User verification may be instigated through various authorization gesture modalities: a touch plus PIN code, password entry, or biometric recognition (presenting a fingerprint). The intent is to be able to distinguish individual users.
Eligible authenticators are filtered and only capable of satisfying this requirement will interact with the user.
Possible user verification values are:
required: this value indicates that the application requires user verification for the operation and will fail the operation if the response does not have the
preferred: this value indicates that the application prefers user verification for the operation if possible, but will not fail the operation if the response does not have the
discouraged: this value indicates that the application does not want user verification employed during the operation (e.g.,in the interest of minimizing disruption to the user interaction flow).
Public constants are provided by