-
Updated
Apr 10, 2022 - Go
#
u2f
Here are 129 public repositories matching this topic...
The Single Sign-On Multi-Factor portal for web apps
docker
nginx
kubernetes
golang
security
ldap
authentication
cookie
push-notifications
u2f
yubikey
two-factor
totp
sso
traefik
mfa
two-factor-authentication
sso-authentication
2fa
multifactor
WebAuthn (FIDO2) server library written in Go
-
Updated
Mar 30, 2022 - Go
-
Updated
Apr 3, 2022 - TypeScript
Pluggable Authentication Module (PAM) for U2F and FIDO2
-
Updated
Apr 7, 2022 - C
Server-side Web Authentication library for Java https://www.w3.org/TR/webauthn/#rp-operations
-
Updated
Apr 7, 2022 - Java
FIDO-U2F / FIDO2 / Webauthn Framework
fido-u2f
symfony
symfony-bundle
u2f
fido
u2f-protocol
factor-authentication
safetynet
webauthn
fido2
webauthn-bundle
webauthn-support
webauthn-framework
webauthn-library
-
Updated
Apr 9, 2022 - PHP
danstiner
commented
Jan 3, 2018
Re-registering with the same site should reset the authentication counter to zero. However this is lowpri as it has little functional impact. Starting at a non-zero number is still within the spec.
Potentially we could also change the dialog to warn this registration will replace an existing one.
An Open-Source FIDO U2F implementation on nRF52 SoC
-
Updated
Aug 22, 2019 - C
-
Updated
Apr 7, 2022 - JavaScript
Decrypt your LUKS partition using a FIDO2 compatible authenticator
-
Updated
Feb 24, 2022 - Rust
HMAC-based (HOTP) and Time-based (TOTP) One-Time Password manager. Works with Google Authenticator for Two-Factor Authentication.
-
Updated
Apr 10, 2022 - TypeScript
rgooch
commented
Dec 13, 2019
The dependency on github.com/cviecco/argon2 should be replaced with golang.org/x/crypto/argon2.
good first issue
Good for newcomers
Improve this page
Add a description, image, and links to the u2f topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the u2f topic, visit your repo's landing page and select "manage topics."
Describe the bug
I have noticed that app-link URLs like:
https://company.okta.com/home/amazon_aws/0obm6u4wyuVYgbLdJ0x7/172cause parsing error inokta_auth_config.pyat line 45 (version 0.4.4).It is caused by an underscore character '_' that should be encoded prior verification like '%5F'.