This document walks you through integrating the TruValidate Multifactor Authentication Core Auth SDK for iOS and Android apps. To use our library, you must have the TruValidate Multifactor Authentication Service and TruValidate Multifactor Authentication Core Auth SDK configured and connected.
Before integrating the TruValidate Multifactor Authentication Authenticator SDK with your app, an administrator must complete the following steps:
From a mobile device, download and install the TruValidate Multifactor Authentication Authenticator app from either the Google Play Store or the Apple App Store.
Run the TruValidate Multifactor Authentication Authenticator app and tap Get Started.
Complete the Link page. This includes:
A username and device name. You will use this username to log into the TruValidate Multifactor Authentication Admin Center. The device name will appear when you review linked devices.
Choose which communication channel you want to use to complete account creation and device registration. You can choose Email and/or SMS. Accept the terms and agreements, then tap Done.
Based on the linking method(s) you chose, you will receive an email and/or text message with a link that you must follow to complete account creation
and link your device to the TruValidate Multifactor Authentication Admin Center.
To log in, enter the username that you entered into the TruValidate Multifactor Authentication Authenticator app when you linked the device.
On the device, authorize the login. If any security auth methods have been enabled, you will be prompted to complete them before you can complete authorization.
Now that you are in the TruValidate Multifactor Authentication Admin Center, click the left navigation button and select Organizations. The All Organizations page
Click the New Organization button. The Create New Organization screen appears.
Enter a name for the organization, provide your name and email address (or name and email address of an admin user).
Complete the Create New Organization Screen.
The user whose email you entered will receive a confirmation email. Click the confirmation email to complete creation of the
Back in the TruValidate Multifactor Authentication Admin Center, open the organization you created. Expand the menu button on the left of the screen and select
Organizations, then click the organization.
From within the organization, select the Directories tab.
Click the New Directory button to create a new directory. Enter a name for the directory and click the Submit button.
Directory details appear. From here, on the General tab, you can see a Authenticator SDK Keys list. Capture the Authenticator SDK Key.
You will need it later when integrating the TruValidate Multifactor Authentication SDK into your app.
Also on the General tab, under Services, click the NEW SERVICE button. The Create New Service screen appears.
Enter a name and description for the service. Optionally choose an avatar file, read and accept the Terms of Service and click
the Create Service button.
These permissions are declared in the SDK’s manifest and are automatically merged by the Android Gradle plugin. Keep this in mind if your build process modifies the manifest for any reason.
<!-- IF INTERESTED IN SUPPORTING THE NOW-DEPRECATED PEBBLE KIT SDK --><uses-sdktools:overrideLibrary="com.getpebble.android.kit"/><uses-permissionandroid:name="android.permission.USE_BIOMETRIC"/><uses-permissionandroid:name="android.permission.USE_FINGERPRINT"/><!-- permission required by Samsung's Pass SDK --><uses-permissionandroid:name="com.samsung.android.providers.context.permission.WRITE_USE_APP_FEATURE_SURVEY"/><uses-permissionandroid:name="android.permission.INTERNET"/><uses-permissionandroid:name="android.permission.ACCESS_NETWORK_STATE"/><uses-permissionandroid:name="android.permission.BLUETOOTH"/><uses-permissionandroid:name="android.permission.BLUETOOTH_ADMIN"/><!-- Needed only if your app targets Android 5.0 (API level 21) or higher. --><uses-featureandroid:name="android.hardware.location.gps"/>
Add the following .plist permissions to your project and provide description values for each permission.
<key>NSBluetoothPeripheralUsageDescription</key><string>Bluetooth is used for the Wearables auth method</string><key>NSCameraUsageDescription</key><string>The camera is used to capture QR codes</string><key>NSLocationWhenInUseUsageDescription</key><string>Location services are used for the Locations auth method</string><key>NSFaceIDUsageDescription</key><string>Face ID is used as an auth method</string>
//Required for Xcode 11+
<key>NSBluetoothAlwaysUsageDescription</key><string>Bluetooth is used for the Wearables auth method</string>
Our latest releases are also available as XCFrameworks.
Add the Authenticator framework to your project.
In Xcode 12+, add LKCAuthenticator.framework or LKCAuthenticator.xcframework to your project, as an embedded framework. Ensure the framework is visible in your build target’s Frameworks, Libraries, and Embedded Content with the option Embed & Sign selected.
In Xcode 10 and earlier, ensure the framework is visible in your build target’s Embedded Binaries and Linked Frameworks and Libraries.
Ensure that the permissions requirements are met.
After including the sdk into your app, you must configure the sdk. Read the next section for more information.
The Core Auth SDK for both platforms can be split up into separate packages/modules, each with their own set of responsibilities and functionality. To take advantage of our SDK, you need to setup each module. Begin with Authentication Management as it is a dependency for the others.
The basic setup for the Core Auth SDK should now be fully configured. The SDK can be configured to use and handle additional features. It is recommended to read the following components to enable a more UX friendly experience for your application.
TransUnion links to user contributed code as a resource to its
community. TransUnion does not in any way guarantee or warrant
the quality and security of these code bases. User contributed code is supported by the
creators. If you do find a link from the site to user contributed code that is malicious or inappropriate in any
way, please report that link to TransUnion immediately and we will investigate the claim. Submit any issue to
TransUnion support at https://transunion.com/support.