Add strong authentication with Passkeys to your native iOS and Android applications, while providing a native experience. This describes how to use the React Native module to register credentials and use them to authenticate your users.
This SDK provides a unified solution for implementing both Apple's public-private key authentication for passkeys on iOS and Google's Credential Manager API for passkeys on Android. It enables the integration of FIDO2-based biometric authentication seamlessly into your mobile applications, offering users a native experience instead of a browser-based one. With passkeys, credentials are securely stored by the device, leveraging iCloud Keychain on iOS and Google Password Manager on Android. These credentials are associated with your domain, facilitating secure sharing between your mobile app and website if applicable.
Using this module, you can easily integrate our Authentication SDK into your React Native app for seamless and secure user identity authentication.
Learn more about how you can boost your security with Transmit Security Authentication.
We recommended that you read more about the verification flow required steps in our iOS documentation and Android documentation
To integrate this module, you'll need to configure an application.
- From the Applications page, create a new application or use an existing one.
- From the application settings:
- For Client type , select native
- For Redirect URI , enter your website URL. This is a mandatory field, but it isn't used for this flow.
- Obtain your client ID and secret for API calls, which are autogenerated upon app creation.
- Enable public sign-up if you manage users using an external system (e.g., external identity provider) or if you want to quickly test WebAuthn registration and authentication without first logging in using a different authentication method.
- Refer to our iOS and Android documentation mentioned above to configure an auth method and associate your domain for Apple and Google.
Note: Configuring Google's assetlinks.json and Apple's apple-app-site-association according to the guidelines in our native SDKs documentation and the user-guides provided by Apple and Google can be a challenging task. However, it is crucial to complete this step accurately for both utilizing the example app and configuring your own application. Instead of attempting to configure this example directly, you are welcome to use it just as a code-reference to ensure proper implementation.
- In your project, navigate to
example/src/config.ts
and configure the clientId, domain, secret and baseUrl using the configuration obtained from the Transmit portal. - Ensure you have all the necessary dependencies by running
yarn
in both the module's root folder and the example root folder. - Run the example app on a real device using Xcode or Android Studio. Alternatively, execute
yarn example ios
oryarn example android
.
Important Security Note: Never store your
secret
in a front-end application.The example app utilizes a mock server to manage communication with the authentication platform. This mock server employs the
secret
you have specified inexample/src/config.ts
exclusively for demonstration purposes. It is paramount that you safeguard yoursecret
in a secure and confidential location.
npm install react-native-ts-authentication
You might need to execute pod install
in your project's /ios
folder and set your minimum iOS target to 15.0 in your Podfile (e.g platform :ios, 15.0
).
- Add project Capabilities as described iOS quick start
- Update YOUR Bundle ID and setup associated domains as described in the iOS quick start
Add to app/build.gradle
under repositories
repositories {
google()
maven {
url('https://transmit.jfrog.io/artifactory/transmit-security-gradle-release-local/')
}
}
As for projects on Gradle 8+ and Kotlin 1.8+ build will fail if the JDK version between compileKotlin and compileJava and jvmTarget are not aligned.
This won't be necessary anymore from React Native 0.73. More on this: https://kotlinlang.org/docs/whatsnew18.html#obligatory-check-for-jvm-targets-of-related-kotlin-and-java-compile-tasks
- Open your project's
.xcworkspace
found underYOUR_PROJECT_PATH/iOS
in Xcode. - Create a plist file named TransmitSecurity.plist in your Application with the following content. CLIENT_ID is configured in your Transmit server. Make sure the file is linked to your target.
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
<plist version="1.0">
<dict>
<key>credentials</key>
<dict>
<!-- Use api.eu.transmitsecurity.io for EU, api.ca.transmitsecurity.io for CA -->
<key>baseUrl</key>
<string>https://api.transmitsecurity.io</string>
<key>clientId</key>
<string>CLIENT_ID</string>
</dict>
</dict>
</plist>
- Open your Android manifest XML file, usually located at
android/app/src/main
. - Update the strings.xml file in your Application with the following content. The CLIENT_ID should be replaced with your client ID
<resources>
<!-- Transmit Security Credentials -->
<string name="transmit_security_app_id">"default_application"</string>
<string name="transmit_security_client_id">"CLIENT_ID"</string>
<string name="transmit_security_base_url">https://api.transmitsecurity.io</string>
</resources>
import TSAuthenticationSDKModule from 'react-native-ts-authentication';
componentDidMount(): void {
// Setup the module as soon your component is ready
this.onAppReady().catch(e => void e);
}
private onAppReady = async (): Promise<void> => {
TSAuthenticationSDKModule.initializeSDK();
/*
Instead of using Plist and strings.xml, you can initialize the module with parameters:
1. ClientID obtained from the application settings in the Transmit portal
2. Custom Domain - Can be null (or undefined if not using BaseURL)
3. BaseURL - Can be null or undefined. "https://api.transmitsecurity.io" | eu = "api.eu.transmitsecurity.io" | ca = "api.ca.transmitsecurity.io"
TSAuthenticationSDKModule.initialize(
"YOUR_CLIENT_ID"
);
*/
}
onStartRegistrationProcess = async (): Promise<void> => {
try {
const response = await TSAuthenticationSDKModule.registerWebAuthn(username, displayName);
// use the response.result string to complete a successful registration in your backend.
} catch (error) {
console.error(`Error during registration process: ${error}`);
}
}
onStartAuthenticationProcess = async (): Promise<void> => {
try {
const response = await TSAuthenticationSDKModule.authenticateWebAuthn(username);
// use the response.result string to complete a successful authentication in your backend.
} catch (error) {
console.error(`Error authenticating the user: ${error}`);
}
}
onStartSignTransactionProcess = async (): Promise<void> => {
try {
const response = await TSAuthenticationSDKModule.signWebauthnTransaction(username);
// use the response.result string to complete a signing a transaction in your backend.
} catch (error) {
console.error(`Error signing a transaction: ${error}`);
}
}
• For iOS, ensure that you add the necessary permissions to use FaceID in your app's Info.plist file.
• For Android, add the following strings to your app's strings.xml file:
<resources>
<string name="BiometricPromptTitle">Authenticate with Biometrics</string>
<string name="BiometricPromptSubtitle">Use your device biometrics to authenticate.</string>
<string name="BiometricPromptCancel">Cancel</string>
</resources>
onRegisterNativeBiometics = async (username: string): Promise<void> => {
try {
const response = await TSAuthenticationSDKModule.registerNativeBiometrics(username);
// use the response.result string to complete biometrics registration in your backend.
} catch (error) {
console.error(`Error signing a transaction: ${error}`);
}
}
authenticateWithNativeBiometrics = async (username: string): Promise<void> => {
try {
const challenge = this.randomString();
const response = await TSAuthenticationSDKModule.authenticateNativeBiometrics(username, challenge);
// use the response.result string to complete biometrics authentication in your backend.
} catch (error) {
console.error(`Error signing a transaction: ${error}`);
}
}
private randomString = (): string => {
return (Math.random() + 1).toString(36).substring(7);
}
onGetDeviceInfo = async (): Promise<void> => {
try {
const response = await TSAuthenticationSDKModule.getDeviceInfo();
} catch (error) {
console.error(`Error getting device info: ${error}`);
}
}
onIsWebAuthenSupported = async (): Promise<void> => {
try {
const isSupported = await TSAuthenticationSDKModule.isWebAuthnSupported();
} catch (error) {
console.error(`Error checking if the device supports webAuthn: ${error}`);
}
}
- Please take note that the example application uses a client-side mock server. In a production environment, a real server is required. Additionally, it is crucial to emphasize that storing the client secret in your front-end application is strictly discouraged for security reasons.
Transmit Security, https://github.com/TransmitSecurity
This project is licensed under the MIT license. See the LICENSE file for more info.