-
Notifications
You must be signed in to change notification settings - Fork 74
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Feature request: provide developers more visibility of auto re-authentication #497
Comments
ProposalIn this proposal, the browser shares whether an explicit user permission was acquired in the transaction with both the IdP and RP whenever auto re-authentication occurred or an explicit mediation occurred. Note that the sharing only happens post user permission for IdP/RP communication. IdPTo share the information to the IdP post user permission, we can include it in the POST request sent to the
RP (API caller)The browser can share the information to the RP via IdentityCredential:
Privacy and Security ConsiderationSharing with IdPThe
The information in #1 and #2 is already known to the IdP by virtue of the RP having used the SDK. If the SDK is not used, it is still acceptable to expose this information to the IdP, as the RP has already trusted the IdP for federated sign-in and the additional information is closely related to the API. #3 is IdP populated information. The information in #4 and #5 is browser-specific information. As the user has already granted permission for the RP/IdP to communicate, revealing this information to the IdP does not introduce any privacy risks. Sharing with RP (API caller)We believe the same analysis above applies to RP as well. In addition, once an IdP has obtained the information, it can already share it with the RP via the opaque Considered AlternativesInstead of the browser sending the bit to both IdP and API callers directly, it can choose to only share it with the IdP, and then let the IdP share it with the RP. For example, IdP can integrate the information to the token string. While it’s suboptimal to overload the well-specified OIDC id token, they can also do so with some extra FedCM support:
While allowing IdP to add information in the response is better from extensibility’s perspective, e.g. they could add more fields to share more information with the API caller, we don’t find it very desirable at the moment. More importantly, we don’t think it’s mutually exclusive with our current proposal so we can add them later if needed. |
@yi-gu seems this should be a proposal under https://github.com/fedidcg/FedCM/tree/main/proposals ? |
thanks @asr-enid! To follow up from yesterday's call: while we'd like to keep the new proposals in "Issues" such that it's easier for other folks to comment on, we'd be happy to adapt to find ways to accommodate different cases (e.g. for folks who want to keep track on new proposals). In the interim, for FedCM changes in Chrome, there's a newsletter that one can subscribe to. |
Auto re-authentication is the default user mediation behavior in Credential Management API. However, auto re-authentication may be unavailable due to reasons that only the browser knows; when it’s unavailable the user may be prompted to sign in with explicit user mediation which is a flow with different properties.
Therefore, providing visibility of the auto re-authentication flow would be beneficial to developers.
The text was updated successfully, but these errors were encountered: