<snip>

> On May 13, 2024, at 4:10 PM, Dick Hardt <dick.ha...@gmail.com> wrote:

> This seems in conflict with the Account Chooser that Google presents, which 
> users now understand as a way for them to select which Google account they 
> want to use. As a Google user, I find this experience with the Google IdP to 
> work well. It would be confusing to me as a user if my name, picture, and 
> email were not shown when selecting which Google account.  The "popup" like 
> UX is nice on sites where I can use my Google account and provides a more 
> seamless experience without a redirect, but I don't know of any other IdP 
> that has deployed a similar UX. 
> 
> The challenge is that the "account chooser" is not how other IdPs interact 
> with the user. For example with Hellō we let users have high fidelity on 
> which name, email, picture they release with each RP, as studies[1] have 
> shown that users will often pick a different combination of name / email / 
> picture across sites that are crisply not aligned along personas captured in 
> an account.

The name, picture, and email are used for the picker displayed by the browser, 
based on IDP data for individual accounts. I do not believe these values are 
released to the RP (by the API) - the result of a successful interaction with 
the IDP for a selected user account is a credential object holding an 
IDP-provided string token. That token can contain or reference RP-specific 
attributes, such as pseudonyms.

I imagine that use of the current API would have single entries for Hellō 
accounts (if there happen to be multiple of them), and challenge for a site 
like Hellō would be letting the user understand that the account selected in 
the picker to initiate IDP interaction is not indicative of the information 
being released to the RP. However, I think this is a general UX issue for all 
IDPs using the federated credential API, unless they actually plan to always 
release exactly the display attributes to the RP.

The /accounts endpoint I admit is the part of the current proposal I understand 
the least. It seems like it mandates that the IDP know disparate accounts which 
have some linkage across machines, such as different members of a household.

> In sharp contrast to the wallet UX / API that was demoed at IIW recently, I 
> find the browser is dictating too much of the UX in FedCM. It enables an 
> experience similar to what Google offers websites today where login is 
> enabled without a redirect -- but other IdPs don't provide that experience -- 
> which leads to the observation that this work is primarily motivated to 
> enable Google to continue offering its experience with the demise of 3P 
> cookies. 

I imagine the difference is that the system UX can delegate to native 
applications in the passkeys and credentials case, and (on Android) can run 
such applications in sandbox modes where they cannot save or report metadata 
upstream over the network unless they are selected. FedCM is going to need to 
delegate to web properties, and it can’t be expected that all browsers will do 
heavy lifting to implement a particular sandboxing model to protect from IDPs 
that might try to get a pipe into every website a user visits that wants 
authentication. Likewise, platforms without Android’s sandboxing model for 
applications likely will need a different approach for credential wallets, and 
may require user consent for wallets to have access to tracking information.

-DW
_______________________________________________
OAuth mailing list -- oauth@ietf.org
To unsubscribe send an email to oauth-le...@ietf.org

Reply via email to