-
Notifications
You must be signed in to change notification settings - Fork 181
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add acceptable trust anchors to AuthenticatorSelectionCriteria #461
Comments
@gmandyam can you please help with this issue here? It does appear that the PRs depend on this. |
Will take a look and create PR. |
FWIW, @balfanz argued that we have two classes of users, neither of who needs this support in V1:
I find that reasonably convincing and would be ok with this whole set of selection APIs being postponed until V2. |
WRT the orig post (OP) #461 (comment): note that preceding Step 11 of Registering a new credential says:
Which means an RP in (2) above will likely have such information on-hand. Though, having a means for the RP to indicate to the client which authnrs are acceptable when invoking the [Create] method is advantageous from various UX perspectives. This is the crux of the OP, yes? There currently is the Authenticator Selection extension for this, as well as PR #479 (which obviates the former extension). |
Given that the related issues are all tagged as CR, moving this issue to milestone CR. |
Based on discussion in weekly conf. call on 06-14-2017, it does not seem like declaring preferred trust path in the API is the method that group participants want to use to address this problem. The preference would be to accept all trust paths, but have the RP communicate back with the user that the selected authenticator is not acceptable if the selected authenticator's trust path is not compliant with RP policy. Recommendation: close this issue or mark it as V2. |
Close as requested. |
In order to accept a created credential, Relying Parties are told in Registering a new credential to:
However, without an addition to the AuthenticatorSelectionCriteria, the user can't get any indication from their Client about which authenticators will be attested by an acceptable trust anchor.
@gmandyam's issues #445, #446, and #447 all depend on this, since the RP can't trust any of those protection claims without a trusted attestation.
The text was updated successfully, but these errors were encountered: