Go to file
lyf 3015a6182c UserAuth SA侧自定义事件没有权限控制,需要增加发送方的发送权限和接收方的权限校验
Signed-off-by: lyf <liyongfei13@h-partners.com>
Change-Id: I80dfb12f3a2447bbd8453774e4db49cccecee0dd
2024-08-24 02:17:33 +00:00
common extend timeout value 2024-08-02 01:56:40 +00:00
figures update readme 2022-07-08 10:36:37 +08:00
frameworks update frameworks/native/executors/src/async_command/enroll_command.cpp. 2024-08-14 12:08:29 +00:00
interfaces/inner_api Initialize to null 2024-08-22 13:06:12 +00:00
param fingerprint disable support 2023-12-07 09:18:12 +00:00
sa_profile UserAuth SA侧自定义事件没有权限控制,需要增加发送方的发送权限和接收方的权限校验 2024-08-24 02:17:33 +00:00
services UserAuth SA侧自定义事件没有权限控制,需要增加发送方的发送权限和接收方的权限校验 2024-08-24 02:17:33 +00:00
test !992 【新需求】锁屏场景下使用身份认证功能 2024-08-16 11:22:44 +00:00
user_auth_icon dos2unix files 2024-04-28 14:43:21 +08:00
.gitignore add userauth executor 2022-05-08 22:46:36 +08:00
bundle.json bundle.json中新增features开关 2024-07-17 10:41:57 +08:00
cfi_blocklist.txt fix : Security and privacy compliance 2023-09-02 07:21:54 +00:00
CODEOWNERS move ipc code to single .h file and add CODEOWNERS file 2023-07-01 06:29:14 +00:00
hisysevent.yaml fix code 2024-03-13 16:25:11 +08:00
LICENSE fix UserAuth issue 2022-03-12 20:47:37 +08:00
OAT.xml fix : update pin_auth user_auth idl to 2_0 2024-04-02 11:59:49 +08:00
README_ZH.md update readme 2022-07-11 14:22:45 +08:00
README.md fix : update pin_auth user_auth idl to 2_0 2024-04-02 11:59:49 +08:00

Unified User Authentication (userauth)

Introduction

As a basic component of the User Identity & Access Management (IAM) subsystem, Unified User Authentication (userauth) implements unified user authentication and provides biometric feature authentication APIs to third-party applications.

Figure 1 userauth architecture

userauth_architecture

The userauth APIs support user authentication of the target Authentication Trust Level (ATL). The target ATL is specified by the service. The target user ID can be specified by the service (system service or basic system application) or obtained from the system context (third-party application).

Directory Structure

//base/useriam/user_auth_framework
├── frameworks          # Framework code
├── interfaces          # Directory for storing external interfaces
│   └── innerkits       # Header files exposed to the internal subsystems
├── sa_profile          # Profile of the Service ability
├── services            # Implementation of the Service ability
├── test                # Directory for storing test code
├── utils               # Directory for storing utility code
├── bundle.json         # Component description file
└── userauth.gni        # Build configuration

Usage

Available APIs

Table 1 APIs for unified user authentication

API Description
getAvailableStatus(authType : AuthType, authTrustLevel : AuthTrustLevel) : number; Obtains the available authentication status.
auth(challenge: BigInt, authType : AuthType, authTrustLevel: AuthTrustLevel, callback: IUserAuthCallback): BigInt; Performs user authentication.

Usage Guidelines

  • Vendors must implement the following in a Trusted Execution Environment (TEE):
  1. Authentication scheme: Determine the user authentication scheme based on the user credentials entered and the target ATL.
  2. Authentication result evaluation: Evaluate whether the authentication reaches the target ATL based on the authentication result returned by the executor.
  • The APIs defined in the header file user_auth/v1_0/IUserAuthInterface.idl in the drivers_interface repository must be implemented in a TEE, and the security of user authentication scheme and result evaluation must be ensured.

Repositories Involved

useriam_user_auth_framework

useriam_pin_auth

useriam_face_auth

drivers_peripheral

drivers_interface