Skip to content
Switch branches/tags
Go to file
Cannot retrieve contributors at this time

Scope Extensions for Web Apps


This document describes a new scope_extensions manifest member that enables web apps to extend their scope to other origins.

Use Cases / Goals

  • Allow sites that control multiple subdomains and top level domains to behave as one contiguous web app.
    E.g. a site may span, and

  • Allow web apps to capture user navigations to sites they are affiliated with.
    E.g. "News Aggregator App" capturing links navigations to


Web app scope (defined by the scope field) is currently used for:

  1. Determining whether an app window's root document has left the app's scope (possibly invoking window UI informing the user of this).
  2. Constraining URLs appearing in manifest members like start_url, file_handlers, or share_target.

The scope_extensions mechanism can expand all these behaviours to include other origins given agreement between the web app's primary origin and the associated origins.


  1. Add a scope_extensions member to the web app manifest specifying a list of origin patterns to associate with.

    Example manifest located at

      "id": "",
      "name": "Example",
      "display": "standalone",
      "start_url": "/index.html",
      "scope_extensions": [
        {"origin": "*"},
        {"origin": ""},
        {"origin": "*"}

    In this example the "Example" app is extending its app scope to all its subdomains along with its site and its subdomains.

  2. Specify a web-app-origin-association.json file format that must be located at https://<associated origin>/.well-known/web-app-origin-association.json on the associated origin's domain. This specifies the set of web apps that may include it as a scope extension keyed on each web app's identifier.

    Example association file located at

      "web_apps": {
         "": {
           "include_paths": ["/*"],
           "authorize": ["intercept-links"]
         "": {
           "include_paths": ["/*"],
           "exclude_paths": ["/settings/*"]
  3. Let the extended scope be the set of URLs that:

    • Has an origin that matches one of the origin patterns in the manifest's scope_extensions list.
    • Has an origin with a valid <origin>/.well-known/web-app-origin-association.json association file with an association entry keyed by the web app's identifier.
    • Matches an include_paths entry in the association entry.
    • Does not match as exclude_paths entry in the association entry.
  4. Replace the constraint on manifest URLs that are bound by scope (except for start_url) to instead be bound by the extended scope. Validation of the associated origins is not required for these URLs to be part of a valid manifest. Prior to validation the URLs must be treated as if they were not specified.

Security Considerations

Declarative link capturing events

Capturing user navigations via "capture_links": "existing-client-event" has the potential for the web app to spoof its associated origins. Event link capturing must not be supported for associated origins unless they specify "authorize": ["intercept-links"] in their entry for the associated web app. This opt-in is used as a signal of trust between the associated origin and the web app.

Related Proposals

URL Handlers

The Scope Extensions proposal is intended to be a replacement for the URL Handlers proposal with the following changes:

  • Re-orient the goal to be focused just on expanding the set of origins/URLs in the web app's scope. Remove the goal of registering web apps as URL handlers in the user's operating system. That behaviour will be covered by the Declarative Link Capturing proposal instead.
  • Rename the new manifest field from url_handlers to scope_extensions to reflect the change in goals.
  • Move the association file from "/web-app-origin-association.json" to "/.well-known/web-app-origin-association.json". This better conforms with RFC 8615.
  • Change the association file entries to be keyed on the web app identifier rather than the web app's manifest URL. This aligns with the recent PWA Unique ID proposal.
  • Rename "paths" to "include_paths" in the association file entries.
  • Add an "authorize" field to the association file entries for the associated origin to provide explicit opt-in signals for security sensitive capabilities.

Declarative Link Capturing

Scope extensions can be considered the first stage in the link capturing pipeline. This proposal allows developers to control the set of user navigation URLs that the web app is intended to capture. The Declarative Link Capturing proposal allows developers to control the action that is taken once a user navigation is captured e.g. open a new app context or navigate an existing one.