Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Improve authenticator taxonomy section #1270

Merged
merged 8 commits into from Sep 4, 2019

Conversation

emlun
Copy link
Member

@emlun emlun commented Aug 7, 2019

This attempts to fix #1231.

This PR branches from #1250, so let's resolve that before this one. Here is the current diff between PR #1250 and this.


Preview | Diff

@emlun emlun added type:editorial stat:Blocked Prerequisites are not yet satisfied labels Aug 7, 2019
@emlun emlun added this to the L2-WD-02 milestone Aug 7, 2019
@emlun emlun requested a review from equalsJeffH August 7, 2019 18:14
@emlun emlun self-assigned this Aug 7, 2019
Copy link

@bdewater bdewater left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thank you - this clears up the question I had at the time and then some :)

@emlun
Copy link
Member Author

emlun commented Aug 8, 2019

@bdewater Great to hear, thanks!

@emlun emlun removed the stat:Blocked Prerequisites are not yet satisfied label Aug 27, 2019
@equalsJeffH
Copy link
Contributor

ISTM this PR at least improves issue #334 "add clearer definition of API use cases to the spec"

Copy link
Contributor

@equalsJeffH equalsJeffH left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This LGTM -- this is much-needed polishing, thx @emlun ! we ought to consider whether it closes #334, or only improves #334 (there's a reasonable chance it seems that it closes #334...) -- what do others think? Maybe there ought to be links from the use cases & scenarios sections down to this new matierial that would justify closing #334, and we can add that in a separate PR (in whichcase keep #334 open for now?)

various detail-level comments below for your consideration. thx again!

index.bs Show resolved Hide resolved
index.bs Outdated Show resolved Hide resolved
index.bs Outdated Show resolved Hide resolved
index.bs Outdated
since it's built directly into the [=client device=] rather than a standalone device.
- For [=second-factor=] authentication in addition to a traditional username and password, any [=authenticator=] can be used.
- Passwordless [=multi-factor=] authentication requires an [=authenticator=]
capable of [=user verification=], and in some cases also [=resident credentials=].
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

s/ [=resident credentials=] / [=resident credential capable=] /

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I wonder whether (here or elsewhere) we ought to get into the detais regarding the situaltion where resident creds are necessary for pswdless login, eg no ambient creds ...?

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggestion applied, thanks!

Hmyeah, maybe. I can't say off the top of my head where that would be though.

- For [=second-factor=] authentication in addition to a traditional username and password, any [=authenticator=] can be used.
- Passwordless [=multi-factor=] authentication requires an [=authenticator=]
capable of [=user verification=], and in some cases also [=resident credentials=].
- A laptop computer might support connecting to [=roaming authenticators=] via USB and Bluetooth,
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

this seems a bit disjoint from the prior bullet items, but may not be worth cycles polishing at this time...

and possession of the [=credential private key=] is used as the only [=authentication factor=].
This can be useful in some situations, but makes the user particularly vulnerable to theft of the [=authenticator=].
- A [=roaming authenticator=] that is [=multi-factor capable=] but not [=resident credential capable=]
can be used for [=multi-factor=] authentication, but requires the user to be identified first
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

"identified first" implies the existence of ambient creds, or the user entering a username, or the user picking the desired creds from a pick list ?

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

(1) or (2), but not (3) since the authenticator is not resident credential capable in this case.


A primary use case for [=platform authenticators=] is to register a particular [=client device=] as a "trusted device" available
as a [=something you have=] [=authentication factor=] for future [=authentication=]. This gives the user the convenience benefit
Bluetooth.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

s/ Bluetooth / Bluetooth, for example / ...?

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The sentence begins with "For example", do we need one here as well?

devices=] that are rarely used or do not include a [=platform authenticator=]; or when policy or preference dictates that the
[=authenticator=] be kept separate from the [=clients=] it is used with. A [=roaming authenticator=] can also be used to hold
Use cases for [=roaming authenticators=] include:
[=authentication|authenticating=] on a new [=client device=] for the first time,
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

s/ time / time (i.e., "bootstrapping" the [=client device=]) / ...?

index.bs Outdated Show resolved Hide resolved
index.bs Outdated Show resolved Hide resolved
@emlun emlun merged commit aded020 into master Sep 4, 2019
@emlun emlun deleted the issue-1231-improve-authenticator-taxonomy branch September 4, 2019 19:15
WebAuthnBot pushed a commit that referenced this pull request Sep 4, 2019
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Poor documentation of how authnr aspects (platform, UV, RK) interact
3 participants