Add FIDO2 authentication support and related tests #596
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Description
By adding support for FIDO2 during authentication, we should be able to add support for FIDO2 registration too later.
I have only tested this using physical YubiKey, I have not tested Windows Hello! WHfB was added with 14.6.
This pull request adds support for FIDO2/WebAuthn hardware security key authentication to the
New-PASSessioncommand and adds a utility for decoding Base64Url strings.New-PASSession, including a newUserNameparameter and validation to ensure it is required when using-type FIDO2. The authentication workflow callsInvoke-FIDO2Authenticationwhentypeis set toFIDO2.ConvertFrom-Base64UrlStringfor converting Base64Url-encoded strings to byte arrays, supporting FIDO2/WebAuthn workflows.Type of change
How Has This Been Tested?
Test Configuration:
Checklist: