The FIDORestApp version 1.0 (Build 25) web-application is a Java Servlet 3.x running on Glassfish 4.x, making webservice calls to StrongAuth's FIDO Certified implementation of the U2F protocol.

  1.  Using Chrome, connect to https://fidodemo.strongauth.com/fidorestapp

     

  2. At the home-page of the fidorestapp application, click on the Auto-Generate button to register an application generated credential.



  3. The credential will be generated automatically by the application. Click Login button to login using application generated credential.



  4. Since the FIDO U2F protocol currently supports using Authenticators only as a Human Interface Device (HID) over the Universal Serial Bus (USB), plug-in the FIDO Authenticator into an available USB port on your computer.

    Once plugged in, wait for a little (no more than a minute) to ensure any necessary HID device drivers are installed and registered with the operating system. The Microsoft Windows operating system will specifically notify you on the status bar when the Authenticator is ready to use.

    Note that the installation of device drivers is done only once by the operating system – subsequent operations with the FIDO Authenticator should be possible as soon as the device is plugged into the USB port.


  5. When the FIDO Authenticator's device driver is enabled, click Register FIDO Token to register 2nd-factor credential.



  6. The fidorestapp should prompt with a message: Please touch your FIDO authenticator now.

    [This is a requirement of the U2F protocol. U2F-based strong-authentication mandates that the user prove to the FIDO Server, that they possess a valid U2F Authenticator and are in physical proximity to the device where the browser is executing.

    “User presence” is implemented differently from Authenticator to Authenticator, depending on how the manufacturer chose to design their Authenticator. Some manufacturers expose a metal plate with a blinking Light Emitting Diode (LED), which must be touched by a human finger to verify user-presence (Yubico); others have a raised button with a blinking LED that must be pressed or pinched to verify user-presence (HyperSecu); yet others require that the Authenticator be removed from the USB port and reinserted to verify user-presence (Neowave and Plug-Up).

    Depending on the type of Authenticator you have, perform the appropriate operation to verify user-presence.]



  7. Upon successful registration, you will see the following confirmation:



  8. Click on Authenticate FIDO Token to authenticate with 2nd-factor credential.


  9. The fidorestapp should prompt with a message: Please touch your FIDO authenticator now.



  10. Upon successful sign in, you will see the following confirmation: