-
Notifications
You must be signed in to change notification settings - Fork 0
Incorporate Prevent Silent Access into this proposal #1
Comments
This requirement looks like it's already mentioned in the explainer (though it doesn't go into detail). |
Ah, yes... It actually says in https://github.com/explainers-by-googlers/storage-access-for-fedcm?tab=readme-ov-file#saa-autogrants So, overhearing from @yi-gu, it sounds like this mechanism doesn't actually control auto-reauthentication on FedCM because it's controlled by the IdP itself (through .preventSilentAccess()) and thus not really a privacy thing but a developer ergonomics / expected behavior kind of question. I do want to be consistent with when FedCM gives out access to identifiers, so I'd be more inclined to align with its prevent silent access behavior. |
Per spec, From FedCM's perspective, post
For this proposal, it does not involve "handing over stored credential to API caller" because from privacy's perspective it only checks if the user has allowed communication between the RP and IdP. Since the It's worth noting that another key factor of this proposal is "RP must opt in for IdP to have storage access with FedCM grant". This is currently enforced by RP specifying proper Permissions Policy for the IdP iframe to use FedCM API. So we could discuss whether calling "PreventSilentAccess" is a signal that the RP is opting out. My personal opinions are:
|
@yi-gu does this mean that |
Sorry that I missed this questions! You are right that @bvandersloot-mozilla mentioned that "If a site goes out of its way to call navigator.credentials.preventSilentAccess(), then we shouldn't be using things from the credential store without a dialog." I agree with the statement for the previous usage of the credential store. e.g. if a user stored their password/passkeys, then they shouldn't be auto signed in post preventSilentAccess; if a user signed in via FedCM, similarly they shouldn't be auto re-authenticated without a dialog. Because in these use cases, it's the website that's requesting "silent access". In the storage access auto-grant use case, it's the 3P iframe (likely an IdP) that's requesting "silent access". From privacy's perspective, there's no IdP tracking concern by allowing auto-grant post WDYT? |
I disagree. In a 3pc-less world, a frame is part of the top level document from a privacy perspective. FedCM actually respects the Practical example: a user that registers an account with an IDP, then decides later to log out and switch to a passkey by just making a new account. FedCM can't auto-reauthenticate. Should the IDP be able to silently use 3pc in the background forever? |
True. It's worth noting that until the One concrete example of us putting high trust on the IdP for returning accounts is the User Info API which is to display the personalized sign-in buttons. Since it shouldn't be disabled with |
Sure! With FedCM as-is, the RP cannot gain data from the IDP without a user-prompt after
I bring up privacy because improving developer ergonomics should not weaken the privacy properties.
I didn't realize that was the case! I had forgotten about this! I suppose that makes my argument invalid, but raises questions about the privacy properties of that feature. |
Totally agree on this principle!
Yeah I think that's what we should align on. i.e. post the initial FedCM permission which has connected the RP and IdP, whether improving developer ergonomics (e.g. allowing auto-grant post preventSilentAccess, or the User Info API itself) actually weakens any privacy property. |
Talked to @bvandersloot-mozilla and @cfredric about this again, to figure out how to move forward here: It sounds like there are two different ways of looking at the privacy implications of calling Our preference for the initial MVP of the SAA autogrant would be to go the slightly more conservative route and match what FedCM does for exposing the token, i.e. respect This is, by the way, also what we had prototyped in Chrome as part of our Origin Trial. I'll close this issue and will file a new one on FedCM to pick the discussion back up. |
As @bvandersloot points out in fedidcg/LightweightFedCM#8, we should not auto-grant storage access if prevent silent access is activated for the top-level (RP) origin.
The text was updated successfully, but these errors were encountered: