Table of Contents
TABLE OF CONTENTS....................................................................................................3
1DOCUMENT INFORMATION ....................................................................................... 5
2OVERVIEW ISHIELD KEY .......................................................................................... 5
3SWISSBIT MANAGEMENT TOOLS ................................................................................... 7
ISHIELD KEY MANAGER COMMAND LINE TOOL ........................................................................... 7
FIDO Command.......................................................................................................................................7
HOTP Command......................................................................................................................................8
PIV Command.........................................................................................................................................8
4FIDO2 APPLICATIONS (STANDARD)................................................................................10
OVERVIEW ...........................................................................................................10
FIDO2 Registration ...............................................................................................................................10
FIDO2 Login ...........................................................................................................................................11
GETTING STARTED WITH FIDO2 APPLICATIONS........................................................................... 11
Preconditions.......................................................................................................................................11
PIN Setup of Swissbit iShield Key......................................................................................................11
Test Registration..................................................................................................................................13
Test Login..............................................................................................................................................14
Register Swissbit iShield Key on an online Microsoft account .....................................................16
Usernameless/Passwordless Sign-in on an online Microsoft account ........................................20
Sign-in with external Identity Provider ..........................................................................................20
SWISSBIT ISHIELD KEY ON VARIOUS SERVICES........................................................................... 28
Auth0.....................................................................................................................................................28
Bitbucket ..............................................................................................................................................32
Github ...................................................................................................................................................34
Amazon Web Service (AWS) ................................................................................................................37
5HOTP APPLICATIONS ............................................................................................ 39
OVERVIEW AND FUNCTIONALITY ....................................................................................... 39
Registration..........................................................................................................................................39
HOTP Computation...............................................................................................................................39
Password Generation and Authentication ......................................................................................40
Counter Resynchronization................................................................................................................41
6PIV APPLICATIONS............................................................................................... 42
OVERVIEW USE CASES.................................................................................................42
Logon.....................................................................................................................................................43
Bitlocker................................................................................................................................................44
Active Directory....................................................................................................................................44
UNDERLYING COMPONENTS........................................................................................... 45
Token Provisioning and Usage on Windows ...................................................................................45
Authentication.....................................................................................................................................45
Certificate Slots ....................................................................................................................................45
REQUIREMENTS...................................................................................................... 46
GETTING STARTED WITH PIV ON ISHIELD KEY PRO ...................................................................... 46
PIV Installation Package.....................................................................................................................46
Installation of the OpenSC Minidriver and iShield PIV Module ....................................................46
Preparation of the iShield Key Pro ...................................................................................................49
Reset the iShield Key Pro ...................................................................................................................49
USE CASE:LOCAL ACCOUNT BITLOCKER ................................................................................ 50