Go to file
Dain Nilsson 9aa9081579
Prepare 0.6.0 release.
2019-05-10 12:52:54 +02:00
debian Prepare 0.6.0 release. 2019-05-10 12:52:54 +02:00
docker/xenial Rename fido_host -> fido2. 2018-04-05 11:05:30 +02:00
examples Allow all supported key algorithms by default. 2019-05-09 14:54:01 +02:00
fido2 Prepare 0.6.0 release. 2019-05-10 12:52:54 +02:00
test Travis fixes. 2019-05-09 15:40:28 +02:00
.gitignore Move stuff around. 2018-07-03 14:57:00 +02:00
.pre-commit-config.yaml Remove unused variable. 2018-12-20 13:55:05 +01:00
.travis.yml Build sdist on Travis. 2019-05-10 12:52:44 +02:00
COPYING Initial import. 2018-03-16 12:13:15 +01:00
COPYING.APLv2 Initial import. 2018-03-16 12:13:15 +01:00
COPYING.MPLv2 Initial import. 2018-03-16 12:13:15 +01:00
MANIFEST.in Prepare 0.5.0 release. 2018-12-21 13:53:06 +01:00
NEWS Prepare 0.6.0 release. 2019-05-10 12:52:54 +02:00
Pipfile Prepare 0.6.0 release. 2019-05-10 12:52:54 +02:00
Pipfile.lock Prepare 0.6.0 release. 2019-05-10 12:52:54 +02:00
README.adoc Add reference section to README (fix #39) 2019-05-03 10:48:03 +02:00
appveyor.yml Add Python3.7 to CI 2018-10-17 22:47:46 +03:00
setup.cfg Prepare 0.1.0 prelease. 2018-03-16 14:10:30 +01:00
setup.py Prepare 0.6.0 release. 2019-05-10 12:52:54 +02:00

README.adoc

== python-fido2
image:https://travis-ci.org/Yubico/python-fido2.svg?branch=master["Travis CI Status", link="https://travis-ci.org/Yubico/python-fido2"]
image:https://ci.appveyor.com/api/projects/status/8orx9nbdfq52w47s/branch/master?svg=true["Appveyor Status", link="https://ci.appveyor.com/project/Yubico53275/python-fido-host/branch/master"]


Provides library functionality for communicating with a FIDO device over USB as
well as verifying attestation and assertion signatures.

WARNING: This project is in beta. Expect things to change or break at any time!

This library aims to support the FIDO U2F and FIDO 2.0 protocols for
communicating with a USB authenticator via the Client-to-Authenticator Protocol
(CTAP 1 and 2). In addition to this low-level device access, classes defined in
the `fido2.client` and `fido2.server` modules implement higher level operations
which are useful when interfacing with an Authenticator, or when implementing
WebAuthn support for a Relying Party.

For usage, see the `examples/` directory.


=== References
These links related to WebAuthn and FIDO2 can help you get started:

* Yubico WebAuthn/FIDO2 guide: https://developers.yubico.com/FIDO2/
* W3C WebAuthn specification: https://www.w3.org/TR/webauthn/
* FIDO specifications: https://fidoalliance.org/specifications/download/


=== License
This project, with the exception of the files mentioned below, is licensed
under the BSD 2-clause license.
See the _COPYING_ file for the full license text.

This project contains source code from pyu2f (https://github.com/google/pyu2f)
which is licensed under the Apache License, version 2.0.
These files are located in `fido2/_pyu2f/` and `test/_pyu2f/`.
See http://www.apache.org/licenses/LICENSE-2.0,
or the _COPYING.APLv2_ file for the full license text.

This project also bundles the public suffix list (https://publicsuffix.org)
which is licensed under the Mozilla Public License, version 2.0.
This file is stored as `fido2/public_suffix_list.dat`.
See https://mozilla.org/MPL/2.0/,
or the _COPYING.MPLv2_ file for the full license text.


=== Installation
fido2 is installable by running the following command:

  # pip install fido2

Under Linux you will need to add a Udev rule to be able to access the FIDO
device, or run as root. For example, the Udev rule may contain the following:

----
#Udev rule for allowing HID access to Yubico devices for FIDO support.

KERNEL=="hidraw*", SUBSYSTEM=="hidraw", \
  MODE="0664", GROUP="plugdev", ATTRS{idVendor}=="1050"
----


=== Dependencies
fido2 is compatible with CPython 2.7 (2.7.6 and up), 3.4 onwards, and is tested
on Windows, MacOS, and Linux.

This project depends on Cryptography. For instructions on installing this
dependency, see https://cryptography.io/en/latest/installation/.


=== Development
For development of the library, we recommend using `pipenv`. To set up the dev
environment, run this command in the root directory of the repository:

 pipenv install --dev


==== Running tests
While many tests can run on their own, some require a connected U2F or FIDO2
device to run.

  pipenv run test