NEW: Master Swift design patterns with my latest book! >>

< Previous: Touch to activate: Touch ID, Face ID and LocalAuthentication   Next: Project 29 >

Wrap up

The great thing about biometric authentication is that you don't get any access to fingerprints, face scans, or other secure information. Instead, the system does all the authentication for you, which keeps both your app and users safe.

If you want to take this project further, try using the #if compiler directives from project 26 to make the if true hack work for the simulator and be in the code at the same time as the real Touch ID/Face ID code.

If you're looking for something harder, try creating a password system for your app so that the Touch ID/Face ID fallback is more useful. You'll need to use the addTextField() from project 5, and I suggest you save the password in the keychain!

You did it! Now what?

You finished another project, and I'm glad Hacking with Swift helped you. Now I need your help. Please take just a moment out of your day to tell others about Hacking with Swift so they can benefit too.

You can click below to post a tweet straight to this project. Or if you're feeling particularly generous, you can click here to link to Hacking with Swift on your website and help spread the word.

Thank you. Your support is what keeps me going!

 

About the author

Paul Hudson is the creator of Hacking with Swift, the most comprehensive series of Swift books in the world. He's also the editor of Swift Developer News, the maintainer of the Swift Knowledge Base, and Mario Kart world champion. OK, so that last part isn't true. If you're curious you can learn more here.

Build for watchOS

Take your existing Swift skills to Apple's tiniest platform – check out Hacking with watchOS!

< Previous: Touch to activate: Touch ID, Face ID and LocalAuthentication   Next: Project 29 >
Click here to visit the Hacking with Swift store >>