for
116
115
link:https://developers.yubico.com/java-webauthn-server/JavaDoc/webauthn-server-core/latest/com/yubico/webauthn/data/PublicKeyCredential.html[`PublicKeyCredential`]
@@ -190,7 +189,7 @@ String credentialCreateJson = request.toCredentialsCreateJson();
190
189
return credentialCreateJson; // Send to client
191
190
----------
192
191
193
- You'll need to keep this `PublicKeyCredentialCreationOptions` object in temporary storage
192
+ You will need to keep this `PublicKeyCredentialCreationOptions` object in temporary storage
194
193
so you can also pass it into `finishRegistration(...)` later.
195
194
196
195
Now call the WebAuthn API on the client side:
@@ -266,7 +265,7 @@ try {
266
265
----------
267
266
268
267
Finally, if the previous step was successful, store the new credential in your database.
269
- Here's an example of things you'll likely want to store:
268
+ Here is an example of things you will likely want to store:
270
269
271
270
[source,java]
272
271
----------
@@ -308,7 +307,7 @@ String credentialGetJson = request.toCredentialsGetJson();
308
307
return credentialGetJson; // Send to client
309
308
----------
310
309
311
- Again, you'll need to keep this `PublicKeyCredentialRequestOptions` object in temporary storage
310
+ Again, you will need to keep this `PublicKeyCredentialRequestOptions` object in temporary storage
312
311
so you can also pass it into `finishAssertion(...)` later.
313
312
314
313
Now call the WebAuthn API on the client side:
0 commit comments