Hi,
Yes, it will probably be both more work and more difficult to deploy U2F first and migrate to WebAuthn later. WebAuthn is also already better supported by more browsers than U2F ever was - including native support in mobile operating systems for using the same credentials in mobile apps.
Yes, there would be a lot of changes to the U2F server to support WebAuthn. WebAuthn has a much wider scope than U2F does - including more parameters, more key formats and more signature formats. Most of the expanded cryptography and verification logic can be abstracted by libraries, but the application still needs to be aware of and support the wider API surface.
I recommend skipping U2F entirely and starting out with WebAuthn.
Your users will have a better experience, you will spend less
effort, and you won't need to add complexity to migrate later.
--
You received this message because you are subscribed to the Google Groups "FIDO Dev (fido-dev)" group.
To unsubscribe from this group and stop receiving emails from it, send an email to fido-dev+u...@fidoalliance.org.
To view this discussion on the web visit https://groups.google.com/a/fidoalliance.org/d/msgid/fido-dev/dccb7e6e-1665-489a-8e1a-2bd05726c2ae%40fidoalliance.org.
I would concur with Emil, Jack.
But, why would you want to waste time writing your own FIDO2 server? There is a FIDO Certified, open-source implementation - now with high-availability built-in in Github that supports both FIDO2 and U2F Authenticators today; check it out: https://github.com/strongkey/fido2
Arshad Noor
StrongKey
--
You received this message because you are subscribed to the Google Groups "FIDO Dev (fido-dev)" group.
To unsubscribe from this group and stop receiving emails from it, send an email to fido-dev+u...@fidoalliance.org.
To view this discussion on the web visit https://groups.google.com/a/fidoalliance.org/d/msgid/fido-dev/9dfb7f74-c140-b340-03c8-598245bac37b%40strongkey.com.
Yes start with WebAuthn. That will work just fine with older U2F keys. Dont do a U2F server and migrate if you are just starting.
John B.
To view this discussion on the web visit https://groups.google.com/a/fidoalliance.org/d/msgid/fido-dev/CALRyZMo1r-U5qm8YSGUiAD3wGt0i8gLv-fSbP1RHqq%3DQ-GVzyg%40mail.gmail.com.
To unsubscribe from this group and stop receiving emails from it, send an email to fido...@fidoalliance.org.
To view this discussion on the web visit https://groups.google.com/a/fidoalliance.org/d/msgid/fido-dev/9dfb7f74-c140-b340-03c8-598245bac37b%40strongkey.com.
--
You received this message because you are subscribed to the Google Groups "FIDO Dev (fido-dev)" group.
To unsubscribe from this group and stop receiving emails from it, send an email to fido...@fidoalliance.org.
Yuriy,
Can you distinguish between "FIDO Conformant" and "FIDO
Certified", please? I have come across the expression "FIDO
Conformant", let alone where the word conformant was capitalized
to imply some standard.
If someone from the FIDO Alliance's certification team is on this forum, can they also add some clarity to this? I only see "FIDO Certified" on the official pages of the FIDO Alliance: https://fidoalliance.org/certification/
Thank you.
Arshad Noor
StrongKey
I meant to say that I have NOT come across the term "FIDO Conformant"....
Arshad
--
You received this message because you are subscribed to the Google Groups "FIDO Dev (fido-dev)" group.
To unsubscribe from this group and stop receiving emails from it, send an email to fido-dev+u...@fidoalliance.org.
To view this discussion on the web visit https://groups.google.com/a/fidoalliance.org/d/msgid/fido-dev/f2644091-ea34-76bf-28bb-d6bc23cf97d6%40strongkey.com.
FIDO CERTIFIED
?FIDO CERTIFIED
means that implementation has passed FIDO conformance tools, passed interoperability even, and has achieved official FIDO Alliance certification.
FIDO COMPLIANT
?FIDO COMPLIANT
means that implementation has passed FIDO conformance tools.
To view this discussion on the web visit https://groups.google.com/a/fidoalliance.org/d/msgid/fido-dev/de267946-841c-88ae-7a18-0b280b8c1625%40strongkey.com.
When you say "FIDO conformance tools" are these official "FIDO Alliance conformance tools"?
So, "FIDO Conformant" implies that it addresses protocol-level requirements (per FIDO Alliance? Or is it self-asserted?), but there are no guarantees of interoperability?
Is "FIDO Conformant" a FIDO Alliance program and something supported by the FIDO Alliance?
Are you (still) working at FIDO Alliance? I'm a little confused by your e-mail address since it no longer says @fidoalliance.org, so I'm unsure if you're speaking for the FIDO Alliance or for yourself?
Thanks.
Arshad Noor
StrongKey
Hi,
Yes, it will probably be both more work and more difficult to deploy U2F first and migrate to WebAuthn later. WebAuthn is also already better supported by more browsers than U2F ever was - including native support in mobile operating systems for using the same credentials in mobile apps.
Yes, there would be a lot of changes to the U2F server to support WebAuthn. WebAuthn has a much wider scope than U2F does - including more parameters, more key formats and more signature formats. Most of the expanded cryptography and verification logic can be abstracted by libraries, but the application still needs to be aware of and support the wider API surface.
I recommend skipping U2F entirely and starting out with WebAuthn. Your users will have a better experience, you will spend less effort, and you won't need to add complexity to migrate later.
On 2019-09-25 05:49, Jack wrote:
--We are implementing U2F using Yubikey device. We might want to support WebAuthn in future.
Is it better to implement WebAuthn server now, since it is backward compatible with U2F?
I see that the basic protocol is same for both U2F and WebAuthn. If we implement U2F server now, will there be lot of changes on the U2F server to support WebAuthn?
Thanks in advance.
You received this message because you are subscribed to the Google Groups "FIDO Dev (fido-dev)" group.
To unsubscribe from this group and stop receiving emails from it, send an email to fido...@fidoalliance.org.
The FIDO2 protocol (of which WebAuthn is a sub-protocol) is backwardly compatible with U2F, Jack. By using a FIDO2 server that handles both U2F and FIDO2 registrations/authentications, you can transparently support both protocols/Authenticators in the same web-application.
If you have both, a native U2F and a FIDO2 Authenticator, take them for a spin on https://fido2.strongkey.com. You'll see both of them successfully register and authenticate on that site. If interested, the "Proof of Concept" application you tested is available here: https://github.com/StrongKey/fido2/tree/master/sampleapps/java/poc.
Arshad Noor
StrongKey
--
You received this message because you are subscribed to the Google Groups "FIDO Dev (fido-dev)" group.
To unsubscribe from this group and stop receiving emails from it, send an email to fido-dev+u...@fidoalliance.org.
To view this discussion on the web visit https://groups.google.com/a/fidoalliance.org/d/msgid/fido-dev/ea6bf7b1-1529-17ad-3c38-37526eb8226e%40strongkey.com.