-
Notifications
You must be signed in to change notification settings - Fork 74
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Create a passkey and a federated assertion in a single unified prompt #671
Comments
That might work. The current behavior says "For create(), if a user has previously consented to credential creation and the user agent knows it recently mediated an authentication, then the create() call may resolve without additional prominent modal interaction. If the user agent did not recently mediate an authentication or does not have consent for credential creation, then the call must throw a "NotAllowedError" DOMException." so technically it currently would just throw right away but perhaps it can wait if there is a pending FedCM call. I'm not sure if it is compatible with the existing semantics but if not then another mediation type can be added too... |
This would be allowed in the existing WebAuthn Conditional Create mode. One thing to think about would be an input to FedCM that defines a mapping from the FedCM response to The other thing we'd have to think about is how to get |
The accounts endpoint does respond with an id and a name already: |
Yes, but that's an identifier from the IdP, not the account identifier at the RP. |
Hi Sam, This is interesting. I have a few questions or observations if you don't mind:
|
@philsmart the goal with this flow in consumer scenarios would be to use federated sign in for account creation / sign up (e.g. maybe get a verified email and phone number) and then use a passkey for subsequent sign ins directly to the service (federation would not be used for account sign in at the service). |
also, everything in this flow is already possible today, it just requires more calls, clicks, and user interactions. The goal is to optimize this scenario by taking advantage of a new WebAuthn capability for passkey creation. |
I see, thanks, @timcappalli. This proposal would be one operating mode of FedCM, but not the only one? |
My understanding is that FedCM would be invoked as usual, but if the site also tries to create a passkey with conditional mediation (with its separate method) then we'd do that right after FedCM is used. So it's just something optional: if the developer does not want to use passkeys after FedCM, it won't happen. |
I guess this is one step closer to using a Digital Credential (e.g. a verified email address credential) to create a local account and then a passkey to authenticate. |
exactly |
I chatted a bit more with @timcappalli and @balfanz on this at IIW, and learned that this is not actually how the conditional create works. Apparently, the conditional create works by being called after password creation happens, and being "auto accepted" when that happens. So, I think the correct construction would be: // Gets the user's identity
const identificaiton = await navigator.credentials.get({
identity: ...
});
// Create an account on the server
const {id, email} = await fetch(`/create_account.php`, identification);
// Gets a free passkey.
// The following call gets resolved without any permission prompt
// if called within a certain time range from the FedCM one.
const authentication = await navigator.credentials.create({
publicKey: {
// ... other stuff
user: {
id: id,
email: email,
},
// ... other stuff
},
mediation: "conditional"
});
// Sends passkey to the server @timcappalli did I get this right? |
The general idea of separating identification from authentication has been around for a while, specially in the context of Social login, where OIDC is (unfortunately?) used for both. Since we are getting to the point where we can run an oauth profile in browser UI, it also means that the browser can also unify various flows into a more cohesive UI prompt.
I think the general sense is that there are many circumstances where we'd like to use OIDC for identification but very quickly use passkeys for what they are best, authentication. Some of the obvious reasons is that it feels unnecessary to have the IdP involved in every Sign-in.
While this isn't necessarily a new trend, it wasn't clear to me how we'd reconcile these APIs: do we extend the Credential Manager API? do we embed a FedCM in a Passkey create? Do we embed a Passkey create in a FedCM call?
What I think recently changed was the introduction of
mediation: conditional
to WebAuthn and the de-coupling between the WebAuthn API and the construction of the UI.So, in this framing, we would:
The browser, with both of these calls made, can know that both calls are hanging, and can build a UI that can represent both prompts, largely TBD what the pixels actually look like. When the prompt is accepted, both promises are resolved.
Here is a code snippet of what that might look like:
The text was updated successfully, but these errors were encountered: