Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Use URI instead of URL for related origins #2103

Closed
opotonniee opened this issue Jul 22, 2024 · 2 comments
Closed

Use URI instead of URL for related origins #2103

opotonniee opened this issue Jul 22, 2024 · 2 comments

Comments

@opotonniee
Copy link

I don't know if this has already been discussed (I suspect so!), but I couldn't find it in this project's issues:

The "Validating Related Origins" section only allows to list URL values in the "origins" field. This is fine for related web applications.
Could we extend this feature to also list related mobile applications, by allowing listing mobile specific URIs such as:

  • android:apk-key-hash:<sha1_hash-of-apk-signing-cert>
  • ios:<application-identifier-prefix>.<bundle-identifier>

This would ultimately allow to replace the current proprietary well-known files (assetlinks.json for Android, apple-app-site-association for iOS) by a single and standardized file.

Corresponding changes to the specification would be:

  • valid related origin values are URI instead of URL
  • if URI scheme is https then the existing description still stands
  • if URI is another scheme and the client does not recognize it, then it must silently ignore the entry
  • if the client recognizes the URI scheme, it should validate that the application issuing the WebAuthn request is matching the URI
  • optionally the spec could define URIs for android and ios apps (see above)
@timcappalli
Copy link
Member

timcappalli commented Jul 22, 2024

This was a conscious design choice for this feature (only web applications), as that is what the WebAuthn specification defines. Web Authentication is a Web Platform API and does not actively define App Platform capabilities or behaviors.

Each app platform implements its own web origin to app identity binding, they've been in production for many years, and most of the time it used for more than just FIDO2/WebAuthn.

@opotonniee
Copy link
Author

Noted, although I think it would provide a more consistent solution across clients. New client types would not have to define their own binding. And all related applications would be listed in a single place, whatever their type (web, Android, iOS, or others).

Thanks for the quick feedback.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

2 participants