Secured Requests Data

When using WebAuthn or the Auth Armor Authenticator, you can be sure each auth request is cryptographically secure and verifiable. The validation step in both of these auth methods will return data that you can also use to independently verify the FIDO standard messages.

  • The integrity of a request data is ensured by signing the request data with the device's private key.
  • This is handled automatically when you use Auth features provided by Auth Armor.