So I come to the following conclusions:
A relying party server providing a website with FIDO2 login MAY choose to support U2F devices. If it does, a single login flow MUST require a username in order to allow the relying party to look up the correct public key for U2F Authenticator assertions using the downwards compatibility of FIDO2, OR the relying party provides two different login flows, one for U2F with username and MAYBE a password using only the U2F legacy JavaScript APIs with CTAP1 OR using the FIDO2 WebAuthn/CTAP2 APIs. And another flow for FIDO2 non-U2F without any username and password. This is because the FIDO2 authenticators can store the user handle.
In other words: If I as a relying party choose to support only logins without any username and password, I choose to drop support for U2F-only devices that do not speak FIDO2 and therefore do not return user handles during assertions.
Are my assumptions correct?
--
You received this message because you are subscribed to the Google Groups "FIDO Dev (fido-dev)" group.
To unsubscribe from this group and stop receiving emails from it, send an email to fido-dev+u...@fidoalliance.org.
To post to this group, send email to fido...@fidoalliance.org.
Visit this group at https://groups.google.com/a/fidoalliance.org/group/fido-dev/.
To view this discussion on the web visit https://groups.google.com/a/fidoalliance.org/d/msgid/fido-dev/01ae015a-26cb-4f82-b62f-dfb8c18ddf92%40fidoalliance.org.
--
You received this message because you are subscribed to the Google Groups "FIDO Dev (fido-dev)" group.
To unsubscribe from this group and stop receiving emails from it, send an email to fido-dev+u...@fidoalliance.org.
To post to this group, send email to fido...@fidoalliance.org.
Visit this group at https://groups.google.com/a/fidoalliance.org/group/fido-dev/.
To view this discussion on the web visit https://groups.google.com/a/fidoalliance.org/d/msgid/fido-dev/0e387379-e200-4f62-8ade-85dab500bc0a%40fidoalliance.org.
--
You received this message because you are subscribed to the Google Groups "FIDO Dev (fido-dev)" group.
To unsubscribe from this group and stop receiving emails from it, send an email to fido-dev+u...@fidoalliance.org.
To post to this group, send email to fido...@fidoalliance.org.
Visit this group at https://groups.google.com/a/fidoalliance.org/group/fido-dev/.
To view this discussion on the web visit https://groups.google.com/a/fidoalliance.org/d/msgid/fido-dev/bb21d0ee-5c92-4ce4-b76e-793a8d2f5de9%40fidoalliance.org.
To view this discussion on the web visit https://groups.google.com/a/fidoalliance.org/d/msgid/fido-dev/1675d472-fe6b-4352-b350-fd1762f1e564%40fidoalliance.org.
attestedCredentialData
. For authentication signatures, the AT flag MUST NOT be set and the attestedCredentialData
MUST NOT be included."To view this discussion on the web visit https://groups.google.com/a/fidoalliance.org/d/msgid/fido-dev/a2050844-3e1c-48d8-846a-89c09f47f202%40fidoalliance.org.
Can you think of a use case where the user handle plays an important role after all?
Isn't the credential id in the asserrion always enough for the relying party to create an association to the public key and therefore with a user?
Regards
Sebastian