Shopify is also very interested in this API. I want to second what Tim said 
above. Today we have concerns on how *orphaned* passkeys erroneously 
offered to the user impact passkey sign in conversion rates. This API would 
address these concerns.
On Thursday, October 3, 2024 at 1:21:36 PM UTC-4 Nina Satragno wrote:

> On Wed, Oct 2, 2024 at 11:04 AM Yoav Weiss (@Shopify) <
> yoav...@chromium.org> wrote:
>
>>
>>
>> On Thursday, September 26, 2024 at 10:26:35 PM UTC+2 Alex Russell wrote:
>>
>> Amazing; thanks for letting us know!
>>
>> On Thu, Sep 26, 2024 at 10:22 AM Tim Cappalli <tim.ca...@okta.com> wrote:
>>
>> Okta, a very large WebAuthn Relying Party, is excited about this feature. 
>> It addresses one of the top complaints we hear about passkeys which is 
>> "orphaned passkeys" in authenticators when they are deleted from the user 
>> account at the RP.
>>
>> tim
>>
>> On Wed, Sep 25, 2024 at 2:26 PM Alex Russell <sligh...@chromium.org> 
>> wrote:
>>
>> Hey Nina,
>>
>> This is an exciting feature! The API OWNERS decided to let this Intent 
>> ride this week for a couple of reasons:
>>
>>
>>    - The TAG review is new, and I strongly suspect that there will be 
>>    feedback on the API naming and consistency here
>>    - The Explainer is incomplete. I don't see end-to-end code samples 
>>    outlining how this feature solves a problem that was tricky to work 
>> around 
>>    before (i.e, the before vs. after state), or considered alternatives to 
>>    this design, or even considered alternatives to this choice of naming. 
>>    Explicit non-goals are also conspicuous by their absence.
>>
>>
> I've added non-goals, user journeys, and alternatives we discussed with 
> the WebAuthn WG to the explainer 
> <https://github.com/w3c/webauthn/wiki/Explainer:-WebAuthn-Signal-API-explainer>
> .
>
> In terms of the names of the methods, they were vetted by the WebAuthn WG 
> and we do not expect them to change. We've already had our own fair share 
> of bikeshedding (:
>  
>
>> Our top-line goal at I2S stage is to judge if a proposal is solving an 
>> important problem well. Having an RP weigh in last year is helpful, but 
>> doesn't seem to speak to this specific design. Is there more signal from 
>> developers that this is the right API?
>>
>> Thanks,
>>
>> Alex
>>
>> On Friday, September 20, 2024 at 9:09:55 AM UTC-7 Nina Satragno wrote:
>>
>> Contact emailsnsat...@chromium.org, identity-...@chromium.org
>>
>> Explainerhttps://github.com/w3c/webauthn/wiki/Explainer:-
>> WebAuthn-Signal-API-explainer
>>
>> Specificationhttps://pr-preview.s3.amazonaws.com/nsatragno/
>> webauthn/pull/2093.html#sctn-signal-methods 
>> <https://urldefense.com/v3/__https://pr-preview.s3.amazonaws.com/nsatragno/webauthn/pull/2093.html*sctn-signal-methods__;Iw!!PwKahg!936DvbygeUme5MPpNOWqxDy6FvZCZtkSiLMeRY0TwVIoWbehmHPOg5lD3MGweekJMd2uOWJaEiraYqa-M7bw1rJy$>
>>
>> Summary
>>
>> Allow WebAuthn relying parties to report information about existing 
>> credentials back to credential storage providers, so that incorrect or 
>> revoked credentials can be updated or removed from provider and system UI. 
>> https://github.com/w3c/webauthn/wiki/Explainer:-
>> WebAuthn-Signal-API-explainer
>>
>>
>> Blink componentBlink>WebAuthentication 
>> <https://urldefense.com/v3/__https://bugs.chromium.org/p/chromium/issues/list?q=component:Blink*3EWebAuthentication__;JQ!!PwKahg!936DvbygeUme5MPpNOWqxDy6FvZCZtkSiLMeRY0TwVIoWbehmHPOg5lD3MGweekJMd2uOWJaEiraYqa-M_N3sSnT$>
>>
>> TAG reviewhttps://github.com/w3ctag/design-reviews/issues/996
>>
>> TAG review statusPending
>>
>> Risks
>>
>>
>> Interoperability and Compatibility
>>
>> None, this is a new API.
>>
>>
>> *Gecko*: No signal (https://github.com/mozilla/
>> standards-positions/issues/1075). I'll update here once that changes.
>>
>> *WebKit*: No signal (https://github.com/WebKit/
>> standards-positions/issues/400). I'll update here once that changes.
>>
>>
>> WebKit are now supportive 
>> <https://github.com/WebKit/standards-positions/issues/400#issuecomment-2386532601>
>> !
>>   
>>
>>
>> *Web developers*: Positive (https://github.com/w3c/webauthn/issues/1967#
>> issuecomment-1848433321) The signal methods address common concerns from 
>> RPs that have been voiced since the early days of WebAuthn. See 
>> https://github.com/w3c/webauthn/issues/1967 and the issues linked from 
>> there.
>>
>> *Other signals*:
>>
>> Ergonomics
>>
>> Omitting a valid credential ID from `signalAllAcceptedCredentials` can 
>> result in the user no longer being able to sign in with that passkey. This 
>> is explicitly called out in the spec [1]. The spec recommends that 
>> authenticators hide (instead of removing) passkeys to mitigate this issue. 
>> Chrome will ship a first version that removes credentials, and a follow-up 
>> will hide them instead. This is because removing credentials requires a lot 
>> less coordination from multiple products than hiding them, and lets us ship 
>> and iterate on the API faster. [1] https://w3c.github.io/webauthn/#sctn-
>> signalAllAcceptedCredentials 
>> <https://urldefense.com/v3/__https://w3c.github.io/webauthn/*sctn-signalAllAcceptedCredentials__;Iw!!PwKahg!936DvbygeUme5MPpNOWqxDy6FvZCZtkSiLMeRY0TwVIoWbehmHPOg5lD3MGweekJMd2uOWJaEiraYqa-M9TX2WFX$>
>>
>>
>> Security
>>
>> Relying parties can only update or remove credentials that are bound to 
>> their relying party ID.
>>
>>
>> WebView application risks
>>
>> Does this intent deprecate or change behavior of existing APIs, such that 
>> it has potentially high risk for Android WebView-based applications?
>>
>> N/A, this is a new API.
>>
>>
>> Debuggability
>>
>> Chrome supports signal* methods through the WebAuthn devtools panel [1]. 
>> signal* methods are also supported through webdriver's WebAuthn API [2], 
>> with a small change in the works [3] specifically to be able to debug 
>> `signalCurrentUserDetails`. [1] https://developer.chrome.com/
>> docs/devtools/webauthn 
>> <https://urldefense.com/v3/__https://developer.chrome.com/docs/devtools/webauthn__;!!PwKahg!936DvbygeUme5MPpNOWqxDy6FvZCZtkSiLMeRY0TwVIoWbehmHPOg5lD3MGweekJMd2uOWJaEiraYqa-M6YN4qWB$>
>>  
>> [2] https://w3c.github.io/webauthn/#sctn-automation 
>> <https://urldefense.com/v3/__https://w3c.github.io/webauthn/*sctn-automation__;Iw!!PwKahg!936DvbygeUme5MPpNOWqxDy6FvZCZtkSiLMeRY0TwVIoWbehmHPOg5lD3MGweekJMd2uOWJaEiraYqa-M7MtriSq$>
>>  
>> [3] https://github.com/w3c/webauthn/pull/2148
>>
>>
>> Will this feature be supported on all six Blink platforms (Windows, Mac, 
>> Linux, ChromeOS, Android, and Android WebView)?No
>>
>> Initially, this feature will be supported on Chrome desktop only, and on 
>> Chrome only for Google Password Manager (GPM) credentials. Support for 
>> iCloud keychain and Windows Hello will depend on macOS and Windows updates 
>> respectively. Android support requires an update to the Android Credential 
>> Manager API that is being worked on. For GPM credentials, we also need to 
>> update Google Play Services accordingly. Once the Android Credential 
>> Manager API is launched, other credential providers will be able to hook to 
>> the API.
>>
>>
>> Is this feature fully tested by web-platform-tests 
>> <https://urldefense.com/v3/__https://chromium.googlesource.com/chromium/src/*/main/docs/testing/web_platform_tests.md__;Kw!!PwKahg!936DvbygeUme5MPpNOWqxDy6FvZCZtkSiLMeRY0TwVIoWbehmHPOg5lD3MGweekJMd2uOWJaEiraYqa-M6yeXYeJ$>
>> ?Yes
>>
>> https://wpt.fyi/results/webauthn/signal-all-accepted-
>> credentials.https.html 
>> <https://urldefense.com/v3/__https://wpt.fyi/results/webauthn/signal-all-accepted-credentials.https.html__;!!PwKahg!936DvbygeUme5MPpNOWqxDy6FvZCZtkSiLMeRY0TwVIoWbehmHPOg5lD3MGweekJMd2uOWJaEiraYqa-Mz6qHmfI$>
>>  
>> https://wpt.fyi/results/webauthn/signal-current-user-details.https.html 
>> <https://urldefense.com/v3/__https://wpt.fyi/results/webauthn/signal-current-user-details.https.html__;!!PwKahg!936DvbygeUme5MPpNOWqxDy6FvZCZtkSiLMeRY0TwVIoWbehmHPOg5lD3MGweekJMd2uOWJaEiraYqa-M0WRDUTb$>
>>  
>> https://wpt.fyi/results/webauthn/signal-unknown-credential.https.html 
>> <https://urldefense.com/v3/__https://wpt.fyi/results/webauthn/signal-unknown-credential.https.html__;!!PwKahg!936DvbygeUme5MPpNOWqxDy6FvZCZtkSiLMeRY0TwVIoWbehmHPOg5lD3MGweekJMd2uOWJaEiraYqa-M89eiu-V$>
>>
>>
>> DevTrial instructionshttps://github.com/w3c/webauthn/wiki/Experimenting-
>> with-the-Signal-API-on-Chrome
>>
>> Flag name on chrome://flagschrome://flags#enable-
>> experimental-web-platform-features
>>
>> Finch feature nameCredentialManagerReport
>>
>> Requires code in //chrome?True
>>
>> Tracking bughttps://crbug.com/361751877 
>> <https://urldefense.com/v3/__https://crbug.com/361751877__;!!PwKahg!936DvbygeUme5MPpNOWqxDy6FvZCZtkSiLMeRY0TwVIoWbehmHPOg5lD3MGweekJMd2uOWJaEiraYqa-M7_H9Y5G$>
>>
>> Measurementhttps://chromestatus.com/metrics/feature/timeline/
>> popularity/5104 
>> <https://urldefense.com/v3/__https://chromestatus.com/metrics/feature/timeline/popularity/5104__;!!PwKahg!936DvbygeUme5MPpNOWqxDy6FvZCZtkSiLMeRY0TwVIoWbehmHPOg5lD3MGweekJMd2uOWJaEiraYqa-M3bFYgic$>
>>  https://chromestatus.com/metrics/feature/timeline/popularity/5105 
>> <https://urldefense.com/v3/__https://chromestatus.com/metrics/feature/timeline/popularity/5105__;!!PwKahg!936DvbygeUme5MPpNOWqxDy6FvZCZtkSiLMeRY0TwVIoWbehmHPOg5lD3MGweekJMd2uOWJaEiraYqa-M4OGolP_$>
>>  https://chromestatus.com/metrics/feature/timeline/popularity/5106 
>> <https://urldefense.com/v3/__https://chromestatus.com/metrics/feature/timeline/popularity/5106__;!!PwKahg!936DvbygeUme5MPpNOWqxDy6FvZCZtkSiLMeRY0TwVIoWbehmHPOg5lD3MGweekJMd2uOWJaEiraYqa-M9tSF31m$>
>>
>> Availability expectationWe expect this feature to be generally available 
>> on desktop for M131. Android will follow after.
>>
>> Adoption expectationThe feature can be adopted right away, as while the 
>> functionality provided significantly improves the UX of WebAuthn, it's 
>> provided as a "best-effort" and can safely be unimplemented.
>>
>> Non-OSS dependencies
>>
>> Does the feature depend on any code or APIs outside the Chromium open 
>> source repository and its open-source dependencies to function?
>> * Android Credential Manager for Android support * Apple's browser 
>> passkey APIs for macOS and iOS support. * Windows webauthn.dll for Windows 
>> Hello credentials.
>>
>> Sample links
>> https://signal-api-demo.glitch.me 
>> <https://urldefense.com/v3/__https://signal-api-demo.glitch.me/__;!!PwKahg!936DvbygeUme5MPpNOWqxDy6FvZCZtkSiLMeRY0TwVIoWbehmHPOg5lD3MGweekJMd2uOWJaEiraYqa-M2yTK_9u$>
>>
>> Estimated milestonesDevTrial on desktop130
>>
>> Anticipated spec changes
>>
>> Open questions about a feature may be a source of future web compat or 
>> interop issues. Please list open issues (e.g. links to known github issues 
>> in the project for the feature specification) whose resolution may 
>> introduce web compat/interop risk (e.g., changing to naming or structure of 
>> the API in a non-backward-compatible way).
>> No changes.
>>
>> Link to entry on the Chrome Platform Statushttps://chromestatus.com/
>> feature/5101778518147072?gate=5111131065286656 
>> <https://urldefense.com/v3/__https://chromestatus.com/feature/5101778518147072?gate=5111131065286656__;!!PwKahg!936DvbygeUme5MPpNOWqxDy6FvZCZtkSiLMeRY0TwVIoWbehmHPOg5lD3MGweekJMd2uOWJaEiraYqa-M1nAqjrM$>
>>
>> This intent message was generated by Chrome Platform Status 
>> <https://urldefense.com/v3/__https://chromestatus.com/__;!!PwKahg!936DvbygeUme5MPpNOWqxDy6FvZCZtkSiLMeRY0TwVIoWbehmHPOg5lD3MGweekJMd2uOWJaEiraYqa-M36Savk8$>
>> .
>>
>> -- 
>> Nina Satragno
>>
>> -- 
>> You received this message because you are subscribed to the Google Groups 
>> "blink-dev" group.
>> To unsubscribe from this group and stop receiving emails from it, send an 
>> email to blink-dev+unsubscr...@chromium.org.
>> To view this discussion on the web visit https://groups.google.com/a/
>> chromium.org/d/msgid/blink-dev/cc140654-60b8-4102-9b9f-
>> 1ae970073de2n%40chromium.org 
>> <https://urldefense.com/v3/__https://groups.google.com/a/chromium.org/d/msgid/blink-dev/cc140654-60b8-4102-9b9f-1ae970073de2n*40chromium.org?utm_medium=email&utm_source=footer__;JQ!!PwKahg!936DvbygeUme5MPpNOWqxDy6FvZCZtkSiLMeRY0TwVIoWbehmHPOg5lD3MGweekJMd2uOWJaEiraYqa-M3L2g7ok$>
>> .
>>
>>
>
> -- 
> Nina Satragno
>

-- 
You received this message because you are subscribed to the Google Groups 
"blink-dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to blink-dev+unsubscr...@chromium.org.
To view this discussion on the web visit 
https://groups.google.com/a/chromium.org/d/msgid/blink-dev/d0144180-2bda-4dce-a4a7-a23de20c803cn%40chromium.org.

Reply via email to