Hey Mohamed,

We generally expect explainers to be updated throughout the life of a 
feature. LGTM1, conditional on the explainer being updated with up-to-date 
example code for both the problem and proposed solution.

Best,

Alex

On Thursday, August 14, 2025 at 1:29:18 PM UTC-7 Mohamed Amir Yosef wrote:

> Thanks a lot Dan for your questions!
> Replies are inline
>
> On Wednesday, August 13, 2025 at 7:59:48 PM UTC+3 dan...@microsoft.com 
> wrote:
>
> The parenthetical in the Intent title "(presentation support)" seems to 
> imply that this intent covers only part of Digital Credentials API, and 
> maybe more of it will ship at another time. Is that right, or am I reading 
> too much into it?
>
> Yes, this Intent is for digital credentials presentation via 
> navigator.credentials.get() API
> digital credentials issuance via navigator.credentials.create() API will 
> come separately at a later point of time.
>
>
> Per the comment here 
> <https://github.com/w3ctag/design-reviews/issues/1119#issuecomment-3176058950>
>  the 
> explainer at https://github.com/w3c-fedid/digital-credentials/
> blob/main/explainer.md is outdated and reflects an earlier proposal. So 
> should we be disregarding that explainer and just looking at the 
> introductory sections of the spec instead, or is there a list somewhere of 
> what's changed?
>
> Thank you for spotting that!
> Yes please, disregard the explainer. The the introductory sections of the 
> spec should be sufficient and up-to-date!
>
>  
>
> Thanks,
> Dan
> On Monday, August 11, 2025 at 2:32:19 PM UTC-7 rby...@chromium.org wrote:
>
> [API owner hat off since I work on this API]
>
> On Mon, Aug 11, 2025 at 2:26 PM Chromestatus <ad...@cr-status.appspotmail.
> com> wrote:
>
> Contact emails rby...@chromium.org, go...@chromium.org, ma...@chromium.org, 
> ashim...@google.com 
>
>
> Explainer https://github.com/w3c-fedid/digital-credentials/blob/main/
> explainer.md 
>
> Specification https://w3c-fedid.github.io/digital-credentials 
>
> Summary 
>
> Websites can and do get credentials from mobile wallet apps through a 
> variety of mechanisms today (custom URL handlers, QR code scanning, etc.). 
> This Web Platform feature would allow sites to request identity information 
> from wallets via Android's IdentityCredential CredMan system. It is 
> extensible to support multiple credential formats (eg. ISO mDoc and W3C 
> verifiable credential) and allows multiple wallet apps to be used. 
> Mechanisms are being added to help reduce the risk of ecosystem-scale abuse 
> of real-world identity (see https://docs.google.com/document/u/1/d/
> 1L68tmNXCQXucsCV8eS8CBd_F9FZ6TNwKNOaFkA8RfwI/edit). 
>
>
> Blink component Blink>Identity>DigitalCredentials 
> <https://issues.chromium.org/issues?q=customfield1222907:%22Blink%3EIdentity%3EDigitalCredentials%22>
>  
>
> TAG review Mozilla feedback from Martin (also on the TAG) suggests we 
> need to invest more in the threat model for the larger space and clarify 
> specific privacy mitigations before shipping or requesting TAG review.
>
> Sorry, I forgot to update this (now fixed). The FedID WG filed for TAG 
> review <https://github.com/w3ctag/design-reviews/issues/1119> a month ago 
> now but no comment yet.
>
> Related, TAG has published Preventing Abuse of Digital Credentials 
> <https://w3ctag.github.io/web-no-papers/> which is related (and covers 
> many of the issues I listed 
> <https://github.com/w3c/credential-considerations/blob/main/credentials-considerations.md>
>  when 
> we decided to start going down this path), but doesn't explicitly weigh in 
> on whether and how the Digital Credentials API makes these problems better 
> or worse.
>
> FWIW I personally think the time has come to ship out of OT and continue 
> iterating on this as a launched API. Most of the important debate at this 
> stage is about things we're going to have to keep iterating on like how the 
> browser UI and presentation metadata should best promote privacy and 
> transparency and control for the user (not the API shape). I anticipate 
> much iterating on this in Chrome over the coming years as government 
> identity systems are adopted more widely. For now the risks are relatively 
> low because so few people have these credentials installed in a wallet that 
> supports using the API.
>
> See also this discussion 
> <https://groups.google.com/a/chromium.org/g/blink-dev/c/Vj2tr_cAClk/m/ztVMpBYSAgAJ>
>  
> from our last OT extension.
>
> TAG review status Issues open 
>
> Origin Trial Name Digital Credentials API 
>
> Chromium Trial Name WebIdentityDigitalCredentials 
>
> Origin Trial documentation link https://wicg.github.io/digital-credentials 
>
> WebFeature UseCounter name kIdentityDigitalCredentials 
>
> Risks 
>
>
> Interoperability and Compatibility 
>
> There are multiple standards efforts involved here. We have been working 
> with WebKit and Mozilla in the WICG on defining this specific API. But the 
> greater interoperability risk will come from the data that is sent and 
> returned via this API. Details of that are still in discussions but mostly 
> driven outside the web browser community in the OpenID Foundation (eg. 
> OpenID4VP: https://openid.net/specs/openid-4-verifiable-
> presentations-1_0.html) and ISO (18013-7 "mdoc": 
> https://www.iso.org/standard/82772.html)
>
>
> *Gecko*: Negative (https://github.com/mozilla/standards-positions/issues/
> 1003) We share most of Mozilla's concerns and continue to work with them 
> (and the broader community) on mitigations. I believe we feel greater risk 
> for the established practice of custom schemes becoming prevalent than 
> Mozilla does (eg. due to Google being mandated by eIDAS regulation to 
> accept EUDI credentials). 
>
> *WebKit*: In development (https://github.com/WebKit/
> standards-positions/issues/332) WebKit implementation progress: 
> https://bugs.webkit.org/show_bug.cgi?id=268516
>
>
> Apple has now announced 
> <https://developer.apple.com/videos/play/wwdc2025/232/> shipping in iOS 
> 26 (September). Though it's worth noting that Apple's initial 
> implementation is only partially interoperable with Chrome in that it 
> supports only the ISO 18013-7 Annex C protocol while Chromium is largely 
> protocol agnostic.  
>
>
> *Web developers*: No signals 
>
> *Other signals*: This work in the W3C PING is relevant: 
> https://github.com/w3cping/credential-considerations/ 
>
> Ergonomics 
>
> There's a possibility that these credentials will be used alongside other 
> types of credentials in the future - such as optionally minting a passkey 
> when a digital credential is used to sign up for a site, or by allowing 
> sign-up with either a digital credential or a federated credential via 
> FedCM. As such we argued it was best to put this work in the context of the 
> Credential Management API, and hence the support is added in 
> 'navigator.identity.get() API . 
>
>
> Activation 
>
> The primary activation concern is enabling existing deployments using 
> technology like OpenID4VP to be able to also support this API. As such we 
> have left the request protocol unspecified at this layer, to be specified 
> along with existing request protocols to maximize activation opportunity. 
>
>
> Security 
>
> See https://github.com/WICG/digital-credentials/blob/main/
> horizontal-reviews/security-privacy.md and https://github.com/w3c-fedid/
> digital-credentials/issues/115
>
>
> WebView application risks 
>
> Does this intent deprecate or change behavior of existing APIs, such that 
> it has potentially high risk for Android WebView-based applications?
>
> This feature does not deprecate or change the behavior of existing APIs. 
> This feature adds a new feature via extending the existing 
> navigator.credentials.get() with a new type. 
>
>
> Debuggability 
>
> None necessary - just new JS API. For testing we may want to add a 
> developer option to provide a fake wallet (as for the devtools fake 
> authenticator for WebAuthn), but this is not urgent.
>
>
> Will this feature be supported on all six Blink platforms (Windows, Mac, 
> Linux, ChromeOS, Android, and Android WebView)? No 
>
> Android and Desktop Only
>
>
> Is this feature fully tested by web-platform-tests 
> <https://chromium.googlesource.com/chromium/src/+/main/docs/testing/web_platform_tests.md>
> ? Yes 
>
> https://wpt.fyi/results/digital-credentials?label=
> master&label=experimental&aligned
>
>
> DevTrial instructions https://digitalcredentials.dev/docs/requirements 
>
> Flag name on about://flags web-identity-digital-credentials 
>
> Finch feature name WebIdentityDigitalCredentials 
>
> Rollout plan Will ship enabled for all users 
>
> Requires code in //chrome? True 
>
> Tracking bug https://issues.chromium.org/issues/40257092 
>
> Launch bug https://launch.corp.google.com/launch/4268575 
>
> Availability expectation - Feature is in Chromium browsers for the 
> foreseeable future. - Feature is available in Webkit (Safari) starting 
> version 26 
>
> Adoption expectation Feature is used by specific partner(s) to provide 
> functionality within 12 months of launch in Chrome. 
>
> Adoption plan - Many partnership are being driven by the Android and the 
> Google Wallet teams. - Regulations in the EU may recommend incorporating 
> the API in Digital Wallets in the EU and hence there is a very chance that 
> website will start adopting this API. 
>
> Non-OSS dependencies 
>
> Does the feature depend on any code or APIs outside the Chromium open 
> source repository and its open-source dependencies to function?
> This API passes the request from the verifier website to the underlying 
> operating system. Therefore on Android, it replies on the Credential 
> Manager API. This is widely deployed via GMSCore though. 
>
> Sample links 
> https://digitalcredentials.dev/docs/requirements 
>
> Estimated milestones Shipping on desktop 141 Origin trial desktop first 
> 134 Origin trial desktop last 140 Origin trial extension 1 end milestone 
> 140 Origin trial extension 2 end milestone 139 Origin trial extension 3 
> end milestone 136 DevTrial on desktop 133 Shipping on Android 141 Origin 
> trial Android first 128 Origin trial Android last 140 DevTrial on Android 
> 119 
>
> Anticipated spec changes 
>
> Open questions about a feature may be a source of future web compat or 
> interop issues. Please list open issues (e.g. links to known github issues 
> in the project for the feature specification) whose resolution may 
> introduce web compat/interop risk (e.g., changing to naming or structure of 
> the API in a non-backward-compatible way).
>
>
> Link to entry on the Chrome Platform Status https://chromestatus.com/
> feature/5166035265650688?gate=5070577134469120 
>
> Links to previous Intent discussions Intent to Prototype: 
> https://groups.google.com/a/chromium.org/d/msgid/blink-
> dev/CAL9PXLx3sHWmdE-ikAEDay_S3ijf0%2BfxB_LbsuOx8YJx%2BZA7%
> 2Bg%40mail.gmail.com 
> Intent to Experiment: https://groups.google.com/a/
> chromium.org/d/msgid/blink-dev/CAFUtAY-421uDmu2WNDBG5bYRSWAhfmahsHPVj
> DwN5NLkUdCkvw%40mail.gmail.com 
> Intent to Extend Experiment 1: https://groups.google.com/a/
> chromium.org/d/msgid/blink-dev/6876938b.2b0a0220.377b9f.
> 0109.GAE%40google.com 
> Intent to Extend Experiment 2: https://groups.google.com/a/
> chromium.org/d/msgid/blink-dev/67f3fe84.170a0220.25676e.
> 143e.GAE%40google.com 
> Intent to Extend Experiment 3: https://groups.google.com/a/
> chromium.org/d/msgid/blink-dev/6786814c.2b0a0220.1b83ac.
> 051d.GAE%40google.com 
>
>
> This intent message was generated by Chrome Platform Status 
> <https://chromestatus.com>. 
>
>

-- 
You received this message because you are subscribed to the Google Groups 
"blink-dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to blink-dev+unsubscr...@chromium.org.
To view this discussion visit 
https://groups.google.com/a/chromium.org/d/msgid/blink-dev/7b83a6c1-53ae-4dd4-8eb4-549daf8126a1n%40chromium.org.

Reply via email to