Forked from Crypho AS - Cordova plugin Secure Storage.
This plugin is for use with Cordova and allows your application to securely store secrets on iOS & Android phones.
- Android
- iOS
- Browser (mock-only, key/values are stored unencrypted)
Below are the methods for installing this plugin automatically using command line tools. For additional info, take a look at the Plugman Documentation and Cordova Plugin Specification.
The plugin can be installed via the Cordova command line interface:
- Navigate to the root folder for your phonegap project.
- Run the command:
cordova plugin add https://github.com/kunder-lab/cordova-plugin-secure-storage
or if you want to be running the development version,
cordova plugin add https://github.com/kunder-lab/cordova-plugin-secure-storage.git
####Create a namespaced storage.
// Using callbacks
var ss = new cordova.plugins.SecureStorage(
function () { console.log('Success')},
function (error) { console.log('Error ' + error); },
'my_app');
// With no callbacks
var ss = new SecureStorage('my_app');
// Using callbacks
ss.set(
function (key) { console.log('Set ' + key); },
function (error) { console.log('Error ' + error); },
'mykey', 'myvalue');
// Using promises
ss.set('mykey', 'myvalue')
.then(function () { console.log('Success')})
.catch(function (error) { console.log('Error ' + error); });
where key
and value
are both strings.
// Using callbacks
ss.get(
function (value) { console.log('Success, got ' + value); },
function (error) { console.log('Error ' + error); },
'mykey');
// Using promises
ss.get('mykey')
.then(function () { console.log('Success')})
.catch(function (error) { console.log('Error ' + error); });
// Using callbacks
ss.remove(
function (key) { console.log('Removed ' + key); },
function (error) { console.log('Error, ' + error); },
'mykey');
// Using promises
ss.remove('mykey')
.then(function () { console.log('Success')})
.catch(function (error) { console.log('Error ' + error); });
##Platform details
On iOS secrets are stored directly in the KeyChain through the SSKeychain library.
It it possible to configure the accessibility of the keychain by setting the KeychainAccessibility
preference in the config.xml
to one of the following strings:
- AfterFirstUnlock
- AfterFirstUnlockThisDeviceOnly
- WhenUnlocked
- WhenUnlockedThisDeviceOnly
- Always
- AlwaysThisDeviceOnly
- WhenPasscodeSetThisDeviceOnly (this option is available only on iOS8 and later)
For reference what these settings mean, see Keychain Item Accessibility Constants.
For example, include in your config.xml
the following:
<platform name="ios">
<preference name="KeychainAccessibility" value="WhenUnlocked"/>
</platform>
iOS 7 is supported without WhenPasscodeSetThisDeviceOnly
option.
How to test the plugin using iOS 7 simulator:
- Download and install Xcode 6 into a separate folder, e.g. /Application/Xcode 6/
- Run
$ xcode-select --switch <path to Xcode6>/Contents/Developer
- Build Cordova app with the plugin and run it in iOS 7 simulator
On Android there does not exist an equivalent of the iOS KeyChain. The SecureStorage
API is implemented as follows:
- A random 256-bit AES key is generated in the browser.
- The AES key encrypts the value.
- The AES key is encrypted with a device-generated RSA (RSA/ECB/PKCS1Padding) from the Android KeyStore.
- The combination of the encrypted AES key and value are stored in
localStorage
.
The inverse process is followed on get
. AES is provided by the sjcl library.
Android will not allow the creation of cryptographic keys unless the user has enabled at least PIN locking on the device.
If you want to skip this limitation, it's possible to store the keys not encripted by using this preference in your config.xml
:
<preference name="shouldUseEncriptedStorage" value="false" />
WARNING: this will store the generated keys in a not so secure way.
The browser platform is supported as a mock only. Key/values are stored unencrypted in localStorage.
-
I get the error
cordova.plugins.SecureStorage is not a function
, what gives?You can instantiate the plugin only after the
deviceready
event is fired. The plugin is not available before that. Also make sure you use the plugin after its success callback has fired. -
Do my users really need to set a PIN code on their android devices to use the plugin?
Yes, sorry. Android will not allow the creation of cryptographic keys unless the user has enabled at least PIN locking on the device.
The MIT License
Copyright (c) 2016 kunder.
Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to deal
in the Software without restriction, including without limitation the rights
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
copies of the Software, and to permit persons to whom the Software is
furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in
all copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
THE SOFTWARE.
libscrypt is Copyright (c) 2013, Joshua Small under the BSD license. See src/libscrypt/LICENSE