Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

FedCM - Federated Credential Management API #309

Open
marcoscaceres opened this issue Jan 29, 2024 · 9 comments
Open

FedCM - Federated Credential Management API #309

marcoscaceres opened this issue Jan 29, 2024 · 9 comments
Assignees

Comments

@marcoscaceres
Copy link
Contributor

marcoscaceres commented Jan 29, 2024

WebKittens

@othermaciej, @pascoej, @rmondello, @g-davidson, @annevk, @marcoscaceres, @johnwilander.

Title of the spec

Federated Credential Management API

URL to the spec

https://fedidcg.github.io/FedCM/

URL to the spec's repository

https://github.com/fedidcg/FedCM/

Issue Tracker URL

https://github.com/fedidcg/FedCM/issues/

Explainer URL

https://github.com/fedidcg/FedCM/blob/main/explainer.md

TAG Design Review URL

w3ctag/design-reviews#718

Mozilla standards-positions issue URL

No response

WebKit Bugzilla URL

No response

Radar URL

No response

Description

Allows users to login to websites with their federated accounts in a privacy preserving manner.

@yi-gu
Copy link

yi-gu commented Jan 30, 2024

Thanks for merging the requests! When we ship new FedCM extensions in Blink in the future, should we link to this thread instead of opening new ones?

Some extra context: here's the support we received from webkit-dev before shipping FedCM API in Blink. In addition, Mozilla is "broadly supportive" of the FedCM API. They started prototyping in Firefox and have been collaborating with the Chrome team on a handful of spec PRs. Edge recently showed their support of the FedCM API as well.

@marcoscaceres marcoscaceres self-assigned this Feb 29, 2024
@marcoscaceres
Copy link
Contributor Author

marcoscaceres commented Mar 19, 2024

Seems we already gave a position to FedCM on the blink-dev mailing list:
https://lists.webkit.org/pipermail/webkit-dev/2022-March/032162.html

We are generally supportive and interested in working together to make this coexist well with passkeys.

@RByers
Copy link

RByers commented Mar 20, 2024

Yeah that's what we've referred to as "WebKit support" in our Chromium tracking. I was just wondering if maybe it would be a good idea to get this onto the standards position list too, to improve visibility?

@samuelgoto
Copy link

Mozilla standards-positions issue URL

FWIW, here is a link to Mozilla's Standards position:

mozilla/standards-positions#618 (comment)

It is almost 2 years old (FedCM has evolved a lot since then) so we should probably ask them to refresh their position, but figured it would be helpful at least to have something there.

@marcoscaceres
Copy link
Contributor Author

Sorry, it's difficult for us to review this because the spec has gotten rather chunky (not a bad thing... but it means that it continues to be challenging to find time to dive into all the details). Continuing to try to get to it.

@samuelgoto
Copy link

No worries! We would be happy to jump on a call to walk you through it if that helps, as well as give you a sense of directionality (e.g. with passkeys, DBSC, the Login Status API and the digital credentials API)

@marcoscaceres
Copy link
Contributor Author

marcoscaceres commented May 1, 2024

@samuelgoto, that would help a lot. At the same time, I really would need folks like @rmondello and @pascoej and a few folks that know Web Authn well in the WebKit community to provide an opinion (this is a bit outside my purview... otherwise all you would get is "Marcos' hilariously uninformed option 👍").

@samuelgoto
Copy link

I'd also recommend coordinating with @johnwilander.

@Bug-Reaper

This comment was marked as off-topic.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

6 participants