You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -139,21 +139,21 @@ Will retrieve the server/username/password combination from the secure storage.
139
139
140
140
Will remove the server/username/password combination from the secure storage.
141
141
142
-
### `requestSharedWebCredentials()` (iOS only)
142
+
### `requestSharedWebCredentials()` (iOS and visionOS only)
143
143
144
144
Asks the user for a shared web credential. Requires additional setup both in the app and server side, see [Apple documentation](https://developer.apple.com/documentation/security/shared_web_credentials). Resolves to `{ server, username, password }` if approved and `false` if denied and throws an error if not supported on platform or there's no shared credentials.
### `canImplyAuthentication([{ authenticationType }])` (iOS and visionOS only)
151
151
152
152
Inquire if the type of local authentication policy is supported on this device with the device settings the user chose. Should be used in combination with `accessControl` option in the setter functions. Resolves to `true` if supported.
153
153
154
154
### `getSupportedBiometryType()`
155
155
156
-
**On iOS:** Get what type of hardware biometry support the device can use for biometric encryption. Resolves to a `Keychain.BIOMETRY_TYPE` value when supported and enrolled, otherwise `null`.
156
+
**On iOS and visionOS:** Get what type of hardware biometry support the device can use for biometric encryption. Resolves to a `Keychain.BIOMETRY_TYPE` value when supported and enrolled, otherwise `null`.
157
157
158
158
**On Android:** Get what type of Class 3 (strong) biometry support the device has. Resolves to a `Keychain.BIOMETRY_TYPE` value when supported, otherwise `null`. In most devices this will return `FINGERPRINT` (except for Pixel 4 or similar where fingerprint sensor is not present).
159
159
@@ -167,16 +167,16 @@ Get security level that is supported on the current device with the current OS.
|**`accessControl`**| All | This dictates how a keychain item may be used, see possible values in `Keychain.ACCESS_CONTROL`. |_None_|
173
-
|**`accessible`**| iOS only | This dictates when a keychain item is accessible, see possible values in `Keychain.ACCESSIBLE`. |_`Keychain.ACCESSIBLE.WHEN_UNLOCKED`_|
174
-
|**`accessGroup`**| iOS only | In which App Group to share the keychain. Requires additional setup with entitlements. |_None_|
175
-
|**`authenticationPrompt`**| All | What to prompt the user when unlocking the keychain with biometry or device password. | See [`authenticationPrompt` Properties](#authenticationprompt-properties)|
176
-
|**`authenticationType`**| iOS only | Policies specifying which forms of authentication are acceptable. |`Keychain.AUTHENTICATION_TYPE.DEVICE_PASSCODE_OR_BIOMETRICS`|
177
-
|**`service`**| All | Reverse domain name qualifier for the service associated with password. |_App bundle ID_|
178
-
|**`storage`**| Android only | Force specific cipher storage usage during saving the password | Select best available storage |
179
-
|**`rules`**| Android only | Force following to a specific security rules |`Keychain.RULES.AUTOMATIC_UPGRADE`|
|**`accessControl`**| All | This dictates how a keychain item may be used, see possible values in `Keychain.ACCESS_CONTROL`. |_None_|
173
+
|**`accessible`**| iOS, visionOS| This dictates when a keychain item is accessible, see possible values in `Keychain.ACCESSIBLE`. |_`Keychain.ACCESSIBLE.WHEN_UNLOCKED`_|
174
+
|**`accessGroup`**| iOS, visionOS| In which App Group to share the keychain. Requires additional setup with entitlements. |_None_|
175
+
|**`authenticationPrompt`**| All | What to prompt the user when unlocking the keychain with biometry or device password. | See [`authenticationPrompt` Properties](#authenticationprompt-properties)|
176
+
|**`authenticationType`**| iOS, visionOS| Policies specifying which forms of authentication are acceptable. |`Keychain.AUTHENTICATION_TYPE.DEVICE_PASSCODE_OR_BIOMETRICS`|
177
+
|**`service`**| All | Reverse domain name qualifier for the service associated with password. |_App bundle ID_|
178
+
|**`storage`**| Android only | Force specific cipher storage usage during saving the password | Select best available storage |
179
+
|**`rules`**| Android only | Force following to a specific security rules |`Keychain.RULES.AUTOMATIC_UPGRADE`|
|**`TOUCH_ID`**| Device supports authentication with Touch ID. (iOS only) |
241
241
|**`FACE_ID`**| Device supports authentication with Face ID. (iOS only) |
242
+
|**`OPTIC_ID`**| Device supports authentication with Optic ID. (visionOS only) |
242
243
|**`FINGERPRINT`**| Device supports authentication with Fingerprint. (Android only) |
243
244
|**`FACE`**| Device supports authentication with Face Recognition. (Android only) |
244
245
|**`IRIS`**| Device supports authentication with Iris Recognition. (Android only) |
@@ -503,6 +504,10 @@ Refs:
503
504
504
505
This package supports macOS Catalyst.
505
506
507
+
### visionOS
508
+
509
+
This package supports visionOS.
510
+
506
511
### Security
507
512
508
513
OnAPI levels that do not support Android keystore, FacebookConceal is used to en/decrypt stored data. The encrypted data is then stored in SharedPreferences. SinceConceal itself stores its encryption key in SharedPreferences, it follows that if the device is rooted (or if an attacker can somehow access the filesystem), the key can be obtained and the stored data can be decrypted. Therefore, on such a device, the conceal encryption is only an obscurity. OnAPI level 23+ the key is stored in the AndroidKeystore, which makes the key non-exportable and therefore makes the entire process more secure. Follow best practices and do not store user credentials on a device. Instead use tokens or other forms of authentication and re-ask for user credentials before performing sensitive operations.
0 commit comments