--
You received this message because you are subscribed to the Google Groups "FIDO Dev (fido-dev)" group.
To unsubscribe from this group and stop receiving emails from it, send an email to fido-dev+u...@fidoalliance.org.
To view this discussion on the web visit https://groups.google.com/a/fidoalliance.org/d/msgid/fido-dev/49a00399-700d-4223-b198-d47a57f4c4cdn%40fidoalliance.org.
To view this discussion on the web visit https://groups.google.com/a/fidoalliance.org/d/msgid/fido-dev/CALRyZMqiqqBwwMV2rWD4OvZvpD7BvO0B%2BUbDXg3cDwbZEwFRAg%40mail.gmail.com.
WebAuthn will NOT provide and assertion to a RP withut UP set.
I am confused by @Yuriy's statement. It seems to contridict the behavior of every U2F and CTAP2 authenticator produced to my knowledge.
It also seems to counter the behavior of the certification test tool.
@Yuriy can you clarify?
John B.
To view this discussion on the web visit https://groups.google.com/a/fidoalliance.org/d/msgid/fido-dev/f72c237b-65b2-4b26-b4cd-a33a4f79719an%40fidoalliance.org.
To view this discussion on the web visit https://groups.google.com/a/fidoalliance.org/d/msgid/fido-dev/22f00078-7407-7a42-3469-6991f1388514%40ve7jtb.com.
I have opened a CTAP2.1 issue on this.
https://github.com/fido-alliance/fido-2-specs/issues/1073
You need to be a WG member to acces it. (Sorry)
This is a part of the spec we are currently clarifying around UV and UP caching.
Some things about user presence are being clarified in CTAP2.1.
I think the paranthetical a typical "smartcard scenario" in getAssertion is
not normative and should probably be removed.
The SPWG will have to comment on if the security requirements 1.4 allow NFC tap as a TUP.
Regards
John B.