LGTM3

On Tue, Oct 15, 2024 at 6:52 AM Alex Russell <slightly...@chromium.org>
wrote:

> Thanks for getting more support and better describing the needs, Nina.
>
> LGTM2
>
> On Tue, Oct 15, 2024, 8:19 AM Domenic Denicola <dome...@chromium.org>
> wrote:
>
>> LGTM1
>>
>> On Saturday, September 21, 2024 at 1:09:55 AM UTC+9 Nina Satragno wrote:
>>
>>> Contact emailsnsatra...@chromium.org, identity-...@chromium.org
>>>
>>> Explainer
>>> https://github.com/w3c/webauthn/wiki/Explainer:-WebAuthn-Signal-API-explainer
>>>
>>> Specification
>>> https://pr-preview.s3.amazonaws.com/nsatragno/webauthn/pull/2093.html#sctn-signal-methods
>>>
>>> Summary
>>>
>>> Allow WebAuthn relying parties to report information about existing
>>> credentials back to credential storage providers, so that incorrect or
>>> revoked credentials can be updated or removed from provider and system UI.
>>> https://github.com/w3c/webauthn/wiki/Explainer:-WebAuthn-Signal-API-explainer
>>>
>>>
>>> Blink componentBlink>WebAuthentication
>>> <https://bugs.chromium.org/p/chromium/issues/list?q=component:Blink%3EWebAuthentication>
>>>
>>> TAG reviewhttps://github.com/w3ctag/design-reviews/issues/996
>>>
>>> TAG review statusPending
>>>
>>> Risks
>>>
>>>
>>> Interoperability and Compatibility
>>>
>>> None, this is a new API.
>>>
>>>
>>> *Gecko*: No signal (
>>> https://github.com/mozilla/standards-positions/issues/1075). I'll
>>> update here once that changes.
>>>
>>> *WebKit*: No signal (
>>> https://github.com/WebKit/standards-positions/issues/400). I'll update
>>> here once that changes.
>>>
>>> *Web developers*: Positive (
>>> https://github.com/w3c/webauthn/issues/1967#issuecomment-1848433321)
>>> The signal methods address common concerns from RPs that have been voiced
>>> since the early days of WebAuthn. See
>>> https://github.com/w3c/webauthn/issues/1967 and the issues linked from
>>> there.
>>>
>>> *Other signals*:
>>>
>>> Ergonomics
>>>
>>> Omitting a valid credential ID from `signalAllAcceptedCredentials` can
>>> result in the user no longer being able to sign in with that passkey. This
>>> is explicitly called out in the spec [1]. The spec recommends that
>>> authenticators hide (instead of removing) passkeys to mitigate this issue.
>>> Chrome will ship a first version that removes credentials, and a follow-up
>>> will hide them instead. This is because removing credentials requires a lot
>>> less coordination from multiple products than hiding them, and lets us ship
>>> and iterate on the API faster. [1]
>>> https://w3c.github.io/webauthn/#sctn-signalAllAcceptedCredentials
>>>
>>>
>>> Security
>>>
>>> Relying parties can only update or remove credentials that are bound to
>>> their relying party ID.
>>>
>>>
>>> WebView application risks
>>>
>>> Does this intent deprecate or change behavior of existing APIs, such
>>> that it has potentially high risk for Android WebView-based applications?
>>>
>>> N/A, this is a new API.
>>>
>>>
>>> Debuggability
>>>
>>> Chrome supports signal* methods through the WebAuthn devtools panel [1].
>>> signal* methods are also supported through webdriver's WebAuthn API [2],
>>> with a small change in the works [3] specifically to be able to debug
>>> `signalCurrentUserDetails`. [1]
>>> https://developer.chrome.com/docs/devtools/webauthn [2]
>>> https://w3c.github.io/webauthn/#sctn-automation [3]
>>> https://github.com/w3c/webauthn/pull/2148
>>>
>>>
>>> Will this feature be supported on all six Blink platforms (Windows, Mac,
>>> Linux, ChromeOS, Android, and Android WebView)?No
>>>
>>> Initially, this feature will be supported on Chrome desktop only, and on
>>> Chrome only for Google Password Manager (GPM) credentials. Support for
>>> iCloud keychain and Windows Hello will depend on macOS and Windows updates
>>> respectively. Android support requires an update to the Android Credential
>>> Manager API that is being worked on. For GPM credentials, we also need to
>>> update Google Play Services accordingly. Once the Android Credential
>>> Manager API is launched, other credential providers will be able to hook to
>>> the API.
>>>
>>>
>>> Is this feature fully tested by web-platform-tests
>>> <https://chromium.googlesource.com/chromium/src/+/main/docs/testing/web_platform_tests.md>
>>> ?Yes
>>>
>>>
>>> https://wpt.fyi/results/webauthn/signal-all-accepted-credentials.https.html
>>> https://wpt.fyi/results/webauthn/signal-current-user-details.https.html
>>> https://wpt.fyi/results/webauthn/signal-unknown-credential.https.html
>>>
>>>
>>> DevTrial instructions
>>> https://github.com/w3c/webauthn/wiki/Experimenting-with-the-Signal-API-on-Chrome
>>>
>>> Flag name on chrome://flags
>>> chrome://flags#enable-experimental-web-platform-features
>>>
>>> Finch feature nameCredentialManagerReport
>>>
>>> Requires code in //chrome?True
>>>
>>> Tracking bughttps://crbug.com/361751877
>>>
>>> Measurement
>>> https://chromestatus.com/metrics/feature/timeline/popularity/5104
>>> https://chromestatus.com/metrics/feature/timeline/popularity/5105
>>> https://chromestatus.com/metrics/feature/timeline/popularity/5106
>>>
>>> Availability expectationWe expect this feature to be generally
>>> available on desktop for M131. Android will follow after.
>>>
>>> Adoption expectationThe feature can be adopted right away, as while the
>>> functionality provided significantly improves the UX of WebAuthn, it's
>>> provided as a "best-effort" and can safely be unimplemented.
>>>
>>> Non-OSS dependencies
>>>
>>> Does the feature depend on any code or APIs outside the Chromium open
>>> source repository and its open-source dependencies to function?
>>> * Android Credential Manager for Android support * Apple's browser
>>> passkey APIs for macOS and iOS support. * Windows webauthn.dll for Windows
>>> Hello credentials.
>>>
>>> Sample links
>>> https://signal-api-demo.glitch.me
>>>
>>> Estimated milestones
>>> DevTrial on desktop 130
>>>
>>> Anticipated spec changes
>>>
>>> Open questions about a feature may be a source of future web compat or
>>> interop issues. Please list open issues (e.g. links to known github issues
>>> in the project for the feature specification) whose resolution may
>>> introduce web compat/interop risk (e.g., changing to naming or structure of
>>> the API in a non-backward-compatible way).
>>> No changes.
>>>
>>> Link to entry on the Chrome Platform Status
>>> https://chromestatus.com/feature/5101778518147072?gate=5111131065286656
>>>
>>> This intent message was generated by Chrome Platform Status
>>> <https://chromestatus.com/>.
>>>
>>> --
>>> Nina Satragno
>>>
>> --
>> You received this message because you are subscribed to the Google Groups
>> "blink-dev" group.
>> To unsubscribe from this group and stop receiving emails from it, send an
>> email to blink-dev+unsubscr...@chromium.org.
>> To view this discussion on the web visit
>> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/e4f40ad6-8ee2-4822-a658-3aba5d3487a2n%40chromium.org
>> <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/e4f40ad6-8ee2-4822-a658-3aba5d3487a2n%40chromium.org?utm_medium=email&utm_source=footer>
>> .
>>
> --
> You received this message because you are subscribed to the Google Groups
> "blink-dev" group.
> To unsubscribe from this group and stop receiving emails from it, send an
> email to blink-dev+unsubscr...@chromium.org.
> To view this discussion on the web visit
> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAA44PQhynTnP1tbOQw5_c%2BiaV8c7etBiS%2Bmbkmru4PLWfard8A%40mail.gmail.com
> <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAA44PQhynTnP1tbOQw5_c%2BiaV8c7etBiS%2Bmbkmru4PLWfard8A%40mail.gmail.com?utm_medium=email&utm_source=footer>
> .
>

-- 
You received this message because you are subscribed to the Google Groups 
"blink-dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to blink-dev+unsubscr...@chromium.org.
To view this discussion on the web visit 
https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAOmohSKvK6055tVY94%3D95Stbe8UBARKYcnL64vkqwC2CLRYL6g%40mail.gmail.com.

Reply via email to