On a laptop or desktop:
User navigates to example.com in a browser, sees an option to "Sign in with your phone."
User chooses this option and gets a message from the browser, "Please complete this action on your phone."
Next, on their phone:
User sees a discrete prompt or notification, "Sign in to example.com."
--
You received this message because you are subscribed to the Google Groups "FIDO Dev (fido-dev)" group.
To unsubscribe from this group and stop receiving emails from it, send an email to fido-dev+u...@fidoalliance.org.
To post to this group, send email to fido...@fidoalliance.org.
Visit this group at https://groups.google.com/a/fidoalliance.org/group/fido-dev/.
To view this discussion on the web visit https://groups.google.com/a/fidoalliance.org/d/msgid/fido-dev/787aee13-dcb2-4e01-b863-820886637a5c%40fidoalliance.org.
To view this discussion on the web visit https://groups.google.com/a/fidoalliance.org/d/msgid/fido-dev/8fad89a2-3be0-4445-9c3c-5c902c0b1080%40fidoalliance.org.
The reason this is not explained in WebAuthn, is because it is not part of the specification the W3C is focused on. The W3C is focused on standardizing just the part of the FIDO2 protocol that is implemented in the web user agent: the browser.
The part that completes the FIDO2 protocol between the platform
(the desktop/laptop) and the "roaming" Authenticator is the Client
to Authenticator Protocol 2, which is being standardized by
the FIDO Alliance itself. You need to understand both of these
together to understand how the FIDO2 workflows work for
Registration, Authentication and Transaction Authorization.
The reason they are broken into 2 parts - and are being addressed
by two different standards groups - is because of division of
labor and specialization. Web developers who are writing web-apps
that use WebAuthn do not have to care about CTAP2; Authenticator
manufacturers who are building Roaming Authenticators do not have
to care about WebAuthn; and Server manufacturers - such as
ourselves - have to care about both (and a whole lot more).
Anyone that wishes to truly understand FIDO2 really needs to
understand WebAuthn, CTAP2, Metadata Services, Attestation and
FIDO Extensions.
Arshad Noor
StrongKey
--
You received this message because you are subscribed to the Google Groups "FIDO Dev (fido-dev)" group.
To unsubscribe from this group and stop receiving emails from it, send an email to fido-dev+u...@fidoalliance.org.
To post to this group, send email to fido...@fidoalliance.org.
Visit this group at https://groups.google.com/a/fidoalliance.org/group/fido-dev/.
To view this discussion on the web visit https://groups.google.com/a/fidoalliance.org/d/msgid/fido-dev/67649536-005c-437b-ba18-2744eb541ece%40fidoalliance.org.
I think that you may be confusing the non Fido authentication protocols like GSMA Mobile Conect that use OpenID connect for federation, and may use UAF out of band via a push notification system to authenticate the user, with the new Fido2-CTAP Flow.
To be perfectly clear the out of band Flow suseptable to man in the middle. So while it may use Fido as a component it is not in itself Fido.
The new WebAuthn Flow will cause the browser to enumerate the both plaftofm credentials and roaming credentials the user has for the site.
The roaming credentials could be on a a standalone device that supports USB, NFC or BLE. They may also be on a mobile phone as part of its platform authenticator. The mobile pone could use NFC (on Android) , or BLE to the computer as the transport for CTAP2.
The downside of BLE is that it currently requires pairing the device in advance so the user experience is not ideal. There are standalone BLE U2F authenticators now that show this can work.
There is a proposal to make the BLE connection between a roaming credential provider and a PC more automatic, that Google has put forward.
So the Flow people are using to use push notification with Fido UAF is not itself part of Fido.
WebAuthn/CTAP2 provide a new Flow that properly prevents Phishing/Man in the middle attacks.
Regards
Johnn B.
Sent from Mail for Windows 10
From: Ronnie C
Sent: Wednesday, May 23, 2018 10:55 AM
To: FIDO Dev (fido-dev)
Subject: [FIDO-DEV] WebAuthn use case: multiple devices
In the WebAuthn use case for Authentication, we see the following:
o User navigates to example.com in a browser, sees an option to "Sign in with your phone."
o User chooses this option and gets a message from the browser, "Please complete this action on your phone."
o User sees a discrete prompt or notification, "Sign in to example.com."
I am trying to understand: What is the mechanism which (following the earlier registration on the phone) pushes the prompt/notification to the phone?
If this is a browser-level function (i.e. I am signed into Chrome on both desktop and phone, and hence Chrome syncs/pushes from one instance to the other), then under WebAuthn can this work cross-browser too? i.e. I am on Chrome on desktop, and Safari on phone.
Thanks,
RC.
--
You received this message because you are subscribed to the Google Groups "FIDO Dev (fido-dev)" group.
To unsubscribe from this group and stop receiving emails from it, send an email to fido-dev+u...@fidoalliance.org.
To post to this group, send email to fido...@fidoalliance.org.
Visit this group at https://groups.google.com/a/fidoalliance.org/group/fido-dev/.
To view this discussion on the web visit https://groups.google.com/a/fidoalliance.org/d/msgid/fido-dev/787aee13-dcb2-4e01-b863-820886637a5c%40fidoalliance.org.
CTAP2 otherwise known as Fido 2 is a local connection between the User Agent and the authenticator.
Out of band push notification to a UAF authenticator is not part of Fido (and subject to MIM) UAF and will not be part of CTAP2.
That is not to say that you couldn’t combine a Fido2 platform authenticator onn a mobile phone with a push notification app to get the same effect as the UAF + push notification flow. It is just not part of Fido.
WebAuthn + CTAP2 provide a more secure flow to have the browser/User Agent talk directly to the authenticator on the phone over BLE so that the authentication can happen in band to protect against MIM attacks.
Regards
John B.
From: Tomas Špokas
Sent: Thursday, July 12, 2018 6:27 AM
To: FIDO Dev (fido-dev)
Subject: [FIDO-DEV] Re: WebAuthn use case: multiple devices
I highly doubt that it meant to be physical connection between phone and desktop. WebAuthn does not specify how such flow should work. Probably it's up to you to decide how to implement push notifications and stuff. This is where UAF protocol could possibly be used.
Anyway, I see this question asked over and over again, because WebAuthn does not talk about network communication with authenticator and this confuses people a lot.
Can anybody with high authority explain how PC<->Phone authentication should work when using WebAuthn?
On Wednesday, May 23, 2018 at 5:55:49 PM UTC+3, RC wrote:
In the WebAuthn use case for Authentication, we see the following:
- On a laptop or desktop:
o User navigates to example.com in a browser, sees an option to "Sign in with your phone."
o User chooses this option and gets a message from the browser, "Please complete this action on your phone."
- Next, on their phone:
o User sees a discrete prompt or notification, "Sign in to example.com."
I am trying to understand: What is the mechanism which (following the earlier registration on the phone) pushes the prompt/notification to the phone?
If this is a browser-level function (i.e. I am signed into Chrome on both desktop and phone, and hence Chrome syncs/pushes from one instance to the other), then under WebAuthn can this work cross-browser too? i.e. I am on Chrome on desktop, and Safari on phone.
Thanks,
RC.
--
You received this message because you are subscribed to the Google Groups "FIDO Dev (fido-dev)" group.
To unsubscribe from this group and stop receiving emails from it, send an email to fido-dev+u...@fidoalliance.org.
To post to this group, send email to fido...@fidoalliance.org.
Visit this group at https://groups.google.com/a/fidoalliance.org/group/fido-dev/.
To view this discussion on the web visit https://groups.google.com/a/fidoalliance.org/d/msgid/fido-dev/df3a341f-fd15-4961-955d-1d109b3312fa%40fidoalliance.org.
To view this discussion on the web visit https://groups.google.com/a/fidoalliance.org/d/msgid/fido-dev/5b48f40f.1c69fb81.785d1.7db9%40mx.google.com.