From 0b56ec027aaf2f17c432128bc6c1045a723ca952 Mon Sep 17 00:00:00 2001 From: Madhumita Subramaniam Date: Thu, 15 Dec 2022 12:06:00 +0530 Subject: [PATCH] docs: testing note added (#3319) #2840 --- .../fido2-external-authenticator/README.md | 10 ++++++++++ 1 file changed, 10 insertions(+) diff --git a/docs/script-catalog/person_authentication/fido2-external-authenticator/README.md b/docs/script-catalog/person_authentication/fido2-external-authenticator/README.md index 7e787382929..6b8836e0c72 100644 --- a/docs/script-catalog/person_authentication/fido2-external-authenticator/README.md +++ b/docs/script-catalog/person_authentication/fido2-external-authenticator/README.md @@ -67,6 +67,16 @@ Follow the steps below to enable FIDO2 authentication: !!! Note If FIDO2 is set as a default authentication mechanism users will **not** be able to access the protected resource(s) while using a mobile device or a browser that does not support FIDO2 (e.g. Internet Explorer). + + +### Test the feature +To test, enter the complete URL for authorization in a browser or create a simple webpage with a link that simulates the user sign-in attempt. If the server is configured properly, the first page for the selected authentication method will be displayed to the user. + +An example of a complete URL looks like this - +``` +https:///jans-auth/authorize.htm?response_type=code&redirect_uri=https:///admin&client_id=&scope=openid+profile+email+user_name&state=faad2cdjfdddjfkdf&nonce=dajdffdfsdcfff +``` + ## FIDO2 login page Below is an illustration of the Janssen Server's default FIDO2 login page: