1. Introduction
This section is not normative.
This
specification
defines
an
API
enabling
the
creation
and
use
of
strong,
attested,
scoped
,
public
key-based
credentials
by
web
applications
,
for
the
purpose
of
strongly
authenticating
users.
A
public
key
credential
is
created
and
stored
by
a
WebAuthn
Authenticator
[WAA]
at
the
behest
of
a
WebAuthn
Relying
Party
[WRP]
,
subject
to
user
consent
.
Subsequently,
the
public
key
credential
can
only
be
accessed
by
origins
belonging
to
that
Relying
Party
[RP]
.
This
scoping
is
enforced
jointly
by
conforming
User
Agents
and
authenticators
.
Additionally,
privacy
across
Relying
Parties
[RPS]
is
maintained;
Relying
Parties
[RPS]
are
not
able
to
detect
any
properties,
or
even
the
existence,
of
credentials
scoped
to
other
Relying
Parties
[RPS]
.
Relying
Parties
[RPS]
employ
the
Web
Authentication
API
during
two
distinct,
but
related,
ceremonies
involving
a
user.
The
first
is
Registration
,
where
a
public
key
credential
is
created
on
an
authenticator
,
and
scoped
to
a
Relying
Party
[RP]
with
the
present
user’s
account
(the
account
might
already
exist
or
might
be
created
at
this
time).
The
second
is
Authentication
,
where
the
Relying
Party
[RP]
is
presented
with
an
Authentication
Assertion
proving
the
presence
and
consent
of
the
user
who
registered
the
public
key
credential
.
Functionally,
the
Web
Authentication
API
comprises
a
PublicKeyCredential
which
extends
the
Credential
Management
API
[CREDENTIAL-MANAGEMENT-1]
,
and
infrastructure
which
allows
those
credentials
to
be
used
with
navigator.credentials.create()
and
navigator.credentials.get()
.
The
former
is
used
during
Registration
,
and
the
latter
during
Authentication
.
Broadly, compliant authenticators protect public key credentials , and interact with user agents to implement the Web Authentication API . Implementing compliant authenticators is possible in software executing (a) on a general-purpose computing device, (b) on an on-device Secure Execution Environment, Trusted Platform Module (TPM), or a Secure Element (SE), or (c) off device. Authenticators being implemented on device are called platform authenticators . Authenticators being implemented off device ( roaming authenticators ) can be accessed over a transport such as Universal Serial Bus (USB), Bluetooth Low Energy (BLE), or Near Field Communications (NFC).
1.1. Specification Roadmap
While many W3C specifications are directed primarily to user agent developers and also to web application developers (i.e., "Web authors"), the nature of Web Authentication requires that this specification be correctly used by multiple audiences, as described below.
All audiences ought to begin with § 1.2 Use Cases , § 1.3 Sample API Usage Scenarios , and § 4 Terminology , and should also refer to [WebAuthnAPIGuide] for an overall tutorial. Beyond that, the intended audiences for this document are the following main groups:
-
Relying Party[RP] web application developers, especially those responsible forRelying Party[RP] web application login flows, account recovery flows, user account database content, etc. -
Web framework developers
-
The above two audiences should in particular refer to § 7
WebAuthn Relying Party[WRP] Operations . The introduction to § 5 Web Authentication API may be helpful, though readers should realize that the § 5 Web Authentication API section is targeted specifically at user agent developers, not web application developers. Additionally, if they intend to verify authenticator attestations , then § 6.5 Attestation and § 8 Defined Attestation Statement Formats will also be relevant. § 9 WebAuthn Extensions , and § 10 Defined Extensions will be of interest if they wish to make use of extensions. Finally, they should read § 13.4 Security considerations forRelying Parties[RPS] and § 14.6 Privacy considerations forRelying Parties[RPS] and consider which challenges apply to their application and users.
-
-
User agent developers
-
OS platform developers, responsible for OS platform API design and implementation in regards to platform-specific authenticator APIs, platform WebAuthn Client instantiation, etc.
-
The above two audiences should read § 5 Web Authentication API very carefully, along with § 9 WebAuthn Extensions if they intend to support extensions. They should also carefully read § 14.5 Privacy considerations for clients .
-
-
Authenticator developers. These readers will want to pay particular attention to § 6 WebAuthn Authenticator Model , § 8 Defined Attestation Statement Formats , § 9 WebAuthn Extensions , and § 10 Defined Extensions . They should also carefully read § 13.3 Security considerations for authenticators and § 14.4 Privacy considerations for authenticators .
It
is
important
for
Web
Authentication
deployments'
end-to-end
security
that
the
role
of
each
component—the
Relying
Party
[RP]
server,
the
client
,
and
the
authenticator
—
as
well
as
§ 13
Security
Considerations
and
§ 14
Privacy
Considerations
,
are
understood
by
all
audiences
.
1.2. Use Cases
The below use case scenarios illustrate use of two very different types of authenticators , as well as outline further scenarios. Additional scenarios, including sample code, are given later in § 1.3 Sample API Usage Scenarios .
1.2.1. Registration
-
On a phone:
-
User navigates to example.com in a browser and signs in to an existing account using whatever method they have been using (possibly a legacy method such as a password), or creates a new account.
-
The phone prompts, "Do you want to register this device with example.com?"
-
User agrees.
-
The phone prompts the user for a previously configured authorization gesture (PIN, biometric, etc.); the user provides this.
-
Website shows message, "Registration complete."
-
1.2.2. Authentication
-
On a laptop or desktop:
-
User pairs their phone with the laptop or desktop via Bluetooth.
-
User navigates to example.com in a browser and initiates signing in.
-
User gets a message from the browser, "Please complete this action on your phone."
-
-
Next, on their phone:
-
User sees a discrete prompt or notification, "Sign in to example.com."
-
User selects this prompt / notification.
-
User is shown a list of their example.com identities, e.g., "Sign in as Mohamed / Sign in as 张三".
-
User picks an identity, is prompted for an authorization gesture (PIN, biometric, etc.) and provides this.
-
-
Now, back on the laptop:
-
Web page shows that the selected user is signed in, and navigates to the signed-in page.
-
1.2.3. New Device Registration
This
use
case
scenario
illustrates
how
a
Relying
Party
[RP]
can
leverage
a
combination
of
a
roaming
authenticator
(e.g.,
a
USB
security
key
fob)
and
a
platform
authenticator
(e.g.,
a
built-in
fingerprint
sensor)
such
that
the
user
has:
-
a "primary" roaming authenticator that they use to authenticate on new-to-them client devices (e.g., laptops, desktops) or on such client devices that lack a platform authenticator , and
-
a low-friction means to strongly re-authenticate on client devices having platform authenticators .
Note: This approach of registering multiple authenticators for an account is also useful in account recovery use cases.
-
First, on a desktop computer (lacking a platform authenticator ):
-
User navigates to
example.com
in a browser and signs in to an existing account using whatever method they have been using (possibly a legacy method such as a password), or creates a new account. -
User navigates to account security settings and selects "Register security key".
-
Website prompts the user to plug in a USB security key fob; the user does.
-
The USB security key blinks to indicate the user should press the button on it; the user does.
-
Website shows message, "Registration complete."
Note: Since this computer lacks a platform authenticator , the website may require the user to present their USB security key from time to time or each time the user interacts with the website. This is at the website’s discretion.
-
-
Later, on their laptop (which features a platform authenticator ):
-
User navigates to example.com in a browser and initiates signing in.
-
Website prompts the user to plug in their USB security key.
-
User plugs in the previously registered USB security key and presses the button.
-
Website shows that the user is signed in, and navigates to the signed-in page.
-
Website prompts, "Do you want to register this computer with example.com?"
-
User agrees.
-
Laptop prompts the user for a previously configured authorization gesture (PIN, biometric, etc.); the user provides this.
-
Website shows message, "Registration complete."
-
User signs out.
-
-
Later, again on their laptop:
-
User navigates to example.com in a browser and initiates signing in.
-
Website shows message, "Please follow your computer’s prompts to complete sign in."
-
Laptop prompts the user for an authorization gesture (PIN, biometric, etc.); the user provides this.
-
Website shows that the user is signed in, and navigates to the signed-in page.
-
1.2.4. Other Use Cases and Configurations
A variety of additional use cases and configurations are also possible, including (but not limited to):
-
A user navigates to example.com on their laptop, is guided through a flow to create and register a credential on their phone.
-
A user obtains a discrete, roaming authenticator , such as a "fob" with USB or USB+NFC/BLE connectivity options, loads example.com in their browser on a laptop or phone, and is guided through a flow to create and register a credential on the fob.
-
A
Relying Party[RP] prompts the user for their authorization gesture in order to authorize a single transaction, such as a payment or other financial transaction.
1.3. Sample API Usage Scenarios
This section is not normative.
In this section, we walk through some events in the lifecycle of a public key credential , along with the corresponding sample code for using this API. Note that this is an example flow and does not limit the scope of how the API can be used.
As was the case in earlier sections, this flow focuses on a use case involving a first-factor roaming authenticator with its own display. One example of such an authenticator would be a smart phone. Other authenticator types are also supported by this API, subject to implementation by the client platform . For instance, this flow also works without modification for the case of an authenticator that is embedded in the client device . The flow also works for the case of an authenticator without its own display (similar to a smart card) subject to specific implementation considerations. Specifically, the client platform needs to display any prompts that would otherwise be shown by the authenticator, and the authenticator needs to allow the client platform to enumerate all the authenticator’s credentials so that the client can have information to show appropriate prompts.
1.3.1. Registration
This
is
the
first-time
flow,
in
which
a
new
credential
is
created
and
registered
with
the
server.
In
this
flow,
the
WebAuthn
Relying
Party
[WRP]
does
not
have
a
preference
for
platform
authenticator
or
roaming
authenticators
.
-
The user visits example.com, which serves up a script. At this point, the user may already be logged in using a legacy username and password, or additional authenticator, or other means acceptable to the
Relying Party[RP] . Or the user may be in the process of creating a new account. -
The
Relying Party[RP] script runs the code snippet below. -
The client platform searches for and locates the authenticator.
-
The client connects to the authenticator, performing any pairing actions if necessary.
-
The authenticator shows appropriate UI for the user to provide a biometric or other authorization gesture .
-
The authenticator returns a response to the client , which in turn returns a response to the
Relying Party[RP] script. If the user declined to select an authenticator or provide authorization, an appropriate error is returned. -
If a new credential was created,
-
The
Relying Party[RP] script sends the newly generated credential public key to the server, along with additional information such as attestation regarding the provenance and characteristics of the authenticator. -
The server stores the credential public key in its database and associates it with the user as well as with the characteristics of authentication indicated by attestation, also storing a friendly name for later use.
-
The script may store data such as the credential ID in local storage, to improve future UX by narrowing the choice of credential for the user.
-
The sample code for generating and registering a new key follows:
if ( ! window. PublicKeyCredential) { /* Client not capable. Handle error. */ } var publicKey= { // The challenge is produced by the server; see the Security Considerations challenge: new Uint8Array([ 21 , 31 , 105 /* 29 more random bytes generated by the server */ ]), // Relying Party: rp: { name: "ACME Corporation" }, // User: user: { id: Uint8Array. from ( window. atob( "MIIBkzCCATigAwIBAjCCAZMwggE4oAMCAQIwggGTMII=" ), c=> c. charCodeAt( 0 )), name: "alex.mueller@example.com" , displayName: "Alex Müller" , }, // This Relying Party will accept either an ES256 or RS256 credential, but // prefers an ES256 credential. pubKeyCredParams: [ { type: "public-key" , alg: - 7 // "ES256" as registered in the IANA COSE Algorithms registry }, { type: "public-key" , alg: - 257 // Value registered by this specification for "RS256" } ], authenticatorSelection: { // Try to use UV if possible. This is also the default. userVerification: "preferred" }, timeout: 300000 , // 5 minutes excludeCredentials: [ // Don’t re-register any authenticator that has one of these credentials { "id" : Uint8Array. from ( window. atob( "ufJWp8YGlibm1Kd9XQBWN1WAw2jy5In2Xhon9HAqcXE=" ), c=> c. charCodeAt( 0 )), "type" : "public-key" }, { "id" : Uint8Array. from ( window. atob( "E/e1dhZc++mIsz4f9hb6NifAzJpF1V4mEtRlIPBiWdY=" ), c=> c. charCodeAt( 0 )), "type" : "public-key" } ], // Make excludeCredentials check backwards compatible with credentials registered with U2F extensions: { "appidExclude" : "https://acme.example.com" } }; // Note: The following call will cause the authenticator to display UI. navigator. credentials. create({ publicKey}) . then( function ( newCredentialInfo) { // Send new credential info to server for verification and registration. }). catch ( function ( err) { // No acceptable authenticator or user refused consent. Handle appropriately. });
1.3.2. Registration Specifically with User-Verifying Platform Authenticator
This
is
an
example
flow
for
when
the
WebAuthn
Relying
Party
[WRP]
is
specifically
interested
in
creating
a
public
key
credential
with
a
user-verifying
platform
authenticator
.
-
The user visits example.com and clicks on the login button, which redirects the user to login.example.com.
-
The user enters a username and password to log in. After successful login, the user is redirected back to example.com.
-
The
Relying Party[RP] script runs the code snippet below.-
The user agent checks if a user-verifying platform authenticator is available. If not, terminate this flow.
-
The
Relying Party[RP] asks the user if they want to create a credential with it. If not, terminate this flow. -
The user agent and/or operating system shows appropriate UI and guides the user in creating a credential using one of the available platform authenticators.
-
Upon successful credential creation, the
Relying Party[RP] script conveys the new credential to the server.
-
if ( ! window. PublicKeyCredential) { /* Client not capable of the API. Handle error. */ } PublicKeyCredential. isUserVerifyingPlatformAuthenticatorAvailable() . then( function ( uvpaAvailable) { // If there is a user-verifying platform authenticator if ( uvpaAvailable) { // Render some RP-specific UI and get a Promise for a Boolean value return askIfUserWantsToCreateCredential(); } }). then( function ( userSaidYes) { // If there is a user-verifying platform authenticator // AND the user wants to create a credential if ( userSaidYes) { var publicKeyOptions= { /* Public key credential creation options. */ }; return navigator. credentials. create({ "publicKey" : publicKeyOptions}); } }). then( function ( newCredentialInfo) { if ( newCredentialInfo) { // Send new credential info to server for verification and registration. } }). catch ( function ( err) { // Something went wrong. Handle appropriately. });
1.3.3. Authentication
This is the flow when a user with an already registered credential visits a website and wants to authenticate using the credential.
-
The user visits example.com, which serves up a script.
-
The script asks the client for an Authentication Assertion, providing as much information as possible to narrow the choice of acceptable credentials for the user. This can be obtained from the data that was stored locally after registration, or by other means such as prompting the user for a username.
-
The
Relying Party[RP] script runs one of the code snippets below. -
The client platform searches for and locates the authenticator.
-
The client connects to the authenticator, performing any pairing actions if necessary.
-
The authenticator presents the user with a notification that their attention is needed. On opening the notification, the user is shown a friendly selection menu of acceptable credentials using the account information provided when creating the credentials, along with some information on the origin that is requesting these keys.
-
The authenticator obtains a biometric or other authorization gesture from the user.
-
The authenticator returns a response to the client , which in turn returns a response to the
Relying Party[RP] script. If the user declined to select a credential or provide an authorization, an appropriate error is returned. -
If an assertion was successfully generated and returned,
-
The script sends the assertion to the server.
-
The server examines the assertion, extracts the credential ID , looks up the registered credential public key in its database, and verifies the assertion signature . If valid, it looks up the identity associated with the assertion’s credential ID ; that identity is now authenticated. If the credential ID is not recognized by the server (e.g., it has been deregistered due to inactivity) then the authentication has failed; each
Relying Party[RP] will handle this in its own way. -
The server now does whatever it would otherwise do upon successful authentication -- return a success page, set authentication cookies, etc.
-
If
the
Relying
Party
[RP]
script
does
not
have
any
hints
available
(e.g.,
from
locally
stored
data)
to
help
it
narrow
the
list
of
credentials,
then
the
sample
code
for
performing
such
an
authentication
might
look
like
this:
if ( ! window. PublicKeyCredential) { /* Client not capable. Handle error. */ } // credentialId is generated by the authenticator and is an opaque random byte array var credentialId= new Uint8Array([ 183 , 148 , 245 /* more random bytes previously generated by the authenticator */ ]); var options= { // The challenge is produced by the server; see the Security Considerations challenge: new Uint8Array([ 4 , 101 , 15 /* 29 more random bytes generated by the server */ ]), timeout: 300000 , // 5 minutes allowCredentials: [{ type: "public-key" , id: credentialId}] }; navigator. credentials. get({ "publicKey" : options}) . then( function ( assertion) { // Send assertion to server for verification }). catch ( function ( err) { // No acceptable credential or user refused consent. Handle appropriately. });
On
the
other
hand,
if
the
Relying
Party
[RP]
script
has
some
hints
to
help
it
narrow
the
list
of
credentials,
then
the
sample
code
for
performing
such
an
authentication
might
look
like
the
following.
Note
that
this
sample
also
demonstrates
how
to
use
the
Credential
Properties
Extension
.
if ( ! window. PublicKeyCredential) { /* Client not capable. Handle error. */ } var encoder= new TextEncoder(); var acceptableCredential1= { type: "public-key" , id: encoder. encode( "BA44712732CE" ) }; var acceptableCredential2= { type: "public-key" , id: encoder. encode( "BG35122345NF" ) }; var options= { // The challenge is produced by the server; see the Security Considerations challenge: new Uint8Array([ 8 , 18 , 33 /* 29 more random bytes generated by the server */ ]), timeout: 300000 , // 5 minutes allowCredentials: [ acceptableCredential1, acceptableCredential2], extensions: { 'credProps' : true } }; navigator. credentials. get({ "publicKey" : options}) . then( function ( assertion) { // Send assertion to server for verification }). catch ( function ( err) { // No acceptable credential or user refused consent. Handle appropriately. });
1.3.4. Aborting Authentication Operations
The below example shows how a developer may use the AbortSignal parameter to abort a credential registration operation. A similar procedure applies to an authentication operation.
const authAbortController= new AbortController(); const authAbortSignal= authAbortController. signal; authAbortSignal. onabort= function () { // Once the page knows the abort started, inform user it is attempting to abort. } var options= { // A list of options. } navigator. credentials. create({ publicKey: options, signal: authAbortSignal}) . then( function ( attestation) { // Register the user. }). catch ( function ( error) { if ( error== "AbortError" ) { // Inform user the credential hasn’t been created. // Let the server know a key hasn’t been created. } }); // Assume widget shows up whenever authentication occurs. if ( widget== "disappear" ) { authAbortController. abort(); }
1.3.5. Decommissioning
The following are possible situations in which decommissioning a credential might be desired. Note that all of these are handled on the server side and do not need support from the API specified here.
-
Possibility #1 -- user reports the credential as lost.
-
User goes to server.example.net, authenticates and follows a link to report a lost/stolen authenticator .
-
Server returns a page showing the list of registered credentials with friendly names as configured during registration.
-
User selects a credential and the server deletes it from its database.
-
In the future, the
Relying Party[RP] script does not specify this credential in any list of acceptable credentials, and assertions signed by this credential are rejected.
-
-
Possibility #2 -- server deregisters the credential due to inactivity.
-
Server deletes credential from its database during maintenance activity.
-
In the future, the
Relying Party[RP] script does not specify this credential in any list of acceptable credentials, and assertions signed by this credential are rejected.
-
-
Possibility #3 -- user deletes the credential from the authenticator .
-
User employs a authenticator -specific method (e.g., device settings UI) to delete a credential from their authenticator .
-
From this point on, this credential will not appear in any selection prompts, and no assertions can be generated with it.
-
Sometime later, the server deregisters this credential due to inactivity.
-
1.4. Platform-Specific Implementation Guidance
This specification defines how to use Web Authentication in the general case. When using Web Authentication in connection with specific platform support (e.g. apps), it is recommended to see platform-specific documentation and guides for additional guidance and limitations.
2. Conformance
This specification defines three conformance classes. Each of these classes is specified so that conforming members of the class are secure against non-conforming or hostile members of the other classes.
2.1. User Agents
A User Agent MUST behave as described by § 5 Web Authentication API in order to be considered conformant. Conforming User Agents MAY implement algorithms given in this specification in any way desired, so long as the end result is indistinguishable from the result that would be obtained by the specification’s algorithms.
A conforming User Agent MUST also be a conforming implementation of the IDL fragments of this specification, as described in the “Web IDL” specification. [WebIDL]
2.1.1. Enumerations as DOMString types
Enumeration
types
are
not
referenced
by
other
parts
of
the
Web
IDL
because
that
would
preclude
other
values
from
being
used
without
updating
this
specification
and
its
implementations.
It
is
important
for
backwards
compatibility
that
client
platforms
and
Relying
Parties
[RPS]
handle
unknown
values.
Enumerations
for
this
specification
exist
here
for
documentation
and
as
a
registry.
Where
the
enumerations
are
represented
elsewhere,
they
are
typed
as
DOMString
s,
for
example
in
transports
.
2.2. Authenticators
A
WebAuthn
Authenticator
[WAA]
MUST
provide
the
operations
defined
by
§ 6
WebAuthn
Authenticator
Model
,
and
those
operations
MUST
behave
as
described
there.
This
is
a
set
of
functional
and
security
requirements
for
an
authenticator
to
be
usable
by
a
Conforming
User
Agent
.
As described in § 1.2 Use Cases , an authenticator may be implemented in the operating system underlying the User Agent, or in external hardware, or a combination of both.
2.2.1. Backwards Compatibility with FIDO U2F
Authenticators
that
only
support
the
§ 8.6
FIDO
U2F
Attestation
Statement
Format
have
no
mechanism
to
store
a
user
handle
,
so
the
returned
userHandle
will
always
be
null.
2.3. WebAuthn Relying Parties
A
WebAuthn
Relying
Party
[WRP]
MUST
behave
as
described
in
§ 7
WebAuthn
Relying
Party
[WRP]
Operations
to
obtain
all
the
security
benefits
offered
by
this
specification.
See
§ 13.4.1
Security
Benefits
for
WebAuthn
Relying
Parties
for
further
discussion
of
this.
2.4. All Conformance Classes
All CBOR encoding performed by the members of the above conformance classes MUST be done using the CTAP2 canonical CBOR encoding form . All decoders of the above conformance classes SHOULD reject CBOR that is not validly encoded in the CTAP2 canonical CBOR encoding form and SHOULD reject messages with duplicate map keys.
3. Dependencies
This specification relies on several other underlying specifications, listed below and in Terms defined by reference .
- Base64url encoding
-
The term Base64url Encoding refers to the base64 encoding using the URL- and filename-safe character set defined in Section 5 of [RFC4648] , with all trailing '=' characters omitted (as permitted by Section 3.2) and without the inclusion of any line breaks, whitespace, or other additional characters.
- CBOR
-
A number of structures in this specification, including attestation statements and extensions, are encoded using the CTAP2 canonical CBOR encoding form of the Compact Binary Object Representation ( CBOR ) [RFC8949] , as defined in [FIDO-CTAP] .
- CDDL
-
This specification describes the syntax of all CBOR -encoded data using the CBOR Data Definition Language ( CDDL ) [RFC8610] .
- COSE
-
CBOR Object Signing and Encryption (COSE) [RFC9052] [RFC9053] . The IANA COSE Algorithms registry [IANA-COSE-ALGS-REG] originally established by [RFC8152] and updated by these specifications is also used.
- Credential Management
-
The API described in this document is an extension of the
Credential
concept defined in [CREDENTIAL-MANAGEMENT-1] . - DOM
-
DOMException
and the DOMException values used in this specification are defined in [DOM4] . - ECMAScript
-
%ArrayBuffer% is defined in [ECMAScript] .
- URL
-
The concepts of domain , host , port , scheme , valid domain and valid domain string are defined in [URL] .
- Web IDL
-
Many of the interface definitions and all of the IDL in this specification depend on [WebIDL] . This updated version of the Web IDL standard adds support for
Promise
s, which are now the preferred mechanism for asynchronous interaction in all new web APIs. - FIDO AppID
-
The algorithms for determining the FacetID of a calling application and determining if a caller’s FacetID is authorized for an AppID (used only in the AppID extension ) are defined by [FIDO-APPID] .
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all capitals, as shown here.
4. Terminology
- Attestation
-
Generally, attestation is a statement that serves to bear witness, confirm, or authenticate. In the WebAuthn context, attestation is employed to provide verifiable evidence as to the origin of an authenticator and the data it emits. This includes such things as credential IDs , credential key pairs , signature counters , etc.
An attestation statement is provided within an attestation object during a registration ceremony. See also § 6.5 Attestation and Figure 6 . Whether or how the client conveys the attestation statement and aaguid portions of the attestation object to the
Relying Party[RP] is described by attestation conveyance . - Attestation Certificate
-
An X.509 Certificate for the attestation key pair used by an authenticator to attest to its manufacture and capabilities. At registration time, the authenticator uses the attestation private key to sign the
Relying Party[RP] -specific credential public key (and additional data) that it generates and returns via the authenticatorMakeCredential operation.Relying Parties[RPS] use the attestation public key conveyed in the attestation certificate to verify the attestation signature . Note that in the case of self attestation , the authenticator has no distinct attestation key pair nor attestation certificate , see self attestation for details. -
Authentication
- Authentication Ceremony
-
The ceremony where a user, and the user’s client platform (containing or connected to at least one authenticator ) work in concert to cryptographically prove to a
Relying Party[RP] that the user controls the credential private key of a previously-registered public key credential (see Registration ). Note that this includes a test of user presence or user verification .The WebAuthn authentication ceremony is defined in § 7.2 Verifying an Authentication Assertion , and is initiated by the
Relying Party[RP] invoking anavigator.credentials.get()
publicKey
argument. See § 5 Web Authentication API for an introductory overview and § 1.3.3 Authentication for implementation examples. -
Authentication
Assertion
- Assertion
-
The cryptographically signed
AuthenticatorAssertionResponse
object returned by an authenticator as the result of an authenticatorGetAssertion operation.This corresponds to the [CREDENTIAL-MANAGEMENT-1] specification’s single-use credentials .
-
Authenticator
- WebAuthn Authenticator
-
A cryptographic entity, existing in hardware or software, that can register a user with a given
Relying Party[RP] and later assert possession of the registered public key credential , and optionally verify the user to theRelying Party[RP] . Authenticators can report information regarding their type and security characteristics via attestation during registration and assertion .A
WebAuthn Authenticator[WAA] could be a roaming authenticator , a dedicated hardware subsystem integrated into the client device , or a software component of the client or client device . AWebAuthn Authenticator[WAA] is not necessarily confined to operating in a local context, and can generate or store a credential key pair in a server outside of client-side hardware.In general, an authenticator is assumed to have only one user. If multiple natural persons share access to an authenticator , they are considered to represent the same user in the context of that authenticator . If an authenticator implementation supports multiple users in separated compartments, then each compartment is considered a separate authenticator with a single user with no access to other users' credentials .
- Authorization Gesture
-
An authorization gesture is a physical interaction performed by a user with an authenticator as part of a ceremony , such as registration or authentication . By making such an authorization gesture , a user provides consent for (i.e., authorizes ) a ceremony to proceed. This MAY involve user verification if the employed authenticator is capable, or it MAY involve a simple test of user presence .
- Backed Up
-
Public Key Credential Sources may be backed up in some fashion such that they may become present on an authenticator other than their generating authenticator . Backup can occur via mechanisms including but not limited to peer-to-peer sync, cloud sync, local network sync, and manual import/export. See also § 6.1.3 Credential Backup State .
-
Backup
Eligibility
- Backup Eligible
-
A Public Key Credential Source
's’s generating authenticator determines at creation time whether the public key credential source is allowed to be backed up . Backup eligibility is signaled in authenticator data's’s flags along with the current backup state . Backup eligibility is a credential property and is permanent for a given public key credential source . A backup eligible public key credential source is referred to as a multi-device credential whereas one that is not backup eligible is referred to as a single-device credential . See also § 6.1.3 Credential Backup State . - Backup State
-
The current backup state of a multi-device credential as determined by the current managing authenticator . Backup state is signaled in authenticator data
's’s flags and can change over time. See also backup eligibility and § 6.1.3 Credential Backup State . - Biometric Authenticator
-
Any authenticator that implements biometric recognition .
- Biometric Recognition
-
The automated recognition of individuals based on their biological and behavioral characteristics [ISOBiometricVocabulary] .
-
Bound
credential
- "Authenticator contains a credential"
- "Credential created on an authenticator"
- "Authenticator contains a credential"
-
A public key credential source or public key credential is said to be bound to its managing authenticator . This means that only the managing authenticator can generate assertions for the public key credential sources bound to it.
This may also be expressed as "the managing authenticator contains the bound credential ", or "the bound credential was created on its managing authenticator ". Note, however, that a server-side credential might not be physically stored in persistent memory inside the authenticator, hence " bound to " is the primary term. See § 6.2.2 Credential Storage Modality .
- Ceremony
-
The concept of a ceremony [Ceremony] is an extension of the concept of a network protocol, with human nodes alongside computer nodes and with communication links that include user interface(s), human-to-human communication, and transfers of physical objects that carry data. What is out-of-band to a protocol is in-band to a ceremony. In this specification, Registration and Authentication are ceremonies, and an authorization gesture is often a component of those ceremonies .
-
Client
- WebAuthn Client
-
Also referred to herein as simply a client . See also Conforming User Agent . A
WebAuthn Client[WAC] is an intermediary entity typically implemented in the user agent (in whole, or in part). Conceptually, it underlies the Web Authentication API and embodies the implementation of the[[Create]](origin, options, sameOriginWithAncestors)
and[[DiscoverFromExternalSource]](origin, options, sameOriginWithAncestors)
internal methods . It is responsible for both marshalling the inputs for the underlying authenticator operations , and for returning the results of the latter operations to the Web Authentication API's’s callers.The
WebAuthn Client[WAC] runs on, and is distinct from, aWebAuthn Client[WAC] Device . -
Client
Device
- WebAuthn Client Device
-
The hardware device on which the
WebAuthn Client[WAC] runs, for example a smartphone, a laptop computer or a desktop computer, and the operating system running on that hardware.The distinctions between a
WebAuthn Client[WAC] device and a client are:-
a single client device MAY support running multiple clients , i.e., browser implementations, which all have access to the same authenticators available on that client device , and
-
platform authenticators are bound to a client device rather than a
WebAuthn Client[WAC] .
A client device and a client together constitute a client platform .
-
- Client Platform
-
A client device and a client together make up a client platform . A single hardware device MAY be part of multiple distinct client platforms at different times by running different operating systems and/or clients .
- Client-Side
-
This refers in general to the combination of the user’s client platform , authenticators , and everything gluing it all together.
-
Client-side
discoverable
Public
Key
Credential
Source
- Client-side discoverable Credential
- Discoverable Credential
- Passkey
- [DEPRECATED] Resident Credential
- [DEPRECATED] Resident Key
- Client-side discoverable Credential
-
Note: Historically, client-side discoverable credentials have been known as resident credentials or resident keys . Due to the phrases
ResidentKey
andresidentKey
being widely used in both the WebAuthn API and also in the Authenticator Model (e.g., in dictionary member names, algorithm variable names, and operation parameters) the usage ofresident
within their names has not been changed for backwards compatibility purposes. Also, the term resident key is defined here as equivalent to a client-side discoverable credential .A Client-side discoverable Public Key Credential Source , or Discoverable Credential for short, is a public key credential source that is discoverable and usable in authentication ceremonies where the
Relying Party[RP] does not provide any credential ID s, i.e., theRelying Party[RP] invokesnavigator.credentials.get()
with an emptyallowCredentials
argument. This means that theRelying Party[RP] does not necessarily need to first identify the user.As a consequence, a discoverable credential capable authenticator can generate an assertion signature for a discoverable credential given only an RP ID , which in turn necessitates that the public key credential source is stored in the authenticator or client platform . This is in contrast to a Server-side Public Key Credential Source , which requires that the authenticator is given both the RP ID and the credential ID but does not require client-side storage of the public key credential source .
See also: client-side credential storage modality and non-discoverable credential .
Note: Client-side discoverable credentials are also usable in authentication ceremonies where credential ID s are given, i.e., when calling
navigator.credentials.get()
with a non- emptyallowCredentials
argument. - Conforming User Agent
-
A user agent implementing, in cooperation with the underlying client device , the Web Authentication API and algorithms given in this specification, and handling communication between authenticators and
Relying Parties[RPS] . - Credential ID
-
A probabilistically-unique byte sequence identifying a public key credential source and its authentication assertions . At most 1023 bytes long.
Credential IDs are generated by authenticators in two forms:
-
At least 16 bytes that include at least 100 bits of entropy, or
-
The public key credential source , without its Credential ID or mutable items , encrypted so only its managing authenticator can decrypt it. This form allows the authenticator to be nearly stateless, by having the
Relying Party[RP] store any necessary state.Note: [FIDO-UAF-AUTHNR-CMDS] includes guidance on encryption techniques under "Security Guidelines".
Relying Parties[RPS] do not need to distinguish these two Credential ID forms. -
-
Credential
Key
Pair
- Credential Private Key
- Credential Public Key
- User Public Key
- User Credential
- Credential Private Key
-
A credential key pair is a pair of asymmetric cryptographic keys generated by an authenticator and scoped to a specific
WebAuthn Relying Party[WRP] . It is the central part of a public key credential .A credential public key is the public key portion of a credential key pair . The credential public key is returned to the
Relying Party[RP] during a registration ceremony .A credential private key is the private key portion of a credential key pair . The credential private key is bound to a particular authenticator - its managing authenticator - and is expected to never be exposed to any other party, not even to the owner of the authenticator .
Note that in the case of self attestation , the credential key pair is also used as the attestation key pair , see self attestation for details.
Note: The credential public key is referred to as the user public key in FIDO UAF [UAFProtocol] , and in FIDO U2F [FIDO-U2F-Message-Formats] and some parts of this specification that relate to it.
- Credential Properties
-
A credential property is some characteristic property of a public key credential source , such as whether it is a client-side discoverable credential or a server-side credential .
- Credential Record
-
In order to implement the algorithms defined in § 7
WebAuthn Relying Party[WRP] Operations , theRelying Party[RP] MUST store some properties of registered public key credential sources . The credential record struct is an abstraction of these properties stored in a user account . A credential record is created during a registration ceremony and used in subsequent authentication ceremonies .Relying Parties[RPS] MAY delete credential records as necessary or when requested by users.The following items are RECOMMENDED in order to implement all steps of § 7.1 Registering a New Credential and § 7.2 Verifying an Authentication Assertion as defined:
- type
-
The type of the public key credential source .
- id
-
The Credential ID of the public key credential source .
- publicKey
-
The credential public key of the public key credential source .
- signCount
-
The latest value of the signature counter in the authenticator data from any ceremony using the public key credential source .
- transports
-
The value returned from
getTransports()
when the public key credential source was registered .Note: Modifying or removing items from the value returned from
getTransports()
could negatively impact user experience, or even prevent use of the corresponding credential. - uvInitialized
-
A Boolean value indicating whether any credential from this public key credential source has had the UV flag set.
When this is
true
, theRelying Party[RP] MAY consider the UV flag as an authentication factor in authentication ceremonies . For example, aRelying Party[RP] might skip a password prompt if uvInitialized istrue
and the UV flag is set, even when user verification was not required.When this is
false
, including an authentication ceremony where it would be updated totrue
, the UV flag MUST NOT be relied upon as an authentication factor . This is because the first time a public key credential source sets the UV flag to 1, there is not yet any trust relationship established between theRelying Party[RP] and the authenticator's’s user verification . Therefore, updating uvInitialized fromfalse
totrue
SHOULD require authorization by an additional authentication factor equivalent to WebAuthn user verification . - backupEligible
-
The value of the BE flag when the public key credential source was created.
- backupState
-
The latest value of the BS flag in the authenticator data from any ceremony using the public key credential source .
The following items are OPTIONAL:
- attestationObject
-
The value of the
attestationObject
attribute when the public key credential source was registered . Storing this enables theRelying Party[RP] to reference the credential’s attestation statement at a later time. - attestationClientDataJSON
-
The value of the
clientDataJSON
attribute when the public key credential source was registered . Storing this in combination with the above attestationObject item enables theRelying Party[RP] to re-verify the attestation signature at a later time. - authenticatorDisplayName
-
A human-palatable description of the public key credential source .
If used, the
Relying Party[RP] SHOULD use this to describe the credential record in the user’s account settings. TheRelying Party[RP] SHOULD allow the user to choose this value, and MAY allow the user to modify it at will.The Credential Properties Extension defines the credential property
authenticatorDisplayName
which, when available, MAY be offered as a default for this value. TheRelying Party[RP] MAY also derive a default value from the authenticator’s attestation statement , if any.
WebAuthn extensions MAY define additional items needed to process the extension.
Relying Parties[RPS] MAY also include any additional items as needed, and MAY omit any items not needed for their implementation.The credential descriptor for a credential record is a
PublicKeyCredentialDescriptor
value with the contents:-
type
-
The type of the credential record .
-
id
-
The id of the credential record .
-
transports
-
The transports of the credential record .
- Supplemental public key
-
A additional public key, associated with a user credential , that can be obtained (and exercised) with the supplementalPubKeys extension. These public keys provide more specific continuity signals. For example, a supplemental public key with
device
scope never leaves the device, while a multi-device credential can. Other supplemental public keys might have a broader scope, as described by their attestation .Supplemental public keys MUST NOT have a scope that exceeds the scope of their user credential —i.e. they never link two user credentials together. While this specification defines norms around scopes,
Relying Parties[RPS] have to evaluate supplemental public keys in light of their attestation , if any, and assign credibility to claimed scopes accordingly. - Generating Authenticator
-
The Generating Authenticator is the authenticator involved in the authenticatorMakeCredential operation resulting in the creation of a given public key credential source . The generating authenticator is the same as the managing authenticator for single-device credentials . For multi-device credentials , the generating authenticator may or may not be the same as the current managing authenticator participating in a given authentication operation.
- Human Palatability
-
An identifier that is human-palatable is intended to be rememberable and reproducible by typical human users, in contrast to identifiers that are, for example, randomly generated sequences of bits [EduPersonObjectClassSpec] .
- Non-Discoverable Credential
-
This is a credential whose credential ID must be provided in
allowCredentials
when callingnavigator.credentials.get()
because it is not client-side discoverable . See also server-side credentials . - Public Key Credential
-
Generically, a credential is data one entity presents to another in order to authenticate the former to the latter [RFC4949] . The term public key credential refers to one of: a public key credential source , the possibly- attested credential public key corresponding to a public key credential source , or an authentication assertion . Which one is generally determined by context.
Note: This is a willful violation of [RFC4949] . In English, a "credential" is both a) the thing presented to prove a statement and b) intended to be used multiple times. It’s impossible to achieve both criteria securely with a single piece of data in a public key system. [RFC4949] chooses to define a credential as the thing that can be used multiple times (the public key), while this specification gives "credential" the English term’s flexibility. This specification uses more specific terms to identify the data related to an [RFC4949] credential:- "Authentication information" (possibly including a private key)
- "Signed value"
- [RFC4949] "credential"
At registration time, the authenticator creates an asymmetric key pair, and stores its private key portion and information from the
Relying Party[RP] into a public key credential source . The public key portion is returned to theRelying Party[RP] , which then stores it in the active user account . Subsequently, only thatRelying Party[RP] , as identified by its RP ID , is able to employ the public key credential in authentication ceremonies , via theget()
method. TheRelying Party[RP] uses its stored copy of the credential public key to verify the resultant authentication assertion . - Public Key Credential Source
-
A credential source ( [CREDENTIAL-MANAGEMENT-1] ) used by an authenticator to generate authentication assertions . A public key credential source consists of a struct with the following items :
- type
-
whose value is of
PublicKeyCredentialType
, defaulting topublic-key
. - id
-
A Credential ID .
- privateKey
-
The credential private key .
- rpId
-
The Relying Party Identifier , for the
Relying Party[RP] this public key credential source is scoped to. This is determined by therp
.id
create()
operation. - userHandle
-
The user handle associated when this public key credential source was created. This item is nullable, however user handle MUST always be populated for discoverable credentials .
- otherUI
-
OPTIONAL other information used by the authenticator to inform its UI. For example, this might include the user’s
displayName
. otherUI is a mutable item and SHOULD NOT be bound to the public key credential source in a way that prevents otherUI from being updated.
The authenticatorMakeCredential operation creates a public key credential source bound to a managing authenticator and returns the credential public key associated with its credential private key . The
Relying Party[RP] can use this credential public key to verify the authentication assertions created by this public key credential source . - Rate Limiting
-
The process (also known as throttling) by which an authenticator implements controls against brute force attacks by limiting the number of consecutive failed authentication attempts within a given period of time. If the limit is reached, the authenticator should impose a delay that increases exponentially with each successive attempt, or disable the current authentication modality and offer a different authentication factor if available. Rate limiting is often implemented as an aspect of user verification .
-
Registration
- Registration Ceremony
-
The ceremony where a user, a
Relying Party[RP] , and the user’s client platform (containing or connected to at least one authenticator ) work in concert to create a public key credential and associate it with a user account . Note that this includes employing a test of user presence or user verification . After a successful registration ceremony , the user can be authenticated by an authentication ceremony .The WebAuthn registration ceremony is defined in § 7.1 Registering a New Credential , and is initiated by the
Relying Party[RP] invoking anavigator.credentials.create()
publicKey
argument. See § 5 Web Authentication API for an introductory overview and § 1.3.1 Registration for implementation examples. -
Relying
Party
- WebAuthn Relying Party
-
The entity whose web application utilizes the Web Authentication API to register and authenticate users.
A
Relying Party[RP] implementation typically consists of both some client-side script that invokes the Web Authentication API in the client , and a server-side component that executes the Relying Party operations and other application logic. Communication between the two components MUST use HTTPS or equivalent transport security, but is otherwise beyond the scope of this specification.Note: While the term
Relying Party[RP] is also often used in other contexts (e.g., X.509 and OAuth), an entity acting as aRelying Party[RP] in one context is not necessarily aRelying Party[RP] in other contexts. In this specification, the termWebAuthn Relying Party[WRP] is often shortened to be justRelying Party[RP] , and explicitly refers to aRelying Party[RP] in the WebAuthn context. Note that in any concrete instantiation a WebAuthn context may be embedded in a broader overall context, e.g., one based on OAuth. -
Relying
Party
Identifier
- RP ID
-
In the context of the WebAuthn API , a relying party identifier is a valid domain string identifying the
WebAuthn Relying Party[WRP] on whose behalf a given registration or authentication ceremony is being performed. A public key credential can only be used for authentication with the same entity (as identified by RP ID ) it was registered with.By default, the RP ID for a WebAuthn operation is set to the caller’s origin
's’s effective domain . This default MAY be overridden by the caller, as long as the caller-specified RP ID value is a registrable domain suffix of or is equal to the caller’s origin's’s effective domain . See also § 5.1.3 Create a New Credential - PublicKeyCredential’s [[Create]](origin, options, sameOriginWithAncestors) Method and § 5.1.4 Use an Existing Credential to Make an Assertion - PublicKeyCredential’s [[Get]](options) Method .Note: An RP ID is based on a host's’s domain name. It does not itself include a scheme or port , as an origin does. The RP ID of a public key credential determines its scope . I.e., it determines the set of origins on which the public key credential may be exercised , as follows:-
The RP ID must be equal to the origin
's’s effective domain , or a registrable domain suffix of the origin's’s effective domain . -
One of the following must be true:
For example, given a
Relying Party[RP] whose origin ishttps://login.example.com:1337
, then the following RP ID s are valid:login.example.com
(default) andexample.com
, but notm.login.example.com
and notcom
. Another example of a valid origin ishttp://localhost:8000
, due to the origin beinglocalhost
.This is done in order to match the behavior of pervasively deployed ambient credentials (e.g., cookies, [RFC6265] ). Please note that this is a greater relaxation of "same-origin" restrictions than what document.domain
's’s setter provides.These restrictions on origin values apply to WebAuthn Clients .
Other specifications mimicking the WebAuthn API to enable WebAuthn public key credentials on non-Web platforms (e.g. native mobile applications), MAY define different rules for binding a caller to a Relying Party Identifier . Though, the RP ID syntaxes MUST conform to either valid domain strings or URIs [RFC3986] [URL] .
-
-
Server-side
Public
Key
Credential
Source
- Server-side Credential
- [DEPRECATED] Non-Resident Credential
- Server-side Credential
-
Note: Historically, server-side credentials have been known as non-resident credentials . For backwards compatibility purposes, the various WebAuthn API and Authenticator Model components with various forms of
resident
within their names have not been changed.A Server-side Public Key Credential Source , or Server-side Credential for short, is a public key credential source that is only usable in an authentication ceremony when the
Relying Party[RP] supplies its credential ID innavigator.credentials.get()
's’sallowCredentials
argument. This means that theRelying Party[RP] must manage the credential’s storage and discovery, as well as be able to first identify the user in order to discover the credential IDs to supply in thenavigator.credentials.get()
call.Client-side storage of the public key credential source is not required for a server-side credential . This is in contrast to a client-side discoverable credential , which instead does not require the user to first be identified in order to provide the user’s credential ID s to a
navigator.credentials.get()
call.See also: server-side credential storage modality and non-discoverable credential .
- Test of User Presence
-
A test of user presence is a simple form of authorization gesture and technical process where a user interacts with an authenticator by (typically) simply touching it (other modalities may also exist), yielding a Boolean result. Note that this does not constitute user verification because a user presence test , by definition, is not capable of biometric recognition , nor does it involve the presentation of a shared secret such as a password or PIN.
- User Account
-
In the context of this specification, a user account denotes the mapping of a set of credentials [CREDENTIAL-MANAGEMENT-1] to a (sub)set of a
Relying Party[RP]'s’s resources, as maintained and authorized by theRelying Party[RP] . TheRelying Party[RP] maps a given public key credential to a user account by assigning a user account -specific value to the credential’s user handle and storing a credential record for the credential in the user account . This mapping, the set of credentials, and their authorizations, may evolve over time. A given user account might be accessed by one or more natural persons (also known as "users"), and one natural person might have access to one or more user accounts , depending on actions of the user(s) and theRelying Party[RP] . - User Consent
-
User consent means the user agrees with what they are being asked, i.e., it encompasses reading and understanding prompts. An authorization gesture is a ceremony component often employed to indicate user consent .
- User Handle
-
A user handle is an identifier for a user account , specified by the
Relying Party[RP] asuser
.id
response
.userHandle
allowCredentials
The main use of the user handle is to identify the user account in such authentication ceremonies , but the credential ID could be used instead. The main differences are that the credential ID is chosen by the authenticator and is unique for each credential, while the user handle is chosen by the
Relying Party[RP] and ought to be the same for all credentials registered to the same user account .Authenticators map pairs of RP ID and user handle to public key credential sources . As a consequence, an authenticator will store at most one discoverable credential per user handle per
Relying Party[RP] . Therefore a secondary use of the user handle is to allow authenticators to know when to replace an existing discoverable credential with a new one during the registration ceremony .A user handle is an opaque byte sequence with a maximum size of 64 bytes, and is not meant to be displayed to the user. It MUST NOT contain personally identifying information, see § 14.6.1 User Handle Contents .
- User Present
-
Upon successful completion of a user presence test , the user is said to be " present ".
- User Verification
-
The technical process by which an authenticator locally authorizes the invocation of the authenticatorMakeCredential and authenticatorGetAssertion operations. User verification MAY be instigated through various authorization gesture modalities; for example, through a touch plus pin code, password entry, or biometric recognition (e.g., presenting a fingerprint) [ISOBiometricVocabulary] . The intent is to distinguish individual users. See also § 6.2.3 Authentication Factor Capability .
Note that user verification does not give the
Relying Party[RP] a concrete identification of the user, but when 2 or more ceremonies with user verification have been done with that credential it expresses that it was the same user that performed all of them. The same user might not always be the same natural person, however, if multiple natural persons share access to the same authenticator .Note: Distinguishing natural persons depends in significant part upon the client platform
's’s and authenticator's’s capabilities. For example, some devices are intended to be used by a single individual, yet they may allow multiple natural persons to enroll fingerprints or know the same PIN and thus access the same user account (s) using that device.Note: Invocation of the authenticatorMakeCredential and authenticatorGetAssertion operations implies use of key material managed by the authenticator.Also, for security, user verification and use of credential private keys must all occur within the logical security boundary defining the authenticator .
User verification procedures MAY implement rate limiting as a protection against brute force attacks.
- User Verified
-
Upon successful completion of a user verification process, the user is said to be " verified ".
5. Web Authentication API
This
section
normatively
specifies
the
API
for
creating
and
using
public
key
credentials
.
The
basic
idea
is
that
the
credentials
belong
to
the
user
and
are
managed
by
a
WebAuthn
Authenticator
[WAA]
,
with
which
the
WebAuthn
Relying
Party
[WRP]
interacts
through
the
client
platform
.
Relying
Party
[RP]
scripts
can
(with
the
user’s
consent
)
request
the
browser
to
create
a
new
credential
for
future
use
by
the
Relying
Party
[RP]
.
See
Figure
,
below.
Scripts can also request the user’s permission to perform authentication operations with an existing credential. See Figure , below.
All such operations are performed in the authenticator and are mediated by the client platform on the user’s behalf. At no point does the script get access to the credentials themselves; it only gets information about the credentials in the form of objects.
In addition to the above script interface, the authenticator MAY implement (or come with client software that implements) a user interface for management. Such an interface MAY be used, for example, to reset the authenticator to a clean state or to inspect the current state of the authenticator. In other words, such an interface is similar to the user interfaces provided by browsers for managing user state such as history, saved passwords, and cookies. Authenticator management actions such as credential deletion are considered to be the responsibility of such a user interface and are deliberately omitted from the API exposed to scripts.
The security properties of this API are provided by the client and the authenticator working together. The authenticator, which holds and manages credentials, ensures that all operations are scoped to a particular origin , and cannot be replayed against a different origin , by incorporating the origin in its responses. Specifically, as defined in § 6.3 Authenticator Operations , the full origin of the requester is included, and signed over, in the attestation object produced when a new credential is created as well as in all assertions produced by WebAuthn credentials.
Additionally,
to
maintain
user
privacy
and
prevent
malicious
Relying
Parties
[RPS]
from
probing
for
the
presence
of
public
key
credentials
belonging
to
other
Relying
Parties
[RPS]
,
each
credential
is
also
scoped
to
a
Relying
Party
Identifier
,
or
RP
ID
.
This
RP
ID
is
provided
by
the
client
to
the
authenticator
for
all
operations,
and
the
authenticator
ensures
that
credentials
created
by
a
Relying
Party
[RP]
can
only
be
used
in
operations
requested
by
the
same
RP
ID
.
Separating
the
origin
from
the
RP
ID
in
this
way
allows
the
API
to
be
used
in
cases
where
a
single
Relying
Party
[RP]
maintains
multiple
origins
.
The
client
facilitates
these
security
measures
by
providing
the
Relying
Party
[RP]
's
’s
origin
and
RP
ID
to
the
authenticator
for
each
operation.
Since
this
is
an
integral
part
of
the
WebAuthn
security
model,
user
agents
only
expose
this
API
to
callers
in
secure
contexts
.
For
web
contexts
in
particular,
this
only
includes
those
accessed
via
a
secure
transport
(e.g.,
TLS)
established
without
errors.
The Web Authentication API is defined by the union of the Web IDL fragments presented in the following sections. A combined IDL listing is given in the IDL Index .
5.1.
PublicKeyCredential
Interface
The
PublicKeyCredential
interface
inherits
from
Credential
[CREDENTIAL-MANAGEMENT-1]
,
and
contains
the
attributes
that
are
returned
to
the
caller
when
a
new
credential
is
created,
or
a
new
assertion
is
requested.
[SecureContext ,Exposed =Window ]interface PublicKeyCredential :Credential { [SameObject ]readonly attribute ArrayBuffer ; [
rawId SameObject ]readonly attribute AuthenticatorResponse response ;readonly attribute DOMString ?authenticatorAttachment ;AuthenticationExtensionsClientOutputs ();
getClientExtensionResults static Promise <boolean >();
isConditionalMediationAvailable PublicKeyCredentialJSON (); };
toJSON
-
id
-
This attribute is inherited from
Credential
, thoughPublicKeyCredential
overridesCredential
's’s getter, instead returning the base64url encoding of the data contained in the object’s[[identifier]]
internal slot . -
rawId
-
This attribute returns the
ArrayBuffer
contained in the[[identifier]]
internal slot. -
response
, of type AuthenticatorResponse , readonly -
This attribute contains the authenticator
's’s response to the client’s request to either create a public key credential , or generate an authentication assertion . If thePublicKeyCredential
is created in response tocreate()
, this attribute’s value will be anAuthenticatorAttestationResponse
, otherwise, thePublicKeyCredential
was created in response toget()
, and this attribute’s value will be anAuthenticatorAssertionResponse
. -
authenticatorAttachment
, of type DOMString , readonly, nullable -
This attribute reports the authenticator attachment modality in effect at the time the
navigator.credentials.create()
ornavigator.credentials.get()
methods successfully complete. The attribute’s value SHOULD be a member ofAuthenticatorAttachment
.Relying Parties[RPS] SHOULD treat unknown values as if the value were null.Note: If, as the result of a registration or authentication ceremony ,authenticatorAttachment
's’s value is "cross-platform" and concurrentlyisUserVerifyingPlatformAuthenticatorAvailable
returnstrue
, then the user employed a roaming authenticator for this ceremony while there is an available platform authenticator . Thus theRelying Party[RP] has the opportunity to prompt the user to register the available platform authenticator , which may enable more streamlined user experience flows.An authenticator’s attachment modality could change over time. For example, a mobile phone might at one time only support platform attachment but later receive updates to support cross-platform attachment as well.
-
getClientExtensionResults()
-
This operation returns the value of
[[clientExtensionsResults]]
, which is a map containing extension identifier → client extension output entries produced by the extension’s client extension processing . -
isConditionalMediationAvailable()
-
PublicKeyCredential
overrides this method to indicate availability forconditional
mediation duringnavigator.credentials.get()
.WebAuthn Relying Parties[WRPS] SHOULD verify availability before attempting to setoptions .
tomediation
conditional
.Upon invocation, a promise is returned that resolves with a value of
true
ifconditional
user mediation is available, orfalse
otherwise.This method has no arguments and returns a promise to a Boolean value.
Note: If this method is not present,
conditional
user mediation is not available fornavigator.credentials.get()
. -
toJSON()
-
This operation returns
RegistrationResponseJSON
orAuthenticationResponseJSON
, which are JSON type representations mirroringPublicKeyCredential
, suitable for submission to aRelying Party[RP] server as anapplication/json
payload. The client is in charge of serializing values to JSON types as usual , but MUST take additional steps to first encode anyArrayBuffer
values toDOMString
values using base64url encoding .The
RegistrationResponseJSON.clientExtensionResults
orAuthenticationResponseJSON.clientExtensionResults
member MUST be set to the output ofgetClientExtensionResults()
, with anyArrayBuffer
values encoded toDOMString
values using base64url encoding . This MAY includeArrayBuffer
values from extensions registered in the IANA "WebAuthn Extension Identifiers" registry [IANA-WebAuthn-Registries] but not defined in § 9 WebAuthn Extensions .The
AuthenticatorAttestationResponseJSON.transports
member MUST be set to the output ofgetTransports()
.The
AuthenticatorAttestationResponseJSON.publicKey
member MUST be set to the output ofgetPublicKey()
.The
AuthenticatorAttestationResponseJSON.publicKeyAlgorithm
member MUST be set to the output ofgetPublicKeyAlgorithm()
.
typedef DOMString ; // The structure of this object will be either // RegistrationResponseJSON or AuthenticationResponseJSON
Base64URLString typedef object ;
PublicKeyCredentialJSON dictionary {
RegistrationResponseJSON required Base64URLString ;
id required Base64URLString ;
rawId required AuthenticatorAttestationResponseJSON ;
response DOMString ;
authenticatorAttachment required AuthenticationExtensionsClientOutputsJSON ;
clientExtensionResults required DOMString ; };
type dictionary {
AuthenticatorAttestationResponseJSON required Base64URLString ;
clientDataJSON required Base64URLString ;
authenticatorData required sequence <DOMString >; // The publicKey field will be missing if pubKeyCredParams was used to // negotiate a public-key algorithm that the user agent doesn't // understand. (See section “Easily accessing credential data” for a // list of which algorithms user agents must support.) If using such an // algorithm then the public key must be parsed directly from // attestationObject or authenticatorData.
transports Base64URLString ;
publicKey required long long ; // This value contains copies of some of the fields above. See // section “Easily accessing credential data”.
publicKeyAlgorithm required Base64URLString ; };
attestationObject dictionary {
AuthenticationResponseJSON required Base64URLString ;
id required Base64URLString ;
rawId required AuthenticatorAssertionResponseJSON ;
response DOMString ;
authenticatorAttachment required AuthenticationExtensionsClientOutputsJSON ;
clientExtensionResults required DOMString ; };
type dictionary {
AuthenticatorAssertionResponseJSON required Base64URLString ;
clientDataJSON required Base64URLString ;
authenticatorData required Base64URLString ;
signature Base64URLString ; };
userHandle dictionary { };
AuthenticationExtensionsClientOutputsJSON
-
[[type]]
-
The
PublicKeyCredential
interface object's’s[[type]]
internal slot's’s value is the string "public-key
".Note: This is reflected via the
type
attribute getter inherited fromCredential
. -
[[discovery]]
-
The
PublicKeyCredential
interface object's’s[[discovery]]
internal slot's’s value is "remote
". -
[[identifier]]
-
This internal slot contains the credential ID , chosen by the authenticator. The credential ID is used to look up credentials for use, and is therefore expected to be globally unique with high probability across all credentials of the same type, across all authenticators.
Note: This API does not constrain the format or length of this identifier, except that it MUST be sufficient for the authenticator to uniquely select a key. For example, an authenticator without on-board storage may create identifiers containing a credential private key wrapped with a symmetric key that is burned into the authenticator.
-
[[clientExtensionsResults]]
-
This internal slot contains the results of processing client extensions requested by the
Relying Party[RP] upon theRelying Party[RP]'s’s invocation of eithernavigator.credentials.create()
ornavigator.credentials.get()
.
PublicKeyCredential
's
’s
interface
object
inherits
Credential
's
’s
implementation
of
[[CollectFromCredentialStore]](origin,
options,
sameOriginWithAncestors)
,
and
defines
its
own
implementation
of
each
of
[[Create]](origin,
options,
sameOriginWithAncestors)
,
[[DiscoverFromExternalSource]](origin,
options,
sameOriginWithAncestors)
,
and
[[Store]](credential,
sameOriginWithAncestors)
.
Calling
CredentialsContainer
's
’s
preventSilentAccess()
method
will
have
no
effect
on
PublicKeyCredential
credentials,
since
they
always
require
user
interaction.
5.1.1.
CredentialCreationOptions
Dictionary
Extension
To
support
registration
via
navigator.credentials.create()
,
this
document
extends
the
CredentialCreationOptions
dictionary
as
follows:
partial dictionary CredentialCreationOptions {PublicKeyCredentialCreationOptions ; };
publicKey
5.1.2.
CredentialRequestOptions
Dictionary
Extension
To
support
obtaining
assertions
via
navigator.credentials.get()
,
this
document
extends
the
CredentialRequestOptions
dictionary
as
follows:
partial dictionary CredentialRequestOptions {PublicKeyCredentialRequestOptions ; };
publicKey
5.1.3.
Create
a
New
Credential
-
PublicKeyCredential’s
[[Create]](origin,
options,
sameOriginWithAncestors)
Method
PublicKeyCredential
[[Create]](origin,
options,
sameOriginWithAncestors)
internal
method
[CREDENTIAL-MANAGEMENT-1]
allows
navigator.credentials.create()
to
request
the
creation
of
a
new
public
key
credential
source
,
bound
to
an
authenticator
.
By
setting
options
.
to
mediation
conditional
,
Relying
Parties
[RPS]
can
indicate
that
they
would
like
to
register
a
credential
without
prominent
modal
UI
if
user
has
already
consented
to
create
a
credential.
The
Relying
Party
[RP]
SHOULD
first
check
that
conditionalCreate
is
present
in
the
result
of
getClientCapabilities()
in
order
to
avoid
the
possibility
of
causing
a
user-visible
error
to
be
returned
if
the
user
agent
does
not
support
conditional
user
mediation
for
navigator.credentials.create()
.
The
client
MUST
set
BOTH
requireUserPresence
and
requireUserVerification
to
FALSE
when
options
.
is
set
to
mediation
conditional
unless
they
may
explicitly
performed
during
the
ceremony.
Any
navigator.credentials.create()
operation
can
be
aborted
by
leveraging
the
AbortController
;
see
DOM
§ 3.3
Using
AbortController
and
AbortSignal
objects
in
APIs
for
detailed
instructions.
This internal method accepts three arguments:
-
origin
-
This argument is the relevant settings object
's’s origin , as determined by the callingcreate()
implementation. -
options
-
This argument is a
CredentialCreationOptions
object whoseoptions .
member contains apublicKey
PublicKeyCredentialCreationOptions
object specifying the desired attributes of the to-be-created public key credential . -
sameOriginWithAncestors
-
This argument is a Boolean value which is
true
if and only if the caller’s environment settings object is same-origin with its ancestors . It isfalse
if caller is cross-origin.Note: Invocation of this internal method indicates that it was allowed by permissions policy , which is evaluated at the [CREDENTIAL-MANAGEMENT-1] level. See § 5.9 Permissions Policy integration .
Note:
This
algorithm
is
synchronous:
the
Promise
resolution/rejection
is
handled
by
navigator.credentials.create()
.
Note:
All
BufferSource
objects
used
in
this
algorithm
must
be
snapshotted
when
the
algorithm
begins,
to
avoid
potential
synchronization
issues.
The
algorithm
implementations
should
get
a
copy
of
the
bytes
held
by
the
buffer
source
and
use
that
copy
for
relevant
portions
of
the
algorithm.
When this method is invoked, the user agent MUST execute the following algorithm:
-
Assert:
options .
is present.publicKey
-
If sameOriginWithAncestors is
false
:-
If
options .
is present with the valuemediation
conditional
:-
Throw a "
NotAllowedError
"DOMException
-
-
If the relevant global object , as determined by the calling
create()
implementation, does not have transient activation :-
Throw a "
NotAllowedError
"DOMException
.
-
NOTE: The client SHOULD make it clear to the user in the case where the origin that is creating a credential is different from the top-level origin of the relevant global object (i.e., is a different origin than the user can see in the address bar).
-
-
Let pkOptions be the value of
options .
.publicKey
-
If
pkOptions .
is present, check if its value lies within a reasonable range as defined by the client and if not, correct it to the closest value lying within that range. Set a timer lifetimeTimer to this adjusted value. Iftimeout
pkOptions .
is not present, then set lifetimeTimer to a client -specific default.timeout
See the recommended range and default for a WebAuthn ceremony timeout for guidance on deciding a reasonable range and default for
pkOptions .
.timeout
Note: The user agent should take cognitive guidelines into considerations regarding timeout for users with special needs.
-
If the length of
pkOptions .
is not between 1 and 64 bytes (inclusive) then throw auser
.id
TypeError
. -
Let callerOrigin be
origin
. If callerOrigin is an opaque origin , throw a "NotAllowedError
"DOMException
. -
Let effectiveDomain be the callerOrigin ’s effective domain . If effective domain is not a valid domain , then throw a "
SecurityError
"DOMException
.Note: An effective domain may resolve to a host , which can be represented in various manners, such as domain , ipv4 address , ipv6 address , opaque host , or empty host . Only the domain format of host is allowed here. This is for simplification and also is in recognition of various issues with using direct IP address identification in concert with PKI-based security.
-
- is present
-
If
pkOptions .
is not a registrable domain suffix of and is not equal to effectiveDomain , throw a "rp
.id
SecurityError
"DOMException
. - Is not present
Note:
pkOptions .
represents the caller’s RP ID . The RP ID defaults to being the caller’s originrp
.id
's’s effective domain unless the caller has explicitly setpkOptions .
when callingrp
.id
create()
. -
Let credTypesAndPubKeyAlgs be a new list whose items are pairs of
PublicKeyCredentialType
and aCOSEAlgorithmIdentifier
. -
If
pkOptions .
’s sizepubKeyCredParams
- is zero
-
Append the following pairs of
PublicKeyCredentialType
andCOSEAlgorithmIdentifier
values to credTypesAndPubKeyAlgs :-
public-key
and-7
("ES256"). -
public-key
and-257
("RS256").
-
- is non-zero
-
For each current of
pkOptions .
:pubKeyCredParams
-
If
current .
does not contain atype
PublicKeyCredentialType
supported by this implementation, then continue . -
Let alg be
current .
.alg
-
Append the pair of
current .
and alg to credTypesAndPubKeyAlgs .type
If credTypesAndPubKeyAlgs is empty , throw a "
NotSupportedError
"DOMException
. -
-
Let clientExtensions be a new map and let authenticatorExtensions be a new map .
-
If
pkOptions .
is present, then for each extensionId → clientExtensionInput ofextensions
pkOptions .
:extensions
-
If extensionId is not supported by this client platform or is not a registration extension , then continue .
-
Set clientExtensions [ extensionId ] to clientExtensionInput .
-
If extensionId is not an authenticator extension , then continue .
-
Let authenticatorExtensionInput be the ( CBOR ) result of running extensionId ’s client extension processing algorithm on clientExtensionInput . If the algorithm returned an error, continue .
-
Set authenticatorExtensions [ extensionId ] to the base64url encoding of authenticatorExtensionInput .
-
-
Let collectedClientData be a new
CollectedClientData
instance whose fields are:-
type
-
The string "webauthn.create".
-
challenge
-
The base64url encoding of pkOptions .
challenge
. -
origin
-
The serialization of callerOrigin .
-
topOrigin
-
The serialization of callerOrigin ’s top-level origin if the
sameOriginWithAncestors
argument passed to this internal method isfalse
, elseundefined
. -
crossOrigin
-
The inverse of the value of the
sameOriginWithAncestors
argument passed to this internal method .
-
-
Let clientDataJSON be the JSON-compatible serialization of client data constructed from collectedClientData .
-
Let clientDataHash be the hash of the serialized client data represented by clientDataJSON .
-
If
options .
is present and aborted , throw thesignal
options .
’s abort reason .signal
-
Let issuedRequests be a new ordered set .
-
Let authenticators represent a value which at any given instant is a set of client platform -specific handles, where each item identifies an authenticator presently available on this client platform at that instant.
Note: What qualifies an authenticator as "available" is intentionally unspecified; this is meant to represent how authenticators can be hot-plugged into (e.g., via USB) or discovered (e.g., via NFC or Bluetooth) by the client by various mechanisms, or permanently built into the client .
-
If
options .
is present with the valuemediation
conditional
:-
If the user agent has not recently mediated an authentication, the origin of said authentication is not callerOrigin , or the user does not consent to this type of credential creation, throw a "
NotAllowedError
"DOMException
.It is up to the user agent to decide when it believes an authentication ceremony has been completed. That authentication ceremony MAY be performed via other means than the Web Authentication API .
-
-
Consider the value of
hints
and craft the user interface accordingly, as the user-agent sees fit. -
Start lifetimeTimer .
-
While
lifetimeTimer
has
not
expired,
perform
the
following
actions
depending
upon
lifetimeTimer
,
and
the
state
and
response
for
each
authenticator
in
authenticators
:
- If lifetimeTimer expires,
-
For each authenticator in issuedRequests invoke the authenticatorCancel operation on authenticator and remove authenticator from issuedRequests .
- If the user exercises a user agent user-interface option to cancel the process,
-
For each authenticator in issuedRequests invoke the authenticatorCancel operation on authenticator and remove authenticator from issuedRequests . Throw a "
NotAllowedError
"DOMException
. -
If
options .
is present and aborted ,signal
-
For each authenticator in issuedRequests invoke the authenticatorCancel operation on authenticator and remove authenticator from issuedRequests . Then throw the
options .
’s abort reason .signal
- If an authenticator becomes available on this client device ,
-
Note: This includes the case where an authenticator was available upon lifetimeTimer initiation.
-
This authenticator is now the candidate authenticator .
-
If
pkOptions .
is present:authenticatorSelection
-
If
pkOptions .
is present and its value is not equal to authenticator ’s authenticator attachment modality , continue .authenticatorSelection
.authenticatorAttachment
-
If
pkOptions .
authenticatorSelection
.residentKey
-
is
present
and
set
to
required
-
If the authenticator is not capable of storing a client-side discoverable public key credential source , continue .
-
is
present
and
set
to
preferred
ordiscouraged
-
No effect.
- is not present
-
if
pkOptions .
is set toauthenticatorSelection
.requireResidentKey
true
and the authenticator is not capable of storing a client-side discoverable public key credential source , continue .
-
is
present
and
set
to
-
If
pkOptions .
is set toauthenticatorSelection
.userVerification
required
and the authenticator is not capable of performing user verification , continue .
-
-
Let requireResidentKey be the effective resident key requirement for credential creation , a Boolean value, as follows:
If
pkOptions .
authenticatorSelection
.residentKey
-
is
present
and
set
to
required
-
Let requireResidentKey be
true
. -
is
present
and
set
to
preferred
-
If the authenticator
- is capable of client-side credential storage modality
-
Let requireResidentKey be
true
. - is not capable of client-side credential storage modality , or if the client cannot determine authenticator capability,
-
Let requireResidentKey be
false
.
-
is
present
and
set
to
discouraged
-
Let requireResidentKey be
false
. - is not present
-
Let requireResidentKey be the value of
pkOptions .
.authenticatorSelection
.requireResidentKey
-
is
present
and
set
to
-
Let userVerification be the effective user verification requirement for credential creation , a Boolean value, as follows. If
pkOptions .
authenticatorSelection
.userVerification
-
is
set
to
required
-
-
If
options .
is set tomediation
conditional
and user verification cannot be collected during the ceremony, throw aConstraintError
DOMException
. -
Let userVerification be
true
.
-
-
is
set
to
preferred
-
If the authenticator
- is capable of user verification
-
Let userVerification be
true
. - is not capable of user verification
-
Let userVerification be
false
.
-
is
set
to
discouraged
-
Let userVerification be
false
.
-
is
set
to
-
Let enterpriseAttestationPossible be a Boolean value, as follows. If
pkOptions .
attestation
-
is
set
to
enterprise
-
Let enterpriseAttestationPossible be
true
if the user agent wishes to support enterprise attestation forpkOptions .
(see step 8 , above). Otherwiserp
.id
false
. - otherwise
-
Let enterpriseAttestationPossible be
false
.
-
is
set
to
-
Let attestationFormats be a list of strings, initialized to the value of
pkOptions .
.attestationFormats
-
If
pkOptions .
attestation
-
is
set
to
none
-
Set attestationFormats be the single-element list containing the string “none”
-
is
set
to
-
Let excludeCredentialDescriptorList be a new list .
-
For each credential descriptor C in
pkOptions .
:excludeCredentials
-
If
C .
is not empty , and authenticator is connected over a transport not mentioned intransports
C .
, the client MAY continue .transports
Note: If the client chooses to continue , this could result in inadvertently registering multiple credentials bound to the same authenticator if the transport hints in
C .
are not accurate. For example, stored transport hints could become inaccurate as a result of software upgrades adding new connectivity options.transports
-
Otherwise, Append C to excludeCredentialDescriptorList .
-
-
Invoke
the
authenticatorMakeCredential
operation
on
authenticator
with
clientDataHash
,
pkOptions .
,rp
pkOptions .
, requireResidentKey , userVerification , credTypesAndPubKeyAlgs , excludeCredentialDescriptorList , enterpriseAttestationPossible , attestationFormats , and authenticatorExtensions as parameters.user
-
Append authenticator to issuedRequests .
-
- If an authenticator ceases to be available on this client device ,
-
Remove authenticator from issuedRequests .
- If any authenticator returns a status indicating that the user cancelled the operation,
-
-
Remove authenticator from issuedRequests .
-
For each remaining authenticator in issuedRequests invoke the authenticatorCancel operation on authenticator and remove it from issuedRequests .
Note: Authenticators may return an indication of "the user cancelled the entire operation". How a user agent manifests this state to users is unspecified.
-
-
If
any
authenticator
returns
an
error
status
equivalent
to
"
InvalidStateError
", -
-
Remove authenticator from issuedRequests .
-
For each remaining authenticator in issuedRequests invoke the authenticatorCancel operation on authenticator and remove it from issuedRequests .
-
Throw an "
InvalidStateError
"DOMException
.
Note: This error status is handled separately because the authenticator returns it only if excludeCredentialDescriptorList identifies a credential bound to the authenticator and the user has consented to the operation. Given this explicit consent, it is acceptable for this case to be distinguishable to the
Relying Party[RP] . -
-
If
any
authenticator
returns
an
error
status
not
equivalent
to
"
InvalidStateError
", -
Remove authenticator from issuedRequests .
Note: This case does not imply user consent for the operation, so details about the error are hidden from the
Relying Party[RP] in order to prevent leak of potentially identifying information. See § 14.5.1 Registration Ceremony Privacy for details. - If any authenticator indicates success,
-
-
Remove authenticator from issuedRequests . This authenticator is now the selected authenticator .
-
Let credentialCreationData be a struct whose items are:
-
attestationObjectResult
-
whose value is the bytes returned from the successful authenticatorMakeCredential operation.
Note: this value is
attObj
, as defined in § 6.5.4 Generating an Attestation Object . -
clientDataJSONResult
-
whose value is the bytes of clientDataJSON .
-
attestationConveyancePreferenceOption
-
whose value is the value of pkOptions .
attestation
. -
clientExtensionResults
-
whose value is an
AuthenticationExtensionsClientOutputs
object containing extension identifier → client extension output entries. The entries are created by running each extension’s client extension processing algorithm to create the client extension outputs , for each client extension inpkOptions .
.extensions
-
-
Let constructCredentialAlg be an algorithm that takes a global object global , and whose steps are:
-
If
credentialCreationData . attestationConveyancePreferenceOption
’s value is-
none
-
Replace potentially uniquely identifying information with non-identifying versions of the same:
-
If the aaguid in the attested credential data is 16 zero bytes,
credentialCreationData . attestationObjectResult .fmt
is "packed", and "x5c" is absent fromcredentialCreationData . attestationObjectResult
, then self attestation is being used and no further action is needed. -
Otherwise:
-
Set the value of
credentialCreationData . attestationObjectResult .fmt
to "none", and set the value ofcredentialCreationData . attestationObjectResult .attStmt
to be an empty CBOR map. (See § 8.7 None Attestation Statement Format and § 6.5.4 Generating an Attestation Object ). -
If authenticator is not a platform authenticator then replace the aaguid in the attested credential data with 16 zero bytes.
-
-
-
indirect
-
The client MAY replace the aaguid and attestation statement with a more privacy-friendly and/or more easily verifiable version of the same data (for example, by employing an Anonymization CA ).
-
direct
orenterprise
-
Convey the authenticator
's’s AAGUID and attestation statement , unaltered, to theRelying Party[RP] .
-
-
Let attestationObject be a new
ArrayBuffer
, created using global ’s %ArrayBuffer% , containing the bytes ofcredentialCreationData . attestationObjectResult
’s value. -
Let id be
attestationObject .authData. attestedCredentialData . credentialId
. -
Let pubKeyCred be a new
PublicKeyCredential
object associated with global whose fields are:-
[[identifier]]
-
id
-
authenticatorAttachment
-
The
AuthenticatorAttachment
value matching the current authenticator attachment modality of authenticator . -
response
-
A new
AuthenticatorAttestationResponse
object associated with global whose fields are:-
clientDataJSON
-
A new
ArrayBuffer
, created using global ’s %ArrayBuffer% , containing the bytes ofcredentialCreationData . clientDataJSONResult
. -
attestationObject
-
attestationObject
-
[[transports]]
-
A sequence of zero or more unique
DOMString
s, in lexicographical order, that the authenticator is believed to support. The values SHOULD be members ofAuthenticatorTransport
, but client platforms MUST ignore unknown values.If a user agent does not wish to divulge this information it MAY substitute an arbitrary sequence designed to preserve privacy. This sequence MUST still be valid, i.e. lexicographically sorted and free of duplicates. For example, it may use the empty sequence. Either way, in this case the user agent takes the risk that
Relying Party[RP] behavior may be suboptimal.If the user agent does not have any transport information, it SHOULD set this field to the empty sequence.
Note: How user agents discover transports supported by a given authenticator is outside the scope of this specification, but may include information from an attestation certificate (for example [FIDO-Transports-Ext] ), metadata communicated in an authenticator protocol such as CTAP2, or special-case knowledge about a platform authenticator .
-
-
[[clientExtensionsResults]]
-
A new
ArrayBuffer
, created using global ’s %ArrayBuffer% , containing the bytes ofcredentialCreationData . clientExtensionResults
.
-
-
Return pubKeyCred .
-
-
For each remaining authenticator in issuedRequests invoke the authenticatorCancel operation on authenticator and remove it from issuedRequests .
-
Return constructCredentialAlg and terminate this algorithm.
-
-
Throw a "
NotAllowedError
"DOMException
. In order to prevent information leak that could identify the user without consent , this step MUST NOT be executed before lifetimeTimer has expired. See § 14.5.1 Registration Ceremony Privacy for details.
During
the
above
process,
the
user
agent
SHOULD
show
some
UI
to
the
user
to
guide
them
in
the
process
of
selecting
and
authorizing
an
authenticator.
When
options
.
is
set
to
mediation
conditional
,
prominent
modal
UI
should
not
be
shown
unless
credential
creation
was
previously
consented
to
via
means
determined
by
the
user
agent.
5.1.4.
Use
an
Existing
Credential
to
Make
an
Assertion
-
PublicKeyCredential’s
[[Get]](options)
Method
WebAuthn
Relying
Parties
[WRPS]
call
navigator.credentials.get({publicKey:...,
...})
to
discover
and
use
an
existing
public
key
credential
,
with
the
user’s
consent
.
Relying
Party
[RP]
script
optionally
specifies
some
criteria
to
indicate
what
public
key
credential
sources
are
acceptable
to
it.
The
client
platform
locates
public
key
credential
sources
matching
the
specified
criteria,
and
guides
the
user
to
pick
one
that
the
script
will
be
allowed
to
use.
The
user
may
choose
to
decline
the
entire
interaction
even
if
a
public
key
credential
source
is
present,
for
example
to
maintain
privacy.
If
the
user
picks
a
public
key
credential
source
,
the
user
agent
then
uses
§ 6.3.3
The
authenticatorGetAssertion
Operation
to
sign
a
Relying
Party
[RP]
-provided
challenge
and
other
collected
data
into
an
authentication
assertion
,
which
is
used
as
a
credential
.
The
navigator.credentials.get()
implementation
[CREDENTIAL-MANAGEMENT-1]
calls
PublicKeyCredential.
to
collect
any
credentials
that
should
be
available
without
user
mediation
(roughly,
this
specification’s
authorization
gesture
),
and
if
it
does
not
find
exactly
one
of
those,
it
then
calls
[[CollectFromCredentialStore]]()
PublicKeyCredential.
to
have
the
user
select
a
public
key
credential
source
.
[[DiscoverFromExternalSource]]()
Since
this
specification
requires
an
authorization
gesture
to
create
any
assertions
,
the
PublicKeyCredential.
internal
method
inherits
the
default
behavior
of
[[CollectFromCredentialStore]](origin,
options,
sameOriginWithAncestors)
Credential.[[CollectFromCredentialStore]]()
,
of
returning
an
empty
set.
In
general,
the
user
agent
SHOULD
show
some
UI
to
the
user
to
guide
them
in
selecting
and
authorizing
an
authenticator
with
which
to
complete
the
operation.
By
setting
options
.
to
mediation
conditional
,
Relying
Parties
[RPS]
can
indicate
that
a
prominent
modal
UI
should
not
be
shown
unless
credentials
are
discovered.
Relying
Party
[RP]
script
SHOULD
first
check
that
isConditionalMediationAvailable()
returns
true
in
order
to
avoid
the
possibility
of
causing
a
user-visible
error
to
be
returned
if
the
user
agent
does
not
support
conditional
user
mediation
.
This
navigator.credentials.get()
operation
can
be
aborted
by
leveraging
the
AbortController
;
see
DOM
§ 3.3
Using
AbortController
and
AbortSignal
objects
in
APIs
for
detailed
instructions.
5.1.4.1.
PublicKeyCredential’s
[[DiscoverFromExternalSource]](origin,
options,
sameOriginWithAncestors)
Method
[[DiscoverFromExternalSource]](origin,
options,
sameOriginWithAncestors)
This internal method accepts three arguments:
-
origin
-
This argument is the relevant settings object
's’s origin , as determined by the callingget()
implementation, i.e.,CredentialsContainer
's’s Request aCredential
abstract operation. -
options
-
This argument is a
CredentialRequestOptions
object whoseoptions .
member contains apublicKey
PublicKeyCredentialRequestOptions
object specifying the desired attributes of the public key credential to discover. -
sameOriginWithAncestors
-
This argument is a Boolean value which is
true
if and only if the caller’s environment settings object is same-origin with its ancestors . It isfalse
if caller is cross-origin.Note: Invocation of this internal method indicates that it was allowed by permissions policy , which is evaluated at the [CREDENTIAL-MANAGEMENT-1] level. See § 5.9 Permissions Policy integration .
Note:
This
algorithm
is
synchronous:
the
Promise
resolution/rejection
is
handled
by
navigator.credentials.get()
.
Note:
All
BufferSource
objects
used
in
this
algorithm
must
be
snapshotted
when
the
algorithm
begins,
to
avoid
potential
synchronization
issues.
The
algorithm
implementations
should
get
a
copy
of
the
bytes
held
by
the
buffer
source
and
use
that
copy
for
relevant
portions
of
the
algorithm.
When this method is invoked, the user agent MUST execute the following algorithm:
-
Assert:
options .
is present.publicKey
-
Let pkOptions be the value of
options .
.publicKey
-
If
options .
is present with the valuemediation
conditional
:-
Let credentialIdFilter be the value of
pkOptions .
.allowCredentials
-
Set
pkOptions .
to empty .allowCredentials
Note: This prevents non-discoverable credentials from being used during
conditional
requests. -
Set a timer lifetimeTimer to a value of infinity.
Note: lifetimeTimer is set to a value of infinity so that the user has the entire lifetime of the Document to interact with any
input
form control tagged with a"webauthn"
autofill detail token . For example, upon the user clicking in such an input field, the user agent can render a list of discovered credentials for the user to select from, and perhaps also give the user the option to "try another way".
-
-
Else:
-
If
pkOptions .
is present, check if its value lies within a reasonable range as defined by the client and if not, correct it to the closest value lying within that range. Set a timer lifetimeTimer to this adjusted value. Iftimeout
pkOptions .
is not present, then set lifetimeTimer to a client -specific default.timeout
See the recommended range and default for a WebAuthn ceremony timeout for guidance on deciding a reasonable range and default for
pkOptions .
.timeout
Note: The user agent should take cognitive guidelines into considerations regarding timeout for users with special needs.
-
Let callerOrigin be
origin
. If callerOrigin is an opaque origin , throw a "NotAllowedError
"DOMException
. -
Let effectiveDomain be the callerOrigin ’s effective domain . If effective domain is not a valid domain , then throw a "
SecurityError
"DOMException
.Note: An effective domain may resolve to a host , which can be represented in various manners, such as domain , ipv4 address , ipv6 address , opaque host , or empty host . Only the domain format of host is allowed here. This is for simplification and also is in recognition of various issues with using direct IP address identification in concert with PKI-based security.
-
If
pkOptions .
is not present, then set rpId to effectiveDomain .rpId
Otherwise:
-
If
pkOptions .
is not a registrable domain suffix of and is not equal to effectiveDomain , throw a "rpId
SecurityError
"DOMException
. -
Set rpId to
pkOptions .
.rpId
Note: rpId represents the caller’s RP ID . The RP ID defaults to being the caller’s origin
's’s effective domain unless the caller has explicitly setpkOptions .
when callingrpId
get()
.
-
-
Let clientExtensions be a new map and let authenticatorExtensions be a new map .
-
If
pkOptions .
is present, then for each extensionId → clientExtensionInput ofextensions
pkOptions .
:extensions
-
If extensionId is not supported by this client platform or is not an authentication extension , then continue .
-
Set clientExtensions [ extensionId ] to clientExtensionInput .
-
If extensionId is not an authenticator extension , then continue .
-
Let authenticatorExtensionInput be the ( CBOR ) result of running extensionId ’s client extension processing algorithm on clientExtensionInput . If the algorithm returned an error, continue .
-
Set authenticatorExtensions [ extensionId ] to the base64url encoding of authenticatorExtensionInput .
-
-
Let collectedClientData be a new
CollectedClientData
instance whose fields are:-
type
-
The string "webauthn.get".
-
challenge
-
The base64url encoding of pkOptions .
challenge
-
origin
-
The serialization of callerOrigin .
-
topOrigin
-
The serialization of callerOrigin ’s top-level origin if the
sameOriginWithAncestors
argument passed to this internal method isfalse
, elseundefined
. -
crossOrigin
-
The inverse of the value of the
sameOriginWithAncestors
argument passed to this internal method .
-
-
Let clientDataJSON be the JSON-compatible serialization of client data constructed from collectedClientData .
-
Let clientDataHash be the hash of the serialized client data represented by clientDataJSON .
-
If
options .
is present and aborted , throw thesignal
options .
’s abort reason .signal
-
Let issuedRequests be a new ordered set .
-
Let savedCredentialIds be a new map .
-
Let authenticators represent a value which at any given instant is a set of client platform -specific handles, where each item identifies an authenticator presently available on this client platform at that instant.
Note: What qualifies an authenticator as "available" is intentionally unspecified; this is meant to represent how authenticators can be hot-plugged into (e.g., via USB) or discovered (e.g., via NFC or Bluetooth) by the client by various mechanisms, or permanently built into the client .
-
Let silentlyDiscoveredCredentials be a new map whose entries are of the form: DiscoverableCredentialMetadata → authenticator .
-
Consider the value of
hints
and craft the user interface accordingly, as the user-agent sees fit. -
Start lifetimeTimer .
-
While lifetimeTimer has not expired, perform the following actions depending upon lifetimeTimer , and the state and response for each authenticator in authenticators :
- If lifetimeTimer expires,
-
For each authenticator in issuedRequests invoke the authenticatorCancel operation on authenticator and remove authenticator from issuedRequests .
- If the user exercises a user agent user-interface option to cancel the process,
-
For each authenticator in issuedRequests invoke the authenticatorCancel operation on authenticator and remove authenticator from issuedRequests . Throw a "
NotAllowedError
"DOMException
. -
If
options .
is present and aborted ,signal
-
For each authenticator in issuedRequests invoke the authenticatorCancel operation on authenticator and remove authenticator from issuedRequests . Then throw the
options .
’s abort reason .signal
-
If
options .
ismediation
conditional
and the user interacts with aninput
ortextarea
form control with anautocomplete
attribute whose non-autofill credential type is"webauthn"
, -
Note: The
"webauthn"
autofill detail token must appear immediately after the last autofill detail token of type "Normal" or "Contact". For example:-
"username webauthn"
-
"current-password webauthn"
-
If silentlyDiscoveredCredentials is not empty :
-
Prompt the user to optionally select a DiscoverableCredentialMetadata ( credentialMetadata ) from silentlyDiscoveredCredentials .
Note: The prompt shown SHOULD include values from credentialMetadata ’s otherUI such as
name
anddisplayName
. -
If the user selects a credentialMetadata ,
-
Let publicKeyOptions be a temporary copy of pkOptions .
-
Let authenticator be the value of silentlyDiscoveredCredentials [ credentialMetadata ].
-
Set
publicKeyOptions .
to be a list containing a singleallowCredentials
PublicKeyCredentialDescriptor
item whoseid
's’s value is set to credentialMetadata ’s id's’s value and whoseid
value is set to credentialMetadata ’s type . -
Execute the issuing a credential request to an authenticator algorithm with authenticator , savedCredentialIds , publicKeyOptions , rpId , clientDataHash , and authenticatorExtensions .
If this returns
false
, continue . -
Append authenticator to issuedRequests .
-
-
-
-
If
options .
is notmediation
conditional
, issuedRequests is empty,pkOptions .
is not empty, and no authenticator will become available for any public key credentials therein,allowCredentials
-
Indicate to the user that no eligible credential could be found. When the user acknowledges the dialog, throw a "
NotAllowedError
"DOMException
.Note: One way a client platform can determine that no authenticator will become available is by examining the
transports
PublicKeyCredentialDescriptor
pkOptions .
, if any. For example, if allallowCredentials
PublicKeyCredentialDescriptor
internal
PublicKeyCredentialDescriptor
transports
- If an authenticator becomes available on this client device ,
-
Note: This includes the case where an authenticator was available upon lifetimeTimer initiation.
-
If
options .
ismediation
conditional
and the authenticator supports the silentCredentialDiscovery operation:-
Let collectedDiscoveredCredentialMetadata be the result of invoking the silentCredentialDiscovery operation on authenticator with rpId as parameter.
-
For each credentialMetadata of collectedDiscoveredCredentialMetadata :
-
If credentialIdFilter is empty or credentialIdFilter contains an item whose
id
's’s value is set to credentialMetadata ’s id , set silentlyDiscoveredCredentials [ credentialMetadata ] to authenticator .Note: A request will be issued to this authenticator upon user selection of a credential via interaction with a particular UI context (see here for details).
-
-
-
Else:
-
Execute the issuing a credential request to an authenticator algorithm with authenticator , savedCredentialIds , pkOptions , rpId , clientDataHash , and authenticatorExtensions .
If this returns
false
, continue .Note: This branch is taken if
options .
ismediation
conditional
and the authenticator does not support the silentCredentialDiscovery operation to allow use of such authenticators during aconditional
user mediation request. -
Append authenticator to issuedRequests .
-
-
- If an authenticator ceases to be available on this client device ,
-
Remove authenticator from issuedRequests .
- If any authenticator returns a status indicating that the user cancelled the operation,
-
-
Remove authenticator from issuedRequests .
-
For each remaining authenticator in issuedRequests invoke the authenticatorCancel operation on authenticator and remove it from issuedRequests .
Note: Authenticators may return an indication of "the user cancelled the entire operation". How a user agent manifests this state to users is unspecified.
-
- If any authenticator returns an error status,
-
Remove authenticator from issuedRequests .
- If any authenticator indicates success,
-
-
Remove authenticator from issuedRequests .
-
Let assertionCreationData be a struct whose items are:
-
credentialIdResult
-
If
savedCredentialIds [ authenticator ]
exists, set the value of credentialIdResult to be the bytes ofsavedCredentialIds [ authenticator ]
. Otherwise, set the value of credentialIdResult to be the bytes of the credential ID returned from the successful authenticatorGetAssertion operation, as defined in§ 6.3.3 The authenticatorGetAssertion Operation .[[#sctn-op-get-assertion]]. -
clientDataJSONResult
-
whose value is the bytes of clientDataJSON .
-
authenticatorDataResult
-
whose value is the bytes of the authenticator data returned by the authenticator .
-
signatureResult
-
whose value is the bytes of the signature value returned by the authenticator .
-
userHandleResult
-
If the authenticator returned a user handle , set the value of userHandleResult to be the bytes of the returned user handle . Otherwise, set the value of userHandleResult to null.
-
clientExtensionResults
-
whose value is an
AuthenticationExtensionsClientOutputs
object containing extension identifier → client extension output entries. The entries are created by running each extension’s client extension processing algorithm to create the client extension outputs , for each client extension inpkOptions .
.extensions
-
-
If credentialIdFilter is not empty and credentialIdFilter does not contain an item whose
id
's’s value is set to the value of credentialIdResult , continue . -
If credentialIdFilter is empty and userHandleResult is null, continue .
-
Let constructAssertionAlg be an algorithm that takes a global object global , and whose steps are:
-
Let pubKeyCred be a new
PublicKeyCredential
object associated with global whose fields are:-
[[identifier]]
-
A new
ArrayBuffer
, created using global ’s %ArrayBuffer% , containing the bytes ofassertionCreationData . credentialIdResult
. -
authenticatorAttachment
-
The
AuthenticatorAttachment
value matching the current authenticator attachment modality of authenticator . -
response
-
A new
AuthenticatorAssertionResponse
object associated with global whose fields are:-
clientDataJSON
-
A new
ArrayBuffer
, created using global ’s %ArrayBuffer% , containing the bytes ofassertionCreationData . clientDataJSONResult
. -
authenticatorData
-
A new
ArrayBuffer
, created using global ’s %ArrayBuffer% , containing the bytes ofassertionCreationData . authenticatorDataResult
. -
signature
-
A new
ArrayBuffer
, created using global ’s %ArrayBuffer% , containing the bytes ofassertionCreationData . signatureResult
. -
userHandle
-
If
assertionCreationData . userHandleResult
is null, set this field to null. Otherwise, set this field to a newArrayBuffer
, created using global ’s %ArrayBuffer% , containing the bytes ofassertionCreationData . userHandleResult
.
-
-
[[clientExtensionsResults]]
-
A new
ArrayBuffer
, created using global ’s %ArrayBuffer% , containing the bytes ofassertionCreationData . clientExtensionResults
.
-
-
Return pubKeyCred .
-
-
For each remaining authenticator in issuedRequests invoke the authenticatorCancel operation on authenticator and remove it from issuedRequests .
-
Return constructAssertionAlg and terminate this algorithm.
-
-
Throw a "
NotAllowedError
"DOMException
. In order to prevent information leak that could identify the user without consent , this step MUST NOT be executed before lifetimeTimer has expired. See§ 14.5.2 Authentication Ceremony Privacy[[#sctn-assertion-privacy]] for details.
5.1.4.2. Issuing a Credential Request to an Authenticator
This
sub-algorithm
of
[[DiscoverFromExternalSource]]()
encompasses
the
specific
UI
context-independent
steps
necessary
for
requesting
a
credential
from
a
given
authenticator
,
using
given
PublicKeyCredentialRequestOptions
.
It
is
called
by
[[DiscoverFromExternalSource]]()
from
various
points
depending
on
which
user
mediation
the
present
authentication
ceremony
is
subject
to
(e.g.:
conditional
mediation).
This algorithm accepts the following arguments:
-
authenticator
-
A client platform -specific handle identifying an authenticator presently available on this client platform .
-
savedCredentialIds
-
A map containing authenticator → credential ID . This argument will be modified in this algorithm.
-
pkOptions
-
This argument is a
PublicKeyCredentialRequestOptions
object specifying the desired attributes of the public key credential to discover. -
rpId
-
The request RP ID .
-
clientDataHash
-
The hash of the serialized client data represented by clientDataJSON .
-
authenticatorExtensions
-
A map containing extension identifiers to the base64url encoding of the client extension processing output for authenticator extensions .
This
algorithm
returns
false
if
the
client
determines
that
the
authenticator
is
not
capable
of
handling
the
request,
or
true
if
the
request
was
issued
successfully.
The steps for issuing a credential request to an authenticator are as follows:
-
If
pkOptions .
is set touserVerification
required
and the authenticator is not capable of performing user verification , returnfalse
. -
Let userVerification be the effective user verification requirement for assertion , a Boolean value, as follows. If
pkOptions .
userVerification
-
is
set
to
required
-
Let userVerification be
true
. -
is
set
to
preferred
-
If the authenticator
- is capable of user verification
-
Let userVerification be
true
. - is not capable of user verification
-
Let userVerification be
false
.
-
is
set
to
discouraged
-
Let userVerification be
false
.
-
is
set
to
-
If
pkOptions .
allowCredentials
- is not empty
-
-
Let allowCredentialDescriptorList be a new list .
-
Execute a client platform -specific procedure to determine which, if any, public key credentials described by
pkOptions .
are bound to this authenticator , by matching with rpId ,allowCredentials
pkOptions .
, andallowCredentials
.id
pkOptions .
. Set allowCredentialDescriptorList to this filtered list.allowCredentials
.type
-
If allowCredentialDescriptorList is empty , return
false
. -
Let distinctTransports be a new ordered set .
-
If allowCredentialDescriptorList has exactly one value, set
savedCredentialIds [ authenticator ]
toallowCredentialDescriptorList [0].id
’s value (see here in§ 6.3.3 The authenticatorGetAssertion Operation[[#sctn-op-get-assertion]] for more information). -
For each credential descriptor C in allowCredentialDescriptorList , append each value, if any, of
C .
to distinctTransports .transports
Note: This will aggregate only distinct values of
transports
(for this authenticator ) in distinctTransports due to the properties of ordered sets . -
If distinctTransports
- is not empty
-
The client selects one transport value from distinctTransports , possibly incorporating local configuration knowledge of the appropriate transport to use with authenticator in making its selection.
Then, using transport , invoke the authenticatorGetAssertion operation on authenticator , with rpId , clientDataHash , allowCredentialDescriptorList , userVerification , and authenticatorExtensions as parameters.
- is empty
-
Using local configuration knowledge of the appropriate transport to use with authenticator , invoke the authenticatorGetAssertion operation on authenticator with rpId , clientDataHash , allowCredentialDescriptorList , userVerification , and authenticatorExtensions as parameters.
-
- is empty
-
Using local configuration knowledge of the appropriate transport to use with authenticator , invoke the authenticatorGetAssertion operation on authenticator with rpId , clientDataHash , userVerification , and authenticatorExtensions as parameters.
Note: In this case, the
Relying Party[RP] did not supply a list of acceptable credential descriptors. Thus, the authenticator is being asked to exercise any credential it may possess that is scoped to theRelying Party[RP] , as identified by rpId .
-
Return
true
.
5.1.5.
Store
an
Existing
Credential
-
PublicKeyCredential’s
[[Store]](credential,
sameOriginWithAncestors)
Method
The
[[Store]](credential,
sameOriginWithAncestors)
method
is
not
supported
for
Web
Authentication’s
PublicKeyCredential
type,
so
its
implementation
of
the
[[Store]](credential,
sameOriginWithAncestors)
internal
method
always
throws
an
error.
Note:
This
algorithm
is
synchronous;
the
Promise
resolution/rejection
is
handled
by
navigator.credentials.store()
.
This internal method accepts two arguments:
-
credential
-
This argument is a
PublicKeyCredential
object. -
sameOriginWithAncestors
-
This argument is a Boolean value which is
true
if and only if the caller’s environment settings object is same-origin with its ancestors .
When this method is invoked, the user agent MUST execute the following algorithm:
-
Throw a "
NotSupportedError
"DOMException
.
5.1.6.
Availability
of
User-Verifying
Platform
Authenticator
-
PublicKeyCredential’s
isUserVerifyingPlatformAuthenticatorAvailable()
Method
WebAuthn
Relying
Parties
[WRPS]
use
this
method
to
determine
whether
they
can
create
a
new
credential
using
a
user-verifying
platform
authenticator
.
Upon
invocation,
the
client
employs
a
client
platform
-specific
procedure
to
discover
available
user-verifying
platform
authenticators
.
If
any
are
discovered,
the
promise
is
resolved
with
the
value
of
true
.
Otherwise,
the
promise
is
resolved
with
the
value
of
false
.
Based
on
the
result,
the
Relying
Party
[RP]
can
take
further
actions
to
guide
the
user
to
create
a
credential.
This method has no arguments and returns a Boolean value.
partial interface PublicKeyCredential {static Promise <boolean >(); };
isUserVerifyingPlatformAuthenticatorAvailable
Note:
Invoking
this
method
from
a
browsing
context
where
the
Web
Authentication
API
is
"disabled"
according
to
the
allowed
to
use
algorithm—i.e.,
by
a
permissions
policy
—will
result
in
the
promise
being
rejected
with
a
DOMException
whose
name
is
"
NotAllowedError
".
See
also
§ 5.9
Permissions
Policy
integration
.
[[#sctn-permissions-policy]].
5.1.7.
Availability
of
client
capabilities
-
PublicKeyCredential’s
getClientCapabilities()
Method
WebAuthn
Relying
Parties
[WRPS]
use
this
method
to
determine
the
availability
of
a
limited
set
of
client
capabilities
to
offer
certain
workflows
and
experiences
to
users.
For
example,
an
RP
may
offer
a
sign
in
button
on
clients
where
only
hybrid
transport
is
available
or
where
conditional
mediation
is
unavailable
(instead
of
showing
a
username
field).
Upon invocation, the client employs a client platform -specific procedure to discover availablity of these capabilities.
This method has no arguments and returns a record of capability keys to Boolean values.
partial interface PublicKeyCredential {static Promise <PublicKeyCredentialClientCapabilities >(); };
getClientCapabilities typedef record <DOMString ,boolean >;
PublicKeyCredentialClientCapabilities
Keys
in
PublicKeyCredentialClientCapabilities
MUST
be
sorted
in
ascending
lexicographical
order.
The
set
of
keys
SHOULD
contain
the
set
of
enumeration
values
of
ClientCapability
,
but
the
client
MAY
omit
keys
as
it
deems
necessary;
see
§ 14.5.4
Disclosing
Client
Capabilities
.
[[#sctn-disclosing-client-capabilities]].
When
the
value
for
a
given
capability
is
true
,
the
feature
is
known
to
be
currently
supported
by
the
client.
When
the
value
for
a
given
capability
is
false
,
the
feature
is
known
to
be
not
currently
supported
by
the
client.
When
a
capability
does
not
exist
as
a
key,
the
availability
of
the
client
feature
is
not
known.
The
set
of
keys
SHOULD
also
contain
a
key
for
each
extension
implemented
by
the
client,
where
the
key
is
formed
by
prefixing
the
string
extension:
to
the
extension
identifier
.
The
associated
value
for
each
implemented
extension
SHOULD
be
true
.
If
getClientCapabilities()
is
supported
by
a
client,
but
an
extension
is
not
mapped
to
the
value
true
,
then
a
Relying
Party
[RP]
MAY
assume
that
client
processing
steps
for
that
extension
will
not
be
carried
out
by
this
client
and
that
the
extension
MAY
not
be
forwarded
to
the
authenticator.
Note:
Even
if
an
extension
is
mapped
to
true
,
the
authenticator
used
for
any
given
operation
may
not
support
that
extension,
so
Relying
Parties
[RPS]
MUST
NOT
assume
that
the
authenticator
processing
steps
for
that
extension
will
be
performed
on
that
basis.
Note:
Invoking
this
method
from
a
browsing
context
where
the
Web
Authentication
API
is
"disabled"
according
to
the
allowed
to
use
algorithm—i.e.,
by
a
permissions
policy
—will
result
in
the
promise
being
rejected
with
a
DOMException
whose
name
is
"
NotAllowedError
".
See
also
§ 5.9
Permissions
Policy
integration
.
[[#sctn-permissions-policy]].
5.1.8.
Deserialize
Registration
ceremony
options
-
PublicKeyCredential’s
parseCreationOptionsFromJSON()
Method
WebAuthn
Relying
Parties
[WRPS]
use
this
method
to
convert
JSON
type
representations
of
options
for
navigator.credentials.create()
into
PublicKeyCredentialCreationOptions
.
Upon
invocation,
the
client
MUST
convert
the
options
argument
into
a
new,
identically-structured
PublicKeyCredentialCreationOptions
object,
using
base64url
encoding
to
decode
any
DOMString
attributes
in
PublicKeyCredentialCreationOptionsJSON
that
correspond
to
buffer
source
type
attributes
in
PublicKeyCredentialCreationOptions
.
This
conversion
MUST
also
apply
to
any
client
extension
inputs
processed
by
the
client
.
AuthenticationExtensionsClientInputsJSON
MAY
include
extensions
registered
in
the
IANA
"WebAuthn
Extension
Identifiers"
registry
[IANA-WebAuthn-Registries]
[[!IANA-WebAuthn-Registries]]
but
not
defined
in
§ 9
WebAuthn
Extensions
.
[[#sctn-extensions]].
If
the
client
encounters
any
issues
parsing
any
of
the
JSON
type
representations
then
it
MUST
throw
an
"
EncodingError
"
DOMException
with
a
description
of
the
incompatible
value
and
terminate
the
operation.
partial interface PublicKeyCredential {static PublicKeyCredentialCreationOptions (
parseCreationOptionsFromJSON PublicKeyCredentialCreationOptionsJSON ); };
options dictionary {
PublicKeyCredentialCreationOptionsJSON required PublicKeyCredentialRpEntity ;
rp required PublicKeyCredentialUserEntityJSON ;
user required Base64URLString ;
challenge required sequence <PublicKeyCredentialParameters >;
pubKeyCredParams unsigned long ;
timeout sequence <PublicKeyCredentialDescriptorJSON >= [];
excludeCredentials AuthenticatorSelectionCriteria ;
authenticatorSelection sequence <DOMString >= [];
hints DOMString = "none";
attestation sequence <DOMString >= [];
attestationFormats AuthenticationExtensionsClientInputsJSON ; };
extensions dictionary {
PublicKeyCredentialUserEntityJSON required Base64URLString ;
id required DOMString ;
name required DOMString ; };
displayName dictionary {
PublicKeyCredentialDescriptorJSON required Base64URLString ;
id required DOMString ;
type sequence <DOMString >; };
transports dictionary { };
AuthenticationExtensionsClientInputsJSON
5.1.9.
Deserialize
Authentication
ceremony
options
-
PublicKeyCredential’s
parseRequestOptionsFromJSON()
Methods
WebAuthn
Relying
Parties
[WRPS]
use
this
method
to
convert
JSON
type
representations
of
options
for
navigator.credentials.get()
into
PublicKeyCredentialRequestOptions
.
Upon
invocation,
the
client
MUST
convert
the
options
argument
into
a
new,
identically-structured
PublicKeyCredentialRequestOptions
object,
using
base64url
encoding
to
decode
any
DOMString
attributes
in
PublicKeyCredentialRequestOptionsJSON
that
correspond
to
buffer
source
type
attributes
in
PublicKeyCredentialRequestOptions
.
This
conversion
MUST
also
apply
to
any
client
extension
inputs
processed
by
the
client
.
AuthenticationExtensionsClientInputsJSON
MAY
include
extensions
registered
in
the
IANA
"WebAuthn
Extension
Identifiers"
registry
[IANA-WebAuthn-Registries]
[[!IANA-WebAuthn-Registries]]
but
not
defined
in
§ 9
WebAuthn
Extensions
.
[[#sctn-extensions]].
If
the
client
encounters
any
issues
parsing
any
of
the
JSON
type
representations
then
it
MUST
throw
an
"
EncodingError
"
DOMException
with
a
description
of
the
incompatible
value
and
terminate
the
operation.
partial interface PublicKeyCredential {static PublicKeyCredentialRequestOptions (
parseRequestOptionsFromJSON PublicKeyCredentialRequestOptionsJSON ); };
options dictionary {
PublicKeyCredentialRequestOptionsJSON required Base64URLString ;
challenge unsigned long ;
timeout DOMString ;
rpId sequence <PublicKeyCredentialDescriptorJSON >= [];
allowCredentials DOMString = "preferred";
userVerification sequence <DOMString >= [];
hints AuthenticationExtensionsClientInputsJSON ; };
extensions
5.2.
Authenticator
Responses
(interface
AuthenticatorResponse
)
Authenticators
respond
to
Relying
Party
[RP]
requests
by
returning
an
object
derived
from
the
AuthenticatorResponse
interface:
[SecureContext ,Exposed =Window ]interface AuthenticatorResponse { [SameObject ]readonly attribute ArrayBuffer clientDataJSON ; };
-
clientDataJSON
, of type ArrayBuffer , readonly -
This attribute contains a
JSON-compatible serialization[[#clientdatajson-serialization|JSON-compatible serialization]] of the client data , the hash of which is passed to the authenticator by the client in its call to eithercreate()
orget()
(i.e., the client data itself is not sent to the authenticator).
5.2.1.
Information
About
Public
Key
Credential
(interface
AuthenticatorAttestationResponse
)
The
AuthenticatorAttestationResponse
interface
represents
the
authenticator
's
’s
response
to
a
client’s
request
for
the
creation
of
a
new
public
key
credential
.
It
contains
information
about
the
new
credential
that
can
be
used
to
identify
it
for
later
use,
and
metadata
that
can
be
used
by
the
WebAuthn
Relying
Party
[WRP]
to
assess
the
characteristics
of
the
credential
during
registration.
[SecureContext ,Exposed =Window ]interface AuthenticatorAttestationResponse :AuthenticatorResponse { [SameObject ]readonly attribute ArrayBuffer attestationObject ;sequence <DOMString >();
getTransports ArrayBuffer ();
getAuthenticatorData ArrayBuffer ?();
getPublicKey COSEAlgorithmIdentifier (); };
getPublicKeyAlgorithm
-
clientDataJSON
-
This attribute, inherited from
AuthenticatorResponse
, contains the JSON-compatible serialization of client data (see§ 6.5 Attestation )[[#sctn-attestation]]) passed to the authenticator by the client in order to generate this credential. The exact JSON serialization MUST be preserved, as the hash of the serialized client data has been computed over it. -
attestationObject
, of type ArrayBuffer , readonly -
This attribute contains an attestation object , which is opaque to, and cryptographically protected against tampering by, the client. The attestation object contains both authenticator data and an attestation statement . The former contains the AAGUID, a unique credential ID , and the credential public key . The contents of the attestation statement are determined by the attestation statement format used by the authenticator . It also contains any additional information that the
Relying Party[RP]'s’s server requires to validate the attestation statement , as well as to decode and validate the authenticator data along with the JSON-compatible serialization of client data . For more details, see§ 6.5 Attestation , § 6.5.4 Generating an Attestation Object ,[[#sctn-attestation]], [[#sctn-generating-an-attestation-object]], and Figure 6 . -
getTransports()
-
This operation returns the value of
[[transports]]
. -
getAuthenticatorData()
-
This operation returns the authenticator data contained within
attestationObject
. See§ 5.2.1.1 Easily accessing credential data .[[#sctn-public-key-easy]]. -
getPublicKey()
-
This operation returns the DER SubjectPublicKeyInfo of the new credential, or null if this is not available. See
§ 5.2.1.1 Easily accessing credential data .[[#sctn-public-key-easy]]. -
getPublicKeyAlgorithm()
-
This operation returns the
COSEAlgorithmIdentifier
of the new credential. See§ 5.2.1.1 Easily accessing credential data .[[#sctn-public-key-easy]]. -
[[transports]]
-
This internal slot contains a sequence of zero or more unique
DOMString
s in lexicographical order. These values are the transports that the authenticator is believed to support, or an empty sequence if the information is unavailable. The values SHOULD be members ofAuthenticatorTransport
butRelying Parties[RPS] SHOULD accept and store unknown values.
5.2.1.1. Easily accessing credential data
Every
user
of
the
[[Create]](origin,
options,
sameOriginWithAncestors)
method
will
need
to
parse
and
store
the
returned
credential
public
key
in
order
to
verify
future
authentication
assertions
.
However,
the
credential
public
key
is
in
COSE
format
[RFC9052]
,
[[!RFC9052]],
inside
the
credentialPublicKey
member
of
the
attestedCredentialData
,
inside
the
authenticator
data
,
inside
the
attestation
object
conveyed
by
AuthenticatorAttestationResponse
.
attestationObject
.
Relying
Parties
[RPS]
wishing
to
use
attestation
are
obliged
to
do
the
work
of
parsing
the
attestationObject
and
obtaining
the
credential
public
key
because
that
public
key
copy
is
the
one
the
authenticator
signed
.
However,
many
valid
WebAuthn
use
cases
do
not
require
attestation
.
For
those
uses,
user
agents
can
do
the
work
of
parsing,
expose
the
authenticator
data
directly,
and
translate
the
credential
public
key
into
a
more
convenient
format.
The
getPublicKey()
operation
thus
returns
the
credential
public
key
as
a
SubjectPublicKeyInfo
.
This
ArrayBuffer
can,
for
example,
be
passed
to
Java’s
java.security.spec.X509EncodedKeySpec
,
.NET’s
System.Security.Cryptography.ECDsa.ImportSubjectPublicKeyInfo
,
or
Go’s
crypto/x509.ParsePKIXPublicKey
.
Use
of
getPublicKey()
does
impose
some
limitations:
by
using
pubKeyCredParams
,
a
Relying
Party
[RP]
can
negotiate
with
the
authenticator
to
use
public
key
algorithms
that
the
user
agent
may
not
understand.
However,
if
the
Relying
Party
[RP]
does
so,
the
user
agent
will
not
be
able
to
translate
the
resulting
credential
public
key
into
SubjectPublicKeyInfo
format
and
the
return
value
of
getPublicKey()
will
be
null.
User
agents
MUST
be
able
to
return
a
non-null
value
for
getPublicKey()
when
the
credential
public
key
has
a
COSEAlgorithmIdentifier
value
of:
-
-7 (ES256), where kty is 2 (with uncompressed points) and crv is 1 (P-256).
-
-257 (RS256).
-
-8 (EdDSA), where crv is 6 (Ed25519).
A
SubjectPublicKeyInfo
does
not
include
information
about
the
signing
algorithm
(for
example,
which
hash
function
to
use)
that
is
included
in
the
COSE
public
key.
To
provide
this,
getPublicKeyAlgorithm()
returns
the
COSEAlgorithmIdentifier
for
the
credential
public
key
.
To
remove
the
need
to
parse
CBOR
at
all
in
many
cases,
getAuthenticatorData()
returns
the
authenticator
data
from
attestationObject
.
The
authenticator
data
contains
other
fields
that
are
encoded
in
a
binary
format.
However,
helper
functions
are
not
provided
to
access
them
because
Relying
Parties
[RPS]
already
need
to
extract
those
fields
when
getting
an
assertion
.
In
contrast
to
credential
creation
,
where
signature
verification
is
optional
,
Relying
Parties
[RPS]
should
always
be
verifying
signatures
from
an
assertion
and
thus
must
extract
fields
from
the
signed
authenticator
data
.
The
same
functions
used
there
will
also
serve
during
credential
creation.
Note:
getPublicKey()
and
getAuthenticatorData()
were
only
added
in
level
two
of
this
spec.
Relying
Parties
[RPS]
SHOULD
use
feature
detection
before
using
these
functions
by
testing
the
value
of
'getPublicKey'
in
AuthenticatorAttestationResponse.prototype
.
Relying
Parties
[RPS]
that
require
this
function
to
exist
may
not
interoperate
with
older
user-agents.
5.2.2.
Web
Authentication
Assertion
(interface
AuthenticatorAssertionResponse
)
The
AuthenticatorAssertionResponse
interface
represents
an
authenticator
's
’s
response
to
a
client’s
request
for
generation
of
a
new
authentication
assertion
given
the
WebAuthn
Relying
Party
[WRP]
's
’s
challenge
and
OPTIONAL
list
of
credentials
it
is
aware
of.
This
response
contains
a
cryptographic
signature
proving
possession
of
the
credential
private
key
,
and
optionally
evidence
of
user
consent
to
a
specific
transaction.
[SecureContext ,Exposed =Window ]interface AuthenticatorAssertionResponse :AuthenticatorResponse { [SameObject ]readonly attribute ArrayBuffer authenticatorData ; [SameObject ]readonly attribute ArrayBuffer signature ; [SameObject ]readonly attribute ArrayBuffer ?userHandle ; };
-
clientDataJSON
-
This attribute, inherited from
AuthenticatorResponse
, contains the JSON-compatible serialization of client data (see§ 5.8.1 Client Data Used in WebAuthn Signatures (dictionary CollectedClientData) )[[#dictionary-client-data]]) passed to the authenticator by the client in order to generate this assertion. The exact JSON serialization MUST be preserved, as the hash of the serialized client data has been computed over it. -
authenticatorData
, of type ArrayBuffer , readonly -
This attribute contains the authenticator data returned by the authenticator. See
§ 6.1 Authenticator Data .[[#sctn-authenticator-data]]. -
signature
, of type ArrayBuffer , readonly -
This attribute contains the raw signature returned from the authenticator. See
§ 6.3.3 The authenticatorGetAssertion Operation .[[#sctn-op-get-assertion]]. -
userHandle
, of type ArrayBuffer , readonly, nullable -
This attribute contains the user handle returned from the authenticator, or null if the authenticator did not return a user handle . See
§ 6.3.3 The authenticatorGetAssertion Operation .[[#sctn-op-get-assertion]]. The authenticator MUST always return a user handle if theallowCredentials
option used in the authentication ceremony is empty , and MAY return one otherwise.
5.3.
Parameters
for
Credential
Generation
(dictionary
PublicKeyCredentialParameters
)
dictionary PublicKeyCredentialParameters {required DOMString type ;required COSEAlgorithmIdentifier alg ; };
-
type
, of type DOMString -
This member specifies the type of credential to be created. The value SHOULD be a member of
PublicKeyCredentialType
but client platforms MUST ignore unknown values, ignoring anyPublicKeyCredentialParameters
with an unknowntype
. -
alg
, of type COSEAlgorithmIdentifier -
This member specifies the cryptographic signature algorithm with which the newly generated credential will be used, and thus also the type of asymmetric key pair to be generated, e.g., RSA or Elliptic Curve.
Note: we use "alg" as the latter member name, rather than spelling-out "algorithm", because it will be serialized into a message to the authenticator, which may be sent over a low-bandwidth link.
5.4.
Options
for
Credential
Creation
(dictionary
PublicKeyCredentialCreationOptions
)
dictionary PublicKeyCredentialCreationOptions {required PublicKeyCredentialRpEntity rp ;required PublicKeyCredentialUserEntity user ;required BufferSource challenge ;required sequence <PublicKeyCredentialParameters >pubKeyCredParams ;unsigned long timeout ;sequence <PublicKeyCredentialDescriptor >excludeCredentials = [];AuthenticatorSelectionCriteria authenticatorSelection ;sequence <DOMString >hints = [];DOMString attestation = "none";sequence <DOMString >attestationFormats = [];AuthenticationExtensionsClientInputs extensions ; };
-
rp
, of type PublicKeyCredentialRpEntity -
This member contains a name and an identifier for the
Relying Party[RP] responsible for the request.Its value’s
name
member is REQUIRED. See§ 5.4.1 Public Key Entity Description (dictionary PublicKeyCredentialEntity)[[#dictionary-pkcredentialentity]] for further details.Its value’s
id
member specifies the RP ID the credential should be scoped to. If omitted, its value will be theCredentialsContainer
object’s relevant settings object's’s origin's’s effective domain . See§ 5.4.2 Relying Party Parameters for Credential Generation (dictionary PublicKeyCredentialRpEntity)[[#dictionary-rp-credential-params]] for further details. -
user
, of type PublicKeyCredentialUserEntity -
This member contains names and an identifier for the user account performing the registration .
Its value’s
name
,displayName
andid
members are REQUIRED.id
can be returned as theuserHandle
in some future authentication ceremonies , and is used to overwrite existing discoverable credentials that have the samerp
.id
user
.id
name
anddisplayName
MAY be used by the authenticator and client in future authentication ceremonies to help the user select a credential , but are not returned to theRelying Party[RP] as a result of future authentication ceremoniesFor further details, see
§ 5.4.1 Public Key Entity Description (dictionary PublicKeyCredentialEntity)[[#dictionary-pkcredentialentity]] and§ 5.4.3 User Account Parameters for Credential Generation (dictionary PublicKeyCredentialUserEntity) .[[#dictionary-user-credential-params]]. -
challenge
, of type BufferSource -
This member specifies a challenge that the authenticator signs, along with other data, when producing an attestation object for the newly created credential. See the
§ 13.4.3 Cryptographic Challenges[[#sctn-cryptographic-challenges]] security consideration. -
pubKeyCredParams
, of type sequence< PublicKeyCredentialParameters > -
This member lists the key types and signature algorithms the
Relying Party[RP] supports, ordered from most preferred to least preferred. The client and authenticator make a best-effort to create a credential of the most preferred type possible. If none of the listed types can be created, thecreate()
operation fails.Relying Parties[RPS] that wish to support a wide range of authenticators SHOULD include at least the followingCOSEAlgorithmIdentifier
values:-
-8 (Ed25519)
-
-7 (ES256)
-
-257 (RS256)
Additional signature algorithms can be included as needed.
-
-
timeout
, of type unsigned long -
This OPTIONAL member specifies a time, in milliseconds, that the
Relying Party[RP] is willing to wait for the call to complete. This is treated as a hint, and MAY be overridden by the client . -
excludeCredentials
, of type sequence< PublicKeyCredentialDescriptor >, defaulting to[]
-
The
Relying Party[RP] SHOULD use this OPTIONAL member to list any existing credentials mapped to this user account (as identified byuser
.id
). This ensures that the new credential is not created on an authenticator that already contains a credential mapped to this user account . If it would be, the client is requested to instead guide the user to use a different authenticator , or return an error if that fails. -
authenticatorSelection
, of type AuthenticatorSelectionCriteria -
The
Relying Party[RP] MAY use this OPTIONAL member to specify capabilities and settings that the authenticator MUST or SHOULD satisfy to participate in thecreate()
operation. See§ 5.4.4 Authenticator Selection Criteria (dictionary AuthenticatorSelectionCriteria) .[[#dictionary-authenticatorSelection]]. -
hints
, of type sequence< DOMString >, defaulting to[]
-
This OPTIONAL member contains zero or more elements from
PublicKeyCredentialHints
to guide the user agent in interacting with the user. Note that the elements have typeDOMString
despite being taken from that enumeration. See§ 2.1.1 Enumerations as DOMString types .[[#sct-domstring-backwards-compatibility]]. -
attestation
, of type DOMString , defaulting to"none"
-
The
Relying Party[RP] MAY use this OPTIONAL member to specify a preference regarding attestation conveyance . Its value SHOULD be a member ofAttestationConveyancePreference
. Client platforms MUST ignore unknown values, treating an unknown value as if the member does not exist .The default value is
none
. -
attestationFormats
, of type sequence< DOMString >, defaulting to[]
-
The
Relying Party[RP] MAY use this OPTIONAL member to specify a preference regarding the attestation statement format used by the authenticator . Values SHOULD be taken from the IANA "WebAuthn Attestation Statement Format Identifiers" registry[IANA-WebAuthn-Registries][[!IANA-WebAuthn-Registries]] established by[RFC8809] .[[!RFC8809]]. Values are ordered from most preferable to least preferable. This parameter is advisory and the authenticator MAY use an attestation statement not enumerated in this parameter.The default value is the empty list, which indicates no preference.
-
extensions
, of type AuthenticationExtensionsClientInputs -
The
Relying Party[RP] MAY use this OPTIONAL member to provide client extension inputs requesting additional processing by the client and authenticator . For example, theRelying Party[RP] may request that the client returns additional information about the credential that was created.The extensions framework is defined in
§ 9 WebAuthn Extensions .[[#sctn-extensions]]. Some extensions are defined in§ 10 Defined Extensions ;[[#sctn-defined-extensions]]; consult the IANA "WebAuthn Extension Identifiers" registry[IANA-WebAuthn-Registries][[!IANA-WebAuthn-Registries]] established by[RFC8809][[!RFC8809]] for an up-to-date list of registered WebAuthn Extensions .
5.4.1.
Public
Key
Entity
Description
(dictionary
PublicKeyCredentialEntity
)
The
PublicKeyCredentialEntity
dictionary
describes
a
user
account
,
or
a
WebAuthn
Relying
Party
[WRP]
,
which
a
public
key
credential
is
associated
with
or
scoped
to,
respectively.
dictionary PublicKeyCredentialEntity {required DOMString name ; };
-
name
, of type DOMString -
A human-palatable name for the entity. Its function depends on what the
PublicKeyCredentialEntity
represents:-
When inherited by
PublicKeyCredentialRpEntity
it is a human-palatable identifier for theRelying Party[RP] , intended only for display. For example, "ACME Corporation", "Wonderful Widgets, Inc." or "ОАО Примертех".-
Relying Parties[RPS] SHOULD perform enforcement, as prescribed in Section 2.3 of[RFC8266][[!RFC8266]] for the Nickname Profile of the PRECIS FreeformClass[RFC8264] ,[[!RFC8264]], when settingname
's’s value, or displaying the value to the user. -
This string MAY contain language and direction metadata.
Relying Parties[RPS] SHOULD consider providing this information. See§ 6.4.2 Language and Direction Encoding[[#sctn-strings-langdir]] about how this metadata is encoded. -
Clients SHOULD perform enforcement, as prescribed in Section 2.3 of
[RFC8266][[!RFC8266]] for the Nickname Profile of the PRECIS FreeformClass[RFC8264] ,[[!RFC8264]], onname
's’s value prior to displaying the value to the user or including the value as a parameter of the authenticatorMakeCredential operation.
-
-
When inherited by
PublicKeyCredentialUserEntity
, it is a human-palatable identifier for a user account . This identifier is the primary value displayed to users by Clients to help users understand with which user account a credential is associated.Examples of suitable values for this identifier include, "alexm", "+14255551234", "alex.mueller@example.com", "alex.mueller@example.com (prod-env)", or "alex.mueller@example.com (ОАО Примертех)".
-
The
Relying Party[RP] MAY let the user choose this value. TheRelying Party[RP] SHOULD perform enforcement, as prescribed in Section 3.4.3 of[RFC8265][[!RFC8265]] for the UsernameCasePreserved Profile of the PRECIS IdentifierClass[RFC8264] ,[[!RFC8264]], when settingname
's’s value, or displaying the value to the user. -
This string MAY contain language and direction metadata.
Relying Parties[RPS] SHOULD consider providing this information. See§ 6.4.2 Language and Direction Encoding[[#sctn-strings-langdir]] about how this metadata is encoded. -
Clients SHOULD perform enforcement, as prescribed in Section 3.4.3 of
[RFC8265][[!RFC8265]] for the UsernameCasePreserved Profile of the PRECIS IdentifierClass[RFC8264] ,[[!RFC8264]], onname
's’s value prior to displaying the value to the user or including the value as a parameter of the authenticatorMakeCredential operation.
-
When clients , client platforms , or authenticators display a
name
's’s value, they should always use UI elements to provide a clear boundary around the displayed value, and not allow overflow into other elements[css-overflow-3] .[[css-overflow-3]].When storing a
name
member’s value, the value MAY be truncated as described in§ 6.4.1 String Truncation[[#sctn-strings-truncation]] using a size limit greater than or equal to 64 bytes. -
5.4.2.
Relying
Party
Parameters
for
Credential
Generation
(dictionary
PublicKeyCredentialRpEntity
)
The
PublicKeyCredentialRpEntity
dictionary
is
used
to
supply
additional
Relying
Party
[RP]
attributes
when
creating
a
new
credential.
dictionary PublicKeyCredentialRpEntity :PublicKeyCredentialEntity {DOMString id ; };
5.4.3.
User
Account
Parameters
for
Credential
Generation
(dictionary
PublicKeyCredentialUserEntity
)
The
PublicKeyCredentialUserEntity
dictionary
is
used
to
supply
additional
user
account
attributes
when
creating
a
new
credential.
dictionary PublicKeyCredentialUserEntity :PublicKeyCredentialEntity {required BufferSource id ;required DOMString displayName ; };
-
id
, of type BufferSource -
The user handle of the user account . A user handle is an opaque byte sequence with a maximum size of 64 bytes, and is not meant to be displayed to the user.
To ensure secure operation, authentication and authorization decisions MUST be made on the basis of this
id
member, not thedisplayName
norname
members. See Section 6.1 of[RFC8266] .[[!RFC8266]].The user handle MUST NOT contain personally identifying information about the user, such as a username or e-mail address; see
§ 14.6.1 User Handle Contents[[#sctn-user-handle-privacy]] for details. The user handle MUST NOT be empty.Note: the user handle ought not be a constant value across different user accounts , even for non-discoverable credentials , because some authenticators always create discoverable credentials . Thus a constant user handle would prevent a user from using such an authenticator with more than one user account at the
Relying Party[RP] . -
displayName
, of type DOMString -
A human-palatable name for the user account , intended only for display. The
Relying Party[RP] SHOULD let the user choose this, and SHOULD NOT restrict the choice more than necessary. If no suitable or human-palatable name is available, theRelying Party[RP] SHOULD set this value to an empty string.Examples of suitable values for this identifier include, "Alex Müller", "Alex Müller (ACME Co.)" or "田中倫".
-
Relying Parties[RPS] SHOULD perform enforcement, as prescribed in Section 2.3 of[RFC8266][[!RFC8266]] for the Nickname Profile of the PRECIS FreeformClass[RFC8264] ,[[!RFC8264]], when settingdisplayName
's’s value, or displaying the value to the user. -
This string MAY contain language and direction metadata.
Relying Parties[RPS] SHOULD consider providing this information. See§ 6.4.2 Language and Direction Encoding[[#sctn-strings-langdir]] about how this metadata is encoded. -
Clients SHOULD perform enforcement, as prescribed in Section 2.3 of
[RFC8266][[!RFC8266]] for the Nickname Profile of the PRECIS FreeformClass[RFC8264] ,[[!RFC8264]], ondisplayName
's’s value prior to displaying the value to the user or including the value as a parameter of the authenticatorMakeCredential operation.
When clients , client platforms , or authenticators display a
displayName
's’s value, they should always use UI elements to provide a clear boundary around the displayed value, and not allow overflow into other elements[css-overflow-3] .[[css-overflow-3]].When storing a
displayName
member’s value, the value MAY be truncated as described in§ 6.4.1 String Truncation[[#sctn-strings-truncation]] using a size limit greater than or equal to 64 bytes. -
5.4.4.
Authenticator
Selection
Criteria
(dictionary
AuthenticatorSelectionCriteria
)
WebAuthn
Relying
Parties
[WRPS]
may
use
the
AuthenticatorSelectionCriteria
dictionary
to
specify
their
requirements
regarding
authenticator
attributes.
dictionary AuthenticatorSelectionCriteria {DOMString authenticatorAttachment ;DOMString residentKey ;boolean requireResidentKey =false ;DOMString userVerification = "preferred"; };
-
authenticatorAttachment
, of type DOMString -
If this member is present, eligible authenticators are filtered to be only those authenticators attached with the specified
authenticator[[#enum-attachment|authenticator attachmentmodalitymodality]] (see also§ 6.2.1 Authenticator Attachment Modality ).[[#sctn-authenticator-attachment-modality]]). If this member is absent, then any attachment modality is acceptable. The value SHOULD be a member ofAuthenticatorAttachment
but client platforms MUST ignore unknown values, treating an unknown value as if the member does not exist .See also the
authenticatorAttachment
member ofPublicKeyCredential
, which can tell what authenticator attachment modality was used in a successfulcreate()
orget()
operation. -
residentKey
, of type DOMString -
Specifies the extent to which the
Relying Party[RP] desires to create a client-side discoverable credential . For historical reasons the naming retains the deprecated “resident” terminology. The value SHOULD be a member ofResidentKeyRequirement
but client platforms MUST ignore unknown values, treating an unknown value as if the member does not exist . If no value is given then the effective value isrequired
ifrequireResidentKey
istrue
ordiscouraged
if it isfalse
or absent.See
ResidentKeyRequirement
for the description ofresidentKey
's’s values and semantics. -
requireResidentKey
, of type boolean , defaulting tofalse
-
This member is retained for backwards compatibility with WebAuthn Level 1 and, for historical reasons, its naming retains the deprecated “resident” terminology for discoverable credentials .
Relying Parties[RPS] SHOULD set it totrue
if, and only if,residentKey
is set torequired
. -
userVerification
, of type DOMString , defaulting to"preferred"
-
This member specifies the
Relying Party[RP]'s’s requirements regarding user verification for thecreate()
operation. The value SHOULD be a member ofUserVerificationRequirement
but client platforms MUST ignore unknown values, treating an unknown value as if the member does not exist .See
UserVerificationRequirement
for the description ofuserVerification
's’s values and semantics.
5.4.5.
Authenticator
Attachment
Enumeration
(enum
AuthenticatorAttachment
)
This
enumeration’s
values
describe
authenticators
'
attachment
modalities
.
Relying
Parties
[RPS]
use
this
to
express
a
preferred
authenticator
attachment
modality
when
calling
navigator.credentials.create()
to
create
[[#sctn-createCredential|create
a
credential
,
credential]],
and
clients
use
this
to
report
the
authenticator
attachment
modality
used
to
complete
a
registration
or
authentication
ceremony
.
enum AuthenticatorAttachment {"platform" ,"cross-platform" };
Note:
The
AuthenticatorAttachment
enumeration
is
deliberately
not
referenced,
see
§ 2.1.1
Enumerations
as
DOMString
types
.
[[#sct-domstring-backwards-compatibility]].
-
platform
-
This value indicates platform attachment .
-
cross-platform
-
This value indicates cross-platform attachment .
Note:
An
authenticator
attachment
modality
selection
option
is
available
only
in
the
[[Create]](origin,
options,
sameOriginWithAncestors)
operation.
The
Relying
Party
[RP]
may
use
it
to,
for
example,
ensure
the
user
has
a
roaming
credential
for
authenticating
on
another
client
device
;
or
to
specifically
register
a
platform
credential
for
easier
reauthentication
using
a
particular
client
device
.
The
[[DiscoverFromExternalSource]](origin,
options,
sameOriginWithAncestors)
operation
has
no
authenticator
attachment
modality
selection
option,
so
the
Relying
Party
[RP]
SHOULD
accept
any
of
the
user’s
registered
credentials
.
The
client
and
user
will
then
use
whichever
is
available
and
convenient
at
the
time.
5.4.6.
Resident
Key
Requirement
Enumeration
(enum
ResidentKeyRequirement
)
enum ResidentKeyRequirement {"discouraged" ,"preferred" ,"required" };
Note:
The
ResidentKeyRequirement
enumeration
is
deliberately
not
referenced,
see
§ 2.1.1
Enumerations
as
DOMString
types
.
[[#sct-domstring-backwards-compatibility]].
This
enumeration’s
values
describe
the
Relying
Party
[RP]
's
’s
requirements
for
client-side
discoverable
credentials
(formerly
known
as
resident
credentials
or
resident
keys
):
-
discouraged
-
The
Relying Party[RP] prefers creating a server-side credential , but will accept a client-side discoverable credential . The client and authenticator SHOULD create a server-side credential if possible.Note: A
Relying Party[RP] cannot require that a created credential is a server-side credential and the Credential Properties Extension may not return a value for therk
property. Because of this, it may be the case that it does not know if a credential is a server-side credential or not and thus does not know whether creating a second credential with the same user handle will evict the first. -
preferred
-
The
Relying Party[RP] strongly prefers creating a client-side discoverable credential , but will accept a server-side credential . The client and authenticator SHOULD create a discoverable credential if possible. For example, the client SHOULD guide the user through setting up user verification if needed to create a discoverable credential . This takes precedence over the setting ofuserVerification
. -
required
-
The
Relying Party[RP] requires a client-side discoverable credential . The client MUST return an error if a client-side discoverable credential cannot be created.
Note:
The
Relying
Party
[RP]
can
seek
information
on
whether
or
not
the
authenticator
created
a
client-side
discoverable
credential
using
the
resident
key
credential
property
of
the
Credential
Properties
Extension
.
This
is
useful
when
values
of
discouraged
or
preferred
are
used
for
options
.
,
because
in
those
cases
it
is
possible
for
an
authenticator
to
create
either
a
client-side
discoverable
credential
or
a
server-side
credential
.
authenticatorSelection
.
residentKey
5.4.7.
Attestation
Conveyance
Preference
Enumeration
(enum
AttestationConveyancePreference
)
WebAuthn
Relying
Parties
[WRPS]
may
use
AttestationConveyancePreference
to
specify
their
preference
regarding
attestation
conveyance
during
credential
generation.
enum AttestationConveyancePreference {"none" ,"indirect" ,"direct" ,"enterprise" };
Note:
The
AttestationConveyancePreference
enumeration
is
deliberately
not
referenced,
see
§ 2.1.1
Enumerations
as
DOMString
types
.
[[#sct-domstring-backwards-compatibility]].
-
none
-
The
Relying Party[RP] is not interested in authenticator attestation . For example, in order to potentially avoid having to obtain user consent to relay identifying information to theRelying Party[RP] , or to save a roundtrip to an Attestation CA or Anonymization CA . If the authenticator generates an attestation statement that is not a self attestation , the client will replace it with a None attestation statement.This is the default, and unknown values fall back to the behavior of this value.
-
indirect
-
The
Relying Party[RP] wants to receive a verifiable attestation statement , but allows the client to decide how to obtain such an attestation statement . The client MAY replace an authenticator-generated attestation statement with one generated by an Anonymization CA , in order to protect the user’s privacy, or to assistRelying Parties[RPS] with attestation verification in a heterogeneous ecosystem.Note: There is no guarantee that the
Relying Party[RP] will obtain a verifiable attestation statement in this case. For example, in the case that the authenticator employs self attestation and the client passes the attestation statement through unmodified. -
direct
-
The
Relying Party[RP] wants to receive the attestation statement as generated by the authenticator . -
enterprise
-
The
Relying Party[RP] wants to receive an attestation statement that may include uniquely identifying information. This is intended for controlled deployments within an enterprise where the organization wishes to tie registrations to specific authenticators. User agents MUST NOT provide such an attestation unless the user agent or authenticator configuration permits it for the requested RP ID .If permitted, the user agent SHOULD signal to the authenticator (at invocation time ) that enterprise attestation is requested, and convey the resulting AAGUID and attestation statement , unaltered, to the
Relying Party[RP] .
5.5.
Options
for
Assertion
Generation
(dictionary
PublicKeyCredentialRequestOptions
)
The
PublicKeyCredentialRequestOptions
dictionary
supplies
get()
with
the
data
it
needs
to
generate
an
assertion.
Its
challenge
member
MUST
be
present,
while
its
other
members
are
OPTIONAL.
dictionary PublicKeyCredentialRequestOptions {required BufferSource challenge ;unsigned long timeout ;USVString rpId ;sequence <PublicKeyCredentialDescriptor >allowCredentials = [];DOMString userVerification = "preferred";sequence <DOMString >hints = [];AuthenticationExtensionsClientInputs extensions ; };
-
challenge
, of type BufferSource -
This member specifies a challenge that the authenticator signs, along with other data, when producing an authentication assertion . See the
§ 13.4.3 Cryptographic Challenges[[#sctn-cryptographic-challenges]] security consideration. -
timeout
, of type unsigned long -
This OPTIONAL member specifies a time, in milliseconds, that the
Relying Party[RP] is willing to wait for the call to complete. The value is treated as a hint, and MAY be overridden by the client . -
rpId
, of type USVString -
This OPTIONAL member specifies the RP ID claimed by the
Relying Party[RP] . The client MUST verify that theRelying Party[RP]'s’s origin matches the scope of this RP ID . The authenticator MUST verify that this RP ID exactly equals the rpId of the credential to be used for the authentication ceremony .If not specified, its value will be the
CredentialsContainer
object’s relevant settings object's’s origin's’s effective domain . -
allowCredentials
, of type sequence< PublicKeyCredentialDescriptor >, defaulting to[]
-
This OPTIONAL member is used by the client to find authenticators eligible for this authentication ceremony . It can be used in two ways:
-
If the user account to authenticate is already identified (e.g., if the user has entered a username), then the
Relying Party[RP] SHOULD use this member to list credential descriptors for credential records in the user account . This SHOULD usually include all credential records in the user account .The items SHOULD specify
transports
whenever possible. This helps the client optimize the user experience for any given situation. Also note that theRelying Party[RP] does not need to filter the list when requesting user verification — the client will automatically ignore non-eligible credentials ifuserVerification
is set torequired
.See also the
§ 14.6.3 Privacy leak via credential IDs[[#sctn-credential-id-privacy-leak]] privacy consideration. -
If the user account to authenticate is not already identified, then the
Relying Party[RP] MAY leave this member empty or unspecified. In this case, only discoverable credentials will be utilized in this authentication ceremony , and the user account MAY be identified by theuserHandle
of the resultingAuthenticatorAssertionResponse
. If the available authenticators contain more than one discoverable credential scoped to theRelying Party[RP] , the credentials are displayed by the client platform or authenticator for the user to select from (see step 7 of§ 6.3.3 The authenticatorGetAssertion Operation ).[[#sctn-op-get-assertion]]).
If not empty , the client MUST return an error if none of the listed credentials can be used.
The list is ordered in descending order of preference: the first item in the list is the most preferred credential, and the last is the least preferred.
-
-
userVerification
, of type DOMString , defaulting to"preferred"
-
This OPTIONAL member specifies the
Relying Party[RP]'s’s requirements regarding user verification for theget()
operation. The value SHOULD be a member ofUserVerificationRequirement
but client platforms MUST ignore unknown values, treating an unknown value as if the member does not exist . Eligible authenticators are filtered to only those capable of satisfying this requirement.See
UserVerificationRequirement
for the description ofuserVerification
's’s values and semantics. -
hints
, of type sequence< DOMString >, defaulting to[]
-
This OPTIONAL member contains zero or more elements from
PublicKeyCredentialHints
to guide the user agent in interacting with the user. Note that the elements have typeDOMString
despite being taken from that enumeration. See§ 2.1.1 Enumerations as DOMString types .[[#sct-domstring-backwards-compatibility]]. -
extensions
, of type AuthenticationExtensionsClientInputs -
The
Relying Party[RP] MAY use this OPTIONAL member to provide client extension inputs requesting additional processing by the client and authenticator .The extensions framework is defined in
§ 9 WebAuthn Extensions .[[#sctn-extensions]]. Some extensions are defined in§ 10 Defined Extensions ;[[#sctn-defined-extensions]]; consult the IANA "WebAuthn Extension Identifiers" registry[IANA-WebAuthn-Registries][[!IANA-WebAuthn-Registries]] established by[RFC8809][[!RFC8809]] for an up-to-date list of registered WebAuthn Extensions .
5.6.
Abort
Operations
with
AbortSignal
Developers
are
encouraged
to
leverage
the
AbortController
to
manage
the
[[Create]](origin,
options,
sameOriginWithAncestors)
and
[[DiscoverFromExternalSource]](origin,
options,
sameOriginWithAncestors)
operations.
See
DOM
§ 3.3
Using
AbortController
and
AbortSignal
objects
in
APIs
[[dom#abortcontroller-api-integration]]
section
for
detailed
instructions.
Note:
DOM
§ 3.3
Using
AbortController
and
AbortSignal
objects
in
APIs
[[dom#abortcontroller-api-integration]]
section
specifies
that
web
platform
APIs
integrating
with
the
AbortController
must
reject
the
promise
immediately
once
the
AbortSignal
is
aborted
.
Given
the
complex
inheritance
and
parallelization
structure
of
the
[[Create]](origin,
options,
sameOriginWithAncestors)
and
[[DiscoverFromExternalSource]](origin,
options,
sameOriginWithAncestors)
methods,
the
algorithms
for
the
two
APIs
fulfills
this
requirement
by
checking
the
aborted
property
in
three
places.
In
the
case
of
[[Create]](origin,
options,
sameOriginWithAncestors)
,
the
aborted
property
is
checked
first
in
Credential
Management
1
§ 2.5.4
Create
a
Credential
[[credential-management-1#algorithm-create]]
immediately
before
calling
[[Create]](origin,
options,
sameOriginWithAncestors)
,
then
in
§ 5.1.3
Create
a
New
Credential
-
PublicKeyCredential’s
[[Create]](origin,
options,
sameOriginWithAncestors)
Method
[[#sctn-createCredential]]
right
before
authenticator
sessions
start,
and
finally
during
authenticator
sessions
.
The
same
goes
for
[[DiscoverFromExternalSource]](origin,
options,
sameOriginWithAncestors)
.
The
visibility
and
focus
state
of
the
Window
object
determines
whether
the
[[Create]](origin,
options,
sameOriginWithAncestors)
and
[[DiscoverFromExternalSource]](origin,
options,
sameOriginWithAncestors)
operations
should
continue.
When
the
Window
object
associated
with
the
Document
loses
focus,
[[Create]](origin,
options,
sameOriginWithAncestors)
and
[[DiscoverFromExternalSource]](origin,
options,
sameOriginWithAncestors)
operations
SHOULD
be
aborted.
The WHATWG HTML WG is discussing whether to provide a hook when a browsing context gains or loses focuses. If a hook is provided, the above paragraph will be updated to include the hook. See WHATWG HTML WG Issue #2711 for more details.
5.7. WebAuthn Extensions Inputs and Outputs
The subsections below define the data types used for conveying WebAuthn extension inputs and outputs.
Note: Authenticator extension outputs are conveyed as a part of authenticator data (see Table 1 ).
Note:
The
types
defined
below
—
AuthenticationExtensionsClientInputs
and
AuthenticationExtensionsClientOutputs
—
are
applicable
to
both
registration
extensions
and
authentication
extensions
.
The
"Authentication..."
portion
of
their
names
should
be
regarded
as
meaning
"WebAuthentication..."
5.7.1.
Authentication
Extensions
Client
Inputs
(dictionary
AuthenticationExtensionsClientInputs
)
dictionary { };
AuthenticationExtensionsClientInputs
This is a dictionary containing the client extension input values for zero or more WebAuthn Extensions .
5.7.2.
Authentication
Extensions
Client
Outputs
(dictionary
AuthenticationExtensionsClientOutputs
)
dictionary { };
AuthenticationExtensionsClientOutputs
This is a dictionary containing the client extension output values for zero or more WebAuthn Extensions .
5.7.3.
Authentication
Extensions
Authenticator
Inputs
(CDDL
type
AuthenticationExtensionsAuthenticatorInputs
)
AuthenticationExtensionsAuthenticatorInputs = { * $$extensionInput .within ( tstr => any ) }
The
CDDL
type
AuthenticationExtensionsAuthenticatorInputs
defines
a
CBOR
map
containing
the
authenticator
extension
input
values
for
zero
or
more
WebAuthn
Extensions
.
Extensions
can
add
members
as
described
in
§ 9.3
Extending
Request
Parameters
.
[[#sctn-extension-request-parameters]].
This
type
is
not
exposed
to
the
Relying
Party
[RP]
,
but
is
used
by
the
client
and
authenticator
.
5.7.4.
Authentication
Extensions
Authenticator
Outputs
(CDDL
type
AuthenticationExtensionsAuthenticatorOutputs
)
AuthenticationExtensionsAuthenticatorOutputs = { * $$extensionOutput .within ( tstr => any ) }
The
CDDL
type
AuthenticationExtensionsAuthenticatorOutputs
defines
a
CBOR
map
containing
the
authenticator
extension
output
values
for
zero
or
more
WebAuthn
Extensions
.
Extensions
can
add
members
as
described
in
§ 9.3
Extending
Request
Parameters
.
[[#sctn-extension-request-parameters]].
5.8. Supporting Data Structures
The public key credential type uses certain data structures that are specified in supporting specifications. These are as follows.
5.8.1.
Client
Data
Used
in
WebAuthn
Signatures
(dictionary
CollectedClientData
)
The
client
data
represents
the
contextual
bindings
of
both
the
WebAuthn
Relying
Party
[WRP]
and
the
client
.
It
is
a
key-value
mapping
whose
keys
are
strings.
Values
can
be
any
type
that
has
a
valid
encoding
in
JSON.
Its
structure
is
defined
by
the
following
Web
IDL.
Note:
The
CollectedClientData
may
be
extended
in
the
future.
Therefore
it’s
critical
when
parsing
to
be
tolerant
of
unknown
keys
and
of
any
reordering
of
the
keys.
See
also
§ 5.8.1.2
Limited
Verification
Algorithm
.
[[#clientdatajson-verification]].
dictionary CollectedClientData {; ; ; ; ;required DOMString type ;required DOMString challenge ;required DOMString origin ;DOMString topOrigin ;boolean crossOrigin ;CollectedClientDataExtensions ; };
extensions dictionary {
TokenBinding required DOMString status ;DOMString id ; };enum {
TokenBindingStatus "present" ,"supported" };dictionary { };
CollectedClientDataExtensions
-
type
, of type DOMString -
This member contains the string "webauthn.create" when creating new credentials, and "webauthn.get" when getting an assertion from an existing credential. The purpose of this member is to prevent certain types of signature confusion attacks (where an attacker substitutes one legitimate signature for another).
-
challenge
, of type DOMString -
This member contains the base64url encoding of the challenge provided by the
Relying Party[RP] . See the§ 13.4.3 Cryptographic Challenges[[#sctn-cryptographic-challenges]] security consideration. -
origin
, of type DOMString -
This member contains the fully qualified origin of the requester, as provided to the authenticator by the client, in the syntax defined by
[RFC6454] .[[!RFC6454]]. -
topOrigin
, of type DOMString -
This OPTIONAL member contains the fully qualified top-level origin of the requester, in the syntax defined by
[RFC6454] .[[!RFC6454]]. It is set only if the call was made from context that is not same-origin with its ancestors , i.e. ifcrossOrigin
istrue
. -
crossOrigin
, of type boolean -
This OPTIONAL member contains the inverse of the
sameOriginWithAncestors
argument value that was passed into the internal method . - [RESERVED] tokenBinding
-
This OPTIONAL member contains information about the state of the Token Binding protocol
[TokenBinding][[!TokenBinding]] used when communicating with theRelying Party[RP] . Its absence indicates that the client doesn’t support token bindingNote: While Token Binding was present in Level 1 and Level 2 of WebAuthn, its use is not expected in Level 3. The tokenBinding field is reserved so that it will not be reused for a different purpose.
-
status
, of type DOMString -
This member SHOULD be a member of
TokenBindingStatus
but client platforms MUST ignore unknown values, treating an unknown value as if the tokenBinding member does not exist . When known, this member is one of the following:Note: The
TokenBindingStatus
enumeration is deliberately not referenced, see§ 2.1.1 Enumerations as DOMString types .[[#sct-domstring-backwards-compatibility]]. -
id
, of type DOMString -
This member MUST be present if
status
ispresent
, and MUST be a base64url encoding of the Token Binding ID that was used when communicating with theRelying Party[RP] .
Note: Obtaining a Token Binding ID is a client platform -specific operation.
-
The
CollectedClientData
structure
is
used
by
the
client
to
compute
the
following
quantities:
- JSON-compatible serialization of client data
-
This is the result of performing the JSON-compatible serialization algorithm on the
CollectedClientData
dictionary. - Hash of the serialized client data
-
This is the hash (computed using SHA-256) of the JSON-compatible serialization of client data , as constructed by the client.
5.8.1.1. Serialization
The
serialization
of
the
CollectedClientData
is
a
subset
of
the
algorithm
for
JSON-serializing
to
bytes
.
I.e.
it
produces
a
valid
JSON
encoding
of
the
CollectedClientData
but
also
provides
additional
structure
that
may
be
exploited
by
verifiers
to
avoid
integrating
a
full
JSON
parser.
While
verifiers
are
recommended
to
perform
standard
JSON
parsing,
they
may
use
the
more
limited
algorithm
below
in
contexts
where
a
full
JSON
parser
is
too
large.
This
verification
algorithm
requires
only
base64url
encoding
,
appending
of
bytestrings
(which
could
be
implemented
by
writing
into
a
fixed
template),
and
simple
conditional
checks
(assuming
that
inputs
are
known
not
to
need
escaping).
The serialization algorithm works by appending successive byte strings to an, initially empty, partial result until the complete result is obtained.
-
Let result be an empty byte string.
-
Append 0x7b2274797065223a (
{"type":
) to result . -
Append CCDToString (
type
) to result . -
Append 0x2c226368616c6c656e6765223a (
,"challenge":
) to result . -
Append CCDToString (
challenge
) to result . -
Append 0x2c226f726967696e223a (
,"origin":
) to result . -
Append CCDToString (
origin
) to result . -
Append 0x2c2263726f73734f726967696e223a (
,"crossOrigin":
) to result . -
If
crossOrigin
is not present, or isfalse
:-
Append 0x66616c7365 (
false
) to result .
-
-
Otherwise:
-
Append 0x74727565 (
true
) to result .
-
-
If
topOrigin
is present:-
Append 0x2c22746f704f726967696e223a (
,"topOrigin":
) to result . -
Append CCDToString (
topOrigin
) to result .
-
-
Create a temporary copy of the
CollectedClientData
and remove the fieldstype
,challenge
,origin
,crossOrigin
(if present), andtopOrigin
(if present). -
If no fields remain in the temporary copy then:
-
Append 0x7d (
}
) to result .
-
-
Otherwise:
-
Invoke serialize JSON to bytes on the temporary copy to produce a byte string remainder .
-
Append 0x2c (
,
) to result . -
Remove the leading byte from remainder .
-
Append remainder to result .
-
-
The result of the serialization is the value of result .
The function CCDToString is used in the above algorithm and is defined as:
-
Let encoded be an empty byte string.
-
Append 0x22 (
"
) to encoded . -
Invoke ToString on the given object to convert to a string.
-
For each code point in the resulting string, if the code point:
- is in the set {U+0020, U+0021, U+0023–U+005B, U+005D–U+10FFFF}
-
Append the UTF-8 encoding of that code point to encoded .
- is U+0022
-
Append 0x5c22 (
\"
) to encoded . - is U+005C
-
Append 0x5c5c ( \\ ) to encoded .
- otherwise
-
Append 0x5c75 (
\u
) to encoded , followed by four, lower-case hex digits that, when interpreted as a base-16 number, represent that code point.
-
Append 0x22 (
"
) to encoded . -
The result of this function is the value of encoded .
5.8.1.2. Limited Verification Algorithm
Verifiers
may
use
the
following
algorithm
to
verify
an
encoded
CollectedClientData
if
they
cannot
support
a
full
JSON
parser:
-
The inputs to the algorithm are:
-
A bytestring, clientDataJSON , that contains
clientDataJSON
— the serializedCollectedClientData
that is to be verified. -
A string, type , that contains the expected
type
. -
A byte string, challenge , that contains the challenge byte string that was given in the
PublicKeyCredentialRequestOptions
orPublicKeyCredentialCreationOptions
. -
A string, origin , that contains the expected
origin
that issued the request to the user agent. -
A boolean, crossOrigin , that is true if, and only if, the request should have been performed within a cross-origin
iframe
.
-
-
Let expected be an empty byte string.
-
Append 0x7b2274797065223a (
{"type":
) to expected . -
Append CCDToString ( type ) to expected .
-
Append 0x2c226368616c6c656e6765223a (
,"challenge":
) to expected . -
Perform base64url encoding on challenge to produce a string, challengeBase64 .
-
Append CCDToString ( challengeBase64 ) to expected .
-
Append 0x2c226f726967696e223a (
,"origin":
) to expected . -
Append CCDToString ( origin ) to expected .
-
Append 0x2c2263726f73734f726967696e223a (
,"crossOrigin":
) to expected . -
If crossOrigin is true:
-
Append 0x74727565 (
true
) to expected .
-
-
Otherwise, i.e. crossOrigin is false:
-
Append 0x66616c7365 (
false
) to expected .
-
-
If expected is not a prefix of clientDataJSON then the verification has failed.
-
If clientDataJSON is not at least one byte longer than expected then the verification has failed.
-
If the byte of clientDataJSON at the offset equal to the length of expected :
- is 0x7d
-
The verification is successful.
- is 0x2c
-
The verification is successful.
- otherwise
-
The verification has failed.
5.8.1.3. Future development
In
order
to
remain
compatible
with
the
limited
verification
algorithm
,
future
versions
of
this
specification
must
not
remove
any
of
the
fields
type
,
challenge
,
origin
,
crossOrigin
,
or
topOrigin
from
CollectedClientData
.
They
also
must
not
change
the
serialization
algorithm
to
change
the
order
in
which
those
fields
are
serialized,
or
insert
new
fields
between
them.
If
additional
fields
are
added
to
CollectedClientData
then
verifiers
that
employ
the
limited
verification
algorithm
will
not
be
able
to
consider
them
until
the
two
algorithms
above
are
updated
to
include
them.
Once
such
an
update
occurs
then
the
added
fields
inherit
the
same
limitations
as
described
in
the
previous
paragraph.
Such
an
algorithm
update
would
have
to
accomodate
serializations
produced
by
previous
versions.
I.e.
the
verification
algorithm
would
have
to
handle
the
fact
that
a
sixth
key–value
pair
may
not
appear
sixth
(or
at
all)
if
generated
by
a
user
agent
working
from
a
previous
version.
5.8.2.
Credential
Type
Enumeration
(enum
PublicKeyCredentialType
)
enum PublicKeyCredentialType {"public-key" };
Note:
The
PublicKeyCredentialType
enumeration
is
deliberately
not
referenced,
see
§ 2.1.1
Enumerations
as
DOMString
types
.
[[#sct-domstring-backwards-compatibility]].
Currently
one
credential
type
is
defined,
namely
"
public-key
".
5.8.3.
Credential
Descriptor
(dictionary
PublicKeyCredentialDescriptor
)
dictionary PublicKeyCredentialDescriptor {required DOMString type ;required BufferSource id ;sequence <DOMString >transports ; };
This
dictionary
identifies
a
specific
public
key
credential
.
It
is
used
in
create()
to
prevent
creating
duplicate
credentials
on
the
same
authenticator
,
and
in
get()
to
determine
if
and
how
the
credential
can
currently
be
reached
by
the
client
.
The
credential
descriptor
for
a
credential
record
is
a
subset
of
the
properties
of
that
credential
record
,
and
mirrors
some
fields
of
the
PublicKeyCredential
object
returned
by
create()
and
get()
.
-
type
, of type DOMString -
This member contains the type of the public key credential the caller is referring to. The value SHOULD be a member of
PublicKeyCredentialType
but client platforms MUST ignore anyPublicKeyCredentialDescriptor
with an unknowntype
.This SHOULD be set to the value of the type item of the credential record representing the identified public key credential source . This mirrors the
type
field ofPublicKeyCredential
.Note: If all
PublicKeyCredentialDescriptor
elements inallowCredentials
are ignored then that MUST result in an error since an emptyallowCredentials
is semantically distinct. -
id
, of type BufferSource -
This member contains the credential ID of the public key credential the caller is referring to.
This SHOULD be set to the value of the id item of the credential record representing the identified public key credential source . This mirrors the
rawId
field ofPublicKeyCredential
. -
transports
, of type sequence< DOMString > -
This OPTIONAL member contains a hint as to how the client might communicate with the managing authenticator of the public key credential the caller is referring to. The values SHOULD be members of
AuthenticatorTransport
but client platforms MUST ignore unknown values.This SHOULD be set to the value of the transports item of the credential record representing the identified public key credential source . This mirrors the
response
.getTransports()
PublicKeyCredential
structure created by acreate()
operation.
5.8.4.
Authenticator
Transport
Enumeration
(enum
AuthenticatorTransport
)
enum AuthenticatorTransport {"usb" ,"nfc" ,"ble" ,"smart-card" ,"hybrid" ,"internal" };
Note:
The
AuthenticatorTransport
enumeration
is
deliberately
not
referenced,
see
§ 2.1.1
Enumerations
as
DOMString
types
.
[[#sct-domstring-backwards-compatibility]].
getTransports()
.
-
usb
-
Indicates the respective authenticator can be contacted over removable USB.
-
nfc
-
Indicates the respective authenticator can be contacted over Near Field Communication (NFC).
-
ble
-
Indicates the respective authenticator can be contacted over Bluetooth Smart (Bluetooth Low Energy / BLE).
-
smart-card
-
Indicates the respective authenticator can be contacted over ISO/IEC 7816 smart card with contacts.
-
hybrid
-
Indicates the respective authenticator can be contacted using a combination of (often separate) data-transport and proximity mechanisms. This supports, for example, authentication on a desktop computer using a smartphone.
-
internal
-
Indicates the respective authenticator is contacted using a client device -specific transport, i.e., it is a platform authenticator . These authenticators are not removable from the client device .
5.8.5.
Cryptographic
Algorithm
Identifier
(typedef
COSEAlgorithmIdentifier
)
typedef long ;
COSEAlgorithmIdentifier
COSEAlgorithmIdentifier
-7
for
"ES256"
and
-257
for
"RS256".
The COSE algorithms registry leaves degrees of freedom to be specified by other parameters in a COSE key . In order to promote interoperability, this specification makes the following additional guarantees of credential public keys :
-
Keys with algorithm ES256 (-7) MUST specify P-256 (1) as the crv parameter and MUST NOT use the compressed point form.
-
Keys with algorithm ES384 (-35) MUST specify P-384 (2) as the crv parameter and MUST NOT use the compressed point form.
-
Keys with algorithm ES512 (-36) MUST specify P-521 (3) as the crv parameter and MUST NOT use the compressed point form.
-
Keys with algorithm EdDSA (-8) MUST specify Ed25519 (6) as the crv parameter. (These always use a compressed form in COSE.)
These
restrictions
align
with
the
recommendation
in
Section
2.1
of
[RFC9053]
.
[[!RFC9053]].
Note: There are many checks neccessary to correctly implement signature verification using these algorithms. One of these is that, when processing uncompressed elliptic-curve points, implementations should check that the point is actually on the curve. This check is highlighted because it’s judged to be at particular risk of falling through the gap between a cryptographic library and other code.
5.8.6.
User
Verification
Requirement
Enumeration
(enum
UserVerificationRequirement
)
enum UserVerificationRequirement {"required" ,"preferred" ,"discouraged" };
A
WebAuthn
Relying
Party
[WRP]
may
require
user
verification
for
some
of
its
operations
but
not
for
others,
and
may
use
this
type
to
express
its
needs.
Note:
The
UserVerificationRequirement
enumeration
is
deliberately
not
referenced,
see
§ 2.1.1
Enumerations
as
DOMString
types
.
[[#sct-domstring-backwards-compatibility]].
-
required
-
The
Relying Party[RP] requires user verification for the operation and will fail the overall ceremony if the response does not have the UV flag set. The client MUST return an error if user verification cannot be performed. -
preferred
-
The
Relying Party[RP] prefers user verification for the operation if possible, but will not fail the operation if the response does not have the UV flag set. -
discouraged
-
The
Relying Party[RP] does not want user verification employed during the operation (e.g., in the interest of minimizing disruption to the user interaction flow).
5.8.7.
Client
Capability
Enumeration
(enum
ClientCapability
)
enum ClientCapability {"conditionalCreate" ,"conditionalGet" ,"hybridTransport" ,"passkeyPlatformAuthenticator" ,"userVerifyingPlatformAuthenticator" , };
This
enumeration
defines
a
limited
set
of
client
capabilities
which
a
WebAuthn
Relying
Party
[WRP]
may
evaluate
to
offer
certain
workflows
and
experiences
to
users.
Note:
The
ClientCapability
enumeration
is
deliberately
not
referenced,
see
§ 2.1.1
Enumerations
as
DOMString
types
.
[[#sct-domstring-backwards-compatibility]].
-
conditionalCreate
-
The WebAuthn Client is capable of
conditional
mediation for registration ceremonies .. -
conditionalGet
-
The WebAuthn Client is capable of
conditional
mediation for authentication ceremonies . -
hybridTransport
-
The WebAuthn Client supports usage of the
hybrid
transport. -
passkeyPlatformAuthenticator
-
The WebAuthn Client supports usage of a passkey platform authenticator , locally and/or via
hybrid
transport. -
userVerifyingPlatformAuthenticator
-
The WebAuthn Client supports usage of a user-verifying platform authenticator .
5.8.8.
User-agent
Hints
Enumeration
(enum
PublicKeyCredentialHints
)
enum PublicKeyCredentialHints {"security-key" ,"client-device" ,"hybrid" , };
Note:
The
PublicKeyCredentialHints
enumeration
is
deliberately
not
referenced,
see
§ 2.1.1
Enumerations
as
DOMString
types
.
[[#sct-domstring-backwards-compatibility]].
Hints
MAY
contradict
information
contained
in
credential
transports
and
authenticatorAttachment
.
When
this
occurs,
the
hints
take
precedence.
(Note
that
transports
values
are
not
provided
when
using
discoverable
credentials
,
leaving
hints
as
the
only
avenue
for
expressing
some
aspects
of
such
a
request.)
-
security-key
-
Indicates that the
Relying Party[RP] believes that users will satisfy this request with a physical security key. For example, an enterpriseRelying Party[RP] may set this hint if they have issued security keys to their employees and will only accept those authenticators for registration and authentication .For compatibility with older user agents, when this hint is used in
PublicKeyCredentialCreationOptions
, theauthenticatorAttachment
SHOULD be set tocross-platform
. -
client-device
-
Indicates that the
Relying Party[RP] believes that users will satisfy this request with a platform authenticator attached to the client device .For compatibility with older user agents, when this hint is used in
PublicKeyCredentialCreationOptions
, theauthenticatorAttachment
SHOULD be set toplatform
. -
hybrid
-
Indicates that the
Relying Party[RP] believes that users will satisfy this request with general-purpose authenticators such as smartphones. For example, a consumerRelying Party[RP] may believe that only a small fraction of their customers possesses dedicated security keys. This option also implies that the local platform authenticator should not be promoted in the UI.For compatibility with older user agents, when this hint is used in
PublicKeyCredentialCreationOptions
, theauthenticatorAttachment
SHOULD be set tocross-platform
.
5.9. Permissions Policy integration
This
specification
defines
two
policy-controlled
features
identified
by
the
feature-identifier
tokens
"
publickey-credentials-create
"
and
"
publickey-credentials-get
".
Their
default
allowlists
are
both
'
self
'.
[Permissions-Policy]
[[!Permissions-Policy]]
A
Document
's
’s
permissions
policy
determines
whether
any
content
in
that
document
is
allowed
to
successfully
invoke
the
Web
Authentication
API
,
i.e.,
via
navigator.credentials.create({publicKey:...,
...})
or
navigator.credentials.get({publicKey:...,
...})
If
disabled
in
any
document,
no
content
in
the
document
will
be
allowed
to
use
the
foregoing
methods:
attempting
to
do
so
will
return
an
error
.
Note:
Algorithms
specified
in
[CREDENTIAL-MANAGEMENT-1]
[[!CREDENTIAL-MANAGEMENT-1]]
perform
the
actual
permissions
policy
evaluation.
This
is
because
such
policy
evaluation
needs
to
occur
when
there
is
access
to
the
current
settings
object
.
The
[[Create]](origin,
options,
sameOriginWithAncestors)
and
[[DiscoverFromExternalSource]](origin,
options,
sameOriginWithAncestors)
internal
methods
does
not
have
such
access
since
they
are
invoked
in
parallel
by
CredentialsContainer
's
’s
Create
a
Credential
and
Request
a
Credential
abstract
operations
[CREDENTIAL-MANAGEMENT-1]
.
[[!CREDENTIAL-MANAGEMENT-1]].
5.10.
Using
Web
Authentication
within
iframe
elements
The
Web
Authentication
API
is
disabled
by
default
in
cross-origin
iframe
s.
To
override
this
default
policy
and
indicate
that
a
cross-origin
iframe
is
allowed
to
invoke
the
Web
Authentication
API
's
’s
[[DiscoverFromExternalSource]](origin,
options,
sameOriginWithAncestors)
method,
specify
the
allow
attribute
on
the
iframe
element
and
include
the
publickey-credentials-get
feature-identifier
token
in
the
allow
attribute’s
value.
Relying
Parties
[RPS]
utilizing
the
WebAuthn
API
in
an
embedded
context
should
review
§ 13.4.2
Visibility
Considerations
for
Embedded
Usage
[[#sctn-seccons-visibility]]
regarding
UI
redressing
and
its
possible
mitigations.
6. WebAuthn Authenticator Model
The
[[#sctn-api|The
Web
Authentication
API
API]]
implies
a
specific
abstract
functional
model
for
a
WebAuthn
Authenticator
[WAA]
.
This
section
describes
that
authenticator
model
.
Client
platforms
MAY
implement
and
expose
this
abstract
model
in
any
way
desired.
However,
the
behavior
of
the
client’s
Web
Authentication
API
implementation,
when
operating
on
the
authenticators
supported
by
that
client
platform
,
MUST
be
indistinguishable
from
the
behavior
specified
in
§ 5
Web
Authentication
API
.
[[#sctn-api]].
Note:
[FIDO-CTAP]
[[!FIDO-CTAP]]
is
an
example
of
a
concrete
instantiation
of
this
model,
but
it
is
one
in
which
there
are
differences
in
the
data
it
returns
and
those
expected
by
the
WebAuthn
API
's
[[#sctn-api|WebAuthn
API]]'s
algorithms.
The
CTAP2
response
messages
are
CBOR
maps
constructed
using
integer
keys
rather
than
the
string
keys
defined
in
this
specification
for
the
same
objects.
The
client
is
expected
to
perform
any
needed
transformations
on
such
data.
The
[FIDO-CTAP]
[[!FIDO-CTAP]]
specification
details
the
mapping
between
CTAP2
integer
keys
and
WebAuthn
string
keys
in
Section
§6.
Authenticator
API
.
For
authenticators,
this
model
defines
the
logical
operations
that
they
MUST
support,
and
the
data
formats
that
they
expose
to
the
client
and
the
WebAuthn
Relying
Party
[WRP]
.
However,
it
does
not
define
the
details
of
how
authenticators
communicate
with
the
client
device
,
unless
they
are
necessary
for
interoperability
with
Relying
Parties
[RPS]
.
For
instance,
this
abstract
model
does
not
define
protocols
for
connecting
authenticators
to
clients
over
transports
such
as
USB
or
NFC.
Similarly,
this
abstract
model
does
not
define
specific
error
codes
or
methods
of
returning
them;
however,
it
does
define
error
behavior
in
terms
of
the
needs
of
the
client.
Therefore,
specific
error
codes
are
mentioned
as
a
means
of
showing
which
error
conditions
MUST
be
distinguishable
(or
not)
from
each
other
in
order
to
enable
a
compliant
and
secure
client
implementation.
Relying
Parties
[RPS]
may
influence
authenticator
selection,
if
they
deem
necessary,
by
stipulating
various
authenticator
characteristics
when
creating
credentials
[[#sctn-createCredential|creating
credentials]]
and/or
when
generating
assertions
,
[[#sctn-getAssertion|generating
assertions]],
through
use
of
credential
[[#dictionary-makecredentialoptions|credential
creation
options
options]]
or
assertion
[[#dictionary-assertion-options|assertion
generation
options
,
options]],
respectively.
The
algorithms
underlying
the
WebAuthn
API
[[#sctn-api|WebAuthn
API]]
marshal
these
options
and
pass
them
to
the
applicable
authenticator
operations
[[#sctn-authenticator-ops|authenticator
operations]]
defined
below.
In this abstract model, the authenticator provides key management and cryptographic signatures. It can be embedded in the WebAuthn client or housed in a separate device entirely. The authenticator itself can contain a cryptographic module which operates at a higher security level than the rest of the authenticator. This is particularly important for authenticators that are embedded in the WebAuthn client, as in those cases this cryptographic module (which may, for example, be a TPM) could be considered more trustworthy than the rest of the authenticator.
Each authenticator stores a credentials map , a map from ( rpId , userHandle ) to public key credential source .
Additionally,
each
authenticator
has
an
Authenticator
Attestation
Globally
Unique
Identifier
or
AAGUID
,
which
is
a
128-bit
identifier
indicating
the
type
(e.g.
make
and
model)
of
the
authenticator.
The
AAGUID
MUST
be
chosen
by
its
maker
to
be
identical
across
all
substantially
identical
authenticators
made
by
that
maker,
and
different
(with
high
probability)
from
the
AAGUIDs
of
all
other
types
of
authenticators.
The
AAGUID
for
a
given
type
of
authenticator
SHOULD
be
randomly
generated
to
ensure
this.
The
Relying
Party
[RP]
MAY
use
the
AAGUID
to
infer
certain
properties
of
the
authenticator,
such
as
certification
level
and
strength
of
key
protection,
using
information
from
other
sources.
The
Relying
Party
[RP]
MAY
use
the
AAGUID
to
attempt
to
identify
the
maker
of
the
authenticator
without
requesting
and
verifying
attestation
,
but
the
AAGUID
is
not
provably
authentic
without
attestation
.
The
primary
function
of
the
authenticator
is
to
provide
WebAuthn
signatures
,
which
are
bound
to
various
contextual
data.
These
data
are
observed
and
added
at
different
levels
of
the
stack
as
a
signature
request
passes
from
the
server
to
the
authenticator.
In
verifying
a
signature,
the
server
checks
these
bindings
against
expected
values.
These
contextual
bindings
are
divided
in
two:
Those
added
by
the
Relying
Party
[RP]
or
the
client,
referred
to
as
client
data
;
and
those
added
by
the
authenticator,
referred
to
as
the
authenticator
data
.
The
authenticator
signs
over
the
client
data
,
but
is
otherwise
not
interested
in
its
contents.
To
save
bandwidth
and
processing
requirements
on
the
authenticator,
the
client
hashes
the
client
data
and
sends
only
the
result
to
the
authenticator.
The
authenticator
signs
over
the
combination
of
the
hash
of
the
serialized
client
data
,
and
its
own
authenticator
data
.
The goals of this design can be summarized as follows.
-
The scheme for generating signatures should accommodate cases where the link between the client device and authenticator is very limited, in bandwidth and/or latency. Examples include Bluetooth Low Energy and Near-Field Communication.
-
The data processed by the authenticator should be small and easy to interpret in low-level code. In particular, authenticators should not have to parse high-level encodings such as JSON.
-
Both the client and the authenticator should have the flexibility to add contextual bindings as needed.
-
The design aims to reuse as much as possible of existing encoding formats in order to aid adoption and implementation.
Authenticators produce cryptographic signatures for two distinct purposes:
-
An attestation signature is produced when a new public key credential is created via an authenticatorMakeCredential operation. An attestation signature provides cryptographic proof of certain properties of the authenticator and the credential. For instance, an attestation signature asserts the authenticator type (as denoted by its AAGUID) and the credential public key . The attestation signature is signed by an attestation private key , which is chosen depending on the type of attestation desired. For more details on attestation , see
§ 6.5 Attestation .[[#sctn-attestation]]. -
An assertion signature is produced when the authenticatorGetAssertion method is invoked. It represents an assertion by the authenticator that the user has consented to a specific transaction, such as logging in, or completing a purchase. Thus, an assertion signature asserts that the authenticator possessing a particular credential private key has established, to the best of its ability, that the user requesting this transaction is the same user who consented to creating that particular public key credential . It also asserts additional information, termed client data , that may be useful to the caller, such as the means by which user consent was provided, and the prompt shown to the user by the authenticator . The assertion signature format is illustrated in Figure 4, below .
The term WebAuthn signature refers to both attestation signatures and assertion signatures . The formats of these signatures, as well as the procedures for generating them, are specified below.
6.1. Authenticator Data
The
authenticator
data
structure
encodes
contextual
bindings
made
by
the
authenticator
.
These
bindings
are
controlled
by
the
authenticator
itself,
and
derive
their
trust
from
the
WebAuthn
Relying
Party
[WRP]
's
’s
assessment
of
the
security
properties
of
the
authenticator.
In
one
extreme
case,
the
authenticator
may
be
embedded
in
the
client,
and
its
bindings
may
be
no
more
trustworthy
than
the
client
data
.
At
the
other
extreme,
the
authenticator
may
be
a
discrete
entity
with
high-security
hardware
and
software,
connected
to
the
client
over
a
secure
channel.
In
both
cases,
the
Relying
Party
[RP]
receives
the
authenticator
data
in
the
same
format,
and
uses
its
knowledge
of
the
authenticator
to
make
trust
decisions.
The authenticator data has a compact but extensible encoding. This is desired since authenticators can be devices with limited capabilities and low power requirements, with much simpler software stacks than the client platform .
The authenticator data structure is a byte array of 37 bytes or more, laid out as shown in Table .
Name | Length (in bytes) | Description |
---|---|---|
rpIdHash | 32 | SHA-256 hash of the RP ID the credential is scoped to. |
flags | 1 |
Flags
(bit
0
is
the
least
significant
bit):
|
signCount | 4 | Signature counter , 32-bit unsigned big-endian integer. |
attestedCredentialData | variable (if present) |
attested
credential
data
(if
present).
See
|
extensions | variable (if present) |
Extension-defined
authenticator
data
.
This
is
a
CBOR
|
The RP ID is originally received from the client when the credential is created, and again when an assertion is generated. However, it differs from other client data in some important ways. First, unlike the client data , the RP ID of a credential does not change between operations but instead remains the same for the lifetime of that credential. Secondly, it is validated by the authenticator during the authenticatorGetAssertion operation, by verifying that the RP ID that the requested credential is scoped to exactly matches the RP ID supplied by the client .
Authenticators perform the following steps to generate an authenticator data structure :
-
The UP flag SHALL be set if and only if the authenticator performed a test of user presence . The UV flag SHALL be set if and only if the authenticator performed user verification . The
RFU
bits SHALL be set to zero.Note: If the authenticator performed both a test of user presence and user verification , possibly combined in a single authorization gesture , then the authenticator will set both the UP flag and the UV flag .
-
For attestation signatures , the authenticator MUST set the AT flag and include the
attestedCredentialData
. For assertion signatures , the AT flag MUST NOT be set and theattestedCredentialData
MUST NOT be included. -
If the authenticator does not include any extension data , it MUST set the ED flag to zero, and to one if extension data is included.
Figure shows a visual representation of the authenticator data structure.
Determining
attested
credential
data
's
’s
length,
which
is
variable,
involves
determining
credentialPublicKey
’s
beginning
location
given
the
preceding
credentialId
’s
length
,
and
then
determining
the
credentialPublicKey
’s
length
(see
also
Section
7
of
[RFC9052]
).
[[!RFC9052]]).
6.1.1. Signature Counter Considerations
Authenticators
SHOULD
implement
a
signature
counter
feature.
These
counters
are
conceptually
stored
for
each
credential
by
the
authenticator,
or
globally
for
the
authenticator
as
a
whole.
The
initial
value
of
a
credential’s
signature
counter
is
specified
in
the
signCount
value
of
the
authenticator
data
returned
by
authenticatorMakeCredential
.
The
signature
counter
is
incremented
for
each
successful
authenticatorGetAssertion
operation
by
some
positive
value,
and
subsequent
values
are
returned
to
the
WebAuthn
Relying
Party
[WRP]
within
the
authenticator
data
again.
The
signature
counter
's
’s
purpose
is
to
aid
Relying
Parties
[RPS]
in
detecting
cloned
authenticators.
Clone
detection
is
more
important
for
authenticators
with
limited
protection
measures.
Authenticators
that
do
not
implement
a
signature
counter
leave
the
signCount
in
the
authenticator
data
constant
at
zero.
A
Relying
Party
[RP]
stores
the
signature
counter
of
the
most
recent
authenticatorGetAssertion
operation.
(Or
the
counter
from
the
authenticatorMakeCredential
operation
if
no
authenticatorGetAssertion
has
ever
been
performed
on
a
credential.)
In
subsequent
authenticatorGetAssertion
operations,
the
Relying
Party
[RP]
compares
the
stored
signature
counter
value
with
the
new
signCount
value
returned
in
the
assertion’s
authenticator
data
.
If
either
is
non-zero,
and
the
new
signCount
value
is
less
than
or
equal
to
the
stored
value,
a
cloned
authenticator
may
exist,
or
the
authenticator
may
be
malfunctioning.
Detecting
a
signature
counter
mismatch
does
not
indicate
whether
the
current
operation
was
performed
by
a
cloned
authenticator
or
the
original
authenticator.
Relying
Parties
[RPS]
should
address
this
situation
appropriately
relative
to
their
individual
situations,
i.e.,
their
risk
tolerance.
Authenticators:
-
SHOULD implement per credential signature counters . This prevents the signature counter value from being shared between
Relying Parties[RPS] and being possibly employed as a correlation handle for the user. Authenticators MAY implement a global signature counter , i.e., on a per-authenticator basis, but this is less privacy-friendly for users. -
SHOULD ensure that the signature counter value does not accidentally decrease (e.g., due to hardware failures).
6.1.2. FIDO U2F Signature Format Compatibility
The
format
for
assertion
signatures
,
which
sign
over
the
concatenation
of
an
authenticator
data
structure
and
the
hash
of
the
serialized
client
data
,
are
compatible
with
the
FIDO
U2F
authentication
signature
format
(see
Section
5.4
of
[FIDO-U2F-Message-Formats]
).
[[FIDO-U2F-Message-Formats]]).
This
is
because
the
first
37
bytes
of
the
signed
data
in
a
FIDO
U2F
authentication
response
message
constitute
a
valid
authenticator
data
structure,
and
the
remaining
32
bytes
are
the
hash
of
the
serialized
client
data
.
In
this
authenticator
data
structure,
the
rpIdHash
is
the
FIDO
U2F
application
parameter
,
all
flags
except
UP
are
always
zero,
and
the
attestedCredentialData
and
extensions
are
never
present.
FIDO
U2F
authentication
signatures
can
therefore
be
verified
by
the
same
procedure
as
other
assertion
signatures
generated
by
the
authenticatorGetAssertion
operation.
6.1.3. Credential Backup State
Credential backup eligibility and current backup state is conveyed by the BE and BS flags in the authenticator data , as defined in Table .
The value of the BE flag is set during authenticatorMakeCredential operation and MUST NOT change.
The value of the BS flag may change over time based on the current state of the public key credential source . Table below defines valid combinations and their meaning.
BE | BS | Description |
---|---|---|
0
|
0
| The credential is a single-device credential . |
0
|
1
| This combination is not allowed. |
1
|
0
| The credential is a multi-device credential and is not currently backed up . |
1
|
1
| The credential is a multi-device credential and is currently backed up . |
It
is
RECOMMENDED
that
Relying
Parties
[RPS]
store
the
most
recent
value
of
these
flags
with
the
user
account
for
future
evaluation.
The
following
is
a
non-exhaustive
list
of
how
Relying
Parties
[RPS]
might
use
these
flags
:
-
Requiring additional authenticators :
When the BE flag is set to
0
, the credential is a single-device credential and the generating authenticator will never allow the credential to be backed up.A single-device credential is not resilient to single device loss.
Relying Parties[RPS] SHOULD ensure that each user account has additional authenticators registered and/or an account recovery process in place. For example, the user could be prompted to set up an additional authenticator , such as a roaming authenticator or an authenticator that is capable of multi-device credentials . -
Upgrading a user to a password-free account:
When the BS flag changes from
0
to1
, the authenticator is signaling that the credential is backed up and is protected from single device loss.The
Relying Party[RP] MAY choose to prompt the user to upgrade their account security and remove their password. -
Adding an additional factor after a state change:
When the BS flag changes from
1
to0
, the authenticator is signaling that the credential is no longer backed up, and no longer protected from single device loss. This could be the result of the user actions, such as disabling the backup service, or errors, such as issues with the backup service.When this transition occurs, the
Relying Party[RP] SHOULD guide the user through a process to validate their other authentication factors. If the user does not have another credential for their account, they SHOULD be guided through adding an additional credential to ensure they do not lose access to their account. For example, the user could be prompted to set up an additional authenticator , such as a roaming authenticator or an authenticator that is capable of multi-device credentials .
6.2. Authenticator Taxonomy
Many use cases are dependent on the capabilities of the authenticator used. This section defines some terminology for those capabilities, their most important combinations, and which use cases those combinations enable.
For example:
-
When authenticating for the first time on a particular client device , a roaming authenticator is typically needed since the user doesn’t yet have a platform credential on that client device .
-
For subsequent re-authentication on the same client device , a platform authenticator is likely the most convenient since it’s built directly into the client device rather than being a separate device that the user may have to locate.
-
For second-factor authentication in addition to a traditional username and password, any authenticator can be used.
-
Passwordless multi-factor authentication requires an authenticator capable of user verification , and in some cases also discoverable credential capable .
-
A laptop computer might support connecting to roaming authenticators via USB and Bluetooth, while a mobile phone might only support NFC.
The above examples illustrate the primary authenticator type characteristics:
-
Whether the authenticator is a roaming or platform authenticator, or in some cases both — the authenticator attachment modality . A roaming authenticator can support one or more
transports[[#enum-transport|transports]] for communicating with the client . -
Whether the authenticator is capable of user verification — the authentication factor capability .
-
Whether the authenticator is discoverable credential capable — the credential storage modality .
These characteristics are independent and may in theory be combined in any way, but Table lists and names some authenticator types of particular interest.
Authenticator Type | Authenticator Attachment Modality | Credential Storage Modality | Authentication Factor Capability |
---|---|---|---|
Second-factor platform authenticator | platform | Either | Single-factor capable |
User-verifying platform authenticator | platform | Either | Multi-factor capable |
Second-factor roaming authenticator | cross-platform | Server-side storage | Single-factor capable |
First-factor roaming authenticator | cross-platform | Client-side storage | Multi-factor capable |
Passkey platform authenticator |
platform
(
transport
=
internal
)
or
cross-platform
(
transport
=
hybrid
)
| Client-side storage | Multi-factor capable |
A second-factor platform authenticator is convenient to use for re-authentication on the same client device , and can be used to add an extra layer of security both when initiating a new session and when resuming an existing session. A second-factor roaming authenticator is more likely to be used to authenticate on a particular client device for the first time, or on a client device shared between multiple users.
User-verifying
platform
authenticators
and
first-factor
roaming
authenticators
enable
passwordless
multi-factor
authentication.
In
addition
to
the
proof
of
possession
of
the
credential
private
key
,
these
authenticators
support
user
verification
as
a
second
authentication
factor
,
typically
a
PIN
or
biometric
recognition
.
The
authenticator
can
thus
act
as
two
kinds
of
authentication
factor
,
which
enables
multi-factor
authentication
while
eliminating
the
need
to
share
a
password
with
the
Relying
Party
[RP]
.
The combinations not named in Table have less distinguished use cases:
-
A roaming authenticator that is discoverable credential capable but not multi-factor capable can be used for single-factor authentication without a username, where the user is automatically identified by the user handle and possession of the credential private key is used as the only authentication factor . This can be useful in some situations, but makes the user particularly vulnerable to theft of the authenticator .
-
A roaming authenticator that is multi-factor capable but not discoverable credential capable can be used for multi-factor authentication, but requires the user to be identified first which risks leaking personally identifying information; see
§ 14.6.3 Privacy leak via credential IDs .[[#sctn-credential-id-privacy-leak]].
The following subsections define the aspects authenticator attachment modality , credential storage modality and authentication factor capability in more depth.
6.2.1. Authenticator Attachment Modality
Clients
can
communicate
with
authenticators
using
a
variety
of
mechanisms.
For
example,
a
client
MAY
use
a
client
device
-specific
API
to
communicate
with
an
authenticator
which
is
physically
bound
to
a
client
device
.
On
the
other
hand,
a
client
can
use
a
variety
of
standardized
cross-platform
transport
protocols
such
as
Bluetooth
(see
§ 5.8.4
Authenticator
Transport
Enumeration
(enum
AuthenticatorTransport)
)
[[#enum-transport]])
to
discover
and
communicate
with
cross-platform
attached
authenticators
.
We
refer
to
authenticators
that
are
part
of
the
client
device
as
platform
authenticators
,
while
those
that
are
reachable
via
cross-platform
transport
protocols
are
referred
to
as
roaming
authenticators
.
-
A platform authenticator is attached using a client device -specific transport, called platform attachment , and is usually not removable from the client device . A public key credential bound to a platform authenticator is called a platform credential .
-
A roaming authenticator is attached using cross-platform transports, called cross-platform attachment . Authenticators of this class are removable from, and can "roam" between, client devices . A public key credential bound to a roaming authenticator is called a roaming credential .
Some platform authenticators could possibly also act as roaming authenticators depending on context. For example, a platform authenticator integrated into a mobile device could make itself available as a roaming authenticator via Bluetooth. In this case clients running on the mobile device would recognise the authenticator as a platform authenticator , while clients running on a different client device and communicating with the same authenticator via Bluetooth would recognize it as a roaming authenticator .
The primary use case for platform authenticators is to register a particular client device as a "trusted device", so the client device itself acts as a something you have authentication factor for future authentication . This gives the user the convenience benefit of not needing a roaming authenticator for future authentication ceremonies , e.g., the user will not have to dig around in their pocket for their key fob or phone.
Use cases for roaming authenticators include: authenticating on a new client device for the first time, on rarely used client devices , client devices shared between multiple users, or client devices that do not include a platform authenticator ; and when policy or preference dictates that the authenticator be kept separate from the client devices it is used with. A roaming authenticator can also be used to hold backup credentials in case another authenticator is lost.
6.2.2. Credential Storage Modality
An authenticator can store a public key credential source in one of two ways:
-
In persistent storage embedded in the authenticator , client or client device , e.g., in a secure element. This is a technical requirement for a client-side discoverable public key credential source .
-
By encrypting (i.e., wrapping) the public key credential source such that only this authenticator can decrypt (i.e., unwrap) it and letting the resulting ciphertext be the credential ID of the public key credential source . The credential ID is stored by the
Relying Party[RP] and returned to the authenticator via theallowCredentials
option ofget()
, which allows the authenticator to decrypt and use the public key credential source .This enables the authenticator to have unlimited credential storage capacity, since the encrypted public key credential sources are stored by the
Relying Party[RP] instead of by the authenticator - but it means that a credential stored in this way must be retrieved from theRelying Party[RP] before the authenticator can use it.
Which
of
these
storage
strategies
an
authenticator
supports
defines
the
authenticator
's
’s
credential
storage
modality
as
follows:
-
An authenticator has the client-side credential storage modality if it supports client-side discoverable public key credential sources . An authenticator with client-side credential storage modality is also called discoverable credential capable .
-
An authenticator has the server-side credential storage modality if it does not have the client-side credential storage modality , i.e., it only supports storing public key credential sources as a ciphertext in the credential ID .
Note
that
a
discoverable
credential
capable
authenticator
MAY
support
both
storage
strategies.
In
this
case,
the
authenticator
MAY
at
its
discretion
use
different
storage
strategies
for
different
credentials
,
though
subject
to
the
residentKey
and
requireResidentKey
options
of
create()
.
6.2.3. Authentication Factor Capability
There are three broad classes of authentication factors that can be used to prove an identity during an authentication ceremony : something you have , something you know and something you are . Examples include a physical key, a password, and a fingerprint, respectively.
All
WebAuthn
Authenticators
[WAA]s
belong
to
the
something
you
have
class,
but
an
authenticator
that
supports
user
verification
can
also
act
as
one
or
two
additional
kinds
of
authentication
factor
.
For
example,
if
the
authenticator
can
verify
a
PIN,
the
PIN
is
something
you
know
,
and
a
biometric
authenticator
can
verify
something
you
are
.
Therefore,
an
authenticator
that
supports
user
verification
is
multi-factor
capable
.
Conversely,
an
authenticator
that
is
not
multi-factor
capable
is
single-factor
capable
.
Note
that
a
single
multi-factor
capable
authenticator
could
support
several
modes
of
user
verification
,
meaning
it
could
act
as
all
three
kinds
of
authentication
factor
.
Although
user
verification
is
performed
locally
on
the
authenticator
and
not
by
the
Relying
Party
[RP]
,
the
authenticator
indicates
if
user
verification
was
performed
by
setting
the
UV
flag
in
the
signed
response
returned
to
the
Relying
Party
[RP]
.
The
Relying
Party
[RP]
can
therefore
use
the
UV
flag
to
verify
that
additional
authentication
factors
were
used
in
a
registration
or
authentication
ceremony
.
The
authenticity
of
the
UV
flag
can
in
turn
be
assessed
by
inspecting
the
authenticator
's
’s
attestation
statement
.
6.3. Authenticator Operations
A
WebAuthn
Client
[WAC]
MUST
connect
to
an
authenticator
in
order
to
invoke
any
of
the
operations
of
that
authenticator.
This
connection
defines
an
authenticator
session
.
An
authenticator
must
maintain
isolation
between
sessions.
It
may
do
this
by
only
allowing
one
session
to
exist
at
any
particular
time,
or
by
providing
more
complicated
session
management.
The following operations can be invoked by the client in an authenticator session.
6.3.1. Lookup Credential Source by Credential ID Algorithm
The result of looking up a credential id credentialId in an authenticator authenticator is the result of the following algorithm:
-
If authenticator can decrypt credentialId into a public key credential source credSource :
-
Set credSource . id to credentialId .
-
Return credSource .
-
-
For each public key credential source credSource of authenticator ’s credentials map :
-
If credSource . id is credentialId , return credSource .
-
-
Return
null
.
6.3.2. The authenticatorMakeCredential Operation
It takes the following input parameters:
- hash
-
The hash of the serialized client data , provided by the client.
- rpEntity
-
The
Relying Party[RP]'s’sPublicKeyCredentialRpEntity
. - userEntity
-
The user account’s
PublicKeyCredentialUserEntity
, containing the user handle given by theRelying Party[RP] . - requireResidentKey
-
The effective resident key requirement for credential creation , a Boolean value determined by the client .
- requireUserPresence
-
The constant Boolean value
true
, or FALSE whenoptions .
is set tomediation
conditional
and the user agent previously collected consent from the user. - requireUserVerification
-
The effective user verification requirement for credential creation , a Boolean value determined by the client .
- credTypesAndPubKeyAlgs
-
A sequence of pairs of
PublicKeyCredentialType
and public key algorithms (COSEAlgorithmIdentifier
) requested by theRelying Party[RP] . This sequence is ordered from most preferred to least preferred. The authenticator makes a best-effort to create the most preferred credential that it can. - excludeCredentialDescriptorList
-
An OPTIONAL list of
PublicKeyCredentialDescriptor
objects provided by theRelying Party[RP] with the intention that, if any of these are known to the authenticator, it SHOULD NOT create a new credential. excludeCredentialDescriptorList contains a list of known credentials. - enterpriseAttestationPossible
-
A Boolean value that indicates that individually-identifying attestation MAY be returned by the authenticator.
- attestationFormats
-
A sequence of strings that expresses the
Relying Party[RP]'s’s preference for attestation statement formats, from most to least preferable. If the authenticator returns attestation , then it makes a best-effort attempt to use the most preferable format that it supports. - extensions
-
A CBOR map from extension identifiers to their authenticator extension inputs , created by the client based on the extensions requested by the
Relying Party[RP] , if any.
Note: Before performing this operation, all other operations in progress in the authenticator session MUST be aborted by running the authenticatorCancel operation.
When this operation is invoked, the authenticator MUST perform the following procedure:
-
Check if all the supplied parameters are syntactically well-formed and of the correct length. If not, return an error code equivalent to "
UnknownError
" and terminate the operation. -
Check if at least one of the specified combinations of
PublicKeyCredentialType
and cryptographic parameters in credTypesAndPubKeyAlgs is supported. If not, return an error code equivalent to "NotSupportedError
" and terminate the operation. -
For each descriptor of excludeCredentialDescriptorList :
-
If looking up
descriptor .
in this authenticator returns non-null, and the returned itemid
's’s RP ID and type matchrpEntity .
andid
excludeCredentialDescriptorList .
respectively, then collect an authorization gesture confirming user consent for creating a new credential. The authorization gesture MUST include a test of user presence . If the usertype
- confirms consent to create a new credential
-
return an error code equivalent to "
InvalidStateError
" and terminate the operation. - does not consent to create a new credential
-
return an error code equivalent to "
NotAllowedError
" and terminate the operation.
Note: The purpose of this authorization gesture is not to proceed with creating a credential, but for privacy reasons to authorize disclosure of the fact that
descriptor .
is bound to this authenticator . If the user consents, the client andid
Relying Party[RP] can detect this and guide the user to use a different authenticator . If the user does not consent, the authenticator does not reveal thatdescriptor .
is bound to it, and responds as if the user simply declined consent to create a credential.id
-
-
If requireResidentKey is
true
and the authenticator cannot store a client-side discoverable public key credential source , return an error code equivalent to "ConstraintError
" and terminate the operation. -
If requireUserVerification is
true
and the authenticator cannot perform user verification , return an error code equivalent to "ConstraintError
" and terminate the operation. -
Collect
an
authorization
gesture
confirming
user
consent
for
creating
a
new
credential.
The
prompt
for
the
authorization
gesture
is
shown
by
the
authenticator
if
it
has
its
own
output
capability,
or
by
the
user
agent
otherwise.
The
prompt
SHOULD
display
rpEntity .
,id
rpEntity .
,name
userEntity .
andname
userEntity .
, if possible.displayName
If requireUserVerification is
true
, the authorization gesture MUST include user verification .If requireUserPresence is
true
, the authorization gesture MUST include a test of user presence .If the user does not consent or if user verification fails, return an error code equivalent to "
NotAllowedError
" and terminate the operation. -
Once the authorization gesture has been completed and user consent has been obtained, generate a new credential object:
-
Let ( publicKey , privateKey ) be a new pair of cryptographic keys using the combination of
PublicKeyCredentialType
and cryptographic parameters represented by the first item in credTypesAndPubKeyAlgs that is supported by this authenticator. -
Let userHandle be
userEntity .
.id
-
Let credentialSource be a new public key credential source with the fields:
- type
- privateKey
-
privateKey
- rpId
-
rpEntity .
id
- userHandle
-
userHandle
- otherUI
-
Any other information the authenticator chooses to include.
-
If requireResidentKey is
true
or the authenticator chooses to create a client-side discoverable public key credential source :-
Let credentialId be a new credential id .
-
Set credentialSource . id to credentialId .
-
Let credentials be this authenticator’s credentials map .
-
Set credentials [(
rpEntity .
, userHandle )] to credentialSource .id
-
-
Otherwise:
-
Let credentialId be the result of serializing and encrypting credentialSource so that only this authenticator can decrypt it.
-
-
-
If any error occurred while creating the new credential object, return an error code equivalent to "
UnknownError
" and terminate the operation. -
Let processedExtensions be the result of authenticator extension processing for each supported extension identifier → authenticator extension input in extensions .
-
If the authenticator :
- is a U2F device
-
let the signature counter value for the new credential be zero. (U2F devices may support signature counters but do not return a counter when making a credential. See
[FIDO-U2F-Message-Formats] .)[[FIDO-U2F-Message-Formats]].) - supports a global signature counter
-
Use the global signature counter
's’s actual value when generating authenticator data . - supports a per credential signature counter
-
allocate the counter, associate it with the new credential, and initialize the counter value as zero.
- does not support a signature counter
-
let the signature counter value for the new credential be constant at zero.
-
Let attestedCredentialData be the attested credential data byte array including the credentialId and publicKey .
-
Let attestationFormat be the first supported attestation statement format identifier from attestationFormats , taking into account enterpriseAttestationPossible . If attestationFormats contains no supported value, then let attestationFormat be the attestation statement format identifier most preferred by this authenticator.
-
Let authenticatorData be the byte array specified in
§ 6.1 Authenticator Data ,[[#sctn-authenticator-data]], including attestedCredentialData as theattestedCredentialData
and processedExtensions , if any, as theextensions
. -
Create an attestation object for the new credential using the procedure specified in
§ 6.5.4 Generating an Attestation Object ,[[#sctn-generating-an-attestation-object]], the attestation statement format attestationFormat , and the values authenticatorData and hash , as well astaking into account
the value of enterpriseAttestationPossible . For more details on attestation, see§ 6.5 Attestation .[[#sctn-attestation]].
On successful completion of this operation, the authenticator returns the attestation object to the client.
6.3.3. The authenticatorGetAssertion Operation
It takes the following input parameters:
- rpId
-
The caller’s RP ID , as determined by the user agent and the client.
- hash
-
The hash of the serialized client data , provided by the client.
- allowCredentialDescriptorList
-
An OPTIONAL list of
PublicKeyCredentialDescriptor
s describing credentials acceptable to theRelying Party[RP] (possibly filtered by the client), if any. - requireUserPresence
-
The constant Boolean value
true
. It is included here as a pseudo-parameter to simplify applying this abstract authenticator model to implementations that may wish to make a test of user presence optional although WebAuthn does not. - requireUserVerification
-
The effective user verification requirement for assertion , a Boolean value provided by the client.
- extensions
-
A CBOR map from extension identifiers to their authenticator extension inputs , created by the client based on the extensions requested by the
Relying Party[RP] , if any.
Note: Before performing this operation, all other operations in progress in the authenticator session MUST be aborted by running the authenticatorCancel operation.
When this method is invoked, the authenticator MUST perform the following procedure:
-
Check if all the supplied parameters are syntactically well-formed and of the correct length. If not, return an error code equivalent to "
UnknownError
" and terminate the operation. -
Let credentialOptions be a new empty set of public key credential sources .
-
If allowCredentialDescriptorList was supplied, then for each descriptor of allowCredentialDescriptorList :
-
Let credSource be the result of looking up
descriptor .
in this authenticator.id
-
If credSource is not
null
, append it to credentialOptions .
-
-
Otherwise ( allowCredentialDescriptorList was not supplied), for each key → credSource of this authenticator’s credentials map , append credSource to credentialOptions .
-
Remove any items from credentialOptions whose rpId is not equal to rpId .
-
If credentialOptions is now empty, return an error code equivalent to "
NotAllowedError
" and terminate the operation. -
Prompt
the
user
to
select
a
public
key
credential
source
selectedCredential
from
credentialOptions
.
Collect
an
authorization
gesture
confirming
user
consent
for
using
selectedCredential
.
The
prompt
for
the
authorization
gesture
may
be
shown
by
the
authenticator
if
it
has
its
own
output
capability,
or
by
the
user
agent
otherwise.
If requireUserVerification is
true
, the authorization gesture MUST include user verification .If requireUserPresence is
true
, the authorization gesture MUST include a test of user presence .If the user does not consent , return an error code equivalent to "
NotAllowedError
" and terminate the operation. -
Let processedExtensions be the result of authenticator extension processing for each supported extension identifier → authenticator extension input in extensions .
-
Increment the credential associated signature counter or the global signature counter value, depending on which approach is implemented by the authenticator , by some positive value. If the authenticator does not implement a signature counter , let the signature counter value remain constant at zero.
-
Let authenticatorData be the byte array specified in
§ 6.1 Authenticator Data[[#sctn-authenticator-data]] including processedExtensions , if any, as theextensions
and excludingattestedCredentialData
. -
Let signature be the assertion signature of the concatenation
authenticatorData || hash
using the privateKey of selectedCredential as shown in Figure , below. A simple, undelimited concatenation is safe to use here because the authenticator data describes its own length. The hash of the serialized client data (which potentially has a variable length) is always the last element.Generating an assertion signature . -
If any error occurred while generating the assertion signature , return an error code equivalent to "
UnknownError
" and terminate the operation. -
Return
to
the
user
agent:
-
selectedCredential . id , if either a list of credentials (i.e., allowCredentialDescriptorList ) of length 2 or greater was supplied by the client, or no such list was supplied.
Note: If, within allowCredentialDescriptorList , the client supplied exactly one credential and it was successfully employed, then its credential ID is not returned since the client already knows it. This saves transmitting these bytes over what may be a constrained connection in what is likely a common case.
-
authenticatorData
-
signature
-
selectedCredential . userHandle
Note: In cases where allowCredentialDescriptorList was supplied the returned userHandle value may be
null
, see: userHandleResult .
-
If
the
authenticator
cannot
find
any
credential
corresponding
to
the
specified
Relying
Party
[RP]
that
matches
the
specified
criteria,
it
terminates
the
operation
and
returns
an
error.
6.3.4. The authenticatorCancel Operation
This operation takes no input parameters and returns no result.
When this operation is invoked by the client in an authenticator session , it has the effect of terminating any authenticatorMakeCredential or authenticatorGetAssertion operation currently in progress in that authenticator session. The authenticator stops prompting for, or accepting, any user input related to authorizing the canceled operation. The client ignores any further responses from the authenticator for the canceled operation.
This operation is ignored if it is invoked in an authenticator session which does not have an authenticatorMakeCredential or authenticatorGetAssertion operation currently in progress.
6.3.5. The silentCredentialDiscovery operation
This
is
an
OPTIONAL
operation
authenticators
MAY
support
to
enable
conditional
user
mediation
.
It takes the following input parameter:
- rpId
-
The caller’s RP ID , as determined by the client .
When this operation is invoked, the authenticator MUST perform the following procedure:
-
Let collectedDiscoverableCredentialMetadata be a new list whose items are DiscoverableCredentialMetadata structs with the following items :
- type
- id
-
A Credential ID .
- rpId
- userHandle
-
A user handle .
- otherUI
-
Other information used by the authenticator to inform its UI.
-
For each public key credential source credSource of authenticator ’s credentials map :
-
If credSource is not a client-side discoverable credential , continue .
-
Let discoveredCredentialMetadata be a new DiscoverableCredentialMetadata struct whose items are copies of credSource ’s type , id , rpId , userHandle and otherUI .
-
Append discoveredCredentialMetadata to collectedDiscoverableCredentialMetadata .
-
-
Return collectedDiscoverableCredentialMetadata .
6.4. String Handling
Authenticators
may
be
required
to
store
arbitrary
strings
chosen
by
a
Relying
Party
[RP]
,
for
example
the
name
and
displayName
in
a
PublicKeyCredentialUserEntity
.
This
section
discusses
some
practical
consequences
of
handling
arbitrary
strings
that
may
be
presented
to
humans.
6.4.1. String Truncation
Each arbitrary string in the API will have some accommodation for the potentially limited resources available to an authenticator . When the chosen accommodation is string truncation, care needs to be taken to not corrupt the string value.
For example, truncation based on Unicode code points alone may cause a grapheme cluster to be truncated. This could make the grapheme cluster render as a different glyph, potentially changing the meaning of the string, instead of removing the glyph entirely. For example, figure shows the end of a UTF-8 encoded string whose encoding is 65 bytes long. If truncating to 64 bytes then the final 0x88 byte is removed first to satisfy the size limit. Since that leaves a partial UTF-8 code point, the remainder of that code point must also be removed. Since that leaves a partial grapheme cluster , the remainder of that cluster should also be removed.
The responsibility for handling these concerns falls primarily on the client , to avoid burdening authenticators with understanding character encodings and Unicode character properties. The following subsections define requirements for how clients and authenticators, respectively, may perform string truncation.
6.4.1.1. String Truncation by Clients
When
a
WebAuthn
Client
[WAC]
truncates
a
string,
the
truncation
behaviour
observable
by
the
Relying
Party
[RP]
MUST
satisfy
the
following
requirements:
Choose
a
size
limit
equal
to
or
greater
than
the
specified
minimum
supported
length.
The
string
MAY
be
truncated
so
that
its
length
in
bytes
in
the
UTF-8
character
encoding
satisfies
that
limit.
This
truncation
MUST
respect
UTF-8
code
point
boundaries,
and
SHOULD
respect
grapheme
cluster
boundaries
[UAX29]
.
[[UAX29]].
The
resulting
truncated
value
MAY
be
shorter
than
the
chosen
size
limit
but
MUST
NOT
be
shorter
than
the
longest
prefix
substring
that
satisfies
the
size
limit
and
ends
on
a
grapheme
cluster
boundary.
The client MAY let the authenticator perform the truncation if it satisfies these requirements; otherwise the client MUST perform the truncation before relaying the string value to the authenticator.
In
addition
to
the
above,
truncating
on
byte
boundaries
alone
causes
a
known
issue
that
user
agents
should
be
aware
of:
if
the
authenticator
is
using
[FIDO-CTAP]
[[!FIDO-CTAP]]
then
future
messages
from
the
authenticator
may
contain
invalid
CBOR
since
the
value
is
typed
as
a
CBOR
string
and
thus
is
required
to
be
valid
UTF-8.
Thus,
when
dealing
with
authenticators
,
user
agents
SHOULD:
-
Ensure that any strings sent to authenticators are validly encoded.
-
Handle the case where strings have been truncated resulting in an invalid encoding. For example, any partial code point at the end may be dropped or replaced with U+FFFD .
6.4.1.2. String Truncation by Authenticators
Because
a
WebAuthn
Authenticator
[WAA]
may
be
implemented
in
a
constrained
environment,
the
requirements
on
authenticators
are
relaxed
compared
to
those
for
clients
.
When
a
WebAuthn
Authenticator
[WAA]
truncates
a
string,
the
truncation
behaviour
MUST
satisfy
the
following
requirements:
Choose
a
size
limit
equal
to
or
greater
than
the
specified
minimum
supported
length.
The
string
MAY
be
truncated
so
that
its
length
in
bytes
in
the
UTF-8
character
encoding
satisfies
that
limit.
This
truncation
SHOULD
respect
UTF-8
code
point
boundaries,
and
MAY
respect
grapheme
cluster
boundaries
[UAX29]
.
[[UAX29]].
The
resulting
truncated
value
MAY
be
shorter
than
the
chosen
size
limit
but
MUST
NOT
be
shorter
than
the
longest
prefix
substring
that
satisfies
the
size
limit
and
ends
on
a
grapheme
cluster
boundary.
6.4.2. Language and Direction Encoding
In order to be correctly displayed in context, the language and base direction of a string may be required . Strings in this API may have to be written to fixed-function authenticators and then later read back and displayed on a different platform. Thus language and direction metadata is encoded in the string itself to ensure that it is transported atomically.
To encode language and direction metadata in a string that is documented as permitting it, suffix its code points with two sequences of code points:
The first encodes a language tag with the code point U+E0001 followed by the ASCII values of the language tag each shifted up by U+E0000. For example, the language tag “en-US” becomes the code points U+E0001, U+E0065, U+E006E, U+E002D, U+E0055, U+E0053.
The second consists of a single code point which is either U+200E (“LEFT-TO-RIGHT MARK”), U+200F (“RIGHT-TO-LEFT MARK”), or U+E007F (“CANCEL TAG”). The first two can be used to indicate directionality but SHOULD only be used when neccessary to produce the correct result. (E.g. an RTL string that starts with LTR-strong characters.) The value U+E007F is a direction-agnostic indication of the end of the language tag .
So the string “حبیب الرحمان” could have two different DOMString values, depending on whether the language was encoded or not. (Since the direction is unambiguous a directionality marker is not needed in this example.)
-
Unadorned string: U+FEA2, U+FE92, U+FBFF, U+FE91, U+20, U+FE8E, U+FEDF, U+FEAE, U+FEA4, U+FEE3, U+FE8E, U+FEE7
-
With language “ar-SA” encoded: U+FEA2, U+FE92, U+FBFF, U+FE91, U+20, U+FE8E, U+FEDF, U+FEAE, U+FEA4, U+FEE3, U+FE8E, U+FEE7, U+E0001, U+E0061, U+E0072, U+E002D, U+E0053, U+E0041, U+E007F
Consumers of strings that may have language and direction encoded should be aware that truncation could truncate a language tag into a different, but still valid, language. The final directionality marker or CANCEL TAG code point provide an unambigous indication of truncation.
6.5. Attestation
Authenticators
SHOULD
also
provide
some
form
of
attestation
,
if
possible.
If
an
authenticator
does,
the
basic
requirement
is
that
the
authenticator
can
produce,
for
each
credential
public
key
,
an
attestation
statement
verifiable
by
the
WebAuthn
Relying
Party
[WRP]
.
Typically,
this
attestation
statement
contains
a
signature
by
an
attestation
private
key
over
the
attested
credential
public
key
and
a
challenge,
as
well
as
a
certificate
or
similar
data
providing
provenance
information
for
the
attestation
public
key
,
enabling
the
Relying
Party
[RP]
to
make
a
trust
decision.
However,
if
an
attestation
key
pair
is
not
available,
then
the
authenticator
MAY
either
perform
self
attestation
of
the
credential
public
key
with
the
corresponding
credential
private
key
,
or
otherwise
perform
no
attestation
.
All
this
information
is
returned
by
authenticators
any
time
a
new
public
key
credential
is
generated,
in
the
overall
form
of
an
attestation
object
.
The
relationship
of
the
attestation
object
with
authenticator
data
(containing
attested
credential
data
)
and
the
attestation
statement
is
illustrated
in
figure
,
below.
If
an
authenticator
employs
self
attestation
or
no
attestation
,
then
no
provenance
information
is
provided
for
the
Relying
Party
[RP]
to
base
a
trust
decision
on.
In
these
cases,
the
authenticator
provides
no
guarantees
about
its
operation
to
the
Relying
Party
[RP]
.
packed
attestation
statement
format
.
Several
additional
attestation
statement
formats
are
defined
in
An
important
component
of
the
attestation
object
is
the
attestation
statement
.
This
is
a
specific
type
of
signed
data
object,
containing
statements
about
a
public
key
credential
itself
and
the
authenticator
that
created
it.
It
contains
an
attestation
signature
created
using
the
key
of
the
attesting
authority
(except
for
the
case
of
self
attestation
,
when
it
is
created
using
the
credential
private
key
).
In
order
to
correctly
interpret
an
attestation
statement
,
a
Relying
Party
[RP]
needs
to
understand
these
two
aspects
of
attestation
:
-
The attestation statement format is the manner in which the signature is represented and the various contextual bindings are incorporated into the attestation statement by the authenticator . In other words, this defines the syntax of the statement. Various existing components and OS platforms (such as TPMs and the Android OS) have previously defined attestation statement formats . This specification supports a variety of such formats in an extensible way, as defined in
§ 6.5.2 Attestation Statement Formats .[[#sctn-attestation-formats]]. The formats themselves are identified by strings, as described in§ 8.1 Attestation Statement Format Identifiers .[[#sctn-attstn-fmt-ids]]. -
The attestation type defines the semantics of attestation statements and their underlying trust models. Specifically, it defines how a
Relying Party[RP] establishes trust in a particular attestation statement , after verifying that it is cryptographically valid. This specification supports a number of attestation types , as described in§ 6.5.3 Attestation Types .[[#sctn-attestation-types]].
In
general,
there
is
no
simple
mapping
between
attestation
statement
formats
and
attestation
types
.
For
example,
the
"packed"
attestation
statement
format
defined
in
§ 8.2
Packed
Attestation
Statement
Format
[[#sctn-packed-attestation]]
can
be
used
in
conjunction
with
all
attestation
types
,
while
other
formats
and
types
have
more
limited
applicability.
The privacy, security and operational characteristics of attestation depend on:
-
The attestation type , which determines the trust model,
-
The attestation statement format , which MAY constrain the strength of the attestation by limiting what can be expressed in an attestation statement , and
-
The characteristics of the individual authenticator , such as its construction, whether part or all of it runs in a secure operating environment, and so on.
The
attestation
type
and
attestation
statement
format
is
chosen
by
the
authenticator
;
Relying
Parties
[RPS]
can
only
signal
their
preferences
by
setting
the
attestation
and
attestationFormats
parameters.
It
is
expected
that
most
authenticators
will
support
a
small
number
of
attestation
types
and
attestation
statement
formats
,
while
Relying
Parties
[RPS]
will
decide
what
attestation
types
are
acceptable
to
them
by
policy.
Relying
Parties
[RPS]
will
also
need
to
understand
the
characteristics
of
the
authenticators
that
they
trust,
based
on
information
they
have
about
these
authenticators
.
For
example,
the
FIDO
Metadata
Service
[FIDOMetadataService]
[[FIDOMetadataService]]
provides
one
way
to
access
such
information.
6.5.1. Attested Credential Data
Attested credential data is a variable-length byte array added to the authenticator data when generating an attestation object for a credential. Its format is shown in Table .
Name | Length (in bytes) | Description |
---|---|---|
aaguid | 16 | The AAGUID of the authenticator. |
credentialIdLength | 2 | Byte length L of credentialId , 16-bit unsigned big-endian integer. Value MUST be ≤ 1023. |
credentialId | L | Credential ID |
credentialPublicKey | variable |
The
credential
public
key
encoded
in
COSE_Key
format,
as
defined
in
Section
7
of
COSEAlgorithmIdentifier
value.
The
encoded
credential
public
key
MUST
also
contain
any
additional
REQUIRED
parameters
stipulated
by
the
relevant
key
type
specification,
i.e.,
REQUIRED
for
the
key
type
"kty"
and
algorithm
"alg"
(see
Section
2
of
|
6.5.1.1.
Examples
of
credentialPublicKey
Values
Encoded
in
COSE_Key
Format
This
section
provides
examples
of
COSE_Key-encoded
Elliptic
Curve
and
RSA
public
keys
for
the
ES256,
PS256,
and
RS256
signature
algorithms.
These
examples
adhere
to
the
rules
defined
above
for
the
credentialPublicKey
value,
and
are
presented
in
CDDL
[RFC8610]
[[!RFC8610]]
for
clarity.
Section
7
of
[RFC9052]
[[!RFC9052]]
defines
the
general
framework
for
all
COSE_Key-encoded
keys.
Specific
key
types
for
specific
algorithms
are
defined
in
[RFC9053]
[[!RFC9053]]
as
well
as
in
other
specifications,
as
noted
below.
Below
is
an
example
of
a
COSE_Key-encoded
Elliptic
Curve
public
key
in
EC2
format
(see
Section
7.1
of
[RFC9053]
),
[[!RFC9053]]),
on
the
P-256
curve,
to
be
used
with
the
ES256
signature
algorithm
(ECDSA
w/
SHA-256,
see
Section
2.1
of
[RFC9053]
):
[[!RFC9053]]):
{ 1 : 2 , ; kt y: EC2 keyt ype3 : -7 , ; alg: ES256 signature algorit hm-1 : 1 , ; crv: P-256 curve-2 : x, ; x- coordinate as byte str in g32 bytes in len gt h ; e.g., in hex: 65e da5 a12577 c2 bae829437 fe 338701 a10 aaa375e1 bb5 b5 de108 de439 c08551 d-3 : y ; y- coordinate as byte str in g32 bytes in len gt h ; e.g., in hex: 1e52e d75701163 f 7 f 9e40 ddf 9 f 341 b3 dc9 ba860 af 7e0 ca7 ca7e9ee cd0084 d19 c}
Below
is
the
above
Elliptic
Curve
public
key
encoded
in
the
CTAP2
canonical
CBOR
encoding
form
,
whitespace
and
line
breaks
are
included
here
for
clarity
and
to
match
the
CDDL
[RFC8610]
[[!RFC8610]]
presentation
above:
A5 01 02 03 26 20 01 21 58 20 65e da5 a12577 c2 bae829437 fe 338701 a10 aaa375e1 bb5 b5 de108 de439 c08551 d22 58 20 1e52e d75701163 f 7 f 9e40 ddf 9 f 341 b3 dc9 ba860 af 7e0 ca7 ca7e9ee cd0084 d19 c
Below
is
an
example
of
a
COSE_Key-encoded
2048-bit
RSA
public
key
(see
[RFC8230]
[[RFC8230]]
Section
4
,
to
be
used
with
the
PS256
signature
algorithm
(RSASSA-PSS
with
SHA-256,
see
Section
2
of
[RFC8230]
:
[[RFC8230]]:
{ 1 : 3 , ; kt y: RSA keyt ype3 : -37 , ; alg: PS256 -1 : n , ;n : RSA modulusn byte str in g256 bytes in len gt h ; e.g., in hex (middle bytes elidedf or brevit y): DB5 F651550...6 DC6548 ACC3 -2 : e ; e: RSA public exponent e byte str in g3 bytes in len gt h ; e.g., in hex: 010001 }
Below is an example of the same COSE_Key-encoded RSA public key as above, to be used with the RS256 signature algorithm (RSASSA-PKCS1-v1_5 with SHA-256):
{ 1 : 3 , ; kt y: RSA keyt ype3 : -257 , ; alg: RS256 -1 : n , ;n : RSA modulusn byte str in g256 bytes in len gt h ; e.g., in hex (middle bytes elidedf or brevit y): DB5 F651550...6 DC6548 ACC3 -2 : e ; e: RSA public exponent e byte str in g3 bytes in len gt h ; e.g., in hex: 010001 }
6.5.2. Attestation Statement Formats
As described above, an attestation statement format is a data format which represents a cryptographic signature by an authenticator over a set of contextual bindings. Each attestation statement format MUST be defined using the following template:
-
Supported attestation types :
-
Syntax: The syntax of an attestation statement produced in this format, defined using CDDL
[RFC8610][[!RFC8610]] for the extension point$attStmtFormat
defined in§ 6.5.4 Generating an Attestation Object .[[#sctn-generating-an-attestation-object]]. -
Signing procedure : The signing procedure for computing an attestation statement in this format given the public key credential to be attested, the authenticator data structure containing the authenticator data for the attestation , and the hash of the serialized client data .
-
Verification procedure : The procedure for verifying an attestation statement , which takes the following verification procedure inputs :
-
attStmt : The attestation statement structure
-
authenticatorData : The authenticator data claimed to have been used for the attestation
-
clientDataHash : The hash of the serialized client data
The procedure returns either:
-
An error indicating that the attestation is invalid, or
-
An implementation-specific value representing the attestation type , and the trust path . This attestation trust path is either empty (in case of self attestation ), or a set of X.509 certificates.
-
The
initial
list
of
specified
attestation
statement
formats
is
in
§ 8
Defined
Attestation
Statement
Formats
.
[[#sctn-defined-attestation-formats]].
6.5.3. Attestation Types
WebAuthn supports several attestation types , defining the semantics of attestation statements and their underlying trust models:
Note:
This
specification
does
not
define
any
data
structures
explicitly
expressing
the
attestation
types
employed
by
authenticators
.
Relying
Parties
[RPS]
engaging
in
attestation
statement
verification
—
i.e.,
when
calling
navigator.credentials.create()
they
select
an
attestation
conveyance
other
than
none
and
verify
the
received
attestation
statement
—
will
determine
the
employed
attestation
type
as
a
part
of
verification
.
See
the
"Verification
procedure"
subsections
of
§ 8
Defined
Attestation
Statement
Formats
.
[[#sctn-defined-attestation-formats]].
See
also
§ 14.4.1
Attestation
Privacy
.
[[#sctn-attestation-privacy]].
For
all
attestation
types
defined
in
this
section
other
than
Self
and
None
,
Relying
Party
[RP]
verification
is
followed
by
matching
the
trust
path
to
an
acceptable
root
certificate
per
step
24
of
§ 7.1
Registering
a
New
Credential
.
[[#sctn-registering-a-new-credential]].
Differentiating
these
attestation
types
becomes
useful
primarily
as
a
means
for
determining
if
the
attestation
is
acceptable
under
Relying
Party
[RP]
policy.
- Basic Attestation ( Basic )
-
In the case of basic attestation
[UAFProtocol] ,[[UAFProtocol]], the authenticator’s attestation key pair is specific to an authenticator "model", i.e., a "batch" of authenticators. Thus, authenticators of the same, or similar, model often share the same attestation key pair . See§ 14.4.1 Attestation Privacy[[#sctn-attestation-privacy]] for further information.Basic attestation is also referred to as batch attestation .
- Self Attestation ( Self )
-
In the case of self attestation , also known as surrogate basic attestation
[UAFProtocol] ,[[UAFProtocol]], the Authenticator does not have any specific attestation key pair . Instead it uses the credential private key to create the attestation signature . Authenticators without meaningful protection measures for an attestation private key typically use this attestation type. - Attestation CA ( AttCA )
-
In this case, an authenticator is based on a Trusted Platform Module (TPM) and holds an authenticator-specific "endorsement key" (EK). This key is used to securely communicate with a trusted third party, the Attestation CA
[TCG-CMCProfile-AIKCertEnroll][[!TCG-CMCProfile-AIKCertEnroll]] (formerly known as a "Privacy CA"). The authenticator can generate multiple attestation identity key pairs (AIK) and requests an Attestation CA to issue an AIK certificate for each. Using this approach, such an authenticator can limit the exposure of the EK (which is a global correlation handle) to Attestation CA(s). AIKs can be requested for each authenticator -generated public key credential individually, and conveyed toRelying Parties[RPS] as attestation certificates .Note: This concept typically leads to multiple attestation certificates. The attestation certificate requested most recently is called "active".
- Anonymization CA ( AnonCA )
-
In this case, the authenticator uses an Anonymization CA which dynamically generates per- credential attestation certificates such that the attestation statements presented to
Relying Parties[RPS] do not provide uniquely identifiable information, e.g., that might be used for tracking purposes.Note: Attestation statements conveying attestations of type AttCA or AnonCA use the same data structure as those of type Basic , so the three attestation types are, in general, distinguishable only with externally provided knowledge regarding the contents of the attestation certificates conveyed in the attestation statement .
- No attestation statement ( None )
-
In this case, no attestation information is available. See also
§ 8.7 None Attestation Statement Format .[[#sctn-none-attestation]].
6.5.4. Generating an Attestation Object
To generate an attestation object (see: Figure 6 ) given:
- attestationFormat
- authData
-
A byte array containing authenticator data .
- hash
the authenticator MUST:
-
Let attStmt be the result of running attestationFormat ’s signing procedure given authData and hash .
-
Let fmt be attestationFormat ’s attestation statement format identifier
-
Return the attestation object as a CBOR map with the following syntax, filled in with variables initialized by this algorithm:
attObj = { authData: bytes, $$attStmtType } attStmtTemplate = ( fmt: text, attStmt: { * tstr => any } ; Map is filled in by each concrete attStmtType ) ; Every attestation statement format must have the above fields attStmtTemplate .within $$attStmtType
6.5.5. Signature Formats for Packed Attestation, FIDO U2F Attestation, and Assertion Signatures
-
For COSEAlgorithmIdentifier -7 (ES256), and other ECDSA-based algorithms, the
sig
value MUST be encoded as an ASN.1 DER Ecdsa-Sig-Value, as defined in[RFC3279][[RFC3279]] section 2.2.3.Example: 30 44 ; SEQUENCE (68 Bytes) 02 20 ; INTEGER (32 Bytes) | 3d 46 28 7b 8c 6e 8c 8c 26 1c 1b 88 f2 73 b0 9a | 32 a6 cf 28 09 fd 6e 30 d5 a7 9f 26 37 00 8f 54 02 20 ; INTEGER (32 Bytes) | 4e 72 23 6e a3 90 a9 a1 7b cf 5f 7a 09 d6 3a b2 | 17 6c 92 bb 8e 36 c0 41 98 a2 7b 90 9b 6e 8f 13
Note: As CTAP1/U2F authenticators are already producing signatures values in this format, CTAP2 authenticators will also produce signatures values in the same format, for consistency reasons.
It
is
RECOMMENDED
that
any
new
attestation
formats
defined
not
use
ASN.1
encodings,
but
instead
represent
signatures
as
equivalent
fixed-length
byte
arrays
without
internal
structure,
using
the
same
representations
as
used
by
COSE
signatures
as
defined
in
[RFC9053]
[[!RFC9053]]
and
[RFC8230]
.
[[!RFC8230]].
The below signature format definitions satisfy this requirement and serve as examples for deriving the same for other signature algorithms not explicitly mentioned here:
-
For COSEAlgorithmIdentifier -257 (RS256),
sig
MUST contain the signature generated using the RSASSA-PKCS1-v1_5 signature scheme defined in Section 8.2.1 of[RFC8017][[RFC8017]] with SHA-256 as the hash function. The signature is not ASN.1 wrapped. -
For COSEAlgorithmIdentifier -37 (PS256),
sig
MUST contain the signature generated using the RSASSA-PSS signature scheme defined in Section 8.1.1 of[RFC8017][[RFC8017]] with SHA-256 as the hash function. The signature is not ASN.1 wrapped.
7.
WebAuthn
Relying
Party
[WRP]
Operations
A
registration
or
authentication
ceremony
begins
with
the
WebAuthn
Relying
Party
[WRP]
creating
a
PublicKeyCredentialCreationOptions
or
PublicKeyCredentialRequestOptions
object,
respectively,
which
encodes
the
parameters
for
the
ceremony
.
The
Relying
Party
[RP]
SHOULD
take
care
to
not
leak
sensitive
information
during
this
stage;
see
§ 14.6.2
Username
Enumeration
[[#sctn-username-enumeration]]
for
details.
Upon
successful
execution
of
create()
or
get()
,
the
Relying
Party
[RP]
's
’s
script
receives
a
PublicKeyCredential
containing
an
AuthenticatorAttestationResponse
or
AuthenticatorAssertionResponse
structure,
respectively,
from
the
client.
It
must
then
deliver
the
contents
of
this
structure
to
the
Relying
Party
[RP]
server,
using
methods
outside
the
scope
of
this
specification.
This
section
describes
the
operations
that
the
Relying
Party
[RP]
must
perform
upon
receipt
of
these
structures.
7.1. Registering a New Credential
In
order
to
perform
a
registration
ceremony
,
the
Relying
Party
[RP]
MUST
proceed
as
follows:
-
Let options be a new
PublicKeyCredentialCreationOptions
structure configured to theRelying Party[RP]'s’s needs for the ceremony. -
Call
navigator.credentials.create()
and pass options as thepublicKey
InvalidStateError
", the user might be instructed to use a different authenticator . For information on different error contexts and the circumstances leading to them, see§ 6.3.2 The authenticatorMakeCredential Operation .[[#sctn-op-make-cred]]. -
Let response be
credential .
. If response is not an instance ofresponse
AuthenticatorAttestationResponse
, abort the ceremony with a user-visible error. -
Let clientExtensionResults be the result of calling
credential .
.getClientExtensionResults()
-
Let JSONtext be the result of running UTF-8 decode on the value of
response .
.clientDataJSON
Note: Using any implementation of UTF-8 decode is acceptable as long as it yields the same result as that yielded by the UTF-8 decode algorithm. In particular, any leading byte order mark (BOM) MUST be stripped.
-
Let C , the client data claimed as collected during the credential creation, be the result of running an implementation-specific JSON parser on JSONtext .
Note: C may be any implementation-specific data structure representation, as long as C ’s components are referenceable, as required by this algorithm.
-
Verify that the value of
C .
istype
webauthn.create
. -
Verify that the value of
C .
equals the base64url encoding ofchallenge
options .
.challenge
-
Verify
that
the
value
of
C .
is an origin expected by theorigin
Relying Party[RP] . See§ 13.4.9 Validating the origin of a credential[[#sctn-validating-origin]] for guidance. -
If
C .
is present:topOrigin
-
Verify that the
Relying Party[RP] expects that this credential would have been created within an iframe that is not same-origin with its ancestors . -
Verify that the value of
C .
matches the origin of a page that thetopOrigin
Relying Party[RP] expects to be sub-framed within. See§ 13.4.9 Validating the origin of a credential[[#sctn-validating-origin]] for guidance.
-
-
Let hash be the result of computing a hash over
response .
using SHA-256.clientDataJSON
-
Perform CBOR decoding on the
attestationObject
field of theAuthenticatorAttestationResponse
structure to obtain the attestation statement format fmt , the authenticator data authData , and the attestation statement attStmt . -
Verify that the
rpIdHash
in authData is the SHA-256 hash of the RP ID expected by theRelying Party[RP] . -
Verify that the UP bit of the
flags
in authData is set, unlessoptions .
is set tomediation
conditional
. -
If the
Relying Party[RP] requires user verification for this registration, verify that the UV bit of theflags
in authData is set. -
If the BE bit of the
flags
in authData is not set, verify that the BS bit is not set. -
If the
Relying Party[RP] uses the credential’s backup eligibility to inform its user experience flows and/or policies, evaluate the BE bit of theflags
in authData . -
If the
Relying Party[RP] uses the credential’s backup state to inform its user experience flows and/or policies, evaluate the BS bit of theflags
in authData . -
Verify that the "alg" parameter in the credential public key in authData matches the
alg
attribute of one of the items inoptions .
.pubKeyCredParams
-
Verify
that
the
values
of
the
client
extension
outputs
in
clientExtensionResults
and
the
authenticator
extension
outputs
in
the
extensions
in authData are as expected, considering the client extension input values that were given inoptions .
and any specific policy of theextensions
Relying Party[RP] regarding unsolicited extensions, i.e., those that were not specified as part ofoptions .
. In the general case, the meaning of "are as expected" is specific to theextensions
Relying Party[RP] and which extensions are in use.Note: Client platforms MAY enact local policy that sets additional authenticator extensions or client extensions and thus cause values to appear in the authenticator extension outputs or client extension outputs that were not originally specified as part of
options .
.extensions
Relying Parties[RPS] MUST be prepared to handle such situations, whether it be to ignore the unsolicited extensions or reject the attestation. TheRelying Party[RP] can make this decision based on local policy and the extensions in use.Note: Since all extensions are OPTIONAL for both the client and the authenticator , the
Relying Party[RP] MUST also be prepared to handle cases where none or not all of the requested extensions were acted upon.Note: The supplementalPubKeys extension has explicit verification procedures, see
§ 10.2.2.3.1 Registration (create()) .[[#sctn-supplemental-public-keys-extension-verification-create]]. -
Determine the attestation statement format by performing a USASCII case-sensitive match on fmt against the set of supported WebAuthn Attestation Statement Format Identifier values. An up-to-date list of registered WebAuthn Attestation Statement Format Identifier values is maintained in the IANA "WebAuthn Attestation Statement Format Identifiers" registry
[IANA-WebAuthn-Registries][[!IANA-WebAuthn-Registries]] established by[RFC8809] .[[!RFC8809]]. -
Verify
that
attStmt
is
a
correct
attestation
statement
,
conveying
a
valid
attestation
signature
,
by
using
the
attestation
statement
format
fmt
’s
verification
procedure
given
attStmt
,
authData
and
hash
.
Note: Each attestation statement format specifies its own verification procedure . See
§ 8 Defined Attestation Statement Formats[[#sctn-defined-attestation-formats]] for the initially-defined formats, and[IANA-WebAuthn-Registries][[!IANA-WebAuthn-Registries]] for the up-to-date list. -
If
validation
is
successful,
obtain
a
list
of
acceptable
trust
anchors
(i.e.
attestation
root
certificates)
for
that
attestation
type
and
attestation
statement
format
fmt
,
from
a
trusted
source
or
from
policy.
For
example,
the
FIDO
Metadata
Service
[FIDOMetadataService][[FIDOMetadataService]] provides one way to obtain such information, using theaaguid
in theattestedCredentialData
in authData . -
Assess
the
attestation
trustworthiness
using
the
outputs
of
the
verification
procedure
in
step
22
,
as
follows:
-
If no attestation was provided, verify that None attestation is acceptable under
Relying Party[RP] policy. -
If self attestation was used, verify that self attestation is acceptable under
Relying Party[RP] policy. -
Otherwise, use the X.509 certificates returned as the attestation trust path from the verification procedure to verify that the attestation public key either correctly chains up to an acceptable root certificate, or is itself an acceptable certificate (i.e., it and the root certificate obtained in step 23 may be the same).
-
-
Verify that the
credentialId
is ≤ 1023 bytes. Credential IDs larger than this many bytes SHOULD cause the RP to fail this registration ceremony . -
Verify that the
credentialId
is not yet registered for any user. If thecredentialId
is already known then theRelying Party[RP] SHOULD fail this registration ceremony .NOTE: The rationale for
Relying Parties[RPS] rejecting duplicate credential IDs is as follows: credential IDs contain sufficient entropy that accidental duplication is very unlikely. However, attestation types other than self attestation do not include a self-signature to explicitly prove possession of the credential private key at registration time. Thus an attacker who has managed to obtain a user’s credential ID and credential public key for a site (this could be potentially accomplished in various ways), could attempt to register a victim’s credential as their own at that site. If theRelying Party[RP] accepts this new registration and replaces the victim’s existing credential registration, and the credentials are discoverable , then the victim could be forced to sign into the attacker’s account at their next attempt. Data saved to the site by the victim in that state would then be available to the attacker. -
If
the
attestation
statement
attStmt
verified
successfully
and
is
found
to
be
trustworthy,
then
create
and
store
a
new
credential
record
in
the
user
account
that
was
denoted
in
options .
, with the following contents:user
- type
-
credential .
.type
- id
-
credential .
orid
credential .
, whichever format is preferred by therawId
Relying Party[RP] . - publicKey
-
The credential public key in authData .
- signCount
-
authData . signCount
. - uvInitialized
- transports
-
The value returned from
response .
.getTransports()
- backupEligible
- backupState
The new credential record MAY also include the following OPTIONAL contents:
- attestationObject
-
response .
.attestationObject
- attestationClientDataJSON
-
response .
.clientDataJSON
-
If the attestation statement attStmt successfully verified but is not trustworthy per step 24 above, the
Relying Party[RP] SHOULD fail the registration ceremony .NOTE: However, if permitted by policy, the
Relying Party[RP] MAY register the credential ID and credential public key but treat the credential as one with self attestation (see§ 6.5.3 Attestation Types ).[[#sctn-attestation-types]]). If doing so, theRelying Party[RP] is asserting there is no cryptographic proof that the public key credential has been generated by a particular authenticator model. See[FIDOSecRef][[FIDOSecRef]] and[UAFProtocol][[UAFProtocol]] for a more detailed discussion.
Verification
of
attestation
objects
requires
that
the
Relying
Party
[RP]
has
a
trusted
method
of
determining
acceptable
trust
anchors
in
step
23
above.
Also,
if
certificates
are
being
used,
the
Relying
Party
[RP]
MUST
have
access
to
certificate
status
information
for
the
intermediate
CA
certificates.
The
Relying
Party
[RP]
MUST
also
be
able
to
build
the
attestation
certificate
chain
if
the
client
did
not
provide
this
chain
in
the
attestation
information.
7.2. Verifying an Authentication Assertion
In
order
to
perform
an
authentication
ceremony
,
the
Relying
Party
[RP]
MUST
proceed
as
follows:
-
Let options be a new
PublicKeyCredentialRequestOptions
structure configured to theRelying Party[RP]'s’s needs for the ceremony. -
Call
navigator.credentials.get()
and pass options as thepublicKey
§ 6.3.3 The authenticatorGetAssertion Operation .[[#sctn-op-get-assertion]]. -
Let response be
credential .
. If response is not an instance ofresponse
AuthenticatorAssertionResponse
, abort the ceremony with a user-visible error. -
Let clientExtensionResults be the result of calling
credential .
.getClientExtensionResults()
-
If
options .
is not empty , verify thatallowCredentials
credential .
identifies one of the public key credentials listed inid
options .
.allowCredentials
-
Identify the user being authenticated and let credentialRecord be the credential record for the credential :
- If the user was identified before the authentication ceremony was initiated, e.g., via a username or cookie,
-
verify that the identified user account contains a credential record whose id equals
credential .
. Let credentialRecord be that credential record . IfrawId
response .
is present, verify that it equals the user handle of the user account .userHandle
- If the user was not identified before the authentication ceremony was initiated,
-
verify that
response .
is present. Verify that the user account identified byuserHandle
response .
contains a credential record whose id equalsuserHandle
credential .
. Let credentialRecord be that credential record .rawId
-
Let cData , authData and sig denote the value of response ’s
clientDataJSON
,authenticatorData
, andsignature
respectively. -
Let JSONtext be the result of running UTF-8 decode on the value of cData .
Note: Using any implementation of UTF-8 decode is acceptable as long as it yields the same result as that yielded by the UTF-8 decode algorithm. In particular, any leading byte order mark (BOM) MUST be stripped.
-
Let C , the client data claimed as used for the signature, be the result of running an implementation-specific JSON parser on JSONtext .
Note: C may be any implementation-specific data structure representation, as long as C ’s components are referenceable, as required by this algorithm.
-
Verify that the value of
C .
is the stringtype
webauthn.get
. -
Verify that the value of
C .
equals the base64url encoding ofchallenge
options .
.challenge
-
Verify
that
the
value
of
C .
is an origin expected by theorigin
Relying Party[RP] . See§ 13.4.9 Validating the origin of a credential[[#sctn-validating-origin]] for guidance. -
If
C .
is present:topOrigin
-
Verify that the
Relying Party[RP] expects this credential to be used within an iframe that is not same-origin with its ancestors . -
Verify that the value of
C .
matches the origin of a page that thetopOrigin
Relying Party[RP] expects to be sub-framed within. See§ 13.4.9 Validating the origin of a credential[[#sctn-validating-origin]] for guidance.
-
-
Verify
that
the
rpIdHash
in authData is the SHA-256 hash of the RP ID expected by theRelying Party[RP] .Note: If using the appid extension, this step needs some special logic. See
§ 10.1.1 FIDO AppID Extension (appid)[[#sctn-appid-extension]] for details. -
Determine whether user verification is required for this assertion. User verification SHOULD be required if, and only if,
options .
is set touserVerification
required
.If user verification was determined to be required, verify that the UV bit of the
flags
in authData is set. Otherwise, ignore the value of the UV flag . -
If the BE bit of the
flags
in authData is not set, verify that the BS bit is not set. -
If the credential backup state is used as part of
Relying Party[RP] business logic or policy, let currentBe and currentBs be the values of the BE and BS bits, respectively, of theflags
in authData . Compare currentBe and currentBs withcredentialRecord . backupEligible
andcredentialRecord . backupState
:-
If
credentialRecord . backupEligible
is set, verify that currentBe is set. -
If
credentialRecord . backupEligible
is not set, verify that currentBe is not set. -
Apply
Relying Party[RP] policy, if any.
Note: See
§ 6.1.3 Credential Backup State[[#sctn-credential-backup]] for examples of how aRelying Party[RP] might process the BS flag values. -
-
Verify
that
the
values
of
the
client
extension
outputs
in
clientExtensionResults
and
the
authenticator
extension
outputs
in
the
extensions
in authData are as expected, considering the client extension input values that were given inoptions .
and any specific policy of theextensions
Relying Party[RP] regarding unsolicited extensions, i.e., those that were not specified as part ofoptions .
. In the general case, the meaning of "are as expected" is specific to theextensions
Relying Party[RP] and which extensions are in use.Note: Client platforms MAY enact local policy that sets additional authenticator extensions or client extensions and thus cause values to appear in the authenticator extension outputs or client extension outputs that were not originally specified as part of
options .
.extensions
Relying Parties[RPS] MUST be prepared to handle such situations, whether it be to ignore the unsolicited extensions or reject the assertion. TheRelying Party[RP] can make this decision based on local policy and the extensions in use.Note: Since all extensions are OPTIONAL for both the client and the authenticator , the
Relying Party[RP] MUST also be prepared to handle cases where none or not all of the requested extensions were acted upon.Note: The supplementalPubKeys extension has explicit verification procedures, see
§ 10.2.2.3.2 Authentication (get()) .[[#sctn-supplemental-public-keys-extension-verification-get]]. -
Let hash be the result of computing a hash over the cData using SHA-256.
-
Using
credentialRecord . publicKey
, verify that sig is a valid signature over the binary concatenation of authData and hash .Note: This verification step is compatible with signatures generated by FIDO U2F authenticators. See
§ 6.1.2 FIDO U2F Signature Format Compatibility .[[#sctn-fido-u2f-sig-format-compat]]. -
If authData .
signCount
is nonzero orcredentialRecord . signCount
is nonzero, then run the following sub-step:-
If authData .
signCount
is-
greater
than
credentialRecord . signCount
: - The signature counter is valid.
-
less
than
or
equal
to
credentialRecord . signCount
: -
This
is
a
signal
that
the
authenticator
may
be
cloned,
i.e.
at
least
two
copies
of
the
credential
private
key
may
exist
and
are
being
used
in
parallel.
Relying Parties[RPS] should incorporate this information into their risk scoring. Whether theRelying Party[RP] updatescredentialRecord . signCount
below in this case, or not, or fails the authentication ceremony or not, isRelying Party[RP] -specific.
-
greater
than
-
-
Update
credentialRecord
with
new
state
values:
-
Update
credentialRecord . signCount
to the value of authData .signCount
. -
Update
credentialRecord . backupState
to the value of currentBs . -
If
credentialRecord . uvInitialized
isfalse
, update it to the value of the UV bit in the flags in authData . This change SHOULD require authorization by an additional authentication factor equivalent to WebAuthn user verification ; if not authorized, skip this step.
If the
Relying Party[RP] performs additional security checks beyond these WebAuthn authentication ceremony steps, the above state updates SHOULD be deferred to after those additional checks are completed successfully. -
-
If all the above steps are successful, continue with the authentication ceremony as appropriate. Otherwise, fail the authentication ceremony .
8. Defined Attestation Statement Formats
WebAuthn supports pluggable attestation statement formats. This section defines an initial set of such formats.
8.1. Attestation Statement Format Identifiers
Attestation statement formats are identified by a string, called an attestation statement format identifier , chosen by the author of the attestation statement format .
Attestation
statement
format
identifiers
SHOULD
be
registered
in
the
IANA
"WebAuthn
Attestation
Statement
Format
Identifiers"
registry
[IANA-WebAuthn-Registries]
[[!IANA-WebAuthn-Registries]]
established
by
[RFC8809]
.
[[!RFC8809]].
All
registered
attestation
statement
format
identifiers
are
unique
amongst
themselves
as
a
matter
of
course.
Unregistered
attestation
statement
format
identifiers
SHOULD
use
lowercase
reverse
domain-name
naming,
using
a
domain
name
registered
by
the
developer,
in
order
to
assure
uniqueness
of
the
identifier.
All
attestation
statement
format
identifiers
MUST
be
a
maximum
of
32
octets
in
length
and
MUST
consist
only
of
printable
USASCII
characters,
excluding
backslash
and
doublequote,
i.e.,
VCHAR
as
defined
in
[RFC5234]
[[!RFC5234]]
but
without
%x22
and
%x5c.
Note:
This
means
attestation
statement
format
identifiers
based
on
domain
names
MUST
incorporate
only
LDH
Labels
[RFC5890]
.
[[!RFC5890]].
Implementations MUST match WebAuthn attestation statement format identifiers in a case-sensitive fashion.
Attestation
statement
formats
that
may
exist
in
multiple
versions
SHOULD
include
a
version
in
their
identifier.
In
effect,
different
versions
are
thus
treated
as
different
formats,
e.g.,
packed2
as
a
new
version
of
the
§ 8.2
Packed
Attestation
Statement
Format
.
[[#sctn-packed-attestation]].
The
following
sections
present
a
set
of
currently-defined
and
registered
attestation
statement
formats
and
their
identifiers.
The
up-to-date
list
of
registered
attestation
statement
format
identifiers
is
maintained
in
the
IANA
"WebAuthn
Attestation
Statement
Format
Identifiers"
registry
[IANA-WebAuthn-Registries]
[[!IANA-WebAuthn-Registries]]
established
by
[RFC8809]
.
[[!RFC8809]].
8.2. Packed Attestation Statement Format
This is a WebAuthn optimized attestation statement format. It uses a very compact but still extensible encoding method. It is implementable by authenticators with limited resources (e.g., secure elements).
- Attestation statement format identifier
-
packed
- Attestation types supported
- Syntax
-
The syntax of a Packed Attestation statement is defined by the following CDDL:
$$attStmtType //= ( fmt: "packed", attStmt: packedStmtFormat ) packedStmtFormat = { alg: COSEAlgorithmIdentifier, sig: bytes, x5c: [ attestnCert: bytes, * (caCert: bytes) ] } // { alg: COSEAlgorithmIdentifier sig: bytes, }
The semantics of the fields are as follows:
- alg
-
A
COSEAlgorithmIdentifier
containing the identifier of the algorithm used to generate the attestation signature . - sig
-
A byte string containing the attestation signature .
- x5c
-
The elements of this array contain attestnCert and its certificate chain (if any), each encoded in X.509 format. The attestation certificate attestnCert MUST be the first element in the array.
- attestnCert
-
The attestation certificate, encoded in X.509 format.
- Signing procedure
-
The signing procedure for this attestation statement format is similar to the procedure for generating assertion signatures .
-
Let authenticatorData denote the authenticator data for the attestation , and let clientDataHash denote the hash of the serialized client data .
-
If Basic or AttCA attestation is in use, the authenticator produces the sig by concatenating authenticatorData and clientDataHash , and signing the result using an attestation private key selected through an authenticator-specific mechanism. It sets x5c to attestnCert followed by the related certificate chain (if any). It sets alg to the algorithm of the attestation private key.
-
If self attestation is in use, the authenticator produces sig by concatenating authenticatorData and clientDataHash , and signing the result using the credential private key. It sets alg to the algorithm of the credential private key and omits the other fields.
-
- Verification procedure
-
Given the verification procedure inputs attStmt , authenticatorData and clientDataHash , the verification procedure is as follows:
-
Verify that attStmt is valid CBOR conforming to the syntax defined above and perform CBOR decoding on it to extract the contained fields.
-
If x5c is present:
-
Verify that sig is a valid signature over the concatenation of authenticatorData and clientDataHash using the attestation public key in attestnCert with the algorithm specified in alg .
-
Verify that attestnCert meets the requirements in
§ 8.2.1 Packed Attestation Statement Certificate Requirements .[[#sctn-packed-attestation-cert-requirements]]. -
If attestnCert contains an extension with OID
1.3.6.1.4.1.45724.1.1.4
(id-fido-gen-ce-aaguid
) verify that the value of this extension matches theaaguid
in authenticatorData . -
Optionally, inspect x5c and consult externally provided knowledge to determine whether attStmt conveys a Basic or AttCA attestation.
-
If successful, return implementation-specific values representing attestation type Basic , AttCA or uncertainty, and attestation trust path x5c .
-
-
If x5c is not present, self attestation is in use.
-
Validate that alg matches the algorithm of the
credentialPublicKey
in authenticatorData . -
Verify that sig is a valid signature over the concatenation of authenticatorData and clientDataHash using the credential public key with alg .
-
If successful, return implementation-specific values representing attestation type Self and an empty attestation trust path .
-
-
8.2.1. Packed Attestation Statement Certificate Requirements
The attestation certificate MUST have the following fields/extensions:
-
Version MUST be set to 3 (which is indicated by an ASN.1 INTEGER with value 2).
-
Subject field MUST be set to:
- Subject-C
-
ISO 3166 code specifying the country where the Authenticator vendor is incorporated (PrintableString)
- Subject-O
-
Legal name of the Authenticator vendor (UTF8String)
- Subject-OU
-
Literal string “Authenticator Attestation” (UTF8String)
- Subject-CN
-
A UTF8String of the vendor’s choosing
-
If the related attestation root certificate is used for multiple authenticator models, the Extension OID
1.3.6.1.4.1.45724.1.1.4
(id-fido-gen-ce-aaguid
) MUST be present, containing the AAGUID as a 16-byte OCTET STRING. The extension MUST NOT be marked as critical.As
Relying Parties[RPS] may not know if the attestation root certificate is used for multiple authenticator models, it is suggested thatRelying Parties[RPS] check if the extension is present, and if it is, then validate that it contains that same AAGUID as presented in the attestation object .Note that an X.509 Extension encodes the DER-encoding of the value in an OCTET STRING. Thus, the AAGUID MUST be wrapped in two OCTET STRINGS to be valid.
-
The Basic Constraints extension MUST have the CA component set to
false
.
Additionally,
an
Authority
Information
Access
(AIA)
extension
with
entry
id-ad-ocsp
and
a
CRL
Distribution
Point
extension
[RFC5280]
[[RFC5280]]
are
both
OPTIONAL
as
the
status
of
many
attestation
certificates
is
available
through
authenticator
metadata
services.
See,
for
example,
the
FIDO
Metadata
Service
[FIDOMetadataService]
.
[[FIDOMetadataService]].
The
firmware
of
a
particular
authenticator
model
MAY
be
differentiated
using
the
Extension
OID
1.3.6.1.4.1.45724.1.1.5
(
id-fido-gen-ce-fw-version
).
When
present,
this
attribute
contains
an
INTEGER
with
a
non-negative
value
which
is
incremented
for
new
firmware
release
versions.
The
extension
MUST
NOT
be
marked
as
critical.
For example, the following is an attestation certificate containing the above extension OIDs as well as required fields:
-----BEGIN CERTIFICATE----- <!-- bikeshed emdash workaround --> MIIBzTCCAXOgAwIBAgIUYHS3FJEL/JTfFqafuAHvlAS+hDYwCgYIKoZIzj0EAwIw QTELMAkGA1UEBhMCVVMxFDASBgNVBAoMC1dlYkF1dGhuIFdHMRwwGgYDVQQDDBNF eGFtcGxlIEF0dGVzdGF0aW9uMCAXDTI0MDEwMzE3NDUyMVoYDzIwNTAwMTA2MTc0 NTIxWjBBMQswCQYDVQQGEwJVUzEUMBIGA1UECgwLV2ViQXV0aG4gV0cxHDAaBgNV BAMME0V4YW1wbGUgQXR0ZXN0YXRpb24wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNC AATDQN9uaFFH4BKBjthHTM1drpb7gIuPod67qyF6UdL4qah6XUp6tE7Prl+DfQ7P YH9yMOOcci3nr+Q/jOBaWVERo0cwRTAhBgsrBgEEAYLlHAEBBAQSBBDNjDlcJu3u 3mU7AHl9A8o8MBIGCysGAQQBguUcAQEFBAMCASowDAYDVR0TAQH/BAIwADAKBggq hkjOPQQDAgNIADBFAiA3k3aAUVtLhDHLXOgY2kRnK2hrbRgf2EKdTDLJ1Ds/RAIh AOmIblhI3ALCHOaO0IO7YlMpw/lSTvFYv3qwO3m7H8Dc -----END CERTIFICATE----- <!-- bikeshed emdash workaround -->
The attributes above are structured within this certificate as such:
30 21 -- SEQUENCE 06 0B 2B 06 01 04 01 82 E5 1C 01 01 04 -- OID 1.3.6.1.4.1.45724.1.1.4 04 12 -- OCTET STRING 04 10 -- OCTET STRING CD 8C 39 5C 26 ED EE DE -- AAGUID cd8c395c-26ed-eede-653b-00797d03ca3c 65 3B 00 79 7D 03 CA 3C 30 12 -- SEQUENCE 06 0B 2B 06 01 04 01 82 E5 1C 01 01 05 -- OID 1.3.6.1.4.1.45724.1.1.5 04 03 -- OCTET STRING 02 01 -- INTEGER 2A -- Firmware version: 42
8.3. TPM Attestation Statement Format
This attestation statement format is generally used by authenticators that use a Trusted Platform Module as their cryptographic engine.
- Attestation statement format identifier
-
tpm
- Attestation types supported
- Syntax
-
The syntax of a TPM Attestation statement is as follows:
$$attStmtType // = ( fmt: "tpm", attStmt: tpmStmtFormat ) tpmStmtFormat = { ver: "2.0", ( alg: COSEAlgorithmIdentifier, x5c: [ aikCert: bytes, * (caCert: bytes) ] ) sig: bytes, certInfo: bytes, pubArea: bytes }
The semantics of the above fields are as follows:
- ver
-
The version of the TPM specification to which the signature conforms.
- alg
-
A
COSEAlgorithmIdentifier
containing the identifier of the algorithm used to generate the attestation signature . - x5c
-
aikCert followed by its certificate chain, in X.509 encoding.
- aikCert
-
The AIK certificate used for the attestation, in X.509 encoding.
- sig
-
The attestation signature , in the form of a TPMT_SIGNATURE structure as specified in
[TPMv2-Part2][[!TPMv2-Part2]] section 11.3.4. - certInfo
-
The TPMS_ATTEST structure over which the above signature was computed, as specified in
[TPMv2-Part2][[!TPMv2-Part2]] section 10.12.8. - pubArea
-
The TPMT_PUBLIC structure (see
[TPMv2-Part2][[!TPMv2-Part2]] section 12.2.4) used by the TPM to represent the credential public key.
- Signing procedure
-
Let authenticatorData denote the authenticator data for the attestation , and let clientDataHash denote the hash of the serialized client data .
Concatenate authenticatorData and clientDataHash to form attToBeSigned .
Generate a signature using the procedure specified in
[TPMv2-Part3][[!TPMv2-Part3]] Section 18.2, using the attestation private key and setting theextraData
parameter to the digest of attToBeSigned using the hash algorithm corresponding to the "alg" signature algorithm. (For the "RS256" algorithm, this would be a SHA-256 digest.)Set the pubArea field to the public area of the credential public key, the certInfo field to the output parameter of the same name, and the sig field to the signature obtained from the above procedure.
- Verification procedure
-
Given the verification procedure inputs attStmt , authenticatorData and clientDataHash , the verification procedure is as follows:
Verify that attStmt is valid CBOR conforming to the syntax defined above and perform CBOR decoding on it to extract the contained fields.
Verify that the public key specified by the
parameters
andunique
fields of pubArea is identical to thecredentialPublicKey
in theattestedCredentialData
in authenticatorData .Concatenate authenticatorData and clientDataHash to form attToBeSigned .
Validate that certInfo is valid:
-
Verify that
magic
is set toTPM_GENERATED_VALUE
. -
Verify that
type
is set toTPM_ST_ATTEST_CERTIFY
. -
Verify that
extraData
is set to the hash of attToBeSigned using the hash algorithm employed in "alg". -
Verify that
attested
contains aTPMS_CERTIFY_INFO
structure as specified in[TPMv2-Part2][[!TPMv2-Part2]] section 10.12.3, whosename
field contains a valid Name for pubArea , as computed using the algorithm in thenameAlg
field of pubArea using the procedure specified in[TPMv2-Part1][[!TPMv2-Part1]] section 16. -
Verify that x5c is present.
-
Note that the remaining fields in the "Standard Attestation Structure"
[TPMv2-Part1][[!TPMv2-Part1]] section 31.2, i.e.,qualifiedSigner
,clockInfo
andfirmwareVersion
are ignored. These fields MAY be used as an input to risk engines. -
Verify the sig is a valid signature over certInfo using the attestation public key in aikCert with the algorithm specified in alg .
-
Verify that aikCert meets the requirements in
§ 8.3.1 TPM Attestation Statement Certificate Requirements .[[#sctn-tpm-cert-requirements]]. -
If aikCert contains an extension with OID
1.3.6.1.4.1.45724.1.1.4
(id-fido-gen-ce-aaguid
) verify that the value of this extension matches theaaguid
in authenticatorData . -
If successful, return implementation-specific values representing attestation type AttCA and attestation trust path x5c .
-
8.3.1. TPM Attestation Statement Certificate Requirements
TPM attestation certificate MUST have the following fields/extensions:
-
Version MUST be set to 3.
-
Subject field MUST be set to empty.
-
The Subject Alternative Name extension MUST be set as defined in
[TPMv2-EK-Profile][[!TPMv2-EK-Profile]] section 3.2.9. -
The Extended Key Usage extension MUST contain the OID
2.23.133.8.3
("joint-iso-itu-t(2) internationalorganizations(23) 133 tcg-kp(8) tcg-kp-AIKCertificate(3)"). -
The Basic Constraints extension MUST have the CA component set to
false
. -
An Authority Information Access (AIA) extension with entry
id-ad-ocsp
and a CRL Distribution Point extension[RFC5280][[RFC5280]] are both OPTIONAL as the status of many attestation certificates is available through metadata services. See, for example, the FIDO Metadata Service[FIDOMetadataService] .[[FIDOMetadataService]].
8.4. Android Key Attestation Statement Format
When
the
authenticator
in
question
is
a
platform
authenticator
on
the
Android
"N"
or
later
platform,
the
attestation
statement
is
based
on
the
Android
key
attestation
.
In
these
cases,
the
attestation
statement
is
produced
by
a
component
running
in
a
secure
operating
environment,
but
the
authenticator
data
for
the
attestation
is
produced
outside
this
environment.
The
WebAuthn
Relying
Party
[WRP]
is
expected
to
check
that
the
authenticator
data
claimed
to
have
been
used
for
the
attestation
is
consistent
with
the
fields
of
the
attestation
certificate’s
extension
data.
- Attestation statement format identifier
-
android-key
- Attestation types supported
- Syntax
-
An Android key attestation statement consists simply of the Android attestation statement, which is a series of DER encoded X.509 certificates. See the Android developer documentation . Its syntax is defined as follows:
$$attStmtType //= ( fmt: "android-key", attStmt: androidStmtFormat ) androidStmtFormat = { alg: COSEAlgorithmIdentifier, sig: bytes, x5c: [ credCert: bytes, * (caCert: bytes) ] }
- Signing procedure
-
Let authenticatorData denote the authenticator data for the attestation , and let clientDataHash denote the hash of the serialized client data .
Request an Android Key Attestation by calling
keyStore.getCertificateChain(myKeyUUID)
providing clientDataHash as the challenge value (e.g., by using setAttestationChallenge ). Set x5c to the returned value.The authenticator produces sig by concatenating authenticatorData and clientDataHash , and signing the result using the credential private key. It sets alg to the algorithm of the signature format.
- Verification procedure
-
Given the verification procedure inputs attStmt , authenticatorData and clientDataHash , the verification procedure is as follows:
-
Verify that attStmt is valid CBOR conforming to the syntax defined above and perform CBOR decoding on it to extract the contained fields.
-
Verify that sig is a valid signature over the concatenation of authenticatorData and clientDataHash using the public key in the first certificate in x5c with the algorithm specified in alg .
-
Verify that the public key in the first certificate in x5c matches the
credentialPublicKey
in theattestedCredentialData
in authenticatorData . -
Verify that the
attestationChallenge
field in the attestation certificate extension data is identical to clientDataHash . -
Verify the following using the appropriate authorization list from the attestation certificate extension data :
-
The
AuthorizationList.allApplications
field is not present on either authorization list (softwareEnforced
norteeEnforced
), since PublicKeyCredential MUST be scoped to the RP ID . -
For the following, use only the
teeEnforced
authorization list if the RP wants to accept only keys from a trusted execution environment, otherwise use the union ofteeEnforced
andsoftwareEnforced
.-
The value in the
AuthorizationList.origin
field is equal toKM_ORIGIN_GENERATED
. -
The value in the
AuthorizationList.purpose
field is equal toKM_PURPOSE_SIGN
.
-
-
-
If successful, return implementation-specific values representing attestation type Basic and attestation trust path x5c .
-
8.4.1. Android Key Attestation Statement Certificate Requirements
Android
Key
Attestation
attestation
certificate
's
’s
android
key
attestation
certificate
extension
data
is
identified
by
the
OID
1.3.6.1.4.1.11129.2.1.17
,
and
its
schema
is
defined
in
the
Android
developer
documentation
.
8.5. Android SafetyNet Attestation Statement Format
When the authenticator is a platform authenticator on certain Android platforms, the attestation statement may be based on the SafetyNet API . In this case the authenticator data is completely controlled by the caller of the SafetyNet API (typically an application running on the Android platform) and the attestation statement provides some statements about the health of the platform and the identity of the calling application (see SafetyNet Documentation for more details).
- Attestation statement format identifier
-
android-safetynet
- Attestation types supported
- Syntax
-
The syntax of an Android Attestation statement is defined as follows:
$$attStmtType //= ( fmt: "android-safetynet", attStmt: safetynetStmtFormat ) safetynetStmtFormat = { ver: text, response: bytes }
The semantics of the above fields are as follows:
- ver
-
The version number of Google Play Services responsible for providing the SafetyNet API.
- response
-
The UTF-8 encoded result of the getJwsResult() call of the SafetyNet API. This value is a JWS
[RFC7515][[!RFC7515]] object (see SafetyNet online documentation ) in Compact Serialization.
- Signing procedure
-
Let authenticatorData denote the authenticator data for the attestation , and let clientDataHash denote the hash of the serialized client data .
Concatenate authenticatorData and clientDataHash , perform SHA-256 hash of the concatenated string, and let the result of the hash form attToBeSigned .
Request a SafetyNet attestation, providing attToBeSigned as the nonce value. Set response to the result, and ver to the version of Google Play Services running in the authenticator.
- Verification procedure
-
Given the verification procedure inputs attStmt , authenticatorData and clientDataHash , the verification procedure is as follows:
-
Verify that attStmt is valid CBOR conforming to the syntax defined above and perform CBOR decoding on it to extract the contained fields.
-
Verify that response is a valid SafetyNet response of version ver by following the steps indicated by the SafetyNet online documentation . As of this writing, there is only one format of the SafetyNet response and ver is reserved for future use.
-
Verify that the
nonce
attribute in the payload of response is identical to the Base64 encoding of the SHA-256 hash of the concatenation of authenticatorData and clientDataHash . -
Verify that the SafetyNet response actually came from the SafetyNet service by following the steps in the SafetyNet online documentation .
-
If successful, return implementation-specific values representing attestation type Basic and attestation trust path x5c .
-
8.6. FIDO U2F Attestation Statement Format
This
attestation
statement
format
is
used
with
FIDO
U2F
authenticators
using
the
formats
defined
in
[FIDO-U2F-Message-Formats]
.
[[FIDO-U2F-Message-Formats]].
- Attestation statement format identifier
-
fido-u2f
- Attestation types supported
- Syntax
-
The syntax of a FIDO U2F attestation statement is defined as follows:
$$attStmtType //= ( fmt: "fido-u2f", attStmt: u2fStmtFormat ) u2fStmtFormat = { x5c: [ attestnCert: bytes ], sig: bytes }
The semantics of the above fields are as follows:
- x5c
-
A single element array containing the attestation certificate in X.509 format.
- sig
-
The attestation signature . The signature was calculated over the (raw) U2F registration response message
[FIDO-U2F-Message-Formats][[!FIDO-U2F-Message-Formats]] received by the client from the authenticator.
- Signing procedure
-
If the credential public key of the attested credential is not of algorithm -7 ("ES256"), stop and return an error. Otherwise, let authenticatorData denote the authenticator data for the attestation , and let clientDataHash denote the hash of the serialized client data . (Since SHA-256 is used to hash the serialized client data , clientDataHash will be 32 bytes long.)
Generate a Registration Response Message as specified in
[FIDO-U2F-Message-Formats][[!FIDO-U2F-Message-Formats]] Section 4.3 , with the application parameter set to the SHA-256 hash of the RP ID that the given credential is scoped to, the challenge parameter set to clientDataHash , and the key handle parameter set to the credential ID of the given credential. Set the raw signature part of this Registration Response Message (i.e., without the user public key , key handle, and attestation certificates) as sig and set the attestation certificates of the attestation public key as x5c . - Verification procedure
-
Given the verification procedure inputs attStmt , authenticatorData and clientDataHash , the verification procedure is as follows:
-
Verify that attStmt is valid CBOR conforming to the syntax defined above and perform CBOR decoding on it to extract the contained fields.
-
Check that x5c has exactly one element and let attCert be that element. Let certificate public key be the public key conveyed by attCert . If certificate public key is not an Elliptic Curve (EC) public key over the P-256 curve, terminate this algorithm and return an appropriate error.
-
Extract the claimed rpIdHash from authenticatorData , and the claimed credentialId and credentialPublicKey from authenticatorData .
attestedCredentialData
. -
Convert the COSE_KEY formatted credentialPublicKey (see Section 7 of
[RFC9052] )[[!RFC9052]]) to Raw ANSI X9.62 public key format (see ALG_KEY_ECC_X962_RAW in Section 3.6.2 Public Key Representation Formats of[FIDO-Registry] ).[[!FIDO-Registry]]).-
Let x be the value corresponding to the "-2" key (representing x coordinate) in credentialPublicKey , and confirm its size to be of 32 bytes. If size differs or "-2" key is not found, terminate this algorithm and return an appropriate error.
-
Let y be the value corresponding to the "-3" key (representing y coordinate) in credentialPublicKey , and confirm its size to be of 32 bytes. If size differs or "-3" key is not found, terminate this algorithm and return an appropriate error.
-
Let publicKeyU2F be the concatenation
0x04 || x || y
.Note: This signifies uncompressed ECC key format.
-
-
Let verificationData be the concatenation of (0x00 || rpIdHash || clientDataHash || credentialId || publicKeyU2F ) (see Section 4.3 of
[FIDO-U2F-Message-Formats] ).[[!FIDO-U2F-Message-Formats]]). -
Verify the sig using verificationData and the certificate public key per section 4.1.4 of
[SEC1][[!SEC1]] with SHA-256 as the hash function used in step two. -
Optionally, inspect x5c and consult externally provided knowledge to determine whether attStmt conveys a Basic or AttCA attestation.
-
If successful, return implementation-specific values representing attestation type Basic , AttCA or uncertainty, and attestation trust path x5c .
-
8.7. None Attestation Statement Format
The
none
attestation
statement
format
is
used
to
replace
any
authenticator
-provided
attestation
statement
when
a
WebAuthn
Relying
Party
[WRP]
indicates
it
does
not
wish
to
receive
attestation
information,
see
§ 5.4.7
Attestation
Conveyance
Preference
Enumeration
(enum
AttestationConveyancePreference)
.
[[#enum-attestation-convey]].
The authenticator MAY also directly generate attestation statements of this format if the authenticator does not support attestation .
- Attestation statement format identifier
-
none
- Attestation types supported
- Syntax
-
The syntax of a none attestation statement is defined as follows:
$$attStmtType //= ( fmt: "none", attStmt: emptyMap ) emptyMap = {}
- Signing procedure
-
Return the fixed attestation statement defined above.
- Verification procedure
-
Return implementation-specific values representing attestation type None and an empty attestation trust path .
8.8. Apple Anonymous Attestation Statement Format
This attestation statement format is exclusively used by Apple for certain types of Apple devices that support WebAuthn.
- Attestation statement format identifier
-
apple
- Attestation types supported
- Syntax
-
The syntax of an Apple attestation statement is defined as follows:
$$attStmtType //= ( fmt: "apple", attStmt: appleStmtFormat ) appleStmtFormat = { x5c: [ credCert: bytes, * (caCert: bytes) ] }
The semantics of the above fields are as follows:
- x5c
-
credCert followed by its certificate chain, each encoded in X.509 format.
- credCert
-
The credential public key certificate used for attestation, encoded in X.509 format.
- Signing procedure
-
-
Let authenticatorData denote the authenticator data for the attestation, and let clientDataHash denote the hash of the serialized client data .
-
Concatenate authenticatorData and clientDataHash to form nonceToHash .
-
Perform SHA-256 hash of nonceToHash to produce nonce .
-
Let Apple anonymous attestation CA generate an X.509 certificate for the credential public key and include the nonce as a certificate extension with OID
1.2.840.113635.100.8.2
. credCert denotes this certificate. The credCert thus serves as a proof of the attestation, and the included nonce proves the attestation is live. In addition to that, the nonce also protects the integrity of the authenticatorData and client data . -
Set x5c to credCert followed by its certificate chain.
-
- Verification procedure
-
Given the verification procedure inputs attStmt , authenticatorData and clientDataHash , the verification procedure is as follows:
-
Verify that attStmt is valid CBOR conforming to the syntax defined above and perform CBOR decoding on it to extract the contained fields.
-
Concatenate authenticatorData and clientDataHash to form nonceToHash .
-
Perform SHA-256 hash of nonceToHash to produce nonce .
-
Verify that nonce equals the value of the extension with OID
1.2.840.113635.100.8.2
in credCert . -
Verify that the credential public key equals the Subject Public Key of credCert .
-
If successful, return implementation-specific values representing attestation type Anonymization CA and attestation trust path x5c .
-
8.9. Compound Attestation Statement Format
The "compound" attestation statement format is used to pass multiple, self-contained attestation statements in a single ceremony.
- Attestation statement format identifier
-
compound
- Attestation types supported
-
Any. See
§ 6.5.3 Attestation Types .[[#sctn-attestation-types]]. - Syntax
-
The syntax of a compound attestation statement is defined as follows:
$$attStmtType //= ( fmt: "compound", attStmt: [2* nonCompoundAttStmt] ) nonCompoundAttStmt = { $$attStmtType } .within { fmt: text .ne "compound" }
- Signing procedure
-
Not applicable
- Verification procedure
-
Given the verification procedure inputs attStmt , authenticatorData and clientDataHash , the verification procedure is as follows:
-
For each subStmt of attStmt , evaluate the verification procedure corresponding to the attestation statement format identifier
subStmt .fmt
with verification procedure inputs subStmt , authenticatorData and clientDataHash .If validation fails for one or more subStmt , decide the appropriate result based on
Relying Party[RP] policy. -
If sufficiently many (as determined by
Relying Party[RP] policy) items of attStmt verify successfully, return implementation-specific values representing any combination of outputs from successful verification procedures .
-
9. WebAuthn Extensions
The
mechanism
for
generating
public
key
credentials
,
as
well
as
requesting
and
generating
Authentication
assertions,
as
defined
in
§ 5
Web
Authentication
API
,
[[#sctn-api]],
can
be
extended
to
suit
particular
use
cases.
Each
case
is
addressed
by
defining
a
registration
extension
and/or
an
authentication
extension
.
Every extension is a client extension , meaning that the extension involves communication with and processing by the client. Client extensions define the following steps and data:
-
navigator.credentials.create()
extension request parameters and response values for registration extensions . -
navigator.credentials.get()
extension request parameters and response values for authentication extensions . -
Client extension processing for registration extensions and authentication extensions .
When
creating
a
public
key
credential
or
requesting
an
authentication
assertion
,
a
WebAuthn
Relying
Party
[WRP]
can
request
the
use
of
a
set
of
extensions.
These
extensions
will
be
invoked
during
the
requested
operation
if
they
are
supported
by
the
client
and/or
the
WebAuthn
Authenticator
[WAA]
.
The
Relying
Party
[RP]
sends
the
client
extension
input
for
each
extension
in
the
get()
call
(for
authentication
extensions
)
or
create()
call
(for
registration
extensions
)
to
the
client
.
The
client
performs
client
extension
processing
for
each
extension
that
the
client
platform
supports,
and
augments
the
client
data
as
specified
by
each
extension,
by
including
the
extension
identifier
and
client
extension
output
values.
An extension can also be an authenticator extension , meaning that the extension involves communication with and processing by the authenticator. Authenticator extensions define the following steps and data:
-
authenticatorMakeCredential extension request parameters and response values for registration extensions .
-
authenticatorGetAssertion extension request parameters and response values for authentication extensions .
-
Authenticator extension processing for registration extensions and authentication extensions .
For
authenticator
extensions
,
as
part
of
the
client
extension
processing
,
the
client
also
creates
the
CBOR
authenticator
extension
input
value
for
each
extension
(often
based
on
the
corresponding
client
extension
input
value),
and
passes
them
to
the
authenticator
in
the
create()
call
(for
registration
extensions
)
or
the
get()
call
(for
authentication
extensions
).
These
authenticator
extension
input
values
are
represented
in
CBOR
and
passed
as
name-value
pairs,
with
the
extension
identifier
as
the
name,
and
the
corresponding
authenticator
extension
input
as
the
value.
The
authenticator,
in
turn,
performs
additional
processing
for
the
extensions
that
it
supports,
and
returns
the
CBOR
authenticator
extension
output
for
each
as
specified
by
the
extension.
Since
authenticator
extension
output
is
returned
as
part
of
the
signed
authenticator
data
,
authenticator
extensions
MAY
also
specify
an
unsigned
extension
output
,
e.g.
for
cases
where
an
output
itself
depends
on
authenticator
data
.
Part
of
the
client
extension
processing
for
authenticator
extensions
is
to
use
the
authenticator
extension
output
and
unsigned
extension
output
as
an
input
to
creating
the
client
extension
output
.
All
WebAuthn
Extensions
are
OPTIONAL
for
both
clients
and
authenticators.
Thus,
any
extensions
requested
by
a
Relying
Party
[RP]
MAY
be
ignored
by
the
client
browser
or
OS
and
not
passed
to
the
authenticator
at
all,
or
they
MAY
be
ignored
by
the
authenticator.
Ignoring
an
extension
is
never
considered
a
failure
in
WebAuthn
API
processing,
so
when
Relying
Parties
[RPS]
include
extensions
with
any
API
calls,
they
MUST
be
prepared
to
handle
cases
where
some
or
all
of
those
extensions
are
ignored.
All WebAuthn Extensions MUST be defined in such a way that lack of support for them by the client or authenticator does not endanger the user’s security or privacy. For instance, if an extension requires client processing, it could be defined in a manner that ensures that a naïve pass-through that simply transcodes client extension inputs from JSON to CBOR will produce a semantically invalid authenticator extension input value, resulting in the extension being ignored by the authenticator. Since all extensions are OPTIONAL, this will not cause a functional failure in the API operation.
The
IANA
"WebAuthn
Extension
Identifiers"
registry
[IANA-WebAuthn-Registries]
[[!IANA-WebAuthn-Registries]]
established
by
[RFC8809]
[[!RFC8809]]
can
be
consulted
for
an
up-to-date
list
of
registered
WebAuthn
Extensions
.
9.1. Extension Identifiers
Extensions are identified by a string, called an extension identifier , chosen by the extension author.
Extension
identifiers
SHOULD
be
registered
in
the
IANA
"WebAuthn
Extension
Identifiers"
registry
[IANA-WebAuthn-Registries]
[[!IANA-WebAuthn-Registries]]
established
by
[RFC8809]
.
[[!RFC8809]].
All
registered
extension
identifiers
are
unique
amongst
themselves
as
a
matter
of
course.
Unregistered
extension
identifiers
SHOULD
aim
to
be
globally
unique,
e.g.,
by
including
the
defining
entity
such
as
myCompany_extension
.
All
extension
identifiers
MUST
be
a
maximum
of
32
octets
in
length
and
MUST
consist
only
of
printable
USASCII
characters,
excluding
backslash
and
doublequote,
i.e.,
VCHAR
as
defined
in
[RFC5234]
[[!RFC5234]]
but
without
%x22
and
%x5c.
Implementations
MUST
match
WebAuthn
extension
identifiers
in
a
case-sensitive
fashion.
Extensions
that
may
exist
in
multiple
versions
should
take
care
to
include
a
version
in
their
identifier.
In
effect,
different
versions
are
thus
treated
as
different
extensions,
e.g.,
myCompany_extension_01
§ 10
Defined
Extensions
[[#sctn-defined-extensions]]
defines
an
additional
set
of
extensions
and
their
identifiers.
See
the
IANA
"WebAuthn
Extension
Identifiers"
registry
[IANA-WebAuthn-Registries]
[[!IANA-WebAuthn-Registries]]
established
by
[RFC8809]
[[!RFC8809]]
for
an
up-to-date
list
of
registered
WebAuthn
Extension
Identifiers.
9.2. Defining Extensions
A
definition
of
an
extension
MUST
specify
an
extension
identifier
,
a
client
extension
input
argument
to
be
sent
via
the
get()
or
create()
call,
the
client
extension
processing
rules,
and
a
client
extension
output
value.
If
the
extension
communicates
with
the
authenticator
(meaning
it
is
an
authenticator
extension
),
it
MUST
also
specify
the
CBOR
authenticator
extension
input
argument
sent
via
the
authenticatorGetAssertion
or
authenticatorMakeCredential
call,
the
authenticator
extension
processing
rules,
and
the
CBOR
authenticator
extension
output
value.
Extensions
MAY
specify
unsigned
extension
outputs
.
Any
client
extension
that
is
processed
by
the
client
MUST
return
a
client
extension
output
value
so
that
the
WebAuthn
Relying
Party
[WRP]
knows
that
the
extension
was
honored
by
the
client.
Similarly,
any
extension
that
requires
authenticator
processing
MUST
return
an
authenticator
extension
output
to
let
the
Relying
Party
[RP]
know
that
the
extension
was
honored
by
the
authenticator.
If
an
extension
does
not
otherwise
require
any
result
values,
it
SHOULD
be
defined
as
returning
a
JSON
Boolean
client
extension
output
result,
set
to
true
to
signify
that
the
extension
was
understood
and
processed.
Likewise,
any
authenticator
extension
that
does
not
otherwise
require
any
result
values
MUST
return
a
value
and
SHOULD
return
a
CBOR
Boolean
authenticator
extension
output
result,
set
to
true
to
signify
that
the
extension
was
understood
and
processed.
9.3. Extending Request Parameters
An
extension
defines
one
or
two
request
arguments.
The
client
extension
input
,
which
is
a
value
that
can
be
encoded
in
JSON,
is
passed
from
the
WebAuthn
Relying
Party
[WRP]
to
the
client
in
the
get()
or
create()
call,
while
the
CBOR
authenticator
extension
input
is
passed
from
the
client
to
the
authenticator
for
authenticator
extensions
during
the
processing
of
these
calls.
A
Relying
Party
[RP]
simultaneously
requests
the
use
of
an
extension
and
sets
its
client
extension
input
by
including
an
entry
in
the
extensions
option
to
the
create()
or
get()
call.
The
entry
key
is
the
extension
identifier
and
the
value
is
the
client
extension
input
.
Note: Other documents have specified extensions where the extension input does not always use the extension identifier as the entry key. New extensions SHOULD follow the above convention.
var assertionPromise= navigator. credentials. get({ publicKey: { // Other members omitted for brevity extensions: { // An "entry key" identifying the "webauthnExample_foobar" extension, // whose value is a map with two input parameters: "webauthnExample_foobar" : { foo: 42 , bar: "barfoo" } } } });
Extension
definitions
MUST
specify
the
valid
values
for
their
client
extension
input
.
Clients
SHOULD
ignore
extensions
with
an
invalid
client
extension
input
.
If
an
extension
does
not
require
any
parameters
from
the
Relying
Party
[RP]
,
it
SHOULD
be
defined
as
taking
a
Boolean
client
argument,
set
to
true
to
signify
that
the
extension
is
requested
by
the
Relying
Party
[RP]
.
Extensions
that
only
affect
client
processing
need
not
specify
authenticator
extension
input
.
Extensions
that
have
authenticator
processing
MUST
specify
the
method
of
computing
the
authenticator
extension
input
from
the
client
extension
input
,
and
MUST
define
extensions
for
the
CDDL
types
and
AuthenticationExtensionsAuthenticatorInputs
[[#iface-authentication-extensions-authenticator-inputs|AuthenticationExtensionsAuthenticatorInputs]]
by
defining
an
additional
choice
for
the
AuthenticationExtensionsAuthenticatorOutputs
[[#iface-authentication-extensions-authenticator-outputs|AuthenticationExtensionsAuthenticatorOutputs]]
$$extensionInput
and
$$extensionOutput
group
sockets
using
the
extension
identifier
as
the
entry
key.
Extensions
that
do
not
require
input
parameters,
and
are
thus
defined
as
taking
a
Boolean
client
extension
input
value
set
to
true
,
SHOULD
define
the
authenticator
extension
input
also
as
the
constant
Boolean
value
true
(CBOR
major
type
7,
value
21).
The
following
example
defines
that
an
extension
with
identifier
webauthnExample_foobar
takes
an
unsigned
integer
as
authenticator
extension
input
,
and
returns
an
array
of
at
least
one
byte
string
as
authenticator
extension
output
:
$$extensionInput //= ( webauthnExample_foobar: uint ) $$extensionOutput //= ( webauthnExample_foobar: [+ bytes] )
Note: Extensions should aim to define authenticator arguments that are as small as possible. Some authenticators communicate over low-bandwidth links such as Bluetooth Low-Energy or NFC.
9.4. Client Extension Processing
Extensions MAY define additional processing requirements on the client during the creation of credentials or the generation of an assertion. The client extension input for the extension is used as an input to this client processing. For each supported client extension , the client adds an entry to the clientExtensions map with the extension identifier as the key, and the extension’s client extension input as the value.
Likewise,
the
client
extension
outputs
are
represented
as
a
dictionary
in
the
result
of
getClientExtensionResults()
with
extension
identifiers
as
keys,
and
the
client
extension
output
value
of
each
extension
as
the
value.
Like
the
client
extension
input
,
the
client
extension
output
is
a
value
that
can
be
encoded
in
JSON.
There
MUST
NOT
be
any
values
returned
for
ignored
extensions.
Extensions that require authenticator processing MUST define the process by which the client extension input can be used to determine the CBOR authenticator extension input and the process by which the CBOR authenticator extension output , and the unsigned extension output if used, can be used to determine the client extension output .
9.5. Authenticator Extension Processing
The CBOR authenticator extension input value of each processed authenticator extension is included in the extensions parameter of the authenticatorMakeCredential and authenticatorGetAssertion operations. The extensions parameter is a CBOR map where each key is an extension identifier and the corresponding value is the authenticator extension input for that extension.
Likewise, the extension output is represented in the extensions part of the authenticator data . The extensions part of the authenticator data is a CBOR map where each key is an extension identifier and the corresponding value is the authenticator extension output for that extension.
Unsigned
extension
outputs
are
represented
independently
from
authenticator
data
and
returned
by
authenticators
as
a
separate
map,
keyed
with
the
same
extension
identifier
.
This
map
only
contains
entries
for
authenticator
extensions
that
make
use
of
unsigned
outputs.
Unsigned
outputs
are
useful
when
extensions
output
a
signature
over
the
authenticator
data
(because
otherwise
a
signature
would
have
to
sign
over
itself,
which
isn’t
possible)
or
when
some
extension
outputs
should
not
be
sent
to
the
Relying
Party
[RP]
.
Note:
In
[FIDO-CTAP]
[[!FIDO-CTAP]]
unsigned
extension
outputs
are
returned
as
a
CBOR
map
in
a
top-level
field
named
unsignedExtensionOutputs
from
both
authenticatorMakeCredential
and
authenticatorGetAssertion
.
For each supported extension, the authenticator extension processing rule for that extension is used create the authenticator extension output , and unsigned extension output if used, from the authenticator extension input and possibly also other inputs. There MUST NOT be any values returned for ignored extensions.
10. Defined Extensions
This
section
and
its
subsections
define
an
additional
set
of
extensions
to
be
registered
in
the
IANA
"WebAuthn
Extension
Identifiers"
registry
[IANA-WebAuthn-Registries]
[[!IANA-WebAuthn-Registries]]
established
by
[RFC8809]
.
[[!RFC8809]].
These
MAY
be
implemented
by
user
agents
targeting
broad
interoperability.
10.1. Client Extensions
This section defines extensions that are only client extensions .
10.1.1. FIDO AppID Extension (appid)
This
extension
allows
WebAuthn
Relying
Parties
[WRPS]
that
have
previously
registered
a
credential
using
the
legacy
FIDO
U2F
JavaScript
API
[FIDOU2FJavaScriptAPI]
[[FIDOU2FJavaScriptAPI]]
to
request
an
assertion
.
The
FIDO
APIs
use
an
alternative
identifier
for
Relying
Parties
[RPS]
called
an
AppID
[FIDO-APPID]
,
[[!FIDO-APPID]],
and
any
credentials
created
using
those
APIs
will
be
scoped
to
that
identifier.
Without
this
extension,
they
would
need
to
be
re-registered
in
order
to
be
scoped
to
an
RP
ID
.
In
addition
to
setting
the
appid
extension
input,
using
this
extension
requires
some
additional
processing
by
the
Relying
Party
[RP]
in
order
to
allow
users
to
authenticate
using
their
registered
U2F
credentials:
-
List the desired U2F credentials in the
allowCredentials
option of theget()
method:-
Set the
type
members topublic-key
. -
Set the
id
members to the respective U2F key handles of the desired credentials. Note that U2F key handles commonly use base64url encoding but must be decoded to their binary form when used inid
.
allowCredentials
MAY contain a mixture of both WebAuthn credential IDs and U2F key handles; stating theappid
via this extension does not prevent the user from using a WebAuthn-registered credential scoped to the RP ID stated inrpId
. -
-
When verifying the assertion , expect that the
rpIdHash
MAY be the hash of the AppID instead of the RP ID .
This extension does not allow FIDO-compatible credentials to be created. Thus, credentials created with WebAuthn are not backwards compatible with the FIDO JavaScript APIs.
Note:
appid
should
be
set
to
the
AppID
that
the
Relying
Party
[RP]
previously
used
in
the
legacy
FIDO
APIs.
This
might
not
be
the
same
as
the
result
of
translating
the
Relying
Party
[RP]
's
’s
WebAuthn
RP
ID
to
the
AppID
format,
e.g.,
the
previously
used
AppID
may
have
been
"https://accounts.example.com"
but
the
currently
used
RP
ID
might
be
"example.com".
- Extension identifier
-
appid
- Operation applicability
- Client extension input
-
A single USVString specifying a FIDO AppID .
partial dictionary AuthenticationExtensionsClientInputs {USVString
; };appid - Client extension processing
-
-
Let facetId be the result of passing the caller’s origin to the FIDO algorithm for determining the FacetID of a calling application .
-
Let appId be the extension input.
-
Pass facetId and appId to the FIDO algorithm for determining if a caller’s FacetID is authorized for an AppID . If that algorithm rejects appId then return a "
SecurityError
"DOMException
. -
When building allowCredentialDescriptorList , if a U2F authenticator indicates that a credential is inapplicable (i.e. by returning
SW_WRONG_DATA
) then the client MUST retry with the U2F application parameter set to the SHA-256 hash of appId . If this results in an applicable credential, the client MUST include the credential in allowCredentialDescriptorList . The value of appId then replaces therpId
parameter of authenticatorGetAssertion . -
Let output be the Boolean value
false
. -
When creating assertionCreationData , if the assertion was created by a U2F authenticator with the U2F application parameter set to the SHA-256 hash of appId instead of the SHA-256 hash of the RP ID , set output to
true
.
-
Note: In practice, several implementations do not implement steps four and onward of the algorithm for determining if a caller’s FacetID is authorized for an AppID . Instead, in step three, the comparison on the host is relaxed to accept hosts on the same site .
- Client extension output
-
Returns the value of output . If true, the AppID was used and thus, when verifying the assertion , the
Relying Party[RP] MUST expect therpIdHash
to be the hash of the AppID , not the RP ID .partial dictionary AuthenticationExtensionsClientOutputs {boolean
; };appid - Authenticator extension input
-
None.
- Authenticator extension processing
-
None.
- Authenticator extension output
-
None.
10.1.2. FIDO AppID Exclusion Extension (appidExclude)
This
registration
extension
allows
WebAuthn
Relying
Parties
[WRPS]
to
exclude
authenticators
that
contain
specified
credentials
that
were
created
with
the
legacy
FIDO
U2F
JavaScript
API
[FIDOU2FJavaScriptAPI]
.
[[FIDOU2FJavaScriptAPI]].
During
a
transition
from
the
FIDO
U2F
JavaScript
API,
a
Relying
Party
[RP]
may
have
a
population
of
users
with
legacy
credentials
already
registered.
The
appid
extension
allows
the
sign-in
flow
to
be
transitioned
smoothly
but,
when
transitioning
the
registration
flow,
the
excludeCredentials
field
will
not
be
effective
in
excluding
authenticators
with
legacy
credentials
because
its
contents
are
taken
to
be
WebAuthn
credentials.
This
extension
directs
client
platforms
to
consider
the
contents
of
excludeCredentials
as
both
WebAuthn
and
legacy
FIDO
credentials.
Note
that
U2F
key
handles
commonly
use
base64url
encoding
but
must
be
decoded
to
their
binary
form
when
used
in
excludeCredentials
.
- Extension identifier
-
appidExclude
- Operation applicability
- Client extension input
-
A single USVString specifying a FIDO AppID .
partial dictionary AuthenticationExtensionsClientInputs {USVString
; };appidExclude - Client extension processing
-
When
creating[[#sctn-createCredential|creating a newcredential :credential]]:-
Just after establishing the RP ID perform these steps:
-
Let facetId be the result of passing the caller’s origin to the FIDO algorithm for determining the FacetID of a calling application .
-
Let appId be the value of the extension input
appidExclude
. -
Pass facetId and appId to the FIDO algorithm for determining if a caller’s FacetID is authorized for an AppID . If the latter algorithm rejects appId then return a "
SecurityError
"DOMException
and terminate the creating a new credential algorithm as well as these steps.Note: In practice, several implementations do not implement steps four and onward of the algorithm for determining if a caller’s FacetID is authorized for an AppID . Instead, in step three, the comparison on the host is relaxed to accept hosts on the same site .
-
Otherwise, continue with normal processing.
-
-
Just prior to invoking authenticatorMakeCredential perform these steps:
-
If authenticator supports the U2F protocol
[FIDO-U2F-Message-Formats] ,[[!FIDO-U2F-Message-Formats]], then for each credential descriptor C in excludeCredentialDescriptorList :-
Check whether C was created using U2F on authenticator by sending a
U2F_AUTHENTICATE
message to authenticator whose "five parts" are set to the following values:- control byte
-
0x07
("check-only") - challenge parameter
-
32 random bytes
- application parameter
-
SHA-256 hash of appId
- key handle length
-
The length of
C .
(in bytes)id
- key handle
-
The value of
C .
, i.e., the credential id .id
-
If authenticator responds with
message:error:test-of-user-presence-required
(i.e., success): cease normal processing of this authenticator and indicate in a platform-specific manner that the authenticator is inapplicable. For example, this could be in the form of UI, or could involve requesting user consent from authenticator and, upon receipt, treating it as if the authenticator had returnedInvalidStateError
. Requesting user consent can be accomplished by sending anotherU2F_AUTHENTICATE
message to authenticator as above except for setting control byte to0x03
("enforce-user-presence-and-sign"), and ignoring the response.
-
-
Continue with normal processing.
-
-
- Client extension output
-
Returns the value
true
to indicate to theRelying Party[RP] that the extension was acted upon.partial dictionary AuthenticationExtensionsClientOutputs {boolean
; };appidExclude - Authenticator extension input
-
None.
- Authenticator extension processing
-
None.
- Authenticator extension output
-
None.
10.1.3. Credential Properties Extension ( credProps )
This
client
registration
extension
and
authentication
extension
facilitates
reporting
certain
credential
properties
known
by
the
client
to
the
requesting
WebAuthn
Relying
Party
[WRP]
upon
creation
or
use
of
a
public
key
credential
source
.
- Extension identifier
-
credProps
- Operation applicability
- Client extension input
-
The Boolean value
true
to indicate that this extension is requested by theRelying Party[RP] .partial dictionary AuthenticationExtensionsClientInputs {boolean
; };credProps - Client extension processing
-
-
If processed during a registration ceremony :
-
Set
rk
to the value of the requireResidentKey parameter that was used in the invocation of the authenticatorMakeCredential operation.
-
-
Set
authenticatorDisplayName
as described in its definition, using some client-specific procedure. If no suitable value is found, letauthenticatorDisplayName
be undefined.
-
- Client extension output
-
dictionary
{CredentialPropertiesOutput boolean rk ;USVString authenticatorDisplayName ; };partial dictionary AuthenticationExtensionsClientOutputs {CredentialPropertiesOutput
; };credProps -
rk
, of type boolean -
This OPTIONAL property, known abstractly as the resident key credential property , is a Boolean value indicating whether the
PublicKeyCredential
returned as a result of a registration ceremony is a client-side discoverable credential . Ifrk
istrue
, the credential is a discoverable credential . Ifrk
isfalse
, the credential is a server-side credential . Ifrk
is not present, it is not known whether the credential is a discoverable credential or a server-side credential .Note: some authenticators create discoverable credentials even when not requested by the client platform . Because of this, client platforms may be forced to omit the
rk
property because they lack the assurance to be able to set it tofalse
.Relying Parties[RPS] should assume that, if thecredProps
extension is supported, then client platforms will endeavour to populate therk
property. Therefore a missingrk
indicates that the created credential is most likely a non-discoverable credential . -
authenticatorDisplayName
, of type USVString -
This OPTIONAL property is a human-palatable description of the credential’s managing authenticator , chosen by the user.
The client MUST allow the user to choose this value. That choice MAY be presented during the registration or authentication ceremony or MAY be made available outside the ceremony, for example in client settings. The client MAY reuse the same value for multiple credentials with the same managing authenticator across multiple
Relying Parties[RPS] .The client MAY query the authenticator , by some unspecified mechanism, for this value. The authenticator MAY allow the user to configure the response to such a query. The authenticator vendor MAY provide a default response to such a query. The client MAY consider a user-configured response chosen by the user, and SHOULD allow the user to modify a vendor-provided default response.
If the
Relying Party[RP] includes anauthenticatorDisplayName
item in its credential records , theRelying Party[RP] MAY offer thisauthenticatorDisplayName
extension output, if present, as a default value for theauthenticatorDisplayName
of the new credential record it stores after a registration ceremony .If the
authenticatorDisplayName
extension output from an authentication ceremony is different from theauthenticatorDisplayName
of the credential record , theRelying Party[RP] MAY offer the user to update theauthenticatorDisplayName
of the credential record .
-
- Authenticator extension input
-
None.
- Authenticator extension processing
-
None.
- Authenticator extension output
-
None.
10.1.4. Pseudo-random function extension ( prf )
This
client
registration
extension
and
authentication
extension
allows
a
Relying
Party
[RP]
to
evaluate
outputs
from
a
pseudo-random
function
(PRF)
associated
with
a
credential
.
The
PRFs
provided
by
this
extension
map
from
BufferSource
s
of
any
length
to
32-byte
BufferSource
s.
As a motivating example, PRF outputs could be used as symmetric keys to encrypt user data. Such encrypted data would be inaccessible without the ability to get assertions from the associated credential . By using the provision below to evaluate the PRF at two inputs in a single assertion operation, the encryption key could be periodically rotated during assertions by choosing a fresh, random input and reencrypting under the new output. If the evaluation inputs are unpredictable then even an attacker who could satisfy user verification , and who had time-limited access to the authenticator, could not learn the encryption key without also knowing the correct PRF input.
This
extension
is
implemented
on
top
of
the
[FIDO-CTAP]
[[FIDO-CTAP]]
hmac-secret
extension.
It
is
a
separate
client
extension
because
hmac-secret
requires
that
inputs
and
outputs
be
encrypted
in
a
manner
that
only
the
user
agent
can
perform,
and
to
provide
separation
between
uses
by
WebAuthn
and
any
uses
by
the
underlying
platform.
This
separation
is
achieved
by
hashing
the
provided
PRF
inputs
with
a
context
string
to
prevent
evaluation
of
the
PRFs
for
arbitrary
inputs.
The
hmac-secret
extension
provides
two
PRFs
per
credential:
one
which
is
used
for
requests
where
user
verification
is
performed
and
another
for
all
other
requests.
This
extension
only
exposes
a
single
PRF
per
credential
and,
when
implementing
on
top
of
hmac-secret
,
that
PRF
MUST
be
the
one
used
for
when
user
verification
is
performed.
This
overrides
the
UserVerificationRequirement
if
neccessary.
Note:
this
extension
may
be
implemented
for
authenticators
that
do
not
use
[FIDO-CTAP]
[[FIDO-CTAP]]
so
long
as
the
behavior
observed
by
a
Relying
Party
[RP]
is
identical.
- Extension identifier
-
prf
- Operation applicability
- Client extension input
-
dictionary
{AuthenticationExtensionsPRFValues required BufferSource
;first BufferSource
; };second dictionary
{AuthenticationExtensionsPRFInputs AuthenticationExtensionsPRFValues eval ;record <USVString ,AuthenticationExtensionsPRFValues >evalByCredential ; };partial dictionary AuthenticationExtensionsClientInputs {AuthenticationExtensionsPRFInputs
; };prf -
eval
, of type AuthenticationExtensionsPRFValues -
One or two inputs on which to evaluate PRF. Not all authenticators support evaluating the PRFs during credential creation so outputs may, or may not, be provided. If not, then an assertion is needed in order to obtain the outputs.
-
evalByCredential
, of type record< USVString , AuthenticationExtensionsPRFValues > -
A record mapping base64url encoded credential IDs to PRF inputs to evaluate for that credential. Only applicable during assertions when
allowCredentials
is not empty.
-
- Client extension processing ( registration )
-
-
If
evalByCredential
is present, return aDOMException
whose name is “NotSupportedError
”. -
Set
hmac-secret
totrue
in the authenticator extensions input. -
If
eval
is present and a future extension to[FIDO-CTAP][[FIDO-CTAP]] permits evaluation of the PRF at creation time, configurehmac-secret
inputs accordingly: -
Set
enabled
to the value ofhmac-secret
in the authenticator extensions output. If not present, setenabled
tofalse
. -
Set
results
to the decrypted PRF result(s), if any.
-
- Client extension processing ( authentication )
-
-
If
evalByCredential
is not empty butallowCredentials
is empty, return aDOMException
whose name is “NotSupportedError
”. -
If any key in
evalByCredential
is the empty string, or is not a valid base64url encoding , or does not equal theid
of some element ofallowCredentials
after performing base64url decoding , then return aDOMException
whose name is “SyntaxError
”. -
Initialize the
prf
extension output to an empty dictionary. -
Let ev be null, and try to find any applicable PRF input(s):
-
If
evalByCredential
is present and contains an entry whose key is the base64url encoding of the credential ID that will be returned, let ev be the value of that entry. -
If ev is null and
eval
is present, then let ev be the value ofeval
.
-
-
If ev is not null:
-
Let
salt1
be the value ofSHA-256(UTF8Encode("WebAuthn PRF") || 0x00 || ev .
.first
) -
If
ev .
is present, letsecond
salt2
be the value ofSHA-256(UTF8Encode("WebAuthn PRF") || 0x00 || ev .
.second
) -
Send an
hmac-secret
extension to the authenticator using the values ofsalt1
and, if set,salt2
as the parameters of the same name in that process. -
Decrypt the extension result and set
results
to the PRF result(s), if any.
-
-
- Authenticator extension input / processing / output
-
This extension uses the
[FIDO-CTAP][[FIDO-CTAP]]hmac-secret
extension when communicating with the authenticator. It thus does not specify any direct authenticator interaction forRelying Parties[RPS] . - Client extension output
-
dictionary
{AuthenticationExtensionsPRFOutputs boolean enabled ;AuthenticationExtensionsPRFValues results ; };partial dictionary AuthenticationExtensionsClientOutputs {AuthenticationExtensionsPRFOutputs
; };prf -
enabled
, of type boolean -
true
if, and only if, the one or two PRFs are available for use with the created credential. This is only reported during registration and is not present in the case of authentication . -
results
, of type AuthenticationExtensionsPRFValues -
The results of evaluating the PRF for the inputs given in
eval
orevalByCredential
. Outputs may not be available during registration ; see comments ineval
.
-
10.1.5. Large blob storage extension ( largeBlob )
This
client
registration
extension
and
authentication
extension
allows
a
Relying
Party
[RP]
to
store
opaque
data
associated
with
a
credential.
Since
authenticators
can
only
store
small
amounts
of
data,
and
most
Relying
Parties
[RPS]
are
online
services
that
can
store
arbitrary
amounts
of
state
for
a
user,
this
is
only
useful
in
specific
cases.
For
example,
the
Relying
Party
[RP]
might
wish
to
issue
certificates
rather
than
run
a
centralised
authentication
service.
Note:
Relying
Parties
[RPS]
can
assume
that
the
opaque
data
will
be
compressed
when
being
written
to
a
space-limited
device
and
so
need
not
compress
it
themselves.
Since
a
certificate
system
needs
to
sign
over
the
public
key
of
the
credential,
and
that
public
key
is
only
available
after
creation,
this
extension
does
not
add
an
ability
to
write
blobs
in
the
registration
context.
However,
Relying
Parties
[RPS]
SHOULD
use
the
registration
extension
when
creating
the
credential
if
they
wish
to
later
use
the
authentication
extension
.
Since certificates are sizable relative to the storage capabilities of typical authenticators, user agents SHOULD consider what indications and confirmations are suitable to best guide the user in allocating this limited resource and prevent abuse.
Note:
In
order
to
interoperate,
user
agents
storing
large
blobs
on
authenticators
using
[FIDO-CTAP]
[[!FIDO-CTAP]]
are
expected
to
use
the
provisions
detailed
in
that
specification
for
storing
large,
per-credential
blobs
.
Note:
Roaming
authenticators
that
use
[FIDO-CTAP]
[[!FIDO-CTAP]]
as
their
cross-platform
transport
protocol
only
support
this
Large
Blob
extension
for
discoverable
credentials
,
and
might
return
an
error
unless
is
set
to
authenticatorSelection
.
residentKey
preferred
or
required
.
However,
authenticators
that
do
not
utilize
[FIDO-CTAP]
[[!FIDO-CTAP]]
do
not
necessarily
restrict
this
extension
to
discoverable
credentials
.
- Extension identifier
-
largeBlob
- Operation applicability
- Client extension input
-
partial dictionary AuthenticationExtensionsClientInputs {AuthenticationExtensionsLargeBlobInputs
; };largeBlob enum
{LargeBlobSupport
,"required"
, };"preferred" dictionary
{AuthenticationExtensionsLargeBlobInputs DOMString support ;boolean read ;BufferSource write ; };-
support
, of type DOMString -
A DOMString that takes one of the values of
LargeBlobSupport
. (See§ 2.1.1 Enumerations as DOMString types .)[[#sct-domstring-backwards-compatibility]].) Only valid during registration . -
read
, of type boolean -
A boolean that indicates that the
Relying Party[RP] would like to fetch the previously-written blob associated with the asserted credential. Only valid during authentication . -
write
, of type BufferSource -
An opaque byte string that the
Relying Party[RP] wishes to store with the existing credential. Only valid during authentication .
-
- Client extension processing ( registration )
-
-
-
Return a
DOMException
whose name is “NotSupportedError
”.
-
-
If
support
is present and has the valuerequired
:-
Set
supported
totrue
.Note: This is in anticipation of an authenticator capable of storing large blobs becoming available. It occurs during extension processing in step 12 of
[[Create]]()
. TheAuthenticationExtensionsLargeBlobOutputs
will be abandoned if no satisfactory authenticator becomes available. -
If a candidate authenticator becomes available ( step 21 of
[[Create]]()
) then, before evaluating anyoptions
, continue (i.e. ignore the candidate authenticator ) if the candidate authenticator is not capable of storing large blobs.
-
-
Otherwise (i.e.
support
is absent or has the valuepreferred
):-
If an authenticator is selected and the selected authenticator supports large blobs, set
supported
totrue
, andfalse
otherwise.
-
-
- Client extension processing ( authentication )
-
-
If
support
is present:-
Return a
DOMException
whose name is “NotSupportedError
”.
-
-
If both
read
andwrite
are present:-
Return a
DOMException
whose name is “NotSupportedError
”.
-
-
If
read
is present and has the valuetrue
:-
Initialize the client extension output ,
largeBlob
. -
If any authenticator indicates success (in
[[DiscoverFromExternalSource]]()
), attempt to read any largeBlob data associated with the asserted credential. -
If successful, set
blob
to the result.Note: if the read is not successful,
largeBlob
will be present inAuthenticationExtensionsClientOutputs
but theblob
member will not be present.
-
-
If
write
is present:-
If
allowCredentials
does not contain exactly one element:-
Return a
DOMException
whose name is “NotSupportedError
”.
-
-
If the
assertion[[#sctn-getAssertion|assertion]] operation is successful, attempt to store the contents ofwrite
on the authenticator , associated with the indicated credential. -
Set
written
totrue
if successful andfalse
otherwise.
-
-
- Client extension output
-
partial dictionary AuthenticationExtensionsClientOutputs {AuthenticationExtensionsLargeBlobOutputs
; };largeBlob dictionary
{AuthenticationExtensionsLargeBlobOutputs boolean supported ;ArrayBuffer blob ;boolean written ; };-
supported
, of type boolean -
true
if, and only if, the created credential supports storing large blobs. Only present in registration outputs. -
blob
, of type ArrayBuffer -
The opaque byte string that was associated with the credential identified by
rawId
. Only valid ifread
wastrue
. -
written
, of type boolean -
A boolean that indicates that the contents of
write
were successfully stored on the authenticator , associated with the specified credential.
-
- Authenticator extension processing
-
This extension directs the user-agent to cause the large blob to be stored on, or retrieved from, the authenticator. It thus does not specify any direct authenticator interaction for
Relying Parties[RPS] .
10.2. Authenticator Extensions
This section defines extensions that are both client extensions and authenticator extensions .
10.2.1. User Verification Method Extension (uvm)
This extension enables use of a user verification method.
- Extension identifier
-
uvm
- Operation applicability
- Client extension input
-
The Boolean value
true
to indicate that this extension is requested by theRelying Party[RP] .partial dictionary AuthenticationExtensionsClientInputs {boolean
; };uvm - Client extension processing
-
None, except creating the authenticator extension input from the client extension input.
- Client extension output
-
Returns a JSON array of 3-element arrays of numbers that encodes the factors in the authenticator extension output.
typedef sequence <unsigned long >
;UvmEntry typedef sequence <UvmEntry >
;UvmEntries partial dictionary AuthenticationExtensionsClientOutputs {UvmEntries
; };uvm - Authenticator extension input
-
The Boolean value
true
, encoded in CBOR (major type 7, value 21).$$extensionInput //= ( uvm: true, )
- Authenticator extension processing
-
The authenticator sets the authenticator extension output to be one or more user verification methods indicating the method(s) used by the user to authorize the operation, as defined below. This extension can be added to attestation objects and assertions.
- Authenticator extension output
-
Authenticators can report up to 3 different user verification methods (factors) used in a single authentication instance, using the CBOR syntax defined below:
$$extensionOutput //= ( uvm: [ 1*3 uvmEntry ], ) uvmEntry = [ userVerificationMethod: uint .size 4, keyProtectionType: uint .size 2, matcherProtectionType: uint .size 2 ]
The semantics of the fields in each
uvmEntry
are as follows:- userVerificationMethod
-
The authentication method/factor used by the authenticator to verify the user. Available values are defined in Section 3.1 User Verification Methods of
[FIDO-Registry] .[[!FIDO-Registry]]. - keyProtectionType
-
The method used by the authenticator to protect the FIDO registration private key material. Available values are defined in Section 3.2 Key Protection Types of
[FIDO-Registry] .[[!FIDO-Registry]]. - matcherProtectionType
-
The method used by the authenticator to protect the matcher that performs user verification. Available values are defined in Section 3.3 Matcher Protection Types of
[FIDO-Registry] .[[!FIDO-Registry]].
If >3 factors can be used in an authentication instance the authenticator vendor MUST select the 3 factors it believes will be most relevant to the Server to include in the UVM.
Example for authenticator data containing one UVM extension for a multi-factor authentication instance where 2 factors were used:
... -- RP ID hash (32 bytes) 81 -- UP and ED set 00 00 00 01 -- (initial) signature counter ... -- all public key alg etc. A1 -- extension: CBOR map of one element 63 -- Key 1: CBOR text string of 3 bytes 75 76 6d -- "uvm" [=UTF-8 encoded=] string 82 -- Value 1: CBOR array of length 2 indicating two factor usage 83 -- Item 1: CBOR array of length 3 02 -- Subitem 1: CBOR integer for User Verification Method Fingerprint 04 -- Subitem 2: CBOR short for Key Protection Type TEE 02 -- Subitem 3: CBOR short for Matcher Protection Type TEE 83 -- Item 2: CBOR array of length 3 04 -- Subitem 1: CBOR integer for User Verification Method Passcode 01 -- Subitem 2: CBOR short for Key Protection Type Software 01 -- Subitem 3: CBOR short for Matcher Protection Type Software
10.2.2. Supplemental public keys extension ( supplementalPubKeys )
This
authenticator
registration
extension
and
authentication
extension
provides
a
Relying
Party
[RP]
with
additional
public
key(s)
for
credentials.
This
is
done
by
creating
user
credential
-specific
key
pairs
on
the
authenticator
,
when
required
key
pairs
do
not
already
exist
for
the
user
credential
being
created
or
exercised,
and
returning
these
supplemental
keys
(along
with
signatures
by
them)
to
the
Relying
Party
[RP]
.
This
is
done
each
time
this
supplementalPubKeys
extension
is
included
with
either
a
navigator.credentials.create()
or
navigator.credentials.get()
call.
If the authenticator is incapable of generating a supplemental key pair, or the registration or authentication operation fails for any reason, that key pair is omitted from the output. If no supplemental key pairs remain then this extension is ignored. In this case, there is no supplementalPubKeys extension output generated.
Supplemental keys are not user credentials and they do not have their own credential IDs . Instead, any returned keys are a contextual attribute of their associated user credential . That is, when that user credential is used—along with the supplementalPubKeys extension—on a particular authenticator , a particular set of supplemental keys are returned by the extension, along with signatures demonstrating proof-of-possession of those keys.
Supplemental keys never have a scope that is larger than the user credential . That is, they are never shared between any two user credentials and can never be used to link two user credentials together. They only communicate continuity of some property of their associated user credential .
10.2.2.1. Relying Party Usage
This
extension
is
intended
for
use
by
those
Relying
Parties
[RPS]
employing
risk-analysis
systems
informing
their
sign-in
decisions.
This
extension
signals
the
continuity
of
some
property
when
used
consistently
with
both
navigator.credentials.create()
and
navigator.credentials.get()
operations.
The
property
being
signaled
depends
on
the
scope
of
the
supplemental
key
and
its
attestation
statement,
if
any.
The
clearest
example
of
a
supplemental
key
is
one
that
is
device-bound.
Repeated
observation
of
a
device-bound
supplemental
key
indicates
that
a
credential
is
being
used
repeatedly
from
the
same
device.
(Which
cannot
be
otherwise
assumed
in
the
case
of
backup
eligible
credentials.)
But
supplemental
keys
with
wider
scopes
are
also
defined
and
the
exact
properties
that
they
communicate
depend
on
the
attestation
included
along
with
them.
When
a
Relying
Party
[RP]
uses
the
supplementalPubKeys
extension
with
a
create()
call
to
create
a
new
user
credential
,
a
signature
by
one
or
more
new
supplemental
keys
may
be
returned
along
with
the
new
supplemental
public
keys
themselves.
For
the
sake
of
example,
assume
that
a
single
supplemental
public
key
is
returned,
called
“SPK1”.
For
as
long
as
the
user
credential
is
exercised
within
the
scope
of
the
supplemental
key,
the
Relying
Party
[RP]
's
’s
subsequent
get()
operations
for
that
credential
will
likely
generate
assertions
including
further
signatures
by
“SPK1”.
The
credential
may
move
beyond
the
scope
of
that
supplemental
key
(for
example,
by
being
exported
and
imported
elsewhere,
if
backup
eligible
)
and,
if
used
in
this
new
domain,
the
get()
operation
will
return
a
new
supplemental
key,
SPK2,
and
its
signature.
Subsequent
get()
operations
may
observe
either
SPK1
or
SPK2,
depending
on
the
context
in
which
the
user
credential
is
being
used.
A usage example is thus:
A sign-in request is received by a website that, by regulation, must require certain authentication standards. The sign-in is done with a multi-device credential , but also includes a supplemental key with an attestation that states that the supplemental key is only synced after a user has met or exceeded those standards. Since that supplemental key has been seen before, and was initially verified to meet the site’s authentication standards, additional sign-in challenges are not required.
Another example of supplemental keys:
Say that a sign-in request appears at a website along with some geolocation signal that has not been seen for this user account before, and is outside of the typical usage hours observed for the account. The risk may be deemed high enough not to allow the request, even with an assertion by a multi-device credential on its own. But if a signature from a supplemental key that is device-bound, and that is well established for this user can also be presented, then that may tip the balance.
The
weight
that
Relying
Parties
[RPS]
give
to
the
presence
of
a
signature
from
a
supplemental
key
may
be
based
on
information
learned
from
its
optional
attestation.
An
attestation
can
indicate
the
level
of
protection
enjoyed
by
a
hardware-bound
key,
or
the
policies
for
other
types
of
supplemental
key.
10.2.2.2. Extension Definition
- Extension identifier
-
supplementalPubKeys
- Operation applicability
- Client extension input
-
dictionary
{AuthenticationExtensionsSupplementalPubKeysInputs required sequence <DOMString >scopes ;DOMString attestation = "indirect";sequence <DOMString >attestationFormats = []; };partial dictionary AuthenticationExtensionsClientInputs {AuthenticationExtensionsSupplementalPubKeysInputs
; };supplementalPubKeys -
scopes
, of type sequence< DOMString > -
This required member MUST be non-empty. It specifies the scopes of supplemental public keys that the
Relying Party[RP] requests. Values are taken from the CDDL below (i.e., currently defined values areprovider
anddevice
); authenticators silently ignore unrecognized values. Specifying the scopes that aRelying Party[RP] can use allows an authenticator to avoid the work of generating superfluous supplemental keys. -
attestation
, of type DOMString , defaulting to"indirect"
-
The
Relying Party[RP] MAY use this OPTIONAL member to specify a preference regarding attestation conveyance . Its value SHOULD be a member ofAttestationConveyancePreference
. Client platforms MUST ignore unknown values, treating an unknown value as if the member does not exist .The default value is
indirect
. -
attestationFormats
, of type sequence< DOMString >, defaulting to[]
-
The
Relying Party[RP] MAY use this OPTIONAL member to specify a preference regarding the attestation statement format used by the authenticator . Values SHOULD be taken from the IANA "WebAuthn Attestation Statement Format Identifiers" registry[IANA-WebAuthn-Registries][[!IANA-WebAuthn-Registries]] established by[RFC8809] .[[!RFC8809]]. Values are ordered from most preferable to least preferable. This parameter is advisory and the authenticator MAY use an attestation statement not enumerated in this parameter.The default value is the empty list, which indicates no preference.
-
- Client extension processing
-
If
supplementalPubKeys
is present, the client creates the authenticator extension input from the client extension input. - Client extension output
-
A sequence of
ArrayBuffer
s containing the signatures returned as the unsigned extension output .dictionary
{AuthenticationExtensionsSupplementalPubKeysOutputs required sequence <ArrayBuffer >
; };signatures partial dictionary AuthenticationExtensionsClientOutputs {AuthenticationExtensionsSupplementalPubKeysOutputs
; };supplementalPubKeys - Authenticator extension input
-
A CBOR expression of the client extension input
supplementalPublicKeyInputs = { scopes: [+ ; A key that has a broader scope than a single device, but still more ; limited than a multi-device credential. The precise scope is specified ; by the attestation of this supplemental public key. "provider" / ; A key with "device" scope MUST NOT leave the device on which it is ; created. "device"], attestation: tstr, attestationFormats: [* tstr], } $$extensionInput //= ( supplementalPubKeys: supplementalPublicKeyInputs, )
- Authenticator extension output
-
The supplemental public key attestation objects, defined by the
attObjForSupplementalPubKey
type:$$extensionOutput //= ( ; This array of supplemental public keys MUST be ordered ; lexicographically by scope and MUST NOT include more than one element ; with a given scope. supplementalPubKeys: [+ attObjForSupplementalPubKey], ) ; This object conveys an attested supplemental public key and is analogous ; to \`attObj\`. attObjForSupplementalPubKey = { aaguid: bstr, ; AAGUID (16 bytes fixed-length) ; https://www.w3.org/TR/webauthn/#aaguid spk: bstr, ; The public key (self-describing variable length, ; COSE_Key format, CBOR-encoded)). ; See the definition of `scopes` in `supplementalPublicKeyInputs`. scope: "provider" / "device", ; An authenticator-generated random nonce for inclusion in the attestation ; signature. If the authenticator chooses to not generate a nonce, it sets this ; to a zero-length byte string. See the note below about "randomNonce" for a ; discussion on the nonce's purpose. nonce: bstr .size (0..32), ; See https://www.w3.org/TR/webauthn/#sctn-generating-an-attestation-object ; ; Attestation statement formats define the \`fmt\` and \`attStmt\` members of ; $$attStmtType. ; Note that \`fmt\` and \`attStmt\` are top-level members of ; \`attObjForSupplementalPubKey\`. ; ; In summary, the \`attStmt\` will (typically) contain: ; (1) a SIGNATURE value calculated (using the attestation private key) ; over (prefix || aaguid || spk || nonce) where \`prefix\` is ; h'737570706c656d656e74616c5075624b657973206174746573746174696f6e2e ; 00ffffffff'. ; (See the attestation calculations section, below, for a discussion ; about the purpose of this \`prefix\` value.) ; (2) the attestation certificate or public key, and supporting certificates, ; if any. ; ; Note that there are details dependent upon the particular attestation ; statement format. ; See https://www.w3.org/TR/webauthn/#sctn-defined-attestation-formats. $$attStmtType, ; An optional boolean that indicates whether the attestation statement ; contains uniquely identifying information. This can only be true ; when the \`attestation\` field of the extension input is "enterprise" ; and either the user-agent or the authenticator permits uniquely ; identifying attestation for the requested RP ID. ? epAtt: bool .default false, }
- Unsigned extension output
-
A non-empty CBOR array of byte strings containing the signatures generated with the supplemental private keys, in the same order as in the authenticator extension output.
supplementalPublicKeyOutputs = [+ bstr] $$unsignedExtensionOutputs //= ( supplementalPubKeys: supplementalPublicKeyOutputs, )
- Authenticator extension processing
-
For both authenticatorMakeCredential and authenticatorGetAssertion operations:
-
Create or select the public key credential source as usual (see
§ 6.3.2 The authenticatorMakeCredential Operation ,[[#sctn-op-make-cred]], or§ 6.3.3 The authenticatorGetAssertion Operation[[#sctn-op-get-assertion]] as appropriate). -
Let scopes be the set of all supplemental public key scopes that the authenticator supports. Update scopes to be the intersection of itself and
scopes
. If scopes is empty, terminate these processing steps with no extension output. -
Let spks and spkSigs be empty arrays.
-
Sort scopes lexicographically.
-
For each scope in scopes :
-
If a supplemental key with scope scope does not already exist for this { Credential ID , RP ID , userHandle } tuple on the authenticator , create it using the same public key algorithm as that used by the user credential
's’s credential key pair , otherwise locate the existing supplemental key. -
Let attFormat be the chosen attestation statement format , and attAaguid be a 16-byte value, based on the value of
attestation
in the extension input:- none
-
attFormat is "none" or "self", at the authenticator’s discretion, and attAaguid is 16 zero bytes. (Note that, since the supplemental public key is already exercised during
navigator.credentials.create()
calls, the proof-of-possession property provided by "self" attestation is superfluous in that context.) - indirect, direct
-
attFormat is an attestation statement format appropriate for this authenticator based on
attestationFormats
, and attAaguid is the corresponding AAGUID , which MAY be the authenticator’s AAGUID. (Since the supplemental public key's’s scope is different from the user credential , it will often have a different attestation. For example, the attestation for a supplemental public key with “device” scope can be tied to hardware roots of trust, although it does not have to be.) - enterprise
-
The
Relying Party[RP] wants to receive an attestation statement that may include uniquely identifying information. This is intended for controlled deployments within an enterprise where the organization wishes to tie registrations to specific authenticators. Authenticators MUST NOT provide such an attestation unless the user agent or authenticator configuration expressly permits it for the requested RP ID . If not permitted, then follow the steps fordirect
attestation. Otherwise attFormat is an attestation statement format appropriate for this authenticator based onattestationFormats
, and attAaguid is the corresponding AAGUID , which MAY be the authenticator’s AAGUID.Note: CTAP2 does not currently provide for an enterpriseAttestation signal during an authenticatorGetAssertion call. Until that is changed, platform-managed enterprise attestation will not work in that context with CTAP2 authenticators .
-
Let spk be the newly created or existing supplemental public key, in COSE_Key format in the same fashion as for the user credential’s credentialPublicKey when the latter is conveyed in attested credential data .
-
Let supplementalPrivateKey be the newly created or existing private key corresponding to spk .
-
Let randomNonce be a fresh randomly-generated byte string of 32 bytes maximum length, or a zero length byte string if the authenticator chooses to not generate a nonce.
Note: randomNonce ’s purpose is to randomize the attestation signature value for supplemental public keys . If this is not done, then an attestation signature value remains constant for all such signatures issued on behalf of this user credential , possibly exposing the authenticator
's’s attestation private key to side-channel attacks. The randomness-generation mechanism should be carefully chosen by the authenticator implementer. -
Let supplementalPubKey be a CBOR map as defined by
attObjForSupplementalPubKey
above, with keys and values as follows:Note: as with all CBOR structures used in this specification, the CTAP2 canonical CBOR encoding form MUST be used.
-
Set a key and value for the
scope
group based on the value of scope . -
Let the
aaguid
key’s value be attAaguid . -
Let the
spk
key’s value be spk . -
Let the
nonce
key’s value be randomNonce . -
Let the values of the
$$attStmtType
group socket be the result of generating an attestation statement with the attestation statement format , attFormat . See§ 10.2.2.2.2 Attestation calculations .[[#sctn-supplemental-public-keys-attestation-calculations]].Note: The details of the
$$attStmtType
values are dependent upon the particular attestation statement format. See§ 6.5.2 Attestation Statement Formats .[[#sctn-attestation-formats]]. -
If the
$$attStmtType
group socket contains uniquely identifying information then letepAtt
betrue
. Otherwise omit theepAtt
field. (This field can only betrue
when theattestation
field of the extension input is "enterprise" and either the user-agent or the authenticator permits uniquely identifying attestation for the requested RP ID.)
-
-
Append supplementalPubKey to spks .
-
Let spkSig be the result of signing the assertion signature input with supplementalPrivateKey .
Note: the assertion signature input , and thus spkSig , covers the
Relying Party[RP]'s’schallenge
because it includes the hash of the serialized client data . Thus theRelying Party[RP] knows that spkSig is a fresh signature. -
Append spkSig to spkSigs .
-
-
Let the
supplementalPubKeys
authenticator extension output value be the CBOR array spks . -
Let the CBOR encoding of spkSigs be the extension’s unsigned extension output .
Note: spkSigs cannot be included in the authenticator extension output because it is returned inside the authenticator data and that would imply that the signature signs over itself.
-
10.2.2.2.1. AAGUIDs
Any
non-zero
AAGUID
s
included
in
the
supplementalPubKeys
extension
output
aid
a
Relying
Party
[RP]
in
validating
the
attestation
statement
of
the
supplemental
public
key.
The
interpretation
of
each
AAGUID
depends
on
the
scope
of
the
corresponding
key.
Some
or
all
may
differ
from
the
aaguid
in
the
attested
credential
data
of
a
multi-device
credential
.
Thus
the
AAGUID
of
a
supplemental
public
key
MAY
be
different
in
a
single
response
and
either,
or
both,
may
be
zero
depending
on
the
options
requested
and
authenticator
behaviour.
10.2.2.2.2. Attestation calculations
When
computing
attestations,
the
process
in
§ 6.5.4
Generating
an
Attestation
Object
[[#sctn-generating-an-attestation-object]]
takes
two
inputs:
authData
and
hash
.
When
calculating
an
attestation
for
a
supplemental
public
key,
the
typical
value
for
authData
contains
the
attestation
signature
itself,
which
is
impossible.
Also
the
attestation
of
a
supplemental
public
key
is
potentially
used
repeatedly,
thus
may
want
to
be
cached.
But
signing
over
values
that
include
Relying
Party
[RP]
-chosen
nonces,
like
the
hash
of
the
serialized
client
data
,
makes
that
impossible.
Therefore when calculating an attestation for a supplemental public key, the inputs are:
-
For
authData
, substitute the concatenation of the byte string h’737570706c656d656e74616c5075624b657973206174746573746174696f6e2e00ffffffff' and the value of aaguid from the extension output. -
For
hash
, substitute the concatenation of the spk and nonce fields from the extension output. (The nonce MAY be empty.)
The
attestation
signature
is
thus
typically
calculated
over
the
bytes
of
(h’737570706c656d656e74616c5075624b657973206174746573746174696f6e2e00ffffffff'
||
aaguid
||
spk
||
nonce
)
.
The
37-byte
prefix
ensures
domain
separation:
it
takes
the
place
of
the
RP
ID
hash,
flags,
and
signature
counter
fields
in
those
messages
and
ensures
that
no
attestation
signature
for
a
supplemental
public
key
can
be
confused
with
a
signature
for
a
user
credential
.
Note that when nonce is empty, then the (signed) authenticator extension output MAY be constant. However, the (unsigned) spkSig output is always unique and prevents replay of the (signed) extension output without knowledge of the supplemental private key.
10.2.2.3.
supplementalPubKeys
Extension
Output
Verification
Procedures
Verifying
the
supplementalPubKeys
extension
output
is
performed
by
the
Relying
Party
[RP]
whenever
a
supplemental
public
key
is
returned
within
the
extension
output.
The supplementalPubKeys extension adds the following item to credential records :
- supplementalPubKeys
-
An initially empty set of supplemental public key records associated with this public key credential source .
A supplemental public key record is an abstract representation of a registered supplemental public key. It is a struct with the following items :
- aaguid
-
The AAGUID included with the supplemental public key. This MAY be different from the aaguid in the attestationObject , if any, of the containing credential record .
- spk
-
The public key portion of the supplemental public key.
- scope
-
The scope of the supplemental public key. See
§ 10.2.2.2 Extension Definition[[#sctn-supplemental-public-keys-extension-definition]] for details. - fmt
-
The attestation statement format of the supplemental public key’s attestation statement .
- attStmt
-
The supplemental public key’s attestation statement .
10.2.2.3.1.
Registration
(
create()
)
If
the
Relying
Party
[RP]
requested
the
supplementalPubKeys
extension
in
a
navigator.credentials.create()
call,
then
the
below
verification
steps
are
performed
in
the
context
of
step
20
of
§ 7.1
Registering
a
New
Credential
[[#sctn-registering-a-new-credential]]
using
these
variables
established
therein:
credential
,
clientExtensionResults
,
authData
,
and
hash
.
Relying
Party
[RP]
policy
may
specify
whether
a
response
without
a
supplementalPubKeys
extension
output
is
acceptable.
-
Verify that the
supplementalPubKeys
member of clientExtensionResults exists, and contains thesignatures
field. Let signatures be the value of that field. -
Let attObjsForSupplementalPublicKey be the value of the
supplementalPubKeys
member of the authenticator extension output from authData . -
If the size of attObjsForSupplementalPublicKey is not equal to the size of signatures then abort the registration process with an error.
-
Iterate over the indices of attObjsForSupplementalPublicKey (which, after the check in the previous step, must also be the indices of signatures ). Then, for each ( attObjForSupplementalPubKey , signature ) from the two lists:
-
Extract the contained fields from attObjForSupplementalPubKey : aaguid , spk , nonce , fmt and attStmt . Also let scope reflect the scope, specified by the member of the
scope
group that is present.Note: The latter attObjForSupplementalPubKey fields are referenced exclusively in the below steps and are not to be confused with other fields with the same names in other portions of the top-level attestation object .
-
Verify that signature is a valid signature over the assertion signature input (i.e.
authData
andhash
) by the supplemental public key spk . (The signature algorithm is the same as for the user credential .) -
Optionally, if attestation was requested and the
Relying Party[RP] wishes to verify it, verify that attStmt is a correct attestation statement , conveying a valid attestation signature , by using the attestation statement format fmt ’s verification procedure given attStmt . See§ 10.2.2.2.2 Attestation calculations . Relying Party[[#sctn-supplemental-public-keys-attestation-calculations]]. [RP] policy may specifiy which attestations are acceptable.Note: If fmt ’s value is " none " there is no attestation signature to verify.
-
Create a new supplemental public key record with the contents:
- aaguid
-
The value of aaguid .
- spk
-
The value of spk .
- scope
-
The value of scope .
- fmt
-
The value of fmt .
- attStmt
-
The value of attStmt .
In step 27 of
§ 7.1 Registering a New Credential ,[[#sctn-registering-a-new-credential]], add this supplemental public key record to the supplementalPubKeys member of the new credential record .
-
See
also
§ 10.2.2.1
Relying
Party
Usage
[[#sctn-supplemental-public-keys-extension-usage]]
for
further
details.
10.2.2.3.2.
Authentication
(
get()
)
If
the
Relying
Party
[RP]
requested
the
supplementalPubKeys
extension
in
a
navigator.credentials.get()
call,
then
the
below
verification
steps
are
performed
in
the
context
of
step
19
of
§ 7.2
Verifying
an
Authentication
Assertion
[[#sctn-verifying-assertion]]
using
these
variables
established
therein:
credential
,
clientExtensionResults
,
authData
,
hash
,
and
credentialRecord
.
Relying
Party
[RP]
policy
may
specify
whether
a
response
without
a
supplementalPubKeys
extension
output
is
acceptable.
-
Verify that the
supplementalPubKeys
member of clientExtensionResults exists, and contains thesignatures
field. Let signatures be the value of that field. -
Let attObjsForSupplementalPubKeys be the value of the
supplementalPubKeys
member of the authenticator extension output from authData . -
If the size of attObjsForSupplementalPubKeys is not equal to the size of signatures then abort the authentication process with an error.
-
Iterate over the indices of attObjsForSupplementalPubKeys (which, after the check in the previous step, must also be the indices of signatures ). Then, for each ( attObjForSupplementalPubKey , signature ) from the two lists:
-
Extract the contained fields from attObjForSupplementalPubKey : aaguid , spk , nonce , fmt , attStmt . Also let scope reflect the scope, specified by the member of the
scope
group that is present.Note: The latter attObjForSupplementalPubKey fields are referenced exclusively in the below steps and are not to be confused with other fields with the same names in other portions of authenticator data .
-
Verify that signature is a valid signature over the assertion signature input (i.e.
authData
andhash
) by the supplemental public key spk . (The signature algorithm is the same as for the user credential .) -
Let matchedSpkRecords be a new empty set . For each spkRecord in credentialRecord . supplementalPubKeys :
-
If matchedSpkRecords
- has size greater than one:
-
Some form of error has occurred: credentialRecord invariants have been broken. Terminate these verification steps.
- has size equal to one:
-
This is a known supplemental public key
If fmt ’s value is "none" then there is no attestation signature to verify and this is a known supplemental public key with a valid signature. Append spkRecord to recognizedSpks and continue to the next iteration, if any.
Otherwise, let spkRecord be matchedSpkRecords [0]. If the attStmt in attObjForSupplementalPubKey :
- equals spkRecord . attStmt by binary equality:
-
This is a known supplemental public key with a valid signature and valid attestation. Append spkRecord to recognizedSpks and continue to the next iteration, if any.
Note: This authenticator is not generating a fresh per-response random nonce.
- does not equal spkRecord . attStmt by binary equality:
-
Optionally, if attestation was requested and the RP wishes to verify it, verify that attStmt is a correct attestation statement , conveying a valid attestation signature , by using the attestation statement format fmt ’s verification procedure given attStmt . See
§ 10.2.2.2.2 Attestation calculations . Relying Party[[#sctn-supplemental-public-keys-attestation-calculations]]. [RP] policy may specifiy which attestations are acceptable.If the result is:
- successful
-
This is a known supplemental public key with a valid signature and valid attestation. Append spkRecord to recognizedSpks and continue to the next iteration, if any.
- unsuccessful
-
Some form of error has occurred. It is indeterminate whether this is a valid supplemental public key . Either terminate these verification steps with an error or continue to the next iteration, if any, to ignore this key.
- is empty :
-
This is possibly a new supplemental public key .
-
Let matchedSpkKeys be a new empty set . For each spkRecord in credentialRecord . supplementalPubKeys :
-
If matchedSpkKeys is empty :
- If fmt ’s value is "none":
-
There is no attestation signature to verify and this is a new supplemental key. Unless
Relying Party[RP] policy specifies that this attestation is unacceptable, Create a new supplemental public key record and then continue to the next iteration, if any. - Otherwise:
-
Optionally, if attestation was requested and the RP wishes to verify it, verify that attStmt is a correct attestation statement , conveying a valid attestation signature , by using the attestation statement format fmt ’s verification procedure given attStmt . See
§ 10.2.2.2.2 Attestation calculations . Relying Party[[#sctn-supplemental-public-keys-attestation-calculations]]. [RP] policy may specifiy which attestations are acceptable.If the result is:
- successful
-
This is a new supplemental public key . Create a new supplemental public key record then continue to the next iteration, if any.
- unsuccessful
-
Some form of error has occurred and a supplemental public key record cannot be created. Either terminate these verification steps with an error or continue to the next iteration, if any, to ignore this supplemental public key.
-
Otherwise there is some form of error: we recieved a known spk value, but one or more of the accompanying aaguid or scope values did not match what the
Relying Party[RP] has stored along with that spk value. Terminate these verification steps.
-
-
At
the
end
of
these
steps,
recognizedSpks
contains
zero
or
more
supplemental
public
keys
that
were
previously
known
for
this
user
credential
.
These
keys
make
claims
about
the
continuity
of
certain
factors
between
this
authentication
attempt
and
previous
ones.
The
Relying
Party
[RP]
should
judge
those
claims
in
light
of
the
attestations
provided,
if
any,
and
evaluate
the
risk
of
this
authentication
in
light
of
this
information.
See
also
§ 10.2.2.1
Relying
Party
Usage
.
[[#sctn-supplemental-public-keys-extension-usage]].
To Create a new supplemental public key record , perform the following steps:
-
Create a new supplemental public key record with the contents:
- aaguid
-
The value of aaguid .
- spk
-
The value of spk .
- scope
-
The value of scope .
- fmt
-
The value of fmt .
- attStmt
-
The value of attStmt .
In step 23 of
§ 7.2 Verifying an Authentication Assertion ,[[#sctn-verifying-assertion]], append this supplemental public key record to credentialRecord . supplementalPubKeys .
10.2.3. Confirmation Extension (confirmation)
This confirmation extension allows for capturing user confirmation. A [RP] can specify the structured details of a specific confirmation type. The confirmation type specific structured details are intended for display by the platform and by the authenticator (if supported). With this approach, Relying Parties can use the feature independently of the capabilities of the authenticator used by the user, while still benefitting from the increased security level if the authenticator itself supports showing the confirmation prompt.
Authenticators could use a Trusted UI to ensure that the user indeed sees the confirmation details.
Example uses cases could be "I want to move $1234 from account A to account B" or "I want to share my health data with hospital X".
- Extension identifier
confirmation
- Operation applicability
- Client extension input
The confirmationType plus additional details that depend on the confirmation type as specified below.
dictionary
{ };ConfirmationDetailsJSON partial dictionary AuthenticationExtensionsClientInputsJSON {USVString
; // "move-money", "monetary-limit", "trades", "accept-risk", "share-data", "sign-in-purpose"confirmationType ConfirmationDetailsJSON
; };details partial dictionary ConfirmationDetailsJSON { // confirmationType: "spc"required USVString
; // example: "Best Purchase, Inc"payeeName required USVString
; // example: "best-purchase.com"payeeOrigin required PaymentCurrencyAmount
; // example: { "currency": "US-$", "value": 400 }total required PaymentCredentialInstrument
; // example: "EBICS", "SCT Inst", … };instrument partial dictionary ConfirmationDetailsJSON { // confirmationType: "move-money"required USVString
; // example: "IBAN: IE12 BOFI 9000 0112 3456 78"moveFrom required USVString
; // example: "Account 21343255, BIC NFBKUS33XXX"moveTo required PaymentCurrencyAmount
; // example: { "currency": "US-$", "value": 400 }moveTotal USVString
; // example: "EBICS", "SCT Inst", … };moveDetails partial dictionary ConfirmationDetailsJSON { // confirmationType: "monetary-limit"required USVString
; // example: "IBAN: IE12 BOFI 9000 0112 3456 78"limitAccount required PaymentCurrencyAmount
; // example: { "currency": "US-$", "value": 400 }limitTotal USVString
; // example: "daily amount", "weekly ATM withdrawal", … };limitDetails partial dictionary ConfirmationDetailsJSON { // confirmationType: "trades"required USVString
; // example: "IBAN: IE12 BOFI 9000 0112 3456 78"tradeAccount required USVString
; // example: "WKN: 43259887", "Stock Symbol: PYPL")tradeItemName required USVString
; // example: "234"tradeItemCount required USVString
; // example: “GETTEX", "XETRA", TRADEGATE", ...tradeExchange required USVString
; // example: { "currency": "US-$", "value": 400 }tradeConditionTotal USVString
; // example: "limit", "stop" };tradeConditionName partial dictionary ConfirmationDetailsJSON { // confirmationType: "accept-risk"required USVString
; // example: "interest rate risk", "either interest rate or exchange rate risk", ...riskClass required USVString
; // example: "Best Bank, Berlin, Germany"riskRPName required USVString
; // example: "John Doe, more identfying details" };riskUserName partial dictionary ConfirmationDetailsJSON { // confirmationType: "share-data", e.g. according to GDPR article 7, ISO27701 etc.required USVString
; // example: "personal health data since 2016", ...dataClass required USVString
; // data controller, example: "Mount Sinai Hospital, New York, New York, United States"dataRPName required USVString
; // data subject, example: "John Doe, more identfying details" };dataUserName partial dictionary ConfirmationDetailsJSON { // confirmationType: "sign-in-purpose", e.g. open banking sign-in for specific providerrequired USVString
; // example: "AISP ACME Ltd." };purpose - Client extension processing
use a dialog to the user that makes the user aware of the confirmation to be provided (as opposed to doing a simple sign-in).
display the confirmation type and confirmation details to the user. The client SHOULD indicate that the confirmation details originate from a specific relying party (as opposed to the platform itself).
use the
CollectedClientConfirmationData
structure containing the confirmation prompt instead of using theCollectedClientData
structure.pass-through the extension to the authenticator (see "authenticator extension input" below)
pass-through the "authenticator extension output" to the caller as part of the assertion
The
CollectedClientDataExtensions
dictionary contains the following additional fields:partial dictionary CollectedClientDataExtensions {USVString
; // "move-money", "monetary-limit", "trades", "accept-risk", "share-data", "sign-in-purpose"confirmationType ConfirmationDetailsJSON
; };details - Client extension output
Returns the value
true
to indicate to the [RP] that the extension was acted upon.partial dictionary AuthenticationExtensionsClientOutputs {boolean
; };confirmation - Authenticator extension input
The client provides the extension input to the authenticator as:
$$extensionInput //= ( confirmationType: tstr, confirmationDetails: confirmationDetailsMap; ) confirmationDetailsMap = { ; map of the field names and related values as used in the related ConfirmationDetailsJSON ; For example: ; { ; 'moveFrom', 'IBAN: IE12 BOFI 9000 0112 3456 78' ; 'moveTo', 'Account 21343255, BIC NFBKUS33XXX' ; 'moveTotal', ( 'currency', 'US-$', 'value', '400' ) ; 'moveDetails', 'EBICS' ; } }
- Authenticator extension processing
The authenticator supporting this extension MUST display the confirmation details to the user before performing either user verification or test of user presence .
- Authenticator extension output
The authenticator adds the following extension to indicate that the confirmation details were shown and approved by the user:
$$extensionOutput //= ( confirmationType: tstr, confirmationDetails: confirmationDetailsMap; )
Note:
It
is
up
to
the
relying
party
to
handle
the
different
user
verification
options
appropriately.
This
includes
appropriate
settings
for
userVerification
and
appropriate
processing
of
UV
and
UP
.
This
confirmation
extension
doesn’t
change
the
way
user
verification
is
handled
by
the
client
platform
/
authenticator
.
10.2.3.1.
confirmation
Extension
Output
Verification
Procedures
The
following
verification
steps
are
performed
in
the
context
of
step
19
of
[[#sctn-verifying-assertion]]
using
these
variables
established
therein:
credential
,
clientExtensionResults
,
authData
,
hash
,
and
credentialRecord
.
[RP]
policy
may
specify
whether
a
response
without
a
confirmation
extension
output
is
acceptable.
Verify that the
confirmation
key exists in the extensions in authData .Verify that the
confirmation
value in the extensions in authData equals the confirmation prompt that is expected (i.e., that was used when requesting theconfirmation
extension).If processing a response without the
confirmation
extension is acceptable by policy: Fall back tocredential .
entry if authenticator extension output is absent.response
.clientDataJSON
11. User Agent Automation
For
the
purposes
of
user
agent
automation
and
web
application
testing,
this
document
defines
a
number
of
[WebDriver]
[[WebDriver]]
extension
commands
.
11.1. WebAuthn WebDriver Extension Capability
In order to advertise the availability of the extension commands defined below, a new extension capability is defined.
Capability | Key | Value Type | Description |
---|---|---|---|
Virtual Authenticators Support |
"webauthn:virtualAuthenticators"
| boolean | Indicates whether the endpoint node supports all Virtual Authenticators commands. |
When
validating
capabilities
,
the
extension-specific
substeps
to
validate
"webauthn:virtualAuthenticators"
with
value
are
the
following:
-
If
value
is not a boolean return a WebDriver Error with WebDriver error code invalid argument . -
Otherwise, let
deserialized
be set tovalue
.
When
matching
capabilities
,
the
extension-specific
steps
to
match
"webauthn:virtualAuthenticators"
with
value
are
the
following:
-
If
value
istrue
and the endpoint node does not support any of the Virtual Authenticators commands, the match is unsuccessful. -
Otherwise, the match is successful.
11.1.1. Authenticator Extension Capabilities
Additionally, extension capabilities are defined for every authenticator extension (i.e. those defining authenticator extension processing ) defined in this specification:
Capability | Key | Value Type | Description |
---|---|---|---|
User Verification Method Extension Support |
"webauthn:extension:uvm"
| boolean | Indicates whether the endpoint node WebAuthn WebDriver implementation supports the User Verification Method extension. |
Pseudo-Random Function Extension Support |
"webauthn:extension:prf"
| boolean | Indicates whether the endpoint node WebAuthn WebDriver implementation supports the prf extension. |
Large Blob Storage Extension Support |
"webauthn:extension:largeBlob"
| boolean | Indicates whether the endpoint node WebAuthn WebDriver implementation supports the largeBlob extension. |
credBlob Extension Support |
"webauthn:extension:credBlob"
| boolean |
Indicates
whether
the
endpoint
node
WebAuthn
WebDriver
implementation
supports
the
credBlob
extension
defined
in
|
When
validating
capabilities
,
the
extension-specific
substeps
to
validate
an
authenticator
extension
capability
key
with
value
are
the
following:
-
If
value
is not a boolean return a WebDriver Error with WebDriver error code invalid argument . -
Otherwise, let
deserialized
be set tovalue
.
When
matching
capabilities
,
the
extension-specific
steps
to
match
an
authenticator
extension
capability
key
with
value
are
the
following:
-
If
value
istrue
and the endpoint node WebAuthn WebDriver implementation does not support the authenticator extension identified by thekey
, the match is unsuccessful. -
Otherwise, the match is successful.
User-Agents implementing defined authenticator extensions SHOULD implement the corresponding authenticator extension capability .
11.2. Virtual Authenticators
These WebDriver extension commands create and interact with Virtual Authenticators : software implementations of the Authenticator Model . Virtual Authenticators are stored in a Virtual Authenticator Database . Each stored virtual authenticator has the following properties:
- authenticatorId
-
An non-null string made using up to 48 characters from the
unreserved
production defined in Appendix A of[RFC3986][[RFC3986]] that uniquely identifies the Virtual Authenticator . - protocol
-
The protocol the Virtual Authenticator speaks: one of
"ctap1/u2f"
,"ctap2"
or"ctap2_1"
[FIDO-CTAP] .[[FIDO-CTAP]]. - transport
-
The
AuthenticatorTransport
simulated. If the transport is set tointernal
, the authenticator simulates platform attachment . Otherwise, it simulates cross-platform attachment . - hasResidentKey
-
If set to
true
the authenticator will support client-side discoverable credentials . - hasUserVerification
-
If set to
true
, the authenticator supports user verification . - isUserConsenting
-
Determines the result of all user consent authorization gestures , and by extension, any test of user presence performed on the Virtual Authenticator . If set to
true
, a user consent will always be granted. If set tofalse
, it will not be granted. - isUserVerified
-
Determines the result of User Verification performed on the Virtual Authenticator . If set to
true
, User Verification will always succeed. If set tofalse
, it will fail.Note: This property has no effect if hasUserVerification is set to
false
. - extensions
-
A string array containing the extension identifiers supported by the Virtual Authenticator .
A Virtual authenticator MUST support all authenticator extensions present in its extensions array. It MUST NOT support any authenticator extension not present in its extensions array.
- uvm
-
A
UvmEntries
array to be set as the authenticator extension output when processing the User Verification Method extension.Note: This property has no effect if the Virtual Authenticator does not support the User Verification Method extension.
- defaultBackupEligibility
-
Determines the default state of the backup eligibility credential property for any newly created Public Key Credential Source . This value MUST be reflected by the BE authenticator data flag when performing an authenticatorMakeCredential operation with this virtual authenticator .
- defaultBackupState
-
Determines the default state of the backup state credential property for any newly created Public Key Credential Source . This value MUST be reflected by the BS authenticator data flag when performing an authenticatorMakeCredential operation with this virtual authenticator .
11.3. Add Virtual Authenticator
The Add Virtual Authenticator WebDriver extension command creates a software Virtual Authenticator . It is defined as follows:
HTTP Method | URI Template |
---|---|
POST |
/session/{session
id}/webauthn/authenticator
|
The Authenticator Configuration is a JSON Object passed to the remote end steps as parameters . It contains the following key and value pairs:
Key | Value Type | Valid Values | Default |
---|---|---|---|
protocol | string |
"ctap1/u2f"
,
"ctap2"
,
"ctap2_1"
| None |
transport | string |
AuthenticatorTransport
values
| None |
hasResidentKey | boolean |
true
,
false
|
false
|
hasUserVerification | boolean |
true
,
false
|
false
|
isUserConsenting | boolean |
true
,
false
|
true
|
isUserVerified | boolean |
true
,
false
|
false
|
extensions | string array | An array containing extension identifiers | Empty array |
uvm |
UvmEntries
| Up to 3 User Verification Method entries | Empty array |
defaultBackupEligibility | boolean |
true
,
false
|
false
|
defaultBackupState | boolean |
true
,
false
|
false
|
The remote end steps are:
-
If parameters is not a JSON Object , return a WebDriver error with WebDriver error code invalid argument .
Note: parameters is a Authenticator Configuration object.
-
Let authenticator be a new Virtual Authenticator .
-
For each enumerable own property in parameters :
-
Let key be the name of the property.
-
Let value be the result of getting a property named key from parameters .
-
If there is no matching
key
for key in Authenticator Configuration , return a WebDriver error with WebDriver error code invalid argument . -
If value is not one of the
valid values
for that key , return a WebDriver error with WebDriver error code invalid argument . -
Set a property key to value on authenticator .
-
-
For each property in Authenticator Configuration with a default defined:
-
If
key
is not a defined property of authenticator , set a propertykey
todefault
on authenticator .
-
-
For each property in Authenticator Configuration :
-
If
key
is not a defined property of authenticator , return a WebDriver error with WebDriver error code invalid argument .
-
-
For each extension in authenticator . extensions :
-
If extension is not an extension identifier supported by the endpoint node WebAuthn WebDriver implementation, return a WebDriver error with WebDriver error code unsupported operation .
-
-
Generate a valid unique authenticatorId .
-
Set a property
authenticatorId
to authenticatorId on authenticator . -
Store authenticator in the Virtual Authenticator Database .
-
Return success with data authenticatorId .
11.4. Remove Virtual Authenticator
The Remove Virtual Authenticator WebDriver extension command removes a previously created Virtual Authenticator . It is defined as follows:
HTTP Method | URI Template |
---|---|
DELETE |
/session/{session
id}/webauthn/authenticator/{authenticatorId}
|
The remote end steps are:
-
If authenticatorId does not match any Virtual Authenticator stored in the Virtual Authenticator Database , return a WebDriver error with WebDriver error code invalid argument .
-
Remove the Virtual Authenticator identified by authenticatorId from the Virtual Authenticator Database
-
Return success .
11.5. Add Credential
The Add Credential WebDriver extension command injects a Public Key Credential Source into an existing Virtual Authenticator . It is defined as follows:
HTTP Method | URI Template |
---|---|
POST |
/session/{session
id}/webauthn/authenticator/{authenticatorId}/credential
|
The Credential Parameters is a JSON Object passed to the remote end steps as parameters . It contains the following key and value pairs:
Key | Description | Value Type |
---|---|---|
credentialId | The Credential ID encoded using Base64url Encoding . | string |
isResidentCredential |
If
set
to
true
,
a
client-side
discoverable
credential
is
created.
If
set
to
false
,
a
server-side
credential
is
created
instead.
| boolean |
rpId | The Relying Party ID the credential is scoped to. | string |
privateKey |
An
asymmetric
key
package
containing
a
single
private
key
per
| string |
userHandle | The userHandle associated to the credential encoded using Base64url Encoding . This property may not be defined. | string |
signCount | The initial value for a signature counter associated to the public key credential source . | number |
largeBlob | The large, per-credential blob associated to the public key credential source , encoded using Base64url Encoding . This property may not be defined. | string |
backupEligibility |
The
simulated
backup
eligibility
for
the
public
key
credential
source
.
If
unset,
the
value
will
default
to
the
virtual
authenticator
| boolean |
backupState |
The
simulated
backup
state
for
the
public
key
credential
source
.
If
unset,
the
value
will
default
to
the
virtual
authenticator
| boolean |
The remote end steps are:
-
If parameters is not a JSON Object , return a WebDriver error with WebDriver error code invalid argument .
Note: parameters is a Credential Parameters object.
-
Let credentialId be the result of decoding Base64url Encoding on the parameters ’ credentialId property.
-
If credentialId is failure, return a WebDriver error with WebDriver error code invalid argument .
-
Let isResidentCredential be the parameters ’ isResidentCredential property.
-
If isResidentCredential is not defined, return a WebDriver error with WebDriver error code invalid argument .
-
Let rpId be the parameters ’ rpId property.
-
If rpId is not a valid RP ID , return a WebDriver error with WebDriver error code invalid argument .
-
Let privateKey be the result of decoding Base64url Encoding on the parameters ’ privateKey property.
-
If privateKey is failure, return a WebDriver error with WebDriver error code invalid argument .
-
If privateKey is not a validly-encoded asymmetric key package containing a single ECDSA private key on the P-256 curve per
[RFC5958] ,[[RFC5958]], return a WebDriver error with WebDriver error code invalid argument . -
If the parameters ’ userHandle property is defined:
-
Let userHandle be the result of decoding Base64url Encoding on the parameters ’ userHandle property.
-
If userHandle is failure, return a WebDriver error with WebDriver error code invalid argument .
-
-
Otherwise:
-
If isResidentCredential is
true
, return a WebDriver error with WebDriver error code invalid argument . -
Let userHandle be
null
.
-
-
If authenticatorId does not match any Virtual Authenticator stored in the Virtual Authenticator Database , return a WebDriver error with WebDriver error code invalid argument .
-
Let authenticator be the Virtual Authenticator matched by authenticatorId .
-
If isResidentCredential is
true
and the authenticator ’s hasResidentKey property isfalse
, return a WebDriver error with WebDriver error code invalid argument . -
If the authenticator supports the largeBlob extension and the parameters ’ largeBlob feature is defined:
-
Let largeBlob be the result of decoding Base64url Encoding on the parameters ’ largeBlob property.
-
If largeBlob is failure, return a WebDriver error with WebDriver error code invalid argument .
-
-
Otherwise:
-
Let largeBlob be
null
.
-
-
Let backupEligibility be the parameters ’ backupEligibility property.
-
If backupEligibility is not defined, set backupEligibility to the value of the authenticator ’s defaultBackupEligibility .
-
Let backupState be the parameters ’ backupState property.
-
If backupState is not defined, set backupState to the value of the authenticator ’s defaultBackupState .
-
Let credential be a new Client-side discoverable Public Key Credential Source if isResidentCredential is
true
or a Server-side Public Key Credential Source otherwise whose items are:- type
- id
-
credentialId
- privateKey
-
privateKey
- rpId
-
rpId
- userHandle
-
userHandle
-
Set the credential ’s backup eligibility credential property to backupEligibility .
-
Set the credential ’s backup state credential property to backupState .
-
Associate a signature counter counter to the credential with a starting value equal to the parameters ’ signCount or
0
if signCount isnull
. -
If largeBlob is not
null
, set the large, per-credential blob associated to the credential to largeBlob . -
Store the credential and counter in the database of the authenticator .
-
Return success .
11.6. Get Credentials
The
Get
Credentials
WebDriver
extension
command
returns
one
Credential
Parameters
object
for
every
Public
Key
Credential
Source
stored
in
a
Virtual
Authenticator
,
regardless
of
whether
they
were
stored
using
Add
Credential
or
navigator.credentials.create()
.
It
is
defined
as
follows:
HTTP Method | URI Template |
---|---|
GET |
/session/{session
id}/webauthn/authenticator/{authenticatorId}/credentials
|
The remote end steps are:
-
If authenticatorId does not match any Virtual Authenticator stored in the Virtual Authenticator Database , return a WebDriver error with WebDriver error code invalid argument .
-
Let credentialsArray be an empty array.
-
For each Public Key Credential Source credential , managed by the authenticator identified by authenticatorId , construct a corresponding Credential Parameters Object and add it to credentialsArray .
-
Return success with data containing credentialsArray .
11.7. Remove Credential
The Remove Credential WebDriver extension command removes a Public Key Credential Source stored on a Virtual Authenticator . It is defined as follows:
HTTP Method | URI Template |
---|---|
DELETE |
/session/{session
id}/webauthn/authenticator/{authenticatorId}/credentials/{credentialId}
|
The remote end steps are:
-
If authenticatorId does not match any Virtual Authenticator stored in the Virtual Authenticator Database , return a WebDriver error with WebDriver error code invalid argument .
-
Let authenticator be the Virtual Authenticator identified by authenticatorId .
-
If credentialId does not match any Public Key Credential Source managed by authenticator , return a WebDriver error with WebDriver error code invalid argument .
-
Remove the Public Key Credential Source identified by credentialId managed by authenticator .
-
Return success .
11.8. Remove All Credentials
The Remove All Credentials WebDriver extension command removes all Public Key Credential Sources stored on a Virtual Authenticator . It is defined as follows:
HTTP Method | URI Template |
---|---|
DELETE |
/session/{session
id}/webauthn/authenticator/{authenticatorId}/credentials
|
The remote end steps are:
-
If authenticatorId does not match any Virtual Authenticator stored in the Virtual Authenticator Database , return a WebDriver error with WebDriver error code invalid argument .
-
Remove all Public Key Credential Sources managed by the Virtual Authenticator identified by authenticatorId .
-
Return success .
11.9. Set User Verified
The Set User Verified extension command sets the isUserVerified property on the Virtual Authenticator . It is defined as follows:
HTTP Method | URI Template |
---|---|
POST |
/session/{session
id}/webauthn/authenticator/{authenticatorId}/uv
|
The remote end steps are:
-
If parameters is not a JSON Object , return a WebDriver error with WebDriver error code invalid argument .
-
If authenticatorId does not match any Virtual Authenticator stored in the Virtual Authenticator Database , return a WebDriver error with WebDriver error code invalid argument .
-
If isUserVerified is not a defined property of parameters , return a WebDriver error with WebDriver error code invalid argument .
-
Let authenticator be the Virtual Authenticator identified by authenticatorId .
-
Set the authenticator ’s isUserVerified property to the parameters ’ isUserVerified property.
-
Return success .
11.10. Set Credential Properties
The
Set
Credential
Properties
extension
command
allows
setting
the
backupEligibility
and
backupState
credential
properties
of
a
Virtual
Authenticator
's
’s
public
key
credential
source
.
It
is
defined
as
follows:
HTTP Method | URI Template |
---|---|
POST |
/session/{session
id}/webauthn/authenticator/{authenticatorId}/credentials/{credentialId}/props
|
The Set Credential Properties Parameters is a JSON Object passed to the remote end steps as parameters . It contains the following key and value pairs:
Key | Description | Value Type |
---|---|---|
backupEligibility | The backup eligibility credential property . | boolean |
backupState | The backup state credential property . | boolean |
The remote end steps are:
-
If parameters is not a JSON Object , return a WebDriver error with WebDriver error code invalid argument .
Note: parameters is a Set Credential Properties Parameters object.
-
If authenticatorId does not match any Virtual Authenticator stored in the Virtual Authenticator Database , return a WebDriver error with WebDriver error code invalid argument .
-
Let credential be the public key credential source managed by authenticator matched by credentialId .
-
If credential is empty, return a WebDriver error with WebDriver error code invalid argument .
-
Let backupEligibility be the parameters ’ backupEligibility property.
-
If backupEligibility is defined, set the backup eligibility credential property of credential to the value of backupEligibility .
Note: Normally, the backupEligibility property is permanent to a public key credential source . Set Credential Properties allows changing it for testing and debugging purposes.
-
Let backupState be the parameters ’ backupState property.
-
If backupState is defined, set the backup state credential property of credential to the value of backupState .
-
Return success .
12. IANA Considerations
12.1. WebAuthn Attestation Statement Format Identifier Registrations Updates
This
section
updates
the
below-listed
attestation
statement
formats
defined
in
Section
§ 8
Defined
Attestation
Statement
Formats
[[#sctn-defined-attestation-formats]]
in
the
IANA
"WebAuthn
Attestation
Statement
Format
Identifiers"
registry
[IANA-WebAuthn-Registries]
[[!IANA-WebAuthn-Registries]]
established
by
[RFC8809]
,
[[!RFC8809]],
originally
registered
in
[WebAuthn-1]
,
[[WebAuthn-1]],
to
point
to
this
specification.
-
WebAuthn Attestation Statement Format Identifier: packed
-
Description: The "packed" attestation statement format is a WebAuthn-optimized format for attestation . It uses a very compact but still extensible encoding method. This format is implementable by authenticators with limited resources (e.g., secure elements).
-
Specification Document: Section
§ 8.2 Packed Attestation Statement Format[[#sctn-packed-attestation]] of this specification
-
WebAuthn Attestation Statement Format Identifier: tpm
-
Description: The TPM attestation statement format returns an attestation statement in the same format as the packed attestation statement format, although the rawData and signature fields are computed differently.
-
Specification Document: Section
§ 8.3 TPM Attestation Statement Format[[#sctn-tpm-attestation]] of this specification
-
WebAuthn Attestation Statement Format Identifier: android-key
-
Description: Platform authenticators on versions "N", and later, may provide this proprietary "hardware attestation" statement.
-
Specification Document: Section
§ 8.4 Android Key Attestation Statement Format[[#sctn-android-key-attestation]] of this specification
-
WebAuthn Attestation Statement Format Identifier: android-safetynet
-
Description: Android-based platform authenticators MAY produce an attestation statement based on the Android SafetyNet API.
-
Specification Document: Section
§ 8.5 Android SafetyNet Attestation Statement Format[[#sctn-android-safetynet-attestation]] of this specification
-
WebAuthn Attestation Statement Format Identifier: fido-u2f
-
Description: Used with FIDO U2F authenticators
-
Specification Document: Section
§ 8.6 FIDO U2F Attestation Statement Format[[#sctn-fido-u2f-attestation]] of this specification
12.2. WebAuthn Attestation Statement Format Identifier Registrations
This
section
registers
the
below-listed
attestation
statement
formats,
newly
defined
in
Section
§ 8
Defined
Attestation
Statement
Formats
,
[[#sctn-defined-attestation-formats]],
in
the
IANA
"WebAuthn
Attestation
Statement
Format
Identifiers"
registry
[IANA-WebAuthn-Registries]
[[!IANA-WebAuthn-Registries]]
established
by
[RFC8809]
.
[[!RFC8809]].
-
WebAuthn Attestation Statement Format Identifier: apple
-
Description: Used with Apple devices' platform authenticators
-
Specification Document: Section
§ 8.8 Apple Anonymous Attestation Statement Format[[#sctn-apple-anonymous-attestation]] of this specification
-
WebAuthn Attestation Statement Format Identifier: none
-
Description: Used to replace any authenticator-provided attestation statement when a
WebAuthn Relying Party[WRP] indicates it does not wish to receive attestation information. -
Specification Document: Section
§ 8.7 None Attestation Statement Format[[#sctn-none-attestation]] of this specification
12.3. WebAuthn Extension Identifier Registrations Updates
This
section
updates
the
below-listed
extension
identifier
values
defined
in
Section
§ 10
Defined
Extensions
[[#sctn-defined-extensions]]
in
the
IANA
"WebAuthn
Extension
Identifiers"
registry
[IANA-WebAuthn-Registries]
[[!IANA-WebAuthn-Registries]]
established
by
[RFC8809]
,
[[!RFC8809]],
originally
registered
in
[WebAuthn-1]
,
[[WebAuthn-1]],
to
point
to
this
specification.
-
WebAuthn Extension Identifier: appid
-
Description: This authentication extension allows
WebAuthn Relying Parties[WRPS] that have previously registered a credential using the legacy FIDO JavaScript APIs to request an assertion. -
Specification Document: Section
§ 10.1.1 FIDO AppID Extension (appid)[[#sctn-appid-extension]] of this specification
-
WebAuthn Extension Identifier: uvm
-
Description: This registration extension and authentication extension enables use of a user verification method. The user verification method extension returns to the
WebAuthn Relying Party[WRP] which user verification methods (factors) were used for the WebAuthn operation. -
Specification Document: Section
§ 10.2.1 User Verification Method Extension (uvm)[[#sctn-uvm-extension]] of this specification
12.4. WebAuthn Extension Identifier Registrations
This
section
registers
the
below-listed
extension
identifier
values,
newly
defined
in
Section
§ 10
Defined
Extensions
,
[[#sctn-defined-extensions]],
in
the
IANA
"WebAuthn
Extension
Identifiers"
registry
[IANA-WebAuthn-Registries]
[[!IANA-WebAuthn-Registries]]
established
by
[RFC8809]
.
[[!RFC8809]].
-
WebAuthn Extension Identifier: appidExclude
-
Description: This registration extension allows
WebAuthn Relying Parties[WRPS] to exclude authenticators that contain specified credentials that were created with the legacy FIDO U2F JavaScript API[FIDOU2FJavaScriptAPI] .[[FIDOU2FJavaScriptAPI]]. -
Specification Document: Section
§ 10.1.2 FIDO AppID Exclusion Extension (appidExclude)[[#sctn-appid-exclude-extension]] of this specification
-
WebAuthn Extension Identifier: credProps
-
Description: This client registration extension enables reporting of a newly-created credential
's’s properties, as determined by the client , to the callingWebAuthn Relying Party[WRP]'s’s web application . -
Specification Document: Section
§ 10.1.3 Credential Properties Extension (credProps)[[#sctn-authenticator-credential-properties-extension]] of this specification
-
WebAuthn Extension Identifier: largeBlob
-
Description: This client registration extension and authentication extension allows a
Relying Party[RP] to store opaque data associated with a credential. -
Specification Document: Section
§ 10.1.5 Large blob storage extension (largeBlob)[[#sctn-large-blob-extension]] of this specification
13. Security Considerations
This
specification
defines
a
Web
API
[[#sctn-api|Web
API]]
and
a
cryptographic
peer-entity
authentication
protocol.
The
Web
Authentication
API
allows
Web
developers
(i.e.,
"authors")
to
utilize
the
Web
Authentication
protocol
in
their
registration
and
authentication
ceremonies
.
The
entities
comprising
the
Web
Authentication
protocol
endpoints
are
user-controlled
WebAuthn
Authenticators
[WAA]s
and
a
WebAuthn
Relying
Party
[WRP]
's
’s
computing
environment
hosting
the
Relying
Party
[RP]
's
’s
web
application
.
In
this
model,
the
user
agent,
together
with
the
WebAuthn
Client
[WAC]
,
comprise
an
intermediary
between
authenticators
and
Relying
Parties
[RPS]
.
Additionally,
authenticators
can
attest
to
Relying
Parties
[RPS]
as
to
their
provenance.
At
this
time,
this
specification
does
not
feature
detailed
security
considerations.
However,
the
[FIDOSecRef]
[[FIDOSecRef]]
document
provides
a
security
analysis
which
is
overall
applicable
to
this
specification.
Also,
the
[FIDOAuthnrSecReqs]
[[FIDOAuthnrSecReqs]]
document
suite
provides
useful
information
about
authenticator
security
characteristics.
The
below
subsections
comprise
the
current
Web
Authentication-specific
security
considerations.
They
are
divided
by
audience;
general
security
considerations
are
direct
subsections
of
this
section,
while
security
considerations
specifically
for
authenticator
,
client
and
Relying
Party
[RP]
implementers
are
grouped
into
respective
subsections.
13.1. Credential ID Unsigned
The
credential
ID
accompanying
an
authentication
assertion
is
not
signed.
This
is
not
a
problem
because
all
that
would
happen
if
an
authenticator
returns
the
wrong
credential
ID
,
or
if
an
attacker
intercepts
and
manipulates
the
credential
ID
,
is
that
the
WebAuthn
Relying
Party
[WRP]
would
not
look
up
the
correct
credential
public
key
with
which
to
verify
the
returned
signed
authenticator
data
(a.k.a.,
assertion
),
and
thus
the
interaction
would
end
in
an
error.
13.2. Physical Proximity between Client and Authenticator
In the WebAuthn authenticator model , it is generally assumed that roaming authenticators are physically close to, and communicate directly with, the client . This arrangement has some important advantages.
The promise of physical proximity between client and authenticator is a key strength of a something you have authentication factor . For example, if a roaming authenticator can communicate only via USB or Bluetooth, the limited range of these transports ensures that any malicious actor must physically be within that range in order to interact with the authenticator . This is not necessarily true of an authenticator that can be invoked remotely — even if the authenticator verifies user presence , users can be tricked into authorizing remotely initiated malicious requests.
Direct
communication
between
client
and
authenticator
means
the
client
can
enforce
the
scope
restrictions
for
credentials
.
By
contrast,
if
the
communication
between
client
and
authenticator
is
mediated
by
some
third
party,
then
the
client
has
to
trust
the
third
party
to
enforce
the
scope
restrictions
and
control
access
to
the
authenticator
.
Failure
to
do
either
could
result
in
a
malicious
Relying
Party
[RP]
receiving
authentication
assertions
valid
for
other
Relying
Parties
[RPS]
,
or
in
a
malicious
user
gaining
access
to
authentication
assertions
for
other
users.
If designing a solution where the authenticator does not need to be physically close to the client , or where client and authenticator do not communicate directly, designers SHOULD consider how this affects the enforcement of scope restrictions and the strength of the authenticator as a something you have authentication factor.
13.3. Security considerations for authenticators
13.3.1. Attestation Certificate Hierarchy
A
3-tier
hierarchy
for
attestation
certificates
is
RECOMMENDED
(i.e.,
Attestation
Root,
Attestation
Issuing
CA,
Attestation
Certificate).
It
is
also
RECOMMENDED
that
for
each
WebAuthn
Authenticator
[WAA]
device
line
(i.e.,
model),
a
separate
issuing
CA
is
used
to
help
facilitate
isolating
problems
with
a
specific
version
of
an
authenticator
model.
If
the
attestation
root
certificate
is
not
dedicated
to
a
single
WebAuthn
Authenticator
[WAA]
device
line
(i.e.,
AAGUID),
the
AAGUID
SHOULD
be
specified
in
the
attestation
certificate
itself,
so
that
it
can
be
verified
against
the
authenticator
data
.
13.3.2. Attestation Certificate and Attestation Certificate CA Compromise
When
an
intermediate
CA
or
a
root
CA
used
for
issuing
attestation
certificates
is
compromised,
WebAuthn
Authenticator
[WAA]
attestation
key
pairs
are
still
safe
although
their
certificates
can
no
longer
be
trusted.
A
WebAuthn
Authenticator
[WAA]
manufacturer
that
has
recorded
the
attestation
public
keys
for
their
authenticator
models
can
issue
new
attestation
certificates
for
these
keys
from
a
new
intermediate
CA
or
from
a
new
root
CA.
If
the
root
CA
changes,
the
WebAuthn
Relying
Parties
[WRPS]
MUST
update
their
trusted
root
certificates
accordingly.
A
WebAuthn
Authenticator
[WAA]
attestation
certificate
MUST
be
revoked
by
the
issuing
CA
if
its
private
key
has
been
compromised.
A
WebAuthn
Authenticator
manufacturer
may
need
to
ship
a
firmware
update
and
inject
new
attestation
private
keys
and
certificates
into
already
manufactured
WebAuthn
Authenticators
[WAA]s
,
if
the
exposure
was
due
to
a
firmware
flaw.
(The
process
by
which
this
happens
is
out
of
scope
for
this
specification.)
If
the
WebAuthn
Authenticator
[WAA]
manufacturer
does
not
have
this
capability,
then
it
may
not
be
possible
for
Relying
Parties
[RPS]
to
trust
any
further
attestation
statements
from
the
affected
WebAuthn
Authenticators
[WAA]s
.
See
also
the
related
security
consideration
for
Relying
Parties
[RPS]
in
§ 13.4.5
Revoked
Attestation
Certificates
.
[[#sctn-revoked-attestation-certificates]].
13.4.
Security
considerations
for
Relying
Parties
[RPS]
13.4.1. Security Benefits for WebAuthn Relying Parties
The
main
benefits
offered
to
WebAuthn
Relying
Parties
[WRPS]
by
this
specification
include:
-
Users and accounts can be secured using widely compatible, easy-to-use multi-factor authentication.
-
The
Relying Party[RP] does not need to provision authenticator hardware to its users. Instead, each user can independently obtain any conforming authenticator and use that same authenticator with any number ofRelying Parties[RPS] . TheRelying Party[RP] can optionally enforce requirements on authenticators ' security properties by inspecting the attestation statements returned from the authenticators . -
Authentication ceremonies are resistant to man-in-the-middle attacks . Regarding registration ceremonies , see
§ 13.4.4 Attestation Limitations ,[[#sctn-attestation-limitations]], below. -
The
Relying Party[RP] can automatically support multiple types of user verification - for example PIN, biometrics and/or future methods - with little or no code change, and can let each user decide which they prefer to use via their choice of authenticator . -
The
Relying Party[RP] does not need to store additional secrets in order to gain the above benefits.
As
stated
in
the
Conformance
[[#sctn-conforming-relying-parties|Conformance]]
section,
the
Relying
Party
[RP]
MUST
behave
as
described
in
§ 7
WebAuthn
Relying
Party
Operations
[[#sctn-rp-operations]]
to
obtain
all
of
the
above
security
benefits.
However,
one
notable
use
case
that
departs
slightly
from
this
is
described
below
in
§ 13.4.4
Attestation
Limitations
.
[[#sctn-attestation-limitations]].
13.4.2. Visibility Considerations for Embedded Usage
Simplistic
use
of
WebAuthn
in
an
embedded
context,
e.g.,
within
iframe
s
as
described
in
§ 5.10
Using
Web
Authentication
within
iframe
elements
,
[[#sctn-iframe-guidance]],
may
make
users
vulnerable
to
UI
Redressing
attacks,
also
known
as
"
Clickjacking
".
This
is
where
an
attacker
overlays
their
own
UI
on
top
of
a
Relying
Party
[RP]
's
’s
intended
UI
and
attempts
to
trick
the
user
into
performing
unintended
actions
with
the
Relying
Party
[RP]
.
For
example,
using
these
techniques,
an
attacker
might
be
able
to
trick
users
into
purchasing
items,
transferring
money,
etc.
Even
though
WebAuthn-specific
UI
is
typically
handled
by
the
client
platform
and
thus
is
not
vulnerable
to
UI
Redressing
,
it
is
likely
important
for
an
Relying
Party
[RP]
having
embedded
WebAuthn-wielding
content
to
ensure
that
their
content’s
UI
is
visible
to
the
user.
An
emerging
means
to
do
so
is
by
observing
the
status
of
the
experimental
Intersection
Observer
v2
's
’s
isVisible
attribute.
For
example,
the
Relying
Party
[RP]
's
’s
script
running
in
the
embedded
context
could
pre-emptively
load
itself
in
a
popup
window
if
it
detects
isVisble
being
set
to
false
,
thus
side-stepping
any
occlusion
of
their
content.
13.4.3. Cryptographic Challenges
As
a
cryptographic
protocol,
Web
Authentication
is
dependent
upon
randomized
challenges
to
avoid
replay
attacks.
Therefore,
the
values
of
both
PublicKeyCredentialCreationOptions
.
challenge
and
PublicKeyCredentialRequestOptions
.
challenge
MUST
be
randomly
generated
by
Relying
Parties
[RPS]
in
an
environment
they
trust
(e.g.,
on
the
server-side),
and
the
returned
challenge
value
in
the
client’s
response
MUST
match
what
was
generated.
This
SHOULD
be
done
in
a
fashion
that
does
not
rely
upon
a
client’s
behavior,
e.g.,
the
Relying
Party
[RP]
SHOULD
store
the
challenge
temporarily
until
the
operation
is
complete.
Tolerating
a
mismatch
will
compromise
the
security
of
the
protocol.
Challenges SHOULD be valid for a duration similar to the upper limit of the recommended range and default for a WebAuthn ceremony timeout .
In order to prevent replay attacks, the challenges MUST contain enough entropy to make guessing them infeasible. Challenges SHOULD therefore be at least 16 bytes long.
13.4.4. Attestation Limitations
This section is not normative.
When
registering
[[#sctn-registering-a-new-credential|registering
a
new
credential
,
credential]],
the
attestation
statement
,
if
present,
may
allow
the
WebAuthn
Relying
Party
[WRP]
to
derive
assurances
about
various
authenticator
qualities.
For
example,
the
authenticator
model,
or
how
it
stores
and
protects
credential
private
keys
.
However,
it
is
important
to
note
that
an
attestation
statement
,
on
its
own,
provides
no
means
for
a
Relying
Party
[RP]
to
verify
that
an
attestation
object
was
generated
by
the
authenticator
the
user
intended,
and
not
by
a
man-in-the-middle
attacker
.
For
example,
such
an
attacker
could
use
malicious
code
injected
into
Relying
Party
[RP]
script.
The
Relying
Party
[RP]
must
therefore
rely
on
other
means,
e.g.,
TLS
and
related
technologies,
to
protect
the
attestation
object
from
man-in-the-middle
attacks
.
Under the assumption that a registration ceremony is completed securely, and that the authenticator maintains confidentiality of the credential private key , subsequent authentication ceremonies using that public key credential are resistant to tampering by man-in-the-middle attacks .
The
discussion
above
holds
for
all
attestation
types
.
In
all
cases
it
is
possible
for
a
man-in-the-middle
attacker
to
replace
the
PublicKeyCredential
object,
including
the
attestation
statement
and
the
credential
public
key
to
be
registered,
and
subsequently
tamper
with
future
authentication
assertions
scoped
for
the
same
Relying
Party
[RP]
and
passing
through
the
same
attacker.
Such
an
attack
would
potentially
be
detectable;
since
the
Relying
Party
[RP]
has
registered
the
attacker’s
credential
public
key
rather
than
the
user’s,
the
attacker
must
tamper
with
all
subsequent
authentication
ceremonies
with
that
Relying
Party
[RP]
:
unscathed
ceremonies
will
fail,
potentially
revealing
the
attack.
Attestation
types
other
than
Self
Attestation
and
None
can
increase
the
difficulty
of
such
attacks,
since
Relying
Parties
[RPS]
can
possibly
display
authenticator
information,
e.g.,
model
designation,
to
the
user.
An
attacker
might
therefore
need
to
use
a
genuine
authenticator
of
the
same
model
as
the
user’s
authenticator
,
or
the
user
might
notice
that
the
Relying
Party
[RP]
reports
a
different
authenticator
model
than
the
user
expects.
Note: All variants of man-in-the-middle attacks described above are more difficult for an attacker to mount than a man-in-the-middle attack against conventional password authentication.
13.4.5. Revoked Attestation Certificates
If
attestation
certificate
validation
fails
due
to
a
revoked
intermediate
attestation
CA
certificate,
and
the
Relying
Party
[RP]
's
’s
policy
requires
rejecting
the
registration/authentication
request
in
these
situations,
then
it
is
RECOMMENDED
that
the
Relying
Party
[RP]
also
un-registers
(or
marks
with
a
trust
level
equivalent
to
"
self
attestation
")
public
key
credentials
that
were
registered
after
the
CA
compromise
date
using
an
attestation
certificate
chaining
up
to
the
same
intermediate
CA.
It
is
thus
RECOMMENDED
that
Relying
Parties
[RPS]
remember
intermediate
attestation
CA
certificates
during
registration
in
order
to
un-register
related
public
key
credentials
if
the
registration
was
performed
after
revocation
of
such
certificates.
See
also
the
related
security
consideration
for
authenticators
in
§ 13.3.2
Attestation
Certificate
and
Attestation
Certificate
CA
Compromise
.
[[#sctn-ca-compromise]].
13.4.6. Credential Loss and Key Mobility
This
specification
defines
no
protocol
for
backing
up
credential
private
keys
,
or
for
sharing
them
between
authenticators
.
In
general,
it
is
expected
that
a
credential
private
key
never
leaves
the
authenticator
that
created
it.
Losing
an
authenticator
therefore,
in
general,
means
losing
all
credentials
bound
to
the
lost
authenticator
,
which
could
lock
the
user
out
of
an
account
if
the
user
has
only
one
credential
registered
with
the
Relying
Party
[RP]
.
Instead
of
backing
up
or
sharing
private
keys,
the
Web
Authentication
API
allows
registering
multiple
credentials
for
the
same
user.
For
example,
a
user
might
register
platform
credentials
on
frequently
used
client
devices
,
and
one
or
more
roaming
credentials
for
use
as
backup
and
with
new
or
rarely
used
client
devices
.
Relying
Parties
[RPS]
SHOULD
allow
and
encourage
users
to
register
multiple
credentials
to
the
same
user
account
.
Relying
Parties
[RPS]
SHOULD
make
use
of
the
and
excludeCredentials
options
to
ensure
that
these
different
credentials
are
bound
to
different
authenticators
.
user
.
id
13.4.7. Unprotected account detection
This section is not normative.
This
security
consideration
applies
to
Relying
Parties
[RPS]
that
support
authentication
ceremonies
with
a
non-
empty
allowCredentials
argument
as
the
first
authentication
step.
For
example,
if
using
authentication
with
server-side
credentials
as
the
first
authentication
step.
In
this
case
the
allowCredentials
argument
risks
leaking
information
about
which
user
accounts
have
WebAuthn
credentials
registered
and
which
do
not,
which
may
be
a
signal
of
account
protection
strength.
For
example,
say
an
attacker
can
initiate
an
authentication
ceremony
by
providing
only
a
username,
and
the
Relying
Party
[RP]
responds
with
a
non-empty
allowCredentials
for
some
user
accounts
,
and
with
failure
or
a
password
challenge
for
other
user
accounts
.
The
attacker
can
then
conclude
that
the
latter
user
accounts
likely
do
not
require
a
WebAuthn
assertion
for
successful
authentication,
and
thus
focus
an
attack
on
those
likely
weaker
accounts.
This
issue
is
similar
to
the
one
described
in
§ 14.6.2
Username
Enumeration
[[#sctn-username-enumeration]]
and
§ 14.6.3
Privacy
leak
via
credential
IDs
,
[[#sctn-credential-id-privacy-leak]],
and
can
be
mitigated
in
similar
ways.
13.4.8. Code injection attacks
Any
malicious
code
executing
on
an
origin
within
the
scope
of
a
Relying
Party
[RP]
's
’s
public
key
credentials
has
the
potential
to
invalidate
any
and
all
security
guarantees
WebAuthn
may
provide.
WebAuthn
Clients
[WAC]s
only
expose
the
WebAuthn
API
in
secure
contexts
,
which
mitigates
the
most
basic
attacks
but
SHOULD
be
combined
with
additional
precautions
by
Relying
Parties
[RPS]
.
Code injection can happen in several ways; this section attempts to point out some likely scenarios and suggest suitable mitigations, but is not an exhaustive list.
-
Malicous code could be injected by a third-party script included by the
Relying Party[RP] , either intentionally or due to a security vulnerability in the third party.The
Relying Party[RP] therefore SHOULD limit the amount of third-party script included on the origins within the scope of its credentials .The
Relying Party[RP] SHOULD use Content Security Policy[CSP2] ,[[!CSP2]], and/or other appropriate technologies available at the time, to limit what script can run on its origins . -
Malicious code could, by the credential scope rules, be hosted on a subdomain of the RP ID . For example, user-submitted code hosted on
usercontent.example.org
could exercise any credentials scoped to the RP IDexample.org
. If theRelying Party[RP] allows a subdomainorigin
when verifying the assertion , malicious users could use this to launch a man-in-the-middle attack to obtain valid authentication assertions and impersonate the victims of the attack.Therefore, the
Relying Party[RP] by default SHOULD NOT allow a subdomainorigin
when verifying the assertion . If theRelying Party[RP] needs to allow a subdomainorigin
, then theRelying Party[RP] MUST NOT serve untrusted code on any allowed subdomain of origins within the scope of its public key credentials .
13.4.9. Validating the origin of a credential
When
registering
a
credential
and
when
verifying
an
assertion
,
the
Relying
Party
[RP]
MUST
validate
the
origin
member
of
the
client
data
.
The
Relying
Party
[RP]
MUST
NOT
accept
unexpected
values
of
origin
,
as
doing
so
could
allow
a
malicious
website
to
obtain
valid
credentials
.
Although
the
scope
of
WebAuthn
credentials
prevents
their
use
on
domains
outside
the
RP
ID
they
were
registered
for,
the
Relying
Party
[RP]
's
’s
origin
validation
serves
as
an
additional
layer
of
protection
in
case
a
faulty
authenticator
fails
to
enforce
credential
scope
.
See
also
§ 13.4.8
Code
injection
attacks
[[#sctn-code-injection]]
for
discussion
of
potentially
malicious
subdomains.
Validation
MAY
be
performed
by
exact
string
matching
or
any
other
method
as
needed
by
the
Relying
Party
[RP]
.
For
example:
-
A web application served only at
https://example.org
SHOULD requireorigin
to exactly equalhttps://example.org
.This is the simplest case, where
origin
is expected to be the stringhttps://
followed by the RP ID . -
A web application served at a small number of domains might require
origin
to exactly equal some element of a list of allowed origins, for example the list["https://example.org", "https://login.example.org"]
. -
A web application served at a large set of domains that changes often might parse
origin
structurally and require that the URL scheme ishttps
and that the authority equals or is any subdomain of the RP ID - for example,example.org
or any subdomain ofexample.org
).Note: See
§ 13.4.8 Code injection attacks[[#sctn-code-injection]] for a discussion of the risks of allowing any subdomain of the RP ID . -
A web application with a companion native application might allow
origin
to be an operating system dependent identifier for the native application. For example, such aRelying Party[RP] might require thatorigin
exactly equals some element of the list["https://example.org", "example-os:appid:204ffa1a5af110ac483f131a1bef8a841a7adb0d8d135908bbd964ed05d2653b"]
.
Similar
considerations
apply
when
validating
the
topOrigin
member
of
the
client
data
.
When
topOrigin
is
present,
the
Relying
Party
[RP]
MUST
validate
that
its
value
is
expected.
This
validation
MAY
be
performed
by
exact
string
matching
or
any
other
method
as
needed
by
the
Relying
Party
[RP]
.
For
example:
-
A web application that does not wish to be embedded in a cross-origin
iframe
might requiretopOrigin
to exactly equalorigin
. -
A web application that wishes to be embedded in a cross-origin
iframe
on a small number of domains might requiretopOrigin
to exactly equal some element of a list of allowed origins, for example the list["https://example-partner1.org", "https://login.partner2-example.org"]
. -
A web application that wishes to be embedded in a cross-origin
iframe
on a large number of domains might allow any value oftopOrigin
, or use a dynamic procedure to determine whether a giventopOrigin
value is allowed for a particular ceremony.
14. Privacy Considerations
The
privacy
principles
in
[FIDO-Privacy-Principles]
[[!FIDO-Privacy-Principles]]
also
apply
to
this
specification.
This
section
is
divided
by
audience;
general
privacy
considerations
are
direct
subsections
of
this
section,
while
privacy
considerations
specifically
for
authenticator
,
client
and
Relying
Party
[RP]
implementers
are
grouped
into
respective
subsections.
14.1. De-anonymization Prevention Measures
This section is not normative.
Many aspects of the design of the Web Authentication API are motivated by privacy concerns. The main concern considered in this specification is the protection of the user’s personal identity, i.e., the identification of a human being or a correlation of separate identities as belonging to the same human being. Although the Web Authentication API does not use or provide any form of global identity, the following kinds of potentially correlatable identifiers are used:
-
The user’s credential IDs and credential public keys .
These are registered by the
WebAuthn Relying Party[WRP] and subsequently used by the user to prove possession of the corresponding credential private key . They are also visible to the client in the communication with the authenticator . -
The user’s identities specific to each
Relying Party[RP] , e.g., usernames and user handles .These identities are obviously used by each
Relying Party[RP] to identify a user in their system. They are also visible to the client in the communication with the authenticator . -
The user’s biometric characteristic(s), e.g., fingerprints or facial recognition data
[ISOBiometricVocabulary] .[[ISOBiometricVocabulary]].This is optionally used by the authenticator to perform user verification . It is not revealed to the
Relying Party[RP] , but in the case of platform authenticators , it might be visible to the client depending on the implementation. -
The models of the user’s authenticators , e.g., product names.
This is exposed in the attestation statement provided to the
Relying Party[RP] during registration . It is also visible to the client in the communication with the authenticator . -
The identities of the user’s authenticators , e.g., serial numbers.
This is possibly used by the client to enable communication with the authenticator , but is not exposed to the
Relying Party[RP] .
Some
of
the
above
information
is
necessarily
shared
with
the
Relying
Party
[RP]
.
The
following
sections
describe
the
measures
taken
to
prevent
malicious
Relying
Parties
[RPS]
from
using
it
to
discover
a
user’s
personal
identity.
14.2. Anonymous, Scoped, Non-correlatable Public Key Credentials
This section is not normative.
Although
Credential
IDs
and
credential
public
keys
are
necessarily
shared
with
the
WebAuthn
Relying
Party
[WRP]
to
enable
strong
authentication,
they
are
designed
to
be
minimally
identifying
and
not
shared
between
Relying
Parties
[RPS]
.
-
Credential IDs and credential public keys are meaningless in isolation, as they only identify credential key pairs and not users directly.
-
Each public key credential is strictly scoped to a specific
Relying Party[RP] , and the client ensures that its existence is not revealed to otherRelying Parties[RPS] . A maliciousRelying Party[RP] thus cannot ask the client to reveal a user’s other identities. -
The client also ensures that the existence of a public key credential is not revealed to the
Relying Party[RP] without user consent . This is detailed further in§ 14.5.1 Registration Ceremony Privacy[[#sctn-make-credential-privacy]] and§ 14.5.2 Authentication Ceremony Privacy .[[#sctn-assertion-privacy]]. A maliciousRelying Party[RP] thus cannot silently identify a user, even if the user has a public key credential registered and available. -
Authenticators ensure that the credential IDs and credential public keys of different public key credentials are not correlatable as belonging to the same user. A pair of malicious
Relying Parties[RPS] thus cannot correlate users between their systems without additional information, e.g., a willfully reused username or e-mail address. -
Authenticators ensure that their attestation certificates are not unique enough to identify a single authenticator or a small group of authenticators . This is detailed further in
§ 14.4.1 Attestation Privacy .[[#sctn-attestation-privacy]]. A pair of maliciousRelying Parties[RPS] thus cannot correlate users between their systems by tracking individual authenticators .
Additionally,
a
client-side
discoverable
public
key
credential
source
can
optionally
include
a
user
handle
specified
by
the
Relying
Party
[RP]
.
The
credential
can
then
be
used
to
both
identify
and
authenticate
the
user.
This
means
that
a
privacy-conscious
Relying
Party
[RP]
can
allow
creation
of
a
user
account
without
a
traditional
username,
further
improving
non-correlatability
between
Relying
Parties
[RPS]
.
14.3. Authenticator-local Biometric Recognition
Biometric
authenticators
perform
the
biometric
recognition
internally
in
the
authenticator
-
though
for
platform
authenticators
the
biometric
data
might
also
be
visible
to
the
client
,
depending
on
the
implementation.
Biometric
data
is
not
revealed
to
the
WebAuthn
Relying
Party
[WRP]
;
it
is
used
only
locally
to
perform
user
verification
authorizing
the
creation
and
registration
of,
or
authentication
using,
a
public
key
credential
.
A
malicious
Relying
Party
[RP]
therefore
cannot
discover
the
user’s
personal
identity
via
biometric
data,
and
a
security
breach
at
a
Relying
Party
[RP]
cannot
expose
biometric
data
for
an
attacker
to
use
for
forging
logins
at
other
Relying
Parties
[RPS]
.
In
the
case
where
a
Relying
Party
[RP]
requires
biometric
recognition
,
this
is
performed
locally
by
the
biometric
authenticator
perfoming
user
verification
and
then
signaling
the
result
by
setting
the
UV
flag
in
the
signed
assertion
response,
instead
of
revealing
the
biometric
data
itself
to
the
Relying
Party
[RP]
.
14.4. Privacy considerations for authenticators
14.4.1. Attestation Privacy
Attestation certificates and attestation key pairs can be used to track users or link various online identities of the same user together. This can be mitigated in several ways, including:
-
A
WebAuthn Authenticator[WAA] manufacturer may choose to ship authenticators in batches where authenticators in a batch share the same attestation certificate (called Basic Attestation or batch attestation ). This will anonymize the user at the risk of not being able to revoke a particular attestation certificate if its private key is compromised. The authenticator manufacturer SHOULD then ensure that such batches are large enough to provide meaningful anonymization, while also minimizing the batch size in order to limit the number of affected users in case an attestation private key is compromised.[UAFProtocol][[UAFProtocol]] requires that at least 100,000 authenticator devices share the same attestation certificate in order to produce sufficiently large groups. This may serve as guidance about suitable batch sizes. -
A
WebAuthn Authenticator[WAA] may be capable of dynamically generating different attestation key pairs (and requesting related certificates ) per- credential as described in the Anonymization CA approach. For example, an authenticator can ship with a main attestation private key (and certificate ), and combined with a cloud-operated Anonymization CA , can dynamically generate per- credential attestation key pairs and attestation certificates .Note: In various places outside this specification, the term "Privacy CA" is used to refer to what is termed here as an Anonymization CA . Because the Trusted Computing Group (TCG) also used the term "Privacy CA" to refer to what the TCG now refers to as an Attestation CA (ACA)
[TCG-CMCProfile-AIKCertEnroll] ,[[!TCG-CMCProfile-AIKCertEnroll]], we are using the term Anonymization CA here to try to mitigate confusion in the specific context of this specification.
14.4.2. Privacy of personally identifying information Stored in Authenticators
Authenticators MAY provide additional information to clients outside what’s defined by this specification, e.g., to enable the client to provide a rich UI with which the user can pick which credential to use for an authentication ceremony . If an authenticator chooses to do so, it SHOULD NOT expose personally identifying information unless successful user verification has been performed. If the authenticator supports user verification with more than one concurrently enrolled user, the authenticator SHOULD NOT expose personally identifying information of users other than the currently verified user. Consequently, an authenticator that is not capable of user verification SHOULD NOT store personally identifying information.
For
the
purposes
of
this
discussion,
the
user
handle
conveyed
as
the
id
member
of
PublicKeyCredentialUserEntity
is
not
considered
personally
identifying
information;
see
§ 14.6.1
User
Handle
Contents
.
[[#sctn-user-handle-privacy]].
These
recommendations
serve
to
prevent
an
adversary
with
physical
access
to
an
authenticator
from
extracting
personally
identifying
information
about
the
authenticator
's
’s
enrolled
user(s).
14.5. Privacy considerations for clients
14.5.1. Registration Ceremony Privacy
In
order
to
protect
users
from
being
identified
without
consent
,
implementations
of
the
[[Create]](origin,
options,
sameOriginWithAncestors)
method
need
to
take
care
to
not
leak
information
that
could
enable
a
malicious
WebAuthn
Relying
Party
[WRP]
to
distinguish
between
these
cases,
where
"excluded"
means
that
at
least
one
of
the
credentials
listed
by
the
Relying
Party
[RP]
in
excludeCredentials
is
bound
to
the
authenticator
:
-
No authenticators are present.
-
At least one authenticator is present, and at least one present authenticator is excluded.
If
the
above
cases
are
distinguishable,
information
is
leaked
by
which
a
malicious
Relying
Party
[RP]
could
identify
the
user
by
probing
for
which
credentials
are
available.
For
example,
one
such
information
leak
is
if
the
client
returns
a
failure
response
as
soon
as
an
excluded
authenticator
becomes
available.
In
this
case
-
especially
if
the
excluded
authenticator
is
a
platform
authenticator
-
the
Relying
Party
[RP]
could
detect
that
the
ceremony
was
canceled
before
the
timeout
and
before
the
user
could
feasibly
have
canceled
it
manually,
and
thus
conclude
that
at
least
one
of
the
credentials
listed
in
the
excludeCredentials
parameter
is
available
to
the
user.
The above is not a concern, however, if the user has consented to create a new credential before a distinguishable error is returned, because in this case the user has confirmed intent to share the information that would be leaked.
14.5.2. Authentication Ceremony Privacy
In
order
to
protect
users
from
being
identified
without
consent
,
implementations
of
the
[[DiscoverFromExternalSource]](origin,
options,
sameOriginWithAncestors)
method
need
to
take
care
to
not
leak
information
that
could
enable
a
malicious
WebAuthn
Relying
Party
[WRP]
to
distinguish
between
these
cases,
where
"named"
means
that
the
credential
is
listed
by
the
Relying
Party
[RP]
in
allowCredentials
:
-
A named credential is not available.
-
A named credential is available, but the user does not consent to use it.
If
the
above
cases
are
distinguishable,
information
is
leaked
by
which
a
malicious
Relying
Party
[RP]
could
identify
the
user
by
probing
for
which
credentials
are
available.
For
example,
one
such
information
leak
is
if
the
client
returns
a
failure
response
as
soon
as
the
user
denies
consent
to
proceed
with
an
authentication
ceremony
.
In
this
case
the
Relying
Party
[RP]
could
detect
that
the
ceremony
was
canceled
by
the
user
and
not
the
timeout,
and
thus
conclude
that
at
least
one
of
the
credentials
listed
in
the
allowCredentials
parameter
is
available
to
the
user.
14.5.3. Privacy Between Operating System Accounts
If a platform authenticator is included in a client device with a multi-user operating system, the platform authenticator and client device SHOULD work together to ensure that the existence of any platform credential is revealed only to the operating system user that created that platform credential .
14.5.4. Disclosing Client Capabilities
The
getClientCapabilities
method
assists
WebAuthn
Relying
Parties
[WRPS]
in
crafting
registration
and
authentication
experiences
which
have
a
high
chance
of
success
with
the
client
and/or
user.
The client’s support or lack of support of a WebAuthn capability may pose a fingerprinting risk. Client implementations MAY wish to limit capability disclosures based on client policy and/or user consent.
14.6.
Privacy
considerations
for
Relying
Parties
[RPS]
14.6.1. User Handle Contents
Since
the
user
handle
is
not
considered
personally
identifying
information
in
§ 14.4.2
Privacy
of
personally
identifying
information
Stored
in
Authenticators
,
[[#sctn-pii-privacy]],
and
since
authenticators
MAY
reveal
user
handles
without
first
performing
user
verification
,
the
Relying
Party
[RP]
MUST
NOT
include
personally
identifying
information,
e.g.,
e-mail
addresses
or
usernames,
in
the
user
handle
.
This
includes
hash
values
of
personally
identifying
information,
unless
the
hash
function
is
salted
with
salt
values
private
to
the
Relying
Party
[RP]
,
since
hashing
does
not
prevent
probing
for
guessable
input
values.
It
is
RECOMMENDED
to
let
the
user
handle
be
64
random
bytes,
and
store
this
value
in
the
user
account
.
14.6.2. Username Enumeration
While
initiating
a
registration
or
authentication
ceremony
,
there
is
a
risk
that
the
WebAuthn
Relying
Party
[WRP]
might
leak
sensitive
information
about
its
registered
users.
For
example,
if
a
Relying
Party
[RP]
uses
e-mail
addresses
as
usernames
and
an
attacker
attempts
to
initiate
an
authentication
ceremony
for
"alex.mueller@example.com"
and
the
Relying
Party
[RP]
responds
with
a
failure,
but
then
successfully
initiates
an
authentication
ceremony
for
"j.doe@example.com",
then
the
attacker
can
conclude
that
"j.doe@example.com"
is
registered
and
"alex.mueller@example.com"
is
not.
The
Relying
Party
[RP]
has
thus
leaked
the
possibly
sensitive
information
that
"j.doe@example.com"
has
a
user
account
at
this
Relying
Party
[RP]
.
The
following
is
a
non-normative,
non-exhaustive
list
of
measures
the
Relying
Party
[RP]
may
implement
to
mitigate
or
prevent
information
leakage
due
to
such
an
attack:
-
For registration ceremonies :
-
If the
Relying Party[RP] usesRelying Party[RP] -specific usernames to identify users:-
When initiating a registration ceremony , disallow registration of usernames that are syntactically valid e-mail addresses.
Note: The motivation for this suggestion is that in this case the
Relying Party[RP] probably has no choice but to fail the registration ceremony if the user attempts to register a username that is already registered, and an information leak might therefore be unavoidable. By disallowing e-mail addresses as usernames, the impact of the leakage can be mitigated since it will be less likely that a user has the same username at thisRelying Party[RP] as at otherRelying Parties[RPS] .
-
-
If the
Relying Party[RP] uses e-mail addresses to identify users:-
When initiating a registration ceremony , interrupt the user interaction after the e-mail address is supplied and send a message to this address, containing an unpredictable one-time code and instructions for how to use it to proceed with the ceremony. Display the same message to the user in the web interface regardless of the contents of the sent e-mail and whether or not this e-mail address was already registered.
Note: This suggestion can be similarly adapted for other externally meaningful identifiers, for example, national ID numbers or credit card numbers — if they provide similar out-of-band contact information, for example, conventional postal address.
-
-
-
For authentication ceremonies :
-
If, when initiating an authentication ceremony , there is no user account matching the provided username, continue the ceremony by invoking
navigator.credentials.get()
using a syntactically validPublicKeyCredentialRequestOptions
object that is populated with plausible imaginary values.This approach could also be used to mitigate information leakage via
allowCredentials
; see§ 13.4.7 Unprotected account detection[[#sctn-unprotected-account-detection]] and§ 14.6.3 Privacy leak via credential IDs .[[#sctn-credential-id-privacy-leak]].Note: The username may be "provided" in various
Relying Party[RP] -specific fashions: login form, session cookie, etc.Note: If returned imaginary values noticeably differ from actual ones, clever attackers may be able to discern them and thus be able to test for existence of actual accounts. Examples of noticeably different values include if the values are always the same for all username inputs, or are different in repeated attempts with the same username input. The
allowCredentials
member could therefore be populated with pseudo-random values derived deterministically from the username, for example. -
When verifying an
AuthenticatorAssertionResponse
response from the authenticator , make it indistinguishable whether verification failed because the signature is invalid or because no such user or credential is registered. -
Perform a multi-step authentication ceremony , e.g., beginning with supplying username and password or a session cookie, before initiating the WebAuthn ceremony as a subsequent step. This moves the username enumeration problem from the WebAuthn step to the preceding authentication step, where it may be easier to solve.
-
14.6.3. Privacy leak via credential IDs
This section is not normative.
This
privacy
consideration
applies
to
Relying
Parties
[RPS]
that
support
authentication
ceremonies
with
a
non-
empty
allowCredentials
argument
as
the
first
authentication
step.
For
example,
if
using
authentication
with
server-side
credentials
as
the
first
authentication
step.
In
this
case
the
allowCredentials
argument
risks
leaking
personally
identifying
information,
since
it
exposes
the
user’s
credential
IDs
to
an
unauthenticated
caller.
Credential
IDs
are
designed
to
not
be
correlatable
between
Relying
Parties
[RPS]
,
but
the
length
of
a
credential
ID
might
be
a
hint
as
to
what
type
of
authenticator
created
it.
It
is
likely
that
a
user
will
use
the
same
username
and
set
of
authenticators
for
several
Relying
Parties
[RPS]
,
so
the
number
of
credential
IDs
in
allowCredentials
and
their
lengths
might
serve
as
a
global
correlation
handle
to
de-anonymize
the
user.
Knowing
a
user’s
credential
IDs
also
makes
it
possible
to
confirm
guesses
about
the
user’s
identity
given
only
momentary
physical
access
to
one
of
the
user’s
authenticators
.
In
order
to
prevent
such
information
leakage,
the
Relying
Party
[RP]
could
for
example:
-
Perform a separate authentication step, such as username and password authentication or session cookie authentication, before initiating the WebAuthn authentication ceremony and exposing the user’s credential IDs .
-
Use client-side discoverable credentials , so the
allowCredentials
argument is not needed.
If
the
above
prevention
measures
are
not
available,
i.e.,
if
allowCredentials
needs
to
be
exposed
given
only
a
username,
the
Relying
Party
[RP]
could
mitigate
the
privacy
leak
using
the
same
approach
of
returning
imaginary
credential
IDs
as
discussed
in
§ 14.6.2
Username
Enumeration
.
[[#sctn-username-enumeration]].
15. Accessibility Considerations
User
verification
-capable
authenticators
,
whether
roaming
or
platform
,
should
offer
users
more
than
one
user
verification
method.
For
example,
both
fingerprint
sensing
and
PIN
entry.
This
allows
for
fallback
to
other
user
verification
means
if
the
selected
one
is
not
working
for
some
reason.
Note
that
in
the
case
of
roaming
authenticators
,
the
authenticator
and
platform
might
work
together
to
provide
a
user
verification
method
such
as
PIN
entry
[FIDO-CTAP]
.
[[FIDO-CTAP]].
Relying
Parties
[RPS]
,
at
registration
time,
SHOULD
provide
affordances
for
users
to
complete
future
authorization
gestures
correctly.
This
could
involve
naming
the
authenticator,
choosing
a
picture
to
associate
with
the
device,
or
entering
freeform
text
instructions
(e.g.,
as
a
reminder-to-self).
15.1. Recommended Range for Ceremony Timeouts
Ceremonies
relying
on
timing,
e.g.,
a
registration
ceremony
(see
timeout
)
or
an
authentication
ceremony
(see
timeout
),
ought
to
follow
[WCAG21]
's
[[!WCAG21]]'s
Guideline
2.2
Enough
Time
.
If
a
client
platform
determines
that
a
Relying
Party
[RP]
-supplied
timeout
does
not
appropriately
adhere
to
the
latter
[WCAG21]
[[!WCAG21]]
guidelines,
then
the
client
platform
MAY
adjust
the
timeout
accordingly.
The recommended range and default for a WebAuthn ceremony timeout is as follows:
-
Recommended range: 300000 milliseconds to 600000 milliseconds.
-
Recommended default value: 300000 milliseconds (5 minutes).
16. Acknowledgements
We thank the following people for their reviews of, and contributions to, this specification: Yuriy Ackermann, James Barclay, Richard Barnes, Dominic Battré, Julien Cayzac, Domenic Denicola, Rahul Ghosh, Brad Hill, Nidhi Jaju, Jing Jin, Wally Jones, Ian Kilpatrick, Axel Nennker, Yoshikazu Nojima, Kimberly Paulhamus, Adam Powers, Yaron Sheffer, Anne van Kesteren, Johan Verrept, and Boris Zbarsky.Thanks to Adam Powers for creating the overall registration and authentication flow diagrams ( Figure 1 and Figure 2 ).
We thank Anthony Nadalin, John Fontana, and Richard Barnes for their contributions as co-chairs of the Web Authentication Working Group .
We also thank Wendy Seltzer, Samuel Weiler, and Harry Halpin for their contributions as our W3C Team Contacts.