summaryrefslogtreecommitdiff
path: root/internal/oidc/const.go
diff options
context:
space:
mode:
authorJames Elliott <james-d-elliott@users.noreply.github.com>2023-04-15 02:04:42 +1000
committerGitHub <noreply@github.com>2023-04-15 02:04:42 +1000
commit2733fc040cc43269889f5e11fd64c1fdb2e09ebd (patch)
tree2459462966d202d1177fb166a83a476c2e9c5a51 /internal/oidc/const.go
parent37a49b21af4550525890a84b5a7ccf6f1ed51243 (diff)
refactor: webauthn naming (#5243)
Signed-off-by: James Elliott <james-d-elliott@users.noreply.github.com>
Diffstat (limited to 'internal/oidc/const.go')
-rw-r--r--internal/oidc/const.go6
1 files changed, 3 insertions, 3 deletions
diff --git a/internal/oidc/const.go b/internal/oidc/const.go
index 01670e317..3680923c3 100644
--- a/internal/oidc/const.go
+++ b/internal/oidc/const.go
@@ -195,7 +195,7 @@ const (
// a user presence test. Evidence that the end user is present and interacting with the device. This is sometimes
// also referred to as "test of user presence" as per W3C.WD-webauthn-20170216.
//
- // Authelia utilizes this when a user has used Webauthn to authenticate and the user presence flag was set.
+ // Authelia utilizes this when a user has used WebAuthn to authenticate and the user presence flag was set.
// Factor: Meta, Channel: Meta.
//
// RFC8176: https://datatracker.ietf.org/doc/html/rfc8176
@@ -208,7 +208,7 @@ const (
// containing only numbers) that a user enters to unlock a key on the device. This mechanism should have a way to
// deter an attacker from obtaining the PIN by trying repeated guesses.
//
- // Authelia utilizes this when a user has used Webauthn to authenticate and the user verified flag was set.
+ // Authelia utilizes this when a user has used WebAuthn to authenticate and the user verified flag was set.
// Factor: Meta, Channel: Meta.
//
// RFC8176: https://datatracker.ietf.org/doc/html/rfc8176
@@ -244,7 +244,7 @@ const (
// AMRHardwareSecuredKey is an RFC8176 Authentication Method Reference Value that
// represents authentication via a proof-of-Possession (PoP) of a hardware-secured key.
//
- // Authelia utilizes this when a user has used Webauthn to authenticate. Factor: Have, Channel: Browser.
+ // Authelia utilizes this when a user has used WebAuthn to authenticate. Factor: Have, Channel: Browser.
//
// RFC8176: https://datatracker.ietf.org/doc/html/rfc8176
AMRHardwareSecuredKey = "hwk"