Posts

Post not yet marked as solved
1 Replies
1.2k Views
The WWDC23 video on deploying passkeys at Work (https://developer.apple.com/videos/play/wwdc2023/10263/?time=633) talks about a Corporate CA Server signing the Identity Certificate for the passkey, which can be further used during registration with the relying party. Where can I find more information on what protocol and specification this Corporate CA should follow here ? Is this based on protocols such as SCEP/ ACME (or) something else ? Also, where I can find information on what verification this Corporate Server can follow before signing that Identity Cert?
Posted
by venkyg.
Last updated
.
Post not yet marked as solved
0 Replies
584 Views
I'm trying to validate Managed Device Attestation. This works fine on iOS, and i'm trying to test with an Intel based MAC and an Apple Silicon MAC. For Intel MACs, I see the following error that it isn't able to generated the chip/ecid. I'm sending my device the ACME payload (https://developer.apple.com/documentation/devicemanagement/acmecertificate) with Attest and HardwareBound set to True. It seems to occur when it tries to get the Attestation Statement from Apple. The error is (from console App): attestation request failed with error Error Domain=com.apple.appattest.error Code=-1 "Failed to generate chip/ecid" UserInfo={NSLocalizedDescription=Failed to generate chip/ecid, NSUnderlyingError=0x7f8199326c60 {Error Domain=com.apple.appattest.error Code=-1 "Failed to retrieve UniqueChipID." UserInfo={NSLocalizedDescription=Failed to retrieve UniqueChipID.}}} And finally leads to, [ERROR] [0:Cert_PI:<0x24d1d>] [CE] ACME_Install failed ==> Error Domain=NSOSStatusErrorDomain Code=-67673 "failed to successfully respond to challenge" UserInfo={NSLocalizedDescription=failed to successfully respond to challenge}
Posted
by venkyg.
Last updated
.