Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Signaling when user credentials are shared between users to the relying party #1922

Closed
Kieun opened this issue Jul 17, 2023 · 2 comments
Closed

Comments

@Kieun
Copy link
Member

Kieun commented Jul 17, 2023

Description

Some of passkey providers have been providing credential sharing between multiple users. RPs (or enterprise) might have some controls to allow or disallow credential sharing.
Such controls are varying across passkey providers and sometimes RPs might not be aware that user's credential has been shared to others.

Some RPs would like to know such things in order to score the security risk.

I'm thinking that this could be offered as following options.

  • Option 1: mark the credential is shared when returning attestation or assertion within the authData (might be flag)
  • Option 2: leverage well-known URL at relying party side and send a signal at the time when the user credential is actually shared
@dwaite
Copy link
Contributor

dwaite commented Aug 16, 2023

Unfortunately, while a client is the interface with authenticators, it does not necessarily know if a passkey provider supports sharing. Indeed, authenticators themselves may not record if a credential has been shared, and sharing may not be an authenticator-level action.

The current recommended mechanism to mandate non-sharable (hardware-bound) credentials would be to require attestations. To prevent restricting use of new authenticators which also do not share credentials, it is recommended the attestations are verified against an up-to-date list of implementations (such as the FIDO Alliance MDS.)

In the future, an extension such as devicePubKey might serve as a signal that a credential MAY have been shared, although it also could be signaling other events or simple state clearing.

@dwaite dwaite closed this as completed Aug 16, 2023
@Firstyear
Copy link
Contributor

Worth pointing out the FIDO MDS still has some data corruption issues, so it would be good to get those looked at. I have a full set of patch notes if you need @dwaite

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

4 participants