Does this intent deprecate or change behavior of existing APIs, such that it has potentially high risk for Android WebView-based applications?
No information provided| Shipping on desktop | 147 |
| Origin trial desktop first | 139 |
| Origin trial desktop last | 141 |
| Origin trial extension 1 end milestone | 144 |
| DevTrial on desktop | 136 |
| Shipping on Android | 147 |
| DevTrial on Android | 142 |
| Shipping on WebView | 147 |
Hey Ken,It's disappointing to hear that the TAG was trying to litigate specific UI choices, rather than helping to guide the API's design. As a general matter, we should not be specifying *any* explicit UI:
If we've made that mistake here, it's not too late to change course (although it's reasonable to leave non-normative "for instance" examples and Explainer illustrations). If we didn't, then I'm inclined to suggest that we have a conversation with our friends on the TAG about the opportunities for UI treatments that APIs provide vs. requirements.
As I understand your API, an explicit form treatment is still possible in any UI that prefers that. Is that wrong?
Best,Alex
On Thursday, March 5, 2026 at 11:34:59 AM UTC-8 Ken Buchanan wrote:
On Mon, Mar 9, 2026 at 2:51 PM Alex Russell <sligh...@chromium.org> wrote:Hey Ken,It's disappointing to hear that the TAG was trying to litigate specific UI choices, rather than helping to guide the API's design. As a general matter, we should not be specifying *any* explicit UI:If we've made that mistake here, it's not too late to change course (although it's reasonable to leave non-normative "for instance" examples and Explainer illustrations). If we didn't, then I'm inclined to suggest that we have a conversation with our friends on the TAG about the opportunities for UI treatments that APIs provide vs. requirements.Thanks for the response, Alex. We are not specifying the UI, other than that it must allow the user to select an existing passkey for sign-in. The objection stems from this API's functional behaviour, which is intended to enable sign-in via an in-context browser dialog rather than the site having to show a login form. TAG "disagree[s] that a browser dialog is a better user experience than an inline login form," but that is the goal of this API, not the actual thing being specified.This feature allows developers to implement the following flow:if (there is a passkey known by the UA to be available) thenthe UA shows sign-in UI offering that passkeyelsereject the promise so the website can take some other actionThe question is about whether this actually enables better user experiences, because in the current state the first part of that is available via autofill, but the 'else' part is not possible.The discussion with TAG reached a point where they required a higher standard of evidence for user benefit than we can provide. We are satisfied with feedback from developers telling us how they intend to use this, and that this enables a lower-friction sign-in flow that makes it worth shipping.As I understand your API, an explicit form treatment is still possible in any UI that prefers that. Is that wrong?You are correct. This deliberately does not displace any existing WebAuthn usage. Invoking `navigator.credentials.get()` in this mode is not guaranteed to show any UI, so developers need to keep their existing sign-in options available for the cases in which the promise is rejected.
Best,Alex
On Thursday, March 5, 2026 at 11:34:59 AM UTC-8 Ken Buchanan wrote:
How obvious will the existence of browser stored credentials be to the web site?
What if I clear site data in the browser?
/Daniel
--
You received this message because you are subscribed to the Google Groups "blink-dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email to blink-dev+...@chromium.org.
To view this discussion visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CALjHGKoR0EskBNkLxcaRRO0wtfGe-0po0mxnFH_VhSnpFt49Zw%40mail.gmail.com.
To view this discussion visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/29362701-203d-4847-abc0-d0b47e65100d%40gmail.com.
How obvious will the existence of browser stored credentials be to the web site?
What if I clear site data in the browser?
On Wed, Mar 18, 2026 at 10:16 AM Daniel Bratell <brat...@gmail.com> wrote:How obvious will the existence of browser stored credentials be to the web site?
What if I clear site data in the browser?
Since the credentials come from the passkey provider/password manager, clearing site data has no effect.
On Wed, Mar 18, 2026 at 8:32 AM Ken Buchanan <ke...@chromium.org> wrote:On Wed, Mar 18, 2026 at 10:16 AM Daniel Bratell <brat...@gmail.com> wrote:How obvious will the existence of browser stored credentials be to the web site?
What if I clear site data in the browser?
Since the credentials come from the passkey provider/password manager, clearing site data has no effect.In the TAG review, I thought everyone had agreed that if the user uses browser UI to sign out of a site (which is accomplished by clearing site data), the browser should hide the fact that the user has a passkey until the user next chooses to sign in with a passkey. I now see that you removed that section from the explainer after I last looked: https://github.com/w3c/webauthn/wiki/Explainer:-WebAuthn-immediate-mediation/_compare/cef140c78ffe6ea855eb3f8d3c56db7cb17596c8...874f2dcf4c3b831db8169a92ccf828a03ff6551e. At the very least, this should continue to live in the Alternatives Considered section, with the reason for choosing against it.
But I'll re-iterate the TAG's feedback that it's user-hostile to force someone to go over to Incognito in order to hide the fact that they have an account. If I want to use the 'guest' flow on a site that I've previously logged into, the UI that you've mocked in the explainer forces me to 'close' my attempt to check out in order to get to the guest flow. This seems likely to coerce users to sign in, since they don't actually want to 'close' their attempt to check out. Browsers shouldn't facilitate that.
On Wed, Mar 18, 2026 at 11:59 AM Jeffrey Yasskin <jyas...@google.com> wrote:On Wed, Mar 18, 2026 at 8:32 AM Ken Buchanan <ke...@chromium.org> wrote:On Wed, Mar 18, 2026 at 10:16 AM Daniel Bratell <brat...@gmail.com> wrote:How obvious will the existence of browser stored credentials be to the web site?
What if I clear site data in the browser?
Since the credentials come from the passkey provider/password manager, clearing site data has no effect.In the TAG review, I thought everyone had agreed that if the user uses browser UI to sign out of a site (which is accomplished by clearing site data), the browser should hide the fact that the user has a passkey until the user next chooses to sign in with a passkey. I now see that you removed that section from the explainer after I last looked: https://github.com/w3c/webauthn/wiki/Explainer:-WebAuthn-immediate-mediation/_compare/cef140c78ffe6ea855eb3f8d3c56db7cb17596c8...874f2dcf4c3b831db8169a92ccf828a03ff6551e. At the very least, this should continue to live in the Alternatives Considered section, with the reason for choosing against it.Thank you for the suggestion. I have added that to the explainer.