CKey

A Chrome Extension that emulates a Hardware Authentication Device

Cos'è CKey?

CKey è un'estensione di Chrome sviluppata da chomekeyextension, e la sua funzione principale è "A Chrome Extension that emulates a Hardware Authentication Device".

Screenshot dell'Estensione

screenshot

Scarica il file CRX dell'estensione CKey

Scarica i file di estensione CKey in formato crx, installa manualmente le estensioni di Chrome nel browser o condividi i file crx con gli amici per installare facilmente le estensioni di Chrome.

Istruzioni per l'Uso dell'Estensione

                        Chrome Key emulates a Hardware Authentication Device. It is capable of answering Webauthn requests for both registering new keys and authenticating with existing ones.

The purpose is to allow developers to test their applications without requiring having an actual device in hand.

It relies on browser standards such as Web Cryptography API and Concise Binary Object Representation for generation and interaction with key material.

This will never be able to provide the same security guarantees as a real HAD, so use it for development, debugging and testing only.

A 3-post blog series was written, touching different portions of this extension, its guarantees and lack of. The first post of the series may be found here https://blog.joaopeixoto.net/chrome-key-an-extension-story/.                    

Informazioni di Base sull'Estensione

Nome CKey CKey
ID fjdlagkdaoginbnmlhcpochmeecjgcah
URL Ufficiale https://chromewebstore.google.com/detail/ckey/fjdlagkdaoginbnmlhcpochmeecjgcah
Descrizione A Chrome Extension that emulates a Hardware Authentication Device
Dimensione del File 163 KB
Conteggio Installazioni 47
Versione Corrente 1.0.2
Ultimo Aggiornamento 2020-01-26
Data di Pubblicazione 2020-01-26
Sviluppatore chomekeyextension
Tipo di Pagamento free
Lingue Supportate en-US
manifest.json
{
    "update_url": "https:\/\/clients2.google.com\/service\/update2\/crx",
    "manifest_version": 2,
    "name": "CKey",
    "description": "A Chrome Extension that emulates a Hardware Authentication Device",
    "version": "1.0.2",
    "minimum_chrome_version": "36.0.1985.18",
    "content_scripts": [
        {
            "all_frames": true,
            "matches": [
                "https:\/\/*\/*"
            ],
            "exclude_matches": [
                "https:\/\/*\/*.xml"
            ],
            "run_at": "document_start",
            "js": [
                "js\/content_script.js"
            ]
        }
    ],
    "background": {
        "persistent": false,
        "scripts": [
            "js\/babel_polyfill.js",
            "js\/background.js"
        ]
    },
    "content_security_policy": "script-src 'self' 'unsafe-eval'; object-src 'self'",
    "page_action": {
        "default_icon": {
            "16": "images\/lock-16.png",
            "32": "images\/lock-32.png",
            "48": "images\/lock-48.png",
            "128": "images\/lock-128.png"
        }
    },
    "icons": {
        "16": "images\/lock-16.png",
        "32": "images\/lock-32.png",
        "48": "images\/lock-48.png",
        "128": "images\/lock-128.png"
    },
    "permissions": [
        "tabs",
        "storage",
        "https:\/\/*\/*",
        "http:\/\/*\/*"
    ],
    "web_accessible_resources": [
        "js\/inject_webauthn.js",
        "img\/*"
    ]
}