Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

clarify "authenticator model": RPs may perform feature-based authenticator selection #645

Closed
equalsJeffH opened this issue Oct 13, 2017 · 4 comments

Comments

@equalsJeffH
Copy link
Contributor

clarify "authenticator model": RPs may perform feature-based authenticator selection with both

  1. navigator.credentials.create() (which invokes webauthn's #createCredential), and
  2. navigator.credentials.get() (which invokes webauthn's #getAssertion).

In (1), options stipulating "require resident key" and "require user verification" are expected to be passed (see also #536, #524), e.g., ultimately to CTAP's authenticatorMakeCredential command.

In (2), options stipulating "require user verification", "require user presence test" are expected to be passed (see also #629, #524), e.g., ultimately to CTAP's authenticatorGetAssertion command.

@emlun
Copy link
Member

emlun commented Dec 5, 2017

In (2), options stipulating "require user verification", "require user presence test" are expected to be passed

Current language specifies to always perform a user presence test (unless user verification is performed), so the latter option does not currently exist (as discussed in #629 (comment)).

@selfissued
Copy link
Contributor

This is not actionable without a PR. @equalsJeffH - do you plan to create one soon - ideally during this week's FIDO plenary?

@equalsJeffH
Copy link
Contributor Author

yes i plan to "create one soon" but meeting(s) I'm participating in have priority.

@equalsJeffH
Copy link
Contributor Author

equalsJeffH commented Feb 7, 2018

fixed by PR #782

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

3 participants