The great thing about biometric authentication is that you don't get any access to fingerprints, face scans, or other secure information. Instead, the system does all the authentication for you, which keeps both your app and users safe.
If you want to take this project further, try using the
#if compiler directives from project 26 to make the
if true hack work for the simulator and be in the code at the same time as the real Touch ID/Face ID code.
If you're looking for something harder, try creating a password system for your app so that the Touch ID/Face ID fallback is more useful. You'll need to use the
addTextField() from project 5, and I suggest you save the password in the keychain!
You finished another project, and I'm glad Hacking with Swift helped you. Now I need your help. Please take just a moment out of your day to tell others about Hacking with Swift so they can benefit too.
You can click below to post a tweet straight to this project. Or if you're feeling particularly generous, you can click here to link to Hacking with Swift on your website and help spread the word.
Thank you. Your support is what keeps me going!
Paul Hudson is the creator of Hacking with Swift, the most comprehensive series of Swift books in the world. He's also the editor of Swift Developer News, the maintainer of the Swift Knowledge Base, and Mario Kart world champion. OK, so that last part isn't true. If you're curious you can learn more here.
Build for watchOS
Take your existing Swift skills to Apple's tiniest platform – check out Hacking with watchOS!