+Ben and Martin from Mozilla -- could you weigh in on whether we should
create a Mozilla standards position request for this?

Daniel: there is no technical limitation that prevents a non-IDP from
calling this API, apologies for the unclear phrasing. However, a non-IDP
(or indeed an IDP that does not use FedCM) will get no benefit from calling
this API.

Christian

On Wed, Oct 18, 2023 at 12:11 PM Daniel Bratell <bratel...@gmail.com> wrote:

> Hi, I just have a couple of questions without having read through the
> intent in detail.
>
> You say "Our goal is to open this up to other websites in the future.",
> but what does that mean? Is there some kind of web site restriction today?
>
> Not creating a https://github.com/mozilla/standards-positions/issues
> entry seems a bit wrong even if someone at Mozilla has said it is not
> needed. They have in the past specifically wanted us to explicitly use the
> standards-positions repo rather than relying on negative or positive
> statements elsewhere. Would it be best to post one just in case?
>
> /Daniel
> On 2023-10-12 21:04, Christian Biesinger wrote:
>
> Contact emails
>
> cbiesin...@chromium.org
>
>
> Explainer
>
>
> https://github.com/fedidcg/FedCM/blob/main/proposals/idp-sign-in-status-api.md
>
>
> Specification
>
> https://github.com/fedidcg/FedCM/pull/436
>
>
> Summary
>
> The Login Status API <https://github.com/fedidcg/login-status> (formerly
> IdP Sign-in Status API) allows identity providers to signal to the browser
> when their users are logging-in/out. Our goal is to open this up to other
> websites in the future.
>
> This signal, in this intent, is used by FedCM to address a silent timing
> attack, and in doing so, allows FedCM to operate without third party
> cookies altogether. This update would address the last remaining backwards
> incompatible changes we had previously identified in the original I2S of
> FedCM
> <https://groups.google.com/a/chromium.org/g/blink-dev/c/URpYPPH-YQ4/m/E9pgS7GEBAAJ>
> as part of our scope of work.
>
> In the future, we expect that the Login Status API may also be used
> outside of FedCM (e.g. the Storage Access API
> <https://github.com/fedidcg/login-status#storage-access-api>) and may be
> useful for websites that are not identity providers (e.g. extending
> browser storage
> <https://github.com/fedidcg/login-status#extending-site-data-storage>).
>
>
> Blink component
>
> Blink>Identity>FedCM
> <https://bugs.chromium.org/p/chromium/issues/list?q=component:Blink%3EIdentity%3EFedCM>
>
>
> Search tags
>
> fedcm <https://chromestatus.com/features#tags:fedcm>, login
> <https://chromestatus.com/features#tags:login>
>
>
> TAG review
>
> https://github.com/w3ctag/design-reviews/issues/884
>
>
> TAG review status
>
> Pending
>
>
> Chromium Trial Name
>
> FedCmIdpSigninStatus
>
>
> Link to origin trial feedback summary
>
> https://github.com/fedidcg/FedCM/issues/
>
>
> Origin Trial documentation link
>
>
> https://github.com/fedidcg/FedCM/blob/main/proposals/idp-sign-in-status-api.md
>
> https://developer.chrome.com/blog/fedcm-chrome-116-updates/#idp-signin-status
>
>
> Risks Interoperability and Compatibility
>
> For interop:
>
> This I2S is composed of two different (but interdependent) APIs: The Login
> Status API and FedCM.
>
> With regards to the Login Status API
> <https://github.com/fedidcg/login-status>, both Firefox and Safari are on
> board with the general API (breakout notes
> <https://www.w3.org/2023/09/13-login-status-minutes.html>, follow up notes
> <https://github.com/fedidcg/meetings/blob/main/2023/2023-09-14-TPAC-notes.md#login-status-api>)
> . There is an overall agreement on starting from a self-declared status and
> also some general agreement on where the Login Status API may lead in the
> future, including having higher assurance levels and applications outside
> of FedCM.
>
> With regards to its use in FedCM, Firefox is generally in agreement with
> the shape of the solution. Firefox is working on the implementation behind
> a flag. Safari isn’t shipping FedCM yet.
>
> For compat:
>
> While this is a backwards incompatible change for FedCM, we are in active
> conversations with all IdPs that are currently using FedCM (as shown by our
> UKM metrics) and they are onboard with this change.
>
> Gecko: Under consideration (https://github.com/fedidcg/FedCM/pull/436) We
> have been working with the Firefox team for the last year or so on this API
> (e.g. TPAC 2022
> <https://github.com/fedidcg/FedCM/blob/main/meetings/2022/FedCM_%20Options%20for%20the%20Timing%20Attack%20Problem%20(8_16_2022).pdf>).
> We generally agree on the shape of the solution and we are working with
> them to write the spec in a way that allows Chrome and Firefox to implement
> FedCM in an interoperable way. (Firefox has asked us (
> https://github.com/fedidcg/FedCM/issues/431#issuecomment-1425025469) to
> rely on PR comments instead of filing standards positions for these FedCM
> extensions)
>
> WebKit:  Under consideration (
> https://github.com/WebKit/standards-positions/issues/250)
> No signal. Safari has so far shown overall support for FedCM [1], but
> haven't yet formed a position on this specific extension of FedCM [2]. We
> are generally in agreement of the API shape using the Login Status API [3],
> but we haven't yet gotten signals from them on how FedCM, specifically, is
> going to be using this signal.
> [1] https://lists.webkit.org/pipermail/webkit-dev/2022-March/032162.html
> [2] https://github.com/WebKit/standards-positions/issues/250
> [3] https://github.com/privacycg/is-logged-in/issues/53
>
> Web developers: Positive (
> https://developers.google.com/identity/gsi/web/guides/supported-browsers#third-party_cookies)
> We have been working with the FedID CG to develop this API and running
> experiments with the Google Identity Services team.
>
> Other signals:
> Ergonomics
>
> This is an API that is designed to be used by identity providers, when
> their users login in to their websites. We exposed an HTTP header, since we
> heard from them that logins are often made through 302 redirects. We are
> also exposing a JS API for IdPs who find it easier to use JS than HTTP
> headers. We show an error message in devtools when a FedCM request fails
> because the user is not signed in.
> WebView application risks
>
> Does this intent deprecate or change behavior of existing APIs, such that
> it has potentially high risk for Android WebView-based applications?
>
> n/a, FedCM not supported on Webview
> Debuggability
>
> We show errors in devtools to help with debugging.
>
>
> Will this feature be supported on all six Blink platforms (Windows, Mac,
> Linux, Chrome OS, Android, and Android WebView)?
>
> No
> FedCM in general is not supported on WebView, but we support this API on
> all other blink platforms.
>
>
> Is this feature fully tested by web-platform-tests
> <https://chromium.googlesource.com/chromium/src/+/main/docs/testing/web_platform_tests.md>
> ?
> Yes
> Testing on wpt.fyi is blocked on
> https://github.com/web-platform-tests/wpt/pull/40709 getting reviewed and
> merged. Otherwise, we are adding tests that will be in the
> credential-management/fedcm-login-status directory as shown on the WPT
> dashboard here:
> <https://wpt.fyi/results/credential-management?label=master&label=experimental&aligned>
> https://wpt.fyi/results/credential-management/fedcm-login-status?label=experimental&label=master&aligned
>
>
> DevTrial instructions
>
>
> https://github.com/fedidcg/FedCM/blob/main/explorations/HOWTO-chrome.md#idp-sign-in-status-api
>
>
> Flag name on chrome://flags
>
> FedCmIdpSigninStatus
>
>
> Finch feature name
>
> FedCmIdpSigninStatus
>
>
> Requires code in //chrome?
>
> True
>
>
> Tracking bug
>
> https://crbug.com/1451396
>
>
> Launch bug
>
> https://launch.corp.google.com/launch/4280114
>
>
> Estimated milestones
>
> Shipping on desktop
>
> 120
>
> OriginTrial desktop last
>
> 119
>
> OriginTrial desktop first
>
> 116
>
> DevTrial on desktop
>
> 115
>
> Shipping on Android
>
> 120
>
> OriginTrial Android last
>
> 119
>
> OriginTrial Android first
>
> 117
>
> Anticipated spec changes
>
> Open questions about a feature may be a source of future web compat or
> interop issues. Please list open issues (e.g. links to known github issues
> in the project for the feature specification) whose resolution may
> introduce web compat/interop risk (e.g., changing to naming or structure of
> the API in a non-backward-compatible way).
>
> n/a
>
>
> Link to entry on the Chrome Platform Status
>
> https://chromestatus.com/feature/5177628008382464
>
>
> Links to previous Intent discussions
>
> Intent to Experiment:
> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAPTJ0XHJ-LMsCa-PMf1Ft51DCJK1dkzRrFZmRZuzL_Qe2WK2iA%40mail.gmail.com
>
>
> This intent message was generated by Chrome Platform Status
> <https://chromestatus.com/>.
>
> --
> You received this message because you are subscribed to the Google Groups
> "blink-dev" group.
> To unsubscribe from this group and stop receiving emails from it, send an
> email to blink-dev+unsubscr...@chromium.org.
> To view this discussion on the web visit
> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAPTJ0XHZQ7dzGGrY%2BNznzTLA3ap1W8EbLJuMGVxV4sk4oFxvHQ%40mail.gmail.com
> <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAPTJ0XHZQ7dzGGrY%2BNznzTLA3ap1W8EbLJuMGVxV4sk4oFxvHQ%40mail.gmail.com?utm_medium=email&utm_source=footer>
> .
>
>

-- 
You received this message because you are subscribed to the Google Groups 
"blink-dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to blink-dev+unsubscr...@chromium.org.
To view this discussion on the web visit 
https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAPTJ0XHNAms2DKDockc-kEf2WY8u%2BxfjGz966dWoRoh3x%3DbiAw%40mail.gmail.com.

Reply via email to