Is the user.id parameter a printable string or a opaque sequence of bytes? #515
Replies: 3 comments 1 reply
-
My thinking here has been that how the Relying Party chooses to identify users during registration should be easy to see when debugging (in the browser console) during auth. If the RP has a privacy-preserving, prescribed format for user identifiers (e.g. That said I've had this conversation recently over in the py_webauthn project that I professionally maintain at my day job: duo-labs/py_webauthn#187 (comment) tl;dr: I ended up updating that library to accept an optional It's probably time I make a similar change here for the same reasons 🤔 |
Beta Was this translation helpful? Give feedback.
-
Good day, I came across this conversation (fix/simplify-encoding-user-handle-in-assertion-response) while debugging an issue in reusing a passkey that was created by another client layer on the same machine/laptop. It seems the other client layer (another JavaScript library that persisted or created the passkey) is doing what this library was doing prior to this pull request i.e. converting the |
Beta Was this translation helpful? Give feedback.
-
Hi @MasterKale Thanks and regards |
Beta Was this translation helpful? Give feedback.
-
I was trying to use this library to simplify the JSON decoding/encoding associated with registering/authenticating quirks in the browser with webauthn, but I ran into a weird issue.
Based on the Spec, I filled the user.id field with 64 bytes of random data, but when your library decodes the field, it doesn't use the base64URLStringToBuffer function like I would have expected. Instead it appears to decode the field as a printable string (utf8StringToBuffer)?
Is there something I'm missing?
Beta Was this translation helpful? Give feedback.
All reactions