Secure Session Recovery
The SDK offers the option to store session wallet information securely on select platforms using native secure storage.
Recovering Sessions
By default, the SDK will require users to sign in everytime the app is closed completely. This is because, by default, we do not write the session wallet information (e.g. private keys) to any form of persistent storage for user security.
However, on select platforms, we have integrated with the platform’s native secure storage offering.
If you enable StoreSessionPrivateKeyInSecureStorage
in your SequenceConfig
ScriptableObject, we will automatically store the session wallet information for you (on supported platforms) and expose the ability to attempt to recover the session in SequenceLogin
. The default LoginPanel
will automatically handle the UI flow for this as well (see Authentication). If the platform is not supported, this flag will have no effect.
See below the supported platforms and to learn about the platform’s secure storage solution - it is important to understand the basics of how these systems work and think carefully about the security implications of storing private keys (or any secret for that matter) in persistent storage.
iOS
On iOS, we leverage the iOS Keychain.
MacOS
On MacOS, we leverage the MacOS Keychain.
KeychainAccess.mm
and replace the .bundle
. Please see our note in GitHub: https://github.com/0xsequence/sequence-unity/blob/master/Packages/Sequence-Unity/Plugins/MacOS/KeychainAccess.mmWindows
On Windows PCs, we leverage the Crypto: Next Generation - Data Protection API (CNG DPAPI)
Web
On Web builds, we leverage IndexedDB via PlayerPrefs.
Android
On Android builds, we leverage the Android Keystore.
Our Keystore plugin for Unity (included in the SDK) requires a Custom Main Gradle Template. Please navigate to your Project Settings, then under Player > Publishing Settings
enable Custom Main Gradle Template
. This will create a file Assets/Plugins/Android/mainTemplate.gradle
(or similar, the editor will show you the path) if you don’t have one already. Here is an example mainTemplate.gradle
file; please copy/paste this (or incorporate into your existing file).
Our Keystore plugin also requires a Custom Gradle Properties Template. Again, navigate to your Project Settings, then under Player > Publishing Settings
enable Custom Gradle Properties Template
. This will create a file Assets/Plugins/Android/gradleTemplate.properties
(or similar, the editor will show you the path) if you don’t have one already. Here is an example gradleTemplate.properties
file; please copy/paste this (or incorporate into your existing file).
Editor
In the editor, we use PlayerPrefs for private key storage. You will also need to enable ‘EditorStoreSessionPrivateKeyInSecureStorage’ in SequenceConfig in order to use secure storage and recover sessions from within the editor. This separate flag makes it easier for you to test both flows without modifying the behaviour of your builds. Secure storage in the editor is for development purposes only and should not be considered secure for long-term storage.
Was this page helpful?