On Tue, Jul 15, 2025 at 10:44 AM Chromestatus < ad...@cr-status.appspotmail.com> wrote:
> Contact emails rby...@chromium.org, g...@chromium.org, ma...@chromium.org, > ashimaar...@google.com > > Explainer > https://github.com/w3c-fedid/digital-credentials/blob/main/explainer.md > > Specification https://w3c-fedid.github.io/digital-credentials > > Summary > > Websites can and do get credentials from mobile wallet apps through a > variety of mechanisms today (custom URL handlers, QR code scanning, etc.). > This Web Platform feature would allow sites to request identity information > from wallets via Android's IdentityCredential CredMan system. It is > extensible to support multiple credential formats (eg. ISO mDoc and W3C > verifiable credential) and allows multiple wallet apps to be used. > Mechanisms are being added to help reduce the risk of ecosystem-scale abuse > of real-world identity (see > https://docs.google.com/document/u/1/d/1L68tmNXCQXucsCV8eS8CBd_F9FZ6TNwKNOaFkA8RfwI/edit). > > > > Blink component Blink>Identity>DigitalCredentials > <https://issues.chromium.org/issues?q=customfield1222907:%22Blink%3EIdentity%3EDigitalCredentials%22> > > TAG review Mozilla feedback from Martin (also on the TAG) suggests we > need to invest more in the threat model for the larger space and clarify > specific privacy mitigations before shipping or requesting TAG review. FWIW, Wendy Seltzer did send a TAG review for this, at https://github.com/w3ctag/design-reviews/issues/1119. TAG review status Pending > > Origin Trial Name Digital Credentials API > > Chromium Trial Name WebIdentityDigitalCredentials > > Origin Trial documentation link https://wicg.github.io/digital-credentials > > WebFeature UseCounter name kIdentityDigitalCredentials > > Risks > > > Interoperability and Compatibility > > There are multiple standards efforts involved here. We have been working > with WebKit and Mozilla in the WICG on defining this specific API. But the > greater interoperability risk will come from the data that is sent and > returned via this API. Details of that are still in discussions but mostly > driven outside the web browser community in the OpenID Foundation (eg. > OpenID4VP: > https://openid.net/specs/openid-4-verifiable-presentations-1_0.html) and > ISO (18013-7 "mdoc": https://www.iso.org/standard/82772.html) > > > *Gecko*: Negative ( > https://github.com/mozilla/standards-positions/issues/1003) We share most > of Mozilla's concerns and continue to work with them (and the broader > community) on mitigations. I believe we feel greater risk for the > established practice of custom schemes becoming prevalent than Mozilla does > (eg. due to Google being mandated by eIDAS regulation to accept EUDI > credentials). > > *WebKit*: In development ( > https://github.com/WebKit/standards-positions/issues/332) WebKit > implementation progress: https://bugs.webkit.org/show_bug.cgi?id=268516 > > *Web developers*: No signals > > *Other signals*: This work in the W3C PING is relevant: > https://github.com/w3cping/credential-considerations/ > > Ergonomics > > There's a possibility that these credentials will be used alongside other > types of credentials in the future - such as optionally minting a passkey > when a digital credential is used to sign up for a site, or by allowing > sign-up with either a digital credential or a federated credential via > FedCM. As such we argued it was best to put this work in the context of the > Credential Management API, and hence the support is added in > 'navigator.identity.get() API . > > > Activation > > The primary activation concern is enabling existing deployments using > technology like OpenID4VP to be able to also support this API. As such we > have left the request protocol unspecified at this layer, to be specified > along with existing request protocols to maximize activation opportunity. > > > Security > > See > https://github.com/WICG/digital-credentials/blob/main/horizontal-reviews/security-privacy.md > and https://github.com/w3c-fedid/digital-credentials/issues/115 > > > WebView application risks > > Does this intent deprecate or change behavior of existing APIs, such that > it has potentially high risk for Android WebView-based applications? > > > > Goals for experimentation > > > > Reason this experiment is being extended > > We have made significant progress on the spec (specifically the privacy > and security sections), and the First Public Working Draft has been > published on the 1st of July 2025. We are currently waiting for the TAG > review and hence would like to extend this OT for one more milestone. We > are optimistic that by the end of this time we will have received a > positive TAG review, which will unblock shipping the API. > > > Reason this experiment is being extended > > - W3C team report on Digital Credentials formal objection is now published > with, as expected, a recommendation to overrule the objection: > https://www.w3.org/2024/10/team-report-fedid-wg-fo.html - We have made > progress with updating the spec and updated the implementation to match the > latest spec (changing the request and response format, and support multiple > requests) and we would like to test such implementation. - Google Birthday > Correct Flow implementation is also being updated to support both legacy > and modern format. - We have delayed announcing the cross-device OT because > of issue with 3rd party camera apps, we have reached out to other OEMs to > fix it. > > > Reason this experiment is being extended > > I'd like to request permission to extend an OT for this API. The > experiment has been running for Android only so far, but in the meanwhile: > 1- There has been progress on the spec > https://wicg.github.io/digital-credentials/ and it is expected to > graduate to the FedID WG soon. 2- We have added Desktop cross-device > support. Therefore, we are requesting the extension. > > > Ongoing technical constraints > > None > > > Debuggability > > None necessary - just new JS API. For testing we may want to add a > developer option to provide a fake wallet (as for the devtools fake > authenticator for WebAuthn), but this is not urgent. > > > Will this feature be supported on all six Blink platforms (Windows, Mac, > Linux, ChromeOS, Android, and Android WebView)? No > > Android and Desktop Only > > > Is this feature fully tested by web-platform-tests > <https://chromium.googlesource.com/chromium/src/+/main/docs/testing/web_platform_tests.md> > ? Yes > > > https://wpt.fyi/results/digital-credentials?label=master&label=experimental&aligned > > > DevTrial instructions https://digitalcredentials.dev/docs/requirements > > Flag name on about://flags web-identity-digital-credentials > > Finch feature name WebIdentityDigitalCredentials > > Requires code in //chrome? True > > Tracking bug https://issues.chromium.org/issues/40257092 > > Launch bug https://launch.corp.google.com/launch/4268575 > > Estimated milestones > Shipping on desktop 141 > Origin trial desktop first 134 > Origin trial desktop last 136 > Origin trial extension 1 end milestone 140 > Origin trial extension 2 end milestone 139 > Origin trial extension 3 end milestone 136 > DevTrial on desktop 133 > Shipping on Android 141 > Origin trial Android first 128 > Origin trial Android last 133 > DevTrial on Android 119 > > Link to entry on the Chrome Platform Status > https://chromestatus.com/feature/5166035265650688?gate=5169620323139584 > > Links to previous Intent discussions Intent to Prototype: > https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAL9PXLx3sHWmdE-ikAEDay_S3ijf0%2BfxB_LbsuOx8YJx%2BZA7%2Bg%40mail.gmail.com > Intent to Experiment: > https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAFUtAY-421uDmu2WNDBG5bYRSWAhfmahsHPVjDwN5NLkUdCkvw%40mail.gmail.com > Intent to Extend Experiment 2: > https://groups.google.com/a/chromium.org/d/msgid/blink-dev/67f3fe84.170a0220.25676e.143e.GAE%40google.com > Intent to Extend Experiment 3: > https://groups.google.com/a/chromium.org/d/msgid/blink-dev/6786814c.2b0a0220.1b83ac.051d.GAE%40google.com > > > This intent message was generated by Chrome Platform Status > <https://chromestatus.com>. > > -- > You received this message because you are subscribed to the Google Groups > "blink-dev" group. > To unsubscribe from this group and stop receiving emails from it, send an > email to blink-dev+unsubscr...@chromium.org. > To view this discussion visit > https://groups.google.com/a/chromium.org/d/msgid/blink-dev/6876938b.2b0a0220.377b9f.0109.GAE%40google.com > <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/6876938b.2b0a0220.377b9f.0109.GAE%40google.com?utm_medium=email&utm_source=footer> > . > -- You received this message because you are subscribed to the Google Groups "blink-dev" group. To unsubscribe from this group and stop receiving emails from it, send an email to blink-dev+unsubscr...@chromium.org. To view this discussion visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CANh-dXmy3upDcYUBry-nrk-9vEPOeJ9cNxgHg8zPbvJMPAjpuA%40mail.gmail.com.