{
"kind": "Fido2",
"credentialId": "<string>",
"credentialUuid": "<string>",
"dateCreated": "<string>",
"isActive": true,
"name": "<string>",
"publicKey": "<string>",
"relyingPartyId": "<string>",
"origin": "<string>"
}Fido2 (Passkeys / WebAuthn). Recommended for human users. Uses the WebAuthn standard to create and store passkeys on the user’s device. Passkeys are tied to a domain name that must be whitelisted in your Dfns dashboard.Key. A raw public/private keypair, primarily for Service Accounts. You generate and store the keypair yourself. See Generate a Key Pair.PasswordProtectedKey. Like a Key credential, but the private key is stored by Dfns in encrypted form. Dfns never has the password. Encryption and decryption must happen on the frontend so you never access the decrypted key. During login and signing, the API returns the encryptedPrivateKey for the user to decrypt locally.RecoveryKey. Like a Key credential, but designed for account recovery. The user safekeeps a human-readable recovery code. When used, all other credentials are invalidated. See Implementing end-user recovery.| Identity | WebAuthn (Fido2) | Key |
|---|---|---|
| User | Yes | Yes |
| PAT (Personal Access Token) | No | Yes |
| Service Account | No | Yes |
www.app-1.com cannot be used inside the app www.app-2.com)
Key credentials give extra flexibilty over WebAuthn to design signing to meet your needs. For example, you could choose to have a key without a passphrase (disabling MFA), to support scenarios where you don’t want the user to have to interact with your application to sign a transaction. Or, as another example, you could build an integration with an authentication device that is not supported by WebAuthn.
Fido2, Key, Password, Totp, RecoveryKey, PasswordProtectedKey Was this page helpful?