On Thursday, March 10, 2016 at 11:27:34 PM UTC-5, Martin Thomson wrote:
> On Fri, Mar 11, 2016 at 5:56 AM, Axel Nennker <ignisvul...@gmail.com> wrote:
> > no password generation help by the UA
> 
> I agree with MattN here, not doing this eliminates much of the
> advantage of having a password manager.  Or do you have a plan to rely
> on sites doing that with CredentialContainer.store()?  That doesn't
> sound optimal to me.

I think the idea would be something like:

```
var pass = /* generate a long random password */;
var cred = new PasswordCredential({password: pass});
navigator.credentials.store(cred);
```

So having the API as an imperative interface to the password manager doesn't do 
the work for you, but (ISTM) makes it more appealing to do so, since you have 
more assurance that the user is never going to have to see it.

That does raise the question, however, of how such a credential differs from, 
say:

* A cookie
* A random nonce in localStorage/IDB
* A non-extractable WebCrypto key

By which I mean that if a website wants to verify that it is loaded in the same 
browser as before, it already has a variety of ways to do so, some of which 
offer better anti-theft properties than these Credential objects.  Presumably 
the fact that these are not being used means that the site wants some 
indication that it has the right *user*, not just the right browser.  In which 
case, generating a long random password is not so useful.

--Richard
_______________________________________________
dev-platform mailing list
dev-platform@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-platform

Reply via email to