Preparing PingOne for FIDO on Android
PingOne Android
To use FIDO authentication in your Android apps when using PingOne you must complete the following tasks:
Step 1. Generating Android signing key fingerprints
You need to generate signing key fingerprints so that you can create a secure, verifiable link between your server and your native Android app.
This prevents malicious apps from impersonating your official app to register or use FIDO credentials.
You need two different formats of fingerprint:
-
For example,
E6:5A:5D:37:22:FC...22:99:20:03:E6:47 -
Base64-encoded SHA-256 fingerprint
For example,
android:apk-key-hash:jEFEYh80...S5Pj-ZKHHjwi0k
Generating SHA-256 fingerprints of your Android signing certificates
You can use SHA-256 fingerprints of the certificates you use to sign your Android applications to ensure that FIDO only works with apps you’ve signed.
The steps for obtaining the fingerprint depend on the method you use to distribute your application.
-
Android App Bundles
-
Local debug keys
If you are using Android App Bundles to distribute your apps, then the hashes of the certificate used to sign your application are available in the Android Developer console.
Follow these steps to obtain the SHA-256 hash of your signing certificate:
-
Configure your Android App Bundle for signing. Google has a number of methods for managing the signing certificates, including uploading your own or having Google manage them for you.
For information on how to set up signing, refer to Sign your app in the Google Developer Documentation.
-
In the Google Play Console:
-
Select the app that will be supporting mobile biometrics.
-
Navigate to Setup > App integrity > App signing.
Figure 1. App signing keys in the Google Play Console -
In the App signing key certificate section, copy the SHA-256 certificate fingerprint value.
In the Digital Asset Links JSON section is a file that you can copy with the SHA-256 fingerprint already in place.
-
You must manually generate a SHA-256 fingerprint of your signing key in the following scenarios:
-
You are signing your APK with the default debug.jks that Android Studio created for the project
-
You are signing your APK with your own keys that you have generated that have not been uploaded to the Google Play Console
Follow these steps to obtain the SHA-256 hash of your signing certificate:
-
In the
build.gradlefile for your application, check the settings defined in thesigningConfigsproperty:Example signingConfigs when using the default debug.jkssigningConfigs { debug { storeFile file('../debug.jks') storePassword 'android' keyAlias 'androiddebugkey' keyPassword 'android' } } -
In a terminal window, navigate to the location of the JKS file, and then run the following command:
keytool -list -v -alias <keyAlias> -keystore <storeFile> | grep SHA256Swap the <keyAlias> and <storeFile> placeholders with the values you obtained from your project. For example:
keytool -list -v -alias "androiddebugkey" -keystore "./debug.jks" | grep SHA256 -
When requested, enter the keystore password, as specified in the
keyPasswordproperty in thebuild.gradlefile.The default keystore password for certificates in the local debug JKS file is
android.The command prints the SHA-256 fingerprint of the signing key:
Enter keystore password: android SHA256: E6:5A:5D:37:22:FC...22:99:20:03:E6:47 Signature algorithm name: SHA256withRSA
Generating base64-encoded SHA-256 fingerprints of your Android signing certificates
The steps for obtaining the base64-encoded SHA-256 hash depend on the method you use to distribute your application.
-
Android App Bundles
-
Local debug keys
Follow these steps to download the app signing certificate, and then generate a base64-encoded SHA-256 hash:
-
In the Google Play Console:
-
Select the app that will be supporting mobile biometrics.
-
Navigate to Setup > App integrity > App signing.
-
In the App signing key certificate section, click Download certificate.
This downloads a local copy of the signing certificate, named
deployment_cert.der.
-
-
In a terminal window, navigate to the location of the
deployment_cert.derfile, and then run the following command:cat deployment_cert.der | openssl sha256 -binary | openssl base64 | tr '/+' '_-' | tr -d '='The command prints the base64-encoded SHA-256 fingerprint of the signing key:
jEFEYh80K55iHYkxsBRLGtAP6wvjOS5Pj-ZKHHjwi0k -
Add a prefix of
android:apk-key-hash:to the base64-encode SHA-256 fingerprint. For example:android:apk-key-hash:jEFEYh80K55iHYkxsBRLGtAP6wvjOS5Pj-ZKHHjwi0k
Follow these steps to extract the app signing certificate from the JKS and generate a base64-encoded SHA-256 hash:
-
In the
build.gradlefile for your application, check the settings defined in thesigningConfigsproperty:Example signingConfigs when using the default debug.jkssigningConfigs { debug { storeFile file('../debug.jks') storePassword 'android' keyAlias 'androiddebugkey' keyPassword 'android' } } -
In a terminal window, navigate to the location of the JKS file, and then run the following command:
keytool -exportcert -alias <keyAlias> -keystore <storeFile> | openssl sha256 -binary | openssl base64 | tr '/+' '_-' | tr -d '='Swap the <keyAlias> and <storeFile> placeholders with the values you obtained from your project. For example:
keytool -exportcert -alias "androiddebugkey" -keystore "./debug.jks" | openssl sha256 -binary | openssl base64 | tr '/+' '_-' | tr -d '=' -
When requested, enter the keystore password, as specified in the
keyPasswordproperty in thebuild.gradlefile.The default keystore password for certificates in the local debug JKS file is
android.The command prints the base64-encoded SHA-256 fingerprint of the signing key:
Enter keystore password: android jEFEYh80K55iHYkxsBRLGtAP6wvjOS5Pj-ZKHHjwi0k -
Add a prefix of
android:apk-key-hash:to the base64-encode SHA-256 fingerprint. For example:android:apk-key-hash:jEFEYh80K55iHYkxsBRLGtAP6wvjOS5Pj-ZKHHjwi0k
Step 2. Associating your Android app with your PingOne server
In this step you create a Digital Asset Links JSON file that allows your website to make a public, verifiable statement about its relationship with other assets, such as your Android app.
Creating a Digital Asset Links JSON file
To associate your server with your Android app you need to make public, verifiable statements by using a Digital Asset Links JSON file (assetlinks.json).
Create or update an assetlinks.json with the SHA-256 fingerprint value you generated in the previous step:
assetlinks.json file[
{
"relation": [
"delegate_permission/common.handle_all_urls",
"delegate_permission/common.get_login_creds"
],
"target": {
"namespace": "android_app",
"package_name": "com.example.app",
"sha256_cert_fingerprints": [
"E6:5A:5D:37:22:FC...22:99:20:03:E6:47"
]
}
}
]
For more information on creating an assetlinks.json file, refer to Google Digital Asset Links.
Hosting assetlinks.json when using PingOne
For FIDO implementations on Android, you need to upload your assetlinks.json file to a specific location on the web server that corresponds to your Relying Party (RP) ID.
Upload the file so your server makes it accessible at a URL similar to the following example:
https://<your-RP-domain>/.well-known/assetlinks.json
When you configure your server, follow these key requirements:
-
Ensure <your-RP-domain> in the URL exactly matches the RP ID you configure in your DaVinci flows in a later step.
-
Serve the file exclusively over an HTTPS connection.
-
Set the
Content-TypeHTTP header toapplication/jsonwhen serving the file. -
Serve the file directly from the URL without any redirects. Android won’t follow redirects when it verifies the file.
Step 3. Configuring a FIDO policy in PingOne
A FIDO policy defines which FIDO devices are permitted and the desired behavior when registering and authenticating your users.
You can create a new FIDO policy, or update an existing FIDO policy to suit your requirements. The default Passkeys FIDO policy is a great starting point for use with the FIDO module:
To create or edit a FIDO policy:
-
In the PingOne admin console, go to Authentication > FIDO.
-
Click the Plus icon () to create a new FIDO policy, or select an existing policy and then click the Pencil icon () to edit it.
-
Configure the FIDO policy as required. Learn more about Adding a FIDO policy in the PingOne documentation.
-
Save your changes.
-
To set the policy as the default, click the More Options icon (), and then click Make Default.
Figure 3. Setting the default FIDO policy in PingOne
Make a note of your FIDO policy name, you’ll need it in Step 4. Adding a FIDO policy to an MFA policy in PingOne.
Step 4. Adding a FIDO policy to an MFA policy in PingOne
After configuring a FIDO policy you must include it in an MFA policy, alongside any other MFA methods you want to enable.
-
In the PingOne admin console, go to Authentication > MFA.
-
Click the Plus icon () to create a new MFA policy, or select an existing policy and then click the Pencil icon () to edit it.
-
In Allowed Authentication Methods, enable FIDO2.
Learn more about Configuring an MFA policy for strong authentication in the PingOne documentation.
-
In FIDO Policy, select the name of the FIDO policy you created earlier. For example,
Passkeys. -
Save your changes.
The result resembles the following:
Figure 4. An example MFA policy with selected Passkeys FIDO policy in PingOne
Make a note of your MFA policy name, and the policy ID. You will need these in Step 6. Configuring DaVinci flows for FIDO.
Step 5. Creating FIDO forms in PingOne
You need to create two sets of PingOne forms—one set for FIDO registration, and one set for FIDO authentication.
Each set requires a form to list the device types available for the operation, and another form to handle the actual FIDO operation.
Creating forms to list MFA devices in PingOne
To configure a form to list the methods available for FIDO registration:
-
In the PingOne admin console, go to User Experience > Forms.
-
Click the Plus icon (), enter a Form Name and optionally a Form Description, and then click Add Form.
A dialog containing a list of starter templates appears.
-
In the list of templates, select MFA Device Selection - Registration.
-
(Optional) Customize the form in the form builder.
-
Click Save.
The result resembles the following:
Figure 5. PingOne form to list MFA devices for registration
To configure a form to list the methods available for FIDO authentication:
-
In the PingOne admin console, go to User Experience > Forms.
-
Click the icon and select the MFA Device Selection - - Authentication template.
-
(Optional) Customize the templated form in the form builder.
-
Click Save.
The result resembles the following:
Figure 6. PingOne form to list MFA devices for authentication
Creating forms to initiate FIDO operations in PingOne
To create a form in PingOne to initiate FIDO operations for registration, complete the following steps:
-
In the PingOne admin console, go to User Experience > Forms.
-
Click the icon and select the FIDO2 - Registration template.
-
(Optional) Customize the templated form in the form builder.
-
Click Save.
The result resembles the following:
Figure 7. PingOne form to initialize FIDO for registration
To create a form in PingOne to initiate FIDO operations for authentication, complete the following steps:
-
In the PingOne admin console, go to User Experience > Forms.
-
Click the icon and select the FIDO2 - Authentication template.
-
(Optional) Customize the templated form in the form builder.
-
Click Save.
The result resembles the following:
Figure 8. PingOne form to initialize FIDO for authentication
Step 6. Configuring DaVinci flows for FIDO
You’ll need a DaVinci flow for both registering a FIDO device, and authenticating with a FIDO device.
Each flow will need to display the appropriate device selection form you created earlier, as well as the FIDO initiation form.
Configuring a FIDO registration DaVinci flow
In DaVinci, create or edit a FIDO registration flow, and configure it as follows:
-
In the DaVinci flow, add connectors to allow the user to select the MFA device type to register:
-
Add a Form Connector, and configure it to display the form that lists MFA devices for registration as follows:
-
Using the Show Form capability, in the Form field, select the form that lists MFA devices for registration that you created in a previous step.
-
In Authentication Method Source, select the MFA policy that you added your FIDO2 policy to in a previous step.
The result should resemble the following:
Figure 9. Configuring a PingOne Forms connector for FIDO -
-
Add a Functions connector to handle the device selection, including a
FIDO2condition.The result should resemble the following:
Figure 10. Example connectors for selecting the FIDO device to register
-
-
Connect the
FIDO2condition to a section of the flow with connectors to register a FIDO2 device:-
Add a PingOne MFA connector node and select the Create Device capability. (1)
This connector supplies the Public Key Credential Creation field to the following Form connector.
-
In a subsequent node, add a Form connector and select the Show Form capability, then select the FIDO2 registration form you created in a previous step. (2)
Select the FIDO registration initiation form, not the form you created to list the MFA devices available for registration.
-
In a subsequent node, add another PingOne MFA node and select the Activate Device capability. (3)
The result should resemble the following:
Figure 11. Example FIDO registration DaVinci flow connectors.
-
-
Add the signing key hash you generated earlier to the Origin property of the Activate Device capability:
-
Select the PingOne MFA node with the Activate Device capability.
-
On the General tab, in the Origin field, add the signing key hash you created earlier.
For example,
android:apk-key-hash:jEFEYh80K55iHYkxsBRLGtAP6wvjOS5Pj-ZKHHjwi0k
-
-
Save and deploy your changes.
Configuring a FIDO authentication DaVinci flow
In DaVinci, create or edit a FIDO authentication flow, and configure it as follows:
-
In the DaVinci flow, add connectors to allow the user to select the MFA device type to authenticate with:
-
Add a Form Connector, and configure it to display the form that lists MFA devices for registration as follows:
-
Using the Show Form capability, in the Form field, select the form that lists MFA devices for authentication that you created in a previous step.
-
In Authentication Method Source, select the MFA policy that you added your FIDO2 policy to in a previous step.
The result should resemble the following:
Figure 12. Configuring a PingOne Forms connector for FIDO -
-
Add a Functions connector to handle the device selection, including a
FIDO2condition.The result should resemble the following:
Figure 13. Example connectors for selecting the FIDO device to authenticate with
-
-
Connect the
FIDO2condition to a section of the flow with connectors to authenticate with a FIDO2 device:-
Add a PingOne MFA connector node and select the Create Device Authentication capability. (1)
This connector supplies the Public Key Credential Request field to the following Form connector.
-
Select the PingOne MFA connector node, and on the General tab, in the MFA Policy ID field, enter the ID of the MFA policy you added your FIDO2 policy to in a previous step.
You must enter the ID of the MFA policy, for example
9db73f8f-eb79-0e60-032e-7ec026262af3, not the name of the policy.The result should resemble the following:
Figure 14. Adding the MFA Policy ID to a PingOne MFA node, with the Create Device Authentication capability.
-
-
In a subsequent node, add a Form connector and select the Show Form capability, then select the FIDO2 authentication form you created in a previous step. (2)
Select the FIDO authentication initiation form, not the form you created to list the MFA devices available for authentication.
-
In a subsequent node, add another PingOne MFA connector node and select the FIDO Assertion capability. (3)
The result should resemble the following:
Figure 15. Example FIDO authentication DaVinci flow connectors.
-
-
Add the signing key hash you generated earlier to the Origin property of the FIDO Assertion capability:
-
Select the PingOne MFA node with the FIDO Assertion capability.
-
On the General tab, in the Origin field, add the signing key hash you created earlier.
For example,
android:apk-key-hash:jEFEYh80K55iHYkxsBRLGtAP6wvjOS5Pj-ZKHHjwi0k
-
-
Save and deploy your changes.
Step 7. Configuring a DaVinci flow to be launched by your app
After configuring a DaVinci flow for use with the Orchestration SDKs you must configure PingOne so that you can launch the flow from the DaVinci module.
This involves performing the following high-level steps:
-
Checking that your DaVinci flow uses only compatible connectors and fields.
-
Creating an application in DaVinci to connect PingOne to the DaVinci flow.
-
Creating an application in PingOne that the DaVinci module can connect to and access the DaVinci application and its PingOne Flow Policy.
To learn how to complete the steps, refer to Launching a flow with a Ping SDK in the DaVinci documentation.
Next steps
You can now proceed to Integrating FIDO DaVinci flows into Android apps.