--
You received this message because you are subscribed to the Google Groups "FIDO Dev (fido-dev)" group.
To unsubscribe from this group and stop receiving emails from it, send an email to fido-dev+u...@fidoalliance.org.
To post to this group, send email to fido...@fidoalliance.org.
Visit this group at https://groups.google.com/a/fidoalliance.org/group/fido-dev/.
To view this discussion on the web visit https://groups.google.com/a/fidoalliance.org/d/msgid/fido-dev/60d3af09-3353-4483-9e77-ca1a0b6eb056%40fidoalliance.org.
--Hi,I have a question on the AppID and FacetID specification.If the AppID is null or empty, or if AppID=FacetID, the specification asks to continue with normal processing. Why is this so? Malicious apps could attempt to bypass the security mechanism built into the https-URL trustedFacetId verification, by provding an empty appID?From the specs:
- If the AppID is not an HTTPS URL, and matches the FacetID of the caller, no additional processing is necessary and the operation may proceed.
- If the AppID is null or empty, the client must set the AppID to be the FacetID of the caller, and the operation may proceed without additional processing.
How is the security guaranteed in the cases above? Just wanted to get your thoughts here.Thanks,
Dalys
You received this message because you are subscribed to the Google Groups "FIDO Dev (fido-dev)" group.
To unsubscribe from this group and stop receiving emails from it, send an email to fido-dev+u...@fidoalliance.org.
To post to this group, send email to fido...@fidoalliance.org.
Visit this group at https://groups.google.com/a/fidoalliance.org/group/fido-dev/.
To view this discussion on the web visit https://groups.google.com/a/fidoalliance.org/d/msgid/fido-dev/60d3af09-3353-4483-9e77-ca1a0b6eb056%40fidoalliance.org?utm_medium=email&utm_source=footer.
In order to protect the data communication between FIDO UAF Client and FIDO Server a protected TLS channel must be used by FIDO UAF Client (or User Agent) and the Relying Party for all protocol elements.