Backup methods
A guide that goes over all of the various backup methods your users can use.
Passkey + Enclave Backup
Allow customers to create a native passkey on their device that is used to authenticate into a secure enclave that holds the encryption key for the user. Customer's passkeys are backed up to the native cloud storage for their device.
Implementation Requirements
Initialize passkey storage as a backup option in the Portal Config Object with the correct origin
Configuring the relying party
Relying Party Configuration
You have two options when it comes to relying party configurations. It is important that you understand the implications of this decision. A relying party is a trusted domain that is tied to the public key credentials of your users for their passkey.
Use Portal as your relying party
We offer the option to use portalhq.io
as your relying party domain. It requires you to add portalhq.io
as a trusted domain in your manifest file in your android application and share your applications SHA fingerprint and namespace with our team. We will add them to our own digital asset links file and that will allow your app to set portalhq.io
as the relying party.
Add
portalhq.io
as an included domain in your manifest file.Share your applications SHA fingerprint and namespace with the Portal Team.
Use your own relying party
Ensure you have set up your digital asset links url correctly in your app and that you are serving a digital asset links file from the URL you specified in the asset statement in your manifest file.
Read more about setting this up from the android docs: Configuring your Digital Asset Links file
Relying Party Origins
Regardless of the relying party decision you make above, you will need to set the relying party origin to:
read more info here on how to get the SHA256 hash of the apk signing cert.
Example
Initializing the passkey storage class
Calling backup
Password/Pin Backup
Allow customers to create a password/pin. Customers can either remember the password or store it in a password storage manager.
Implementation Requirements
Create a UI for password input.
Enforce password requirements. Customer can choose between password, PIN code, passcode, or any other text-based input.
If user forgets password there are no additional recovery options.
Google Drive
See the docs on how to Configure GDrive storage.
Configuring GDrive Backup
GDrive Backup Options
We provide the following backup options for GDrive in our latest V5+ version of the Android Portal SDK.
GDriveBackupOption.CustomFolder(optionalFolderName): Use this if you would like the key to wallet backup shares to be stored in a custom folder of your choice. This folder will be visible to the user in their GDrive app and they can delete it at any time so this option is considered less safe and we don't recommend it.
GDriveBackupOption.AppDataFolder: Use this option if you would like the key to the wallet backup shares to be stored in a private app-specific folder in GDrive. This folder is not visible to the user and they can not delete the key file unless they go to the GDrive settings and delete the app from the list of the apps connected. This option is safer and is recommended.
GDriveBackupOption.AppDataFolderWithFallback: Use this option if you are coming from v4 of the SDK and would like to use the AppDataFolder option in a backward-compatible way. With this option, new backup keys are stored in the app-specific folder in GDrive but when reading if the key is not found in app-specific folder then the SDK also checks in the GDrive overall to see if the key is available in a custom folder. This way the old backup keys are not lost when you upgrade from v4 to v5. Use this option only when you are upgrading from v3, v4 to V5 otherwise use AppDataFolder option.
If you do not pass in a backup option into portal.backupWallet()
we will default to GDRIVE
backup.
Last updated