A modern web-based management tool for Feitian Security Keys, supporting FIDO2, U2F, PIV, OpenPGP, OTP, and NDEF protocols.
This project uses a three-tier architecture:
Web UI (React + Vite + TypeScript)
⇅ window.postMessage / content script
Chrome Extension (Manifest V3)
⇅ chrome.runtime.connectNative()
Native Host (Rust binary, JSON-RPC)
⇅ PC/SC (CCID), HIDAPI
Feitian Security Key (Vendor ID: 0x096e)
feitian-sk-manager/
├── .github/workflows/ # CI/CD pipelines
├── web/ # React frontend (Vite + TypeScript)
├── extension/ # Chrome Extension (Manifest V3)
├── native/ # Rust native messaging host
└── docs/ # Documentation
- Tech Stack: React 18, TypeScript, Vite
- Design: Black & white minimalist UI with 24px border radius
- Features: Device management, protocol configuration, certificate handling
- Manifest: V3
- Purpose: Bridge between web UI and native host
- Permissions: nativeMessaging, storage
- Language: Rust
- Protocol: JSON-RPC over stdin/stdout
- Libraries: pcsc (CCID), hidapi (FIDO/OTP), serde_json, tokio
- Node.js 18+ and npm
- Rust 1.70+ and Cargo
- Chrome or Edge browser
cd web
npm install
npm run dev # Start dev server
npm run build # Production buildcd native
cargo build # Debug build
cargo build --release # Production build
cargo test # Run testscd extension
# Load unpacked extension in Chrome:
# 1. Navigate to chrome://extensions/
# 2. Enable "Developer mode"
# 3. Click "Load unpacked"
# 4. Select the extension/ directory# All components
npm test # From root directory
# Individual components
cd web && npm test
cd native && cargo test- Install the Chrome Extension from the Chrome Web Store (coming soon)
- Download and install the native host for your platform:
- Windows: Download .exe installer
- macOS: Download .pkg
- Linux: Download .deb or .rpm
See Development Setup above.
This application supports Feitian security keys with Vendor ID 0x096e, including:
- ePass FIDO (PID: 0x0850)
- ePass FIDO-NFC (PID: 0x0852)
- BioPass FIDO (PID: 0x0853)
- AllinPass FIDO (PID: 0x0854)
- ePass K9 FIDO (PID: 0x0856)
- FIDO2 (CTAP2): PIN management, credential management, device reset
- U2F (CTAP1): Registration and authentication
- PIV: Certificate management, key generation, PIN/PUK management
- OpenPGP: Key import/export, card data management
- OTP: HOTP configuration (TOTP coming soon)
- NDEF: NFC data read/write
Contributions are welcome! Please read our Contributing Guide for details.
This project is licensed under the MIT License - see the LICENSE file for details.
For security concerns, please email security@example.com.
- Inspired by YubiKey Manager and similar tools
- Built with modern web technologies
- Designed for security and usability