Authenticate with WebAuthn
Made by Gavin Sawyer
Adds support for biometrics as a primary or multi-factor auth provider using WebAuthn passkeys.
- Works with
- Authentication and Cloud Firestore
- Version
- 10.3.7 | Source code
- Tags
- utilities
- License
- Apache-2.0
- Publisher
- Gavin Sawyer
- Report
- Bug
- Abuse
How this extension works
🎉 2FA passkeys are here in ^10.3.0!
This update brings support for linking secondary discoverable credentials using an alternate attachment (which defaults to "cross-platform"
).
By specifying a factor
parameter to existing browser library methods, you can enable users gain access by inserting and activating or waving a security key over the device.
See the full docs for examples and a feature complete demo.
Use this extension and the browser library to create and sign in users with passkeys, link and unlink existing users to passkeys, and prompt signed-in users with a biometric verification request:
Methods
createUserWithPasskey: (auth: Auth, functions: Functions, name: string) => Promise<UserCredential>;
signInWithPasskey: (auth: Auth, functions: Functions) => Promise<UserCredential>;
linkWithPasskey: (auth: Auth, functions: Functions, name: string) => Promise<UserCredential>;
unlinkPasskey: (auth: Auth, functions: Functions) => Promise<void>;
verifyUserWithPasskey: (auth: Auth, functions: Functions) => Promise<void>;
Designed to be used like the Firebase JavaScript SDK:
import { createUserWithEmailAndPassword } from "firebase/auth";
import { createUserWithPasskey } from "@firebase-web-authn/browser";
class SignUpComponent {
constructor(
private readonly auth: Auth,
private readonly functions: Functions,
) {
// Firebase JavaScript SDK usage
this
.createUserWithEmailAndPassword = (email: string, password: string) => createUserWithEmailAndPassword(auth, email, password)
.then(() => void(0));
// FirebaseWebAuthn usage
this
.createUserWithPasskey = (name: string) => createUserWithPasskey(auth, functions, name)
.then(() => void(0));
}
public readonly createUserWithEmailAndPassword: (email: string, password: string) => Promise<void>;
public readonly createUserWithPasskey: (name: string) => Promise<void>;
}
Use the server library to confirm important actions happening server-side:
Methods
backupEligible: (uid: string, app?: App) => Promise<boolean | null>;
backupSuccessful: (uid: string, app?: App) => Promise<boolean | null>;
credentials: (uid: string, app?: App) => Promise<{ [key in "primary" | "backup"]: WebAuthnUserCredential | null }>;
lastPresent: (uid: string, app?: App) => Promise<Timestamp | null>;
lastVerified: (uid: string, app?: App) => Promise<Timestamp | null>;
Designed to be used within Firebase Functions or another secure context with access to Firestore to check users’ status with FirebaseWebAuthn:
import { getApps, initializeApp } from "firebase-admin/app";
import { lastVerified } from "@firebase-web-authn/server";
getApps().length === 0 && initializeApp();
// If the user was verified within the past 30 seconds, proceed. Otherwise, ask for reverification:
(await lastVerified(user.uid))?.seconds > (Date.now() / 1000) - 30 ?
proceed() :
askForReverification();
Prerequisites
Before installing this extension, you’ll need to set up these services in your project. This must be done both in the Firebase Console and initialized in the application:
- App Check with reCAPTCHA Enterprise or v3
- Authentication with the anonymous provider
- Firestore
- Functions
Additional Setup
Create a Firestore Database to store public key credentials with the ID
ext-firebase-web-authn
and location matching the function deployment. It is recommended to choose eithernam5
in North America oreur3
in Europe and to enable delete protection:% firebase firestore:databases:create ext-firebase-web-authn --location ${MULTI_REGION_NAME} --delete-protection ENABLED
As of September 2023, supported roles for Firebase Extensions do not include
iam.serviceAccounts.signBlob
which is needed for custom auth providers.- After deploying the extension, grant the
Service Account Token Creator
role to the extension’s service account in IAM underFirebase Extensions firebase-web-authn service account
> Edit > Assign roles. - If the service account isn’t appearing, click
Grant Access
and enter its address asext-firebase-web-authn@${PROJECT_ID}.iam.gserviceaccount.com
- After deploying the extension, grant the
The browser must reach FirebaseWebAuthn from the same domain as your website. Modify your
firebase.json
to include a rewrite on each app where you’d like to use passkeys:{ "hosting": [ { "target": "...", "rewrites": [ { "source": "/firebase-web-authn-api", "function": "ext-firebase-web-authn-api" } ] } ] }
Billing
To install an extension, your project must be on the Blaze (pay as you go) plan. This extension uses other Firebase and Google Cloud Platform services, which have associated charges if you exceed the service’s no-cost tier:
- Firestore Database
- Functions (Node.js 18 runtime)