Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Document needs scoping and positioning the profile at the start #25

Open
sbweeden opened this issue Nov 2, 2020 · 2 comments
Open

Document needs scoping and positioning the profile at the start #25

sbweeden opened this issue Nov 2, 2020 · 2 comments

Comments

@sbweeden
Copy link
Contributor

sbweeden commented Nov 2, 2020

The document should suggest at the beginning that this is one profile (not the only way) to deploy FIDO2 for consumer use cases. It is perfectly valid for there to be alternatives to this proposal, or for deployers to make alternative choices to what this profile suggests. This should lead to comments and PRs on this document focusing on the reasoning behind the decisions made in this profile rather than attempts to change or soften the approach and choices made within it (e.g. whether or not to use attestation, etc).

@maxhata
Copy link

maxhata commented Nov 3, 2020

Understanding WebAuthn's complexity for deployment, the "profile" concept might be a reasonable approach.
If that is the case, we have to position it appropriately in the document.

Let's run a hypothetical exercise using attestation as an example.
How much do we talk about it in the positioning section?
One example is such a note that I proposed, #23

In terms of attestation, if we "recommend" not to specify, our target RPs will not be all the consumer facing RPs.
For many RPs who provide services for consumers, attestation is very important. Such RPs include not only banks but also many other types of RPs. So we have to target the audience appropriately and "consumer" will not be the right terminology.

@keikoit
Copy link

keikoit commented Nov 9, 2020

I agree both with you. Currently this document seems to imply that this is the only way to FIDO.
I understood this is one profile example, in the other hand we should consider/identify our position as FIDO alliance, such as should be support attestation or not.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants