Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Describe how to determine authenticator attachment from transports #1670

Conversation

emlun
Copy link
Member

@emlun emlun commented Sep 17, 2021

This would merge into PR #1621.

Addresses #1621 (comment) . Since there wasn't a description of how to determine authenticator/credential attachment from transports, this adds that as a new section similar to §5.2.1.1. Easily accessing credential data.

I'm submitting this as a separate (meta-) PR for visibility, because of the new section.


Preview | Diff

* add transport docs

* Update index.bs

Co-authored-by: Nina Satragno <[email protected]>

* Update index.bs

Co-authored-by: Nina Satragno <[email protected]>

* Update index.bs

Co-authored-by: Nina Satragno <[email protected]>

* Update index.bs

Co-authored-by: Nina Satragno <[email protected]>

Co-authored-by: zakaria ridouh <[email protected]>
Co-authored-by: Nina Satragno <[email protected]>
@emlun emlun added type:editorial process:meta-pr Pull requests into other pull requests rather than main labels Sep 17, 2021
@emlun emlun added this to the L3-WD-01 milestone Sep 17, 2021
index.bs Outdated
@@ -2739,7 +2773,7 @@ attributes.

The [=[RP]=] can determine the resulting [=authenticator attachment modality|attachment=] for the created credential
using the {{AuthenticatorAttestationResponse/getTransports()}} method of the resulting {{AuthenticatorAttestationResponse}}.
See [[#enum-transport]] for details.
See [[#sctn-attachments-from-transports]] for details.
Copy link
Contributor

@sbweeden sbweeden Sep 20, 2021

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I like the new section, but as stated in the review of #1621 I am not sure if it's deterministically possible to derive the authenticator attachment modality that was used purely from the result of getTransports(), specifically in the case where getTransports() returns more than one value, and one of the values is internal. The RP cannot determine which was actually used, and therefore cannot determine whether or not it is useful to prompt the end user to register the platform authenticator if one exists. Let's discuss in the WebAuthn WG call, but I'm thinking the proposal in #1668 would satisfy this goal deterministically.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

and delete this sentence

Suggested change
See [[#sctn-attachments-from-transports]] for details.

z11h and others added 4 commits September 20, 2021 12:21
* transport to platform attachment

* pt2

* add section

* move authenticator attachment to public key credential

* slight changes

* slight changes

Co-authored-by: zakaria ridouh <[email protected]>
Co-authored-by: Nina Satragno <[email protected]>
Co-authored-by: Emil Lundberg <[email protected]>
@nadalin nadalin added the stat:Blocked Prerequisites are not yet satisfied label Sep 22, 2021
@equalsJeffH
Copy link
Contributor

on 2021-09-22 call:
@emlun intend to wait for PR #1668 to resolve and then revisit this PR.

Copy link
Contributor

@equalsJeffH equalsJeffH left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

As @emlun notes in the original post, there is not "...a description of how to determine authenticator/credential attachment from transports...", plus, PR #1668 obviates the need for RPs to do this determination theirselves. However, the spec could be clearer regarding how client platforms ought to determine attachment from the transport used in a request.

NOTE: The latest language in PR #1668 now links to the section [[#sctn-attachments-from-transports]] and tacitly assumes the changes I've suggested here have been made.

Here's a rough suggestion wrt how to spec the latter, HTH....

index.bs Outdated
@@ -2739,7 +2773,7 @@ attributes.

The [=[RP]=] can determine the resulting [=authenticator attachment modality|attachment=] for the created credential
using the {{AuthenticatorAttestationResponse/getTransports()}} method of the resulting {{AuthenticatorAttestationResponse}}.
See [[#enum-transport]] for details.
See [[#sctn-attachments-from-transports]] for details.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

and delete this sentence

Suggested change
See [[#sctn-attachments-from-transports]] for details.

z11h and others added 2 commits September 26, 2021 21:39
@emlun
Copy link
Member Author

emlun commented Oct 1, 2021

@equalsJeffH This all seems fair I think, but also at this point it probably makes more sense to merge this into PR #1668 instead of into #1621, given the now mutual dependency between this and #1668. I'll rebase this onto #1668 and reconfigure the PR.

@emlun emlun force-pushed the issue-1618-review-sbweeden-attachment-transport branch from e1ab848 to 183d059 Compare October 1, 2021 11:17
@emlun
Copy link
Member Author

emlun commented Oct 1, 2021

Hm... looks like I can't do that, because #1668 is a branch in a different repository clone. Maybe just close this and migrate it over to https://github.com/z11h/webauthn instead.

@emlun
Copy link
Member Author

emlun commented Oct 1, 2021

Migrated to z11h#3.

@emlun emlun closed this Oct 1, 2021
@w3c w3c deleted a comment from kike7laguna Oct 6, 2021
@emlun emlun deleted the issue-1618-review-sbweeden-attachment-transport branch June 22, 2022 21:56
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
process:meta-pr Pull requests into other pull requests rather than main stat:Blocked Prerequisites are not yet satisfied type:editorial
Projects
None yet
Development

Successfully merging this pull request may close these issues.

5 participants