-
Notifications
You must be signed in to change notification settings - Fork 2
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
User with multiple devices #2
Comments
Imported from AB/Connect bitbucket - Original Commenter: peppelinuxI don't have an answer but a good chance to learn something. In “6.2.2. Dynamic Self-Issued OpenID Provider Discovery Metadata“ I read subject_types_supported subject_syntax_types_supported having public subjects and a unique alg to hash them, well, it would be a weak kind of solution but I’d prefer to have in the subject value a resolvable DID. It’s an important aspect that we may consider also in the UX experience field, when the user selects how to release his VPs also mind that in a “traditional” multilateral federation we have many OP, the RP deal with many of them, continuosly, and also with users that authenticate in different time with different IDP. |
Imported from AB/Connect bitbucket - Original Commenter: tomcjonesThis is really just a duplication of 1354 Relationship Management, 1380 and many others. The question has not been answered for SIOP. Unfortunately it does not seem to be answerable. It is certainly not the purview of any standards committee to solve your problem. If you cannot handle real-world problems, you will not succeed. If SIOP cannot work with real web sites, it will not be used. The issue, as it see it, has always been, and remains, how will the major browsers support the method. |
Imported from AB/Connect bitbucket - Original Commenter: dwc8I do have a solution (which we have implemented) but so far the group has not been enamoured to it. Basically it is as follows:
|
Imported from AB/Connect bitbucket - Original Commenter: dwc8Tom, regarding your last issue of how will browsers support it, in our current implementation the RP relays its request for VCs to the user’s wallet using scripts that are sent to the browser. I was hoping that we could replace the scripts with SIOP. |
Imported from AB/Connect bitbucket - Original Commenter: tomcjonesstep 4 was addressed at the last meeting by more than one of the members. IMHO it is illegal for the RP to tell the user to provide attributes that are not required for the transaction. (eu and california) Attribute Authentication has been proven to the rather poor at distinguishing people. As you can see from this link - attribute authentication would confuse Prince chas with ozzy osbourne. https://www.bbc.com/news/technology-37307829 I, for one, would vote against any standard that depended on attribute authn |
Imported from AB/Connect bitbucket - Original Commenter: dwc8identifiers are simply attributes that on their own uniquely identify the user. So it appears that you are against multi-attribute authn but not against single attribute authn. In which case could you subclass my design to replace “verifiable credentials from issuers” with “verifiable credential from issuer”, and “identity attributes” with “unique identity attribute” (ie. identifier). Would that work for you? |
Imported from AB/Connect bitbucket - Original Commenter: KristinaYasudaDavid, what is your use-case? WebAuthn/FIDO uses Device-bound private key per RP to identify a user, and it changes when the user changes the device, and it has worked and has been praised for the security offers. The proposal to address an issue you describe which surfaced in certain scenarios has not been “subject identifier is irrelevant“ - it cannot be irrelevant since it opens up a big security hall. Rather a solution is to sync private keys across devices - it is called “Apple passkey“. |
Imported from AB/Connect bitbucket - Original Commenter: dwc8The use case is a user with more than one mobile phone e.g. an iPhone and Android in which the keys are stored in hardware. So if the sub identifier is (the hash of) the public key then the user has two identifiers. You/Mike said the solution is to use software based keys and to sync them across devices, but I don’t see this is a solution to the problem. Rather a more elegant solution in the VC case, is for the trusted VC issuer to insert a unique subject id as an attribute in the VC, then whichever device presents the VC, the same sub identifier is obtained by the RP. And if the RP does not trust any external VC issuer to do this, then it can issue its own VCs to the user, containing just the subject identifier attribute. |
Imported from AB/Connect bitbucket - Original Commenter: dwc8p.s. Apple Passkey stores the private keys in the cloud. But I believe it only works between Apple devices and not with Android. |
Imported from AB/Connect bitbucket - Original Commenter: tomcjonesRather a more elegant solution in the VC case, is for the trusted VC issuer to insert a unique subject id as an attribute in the VC ===> I already have a few of those, they are called email addresses. |
Imported from AB/Connect bitbucket - Original Commenter: dwc8There are also security considerations for this identifier which should be fulfilled (which email addresses and telephone numbers don't fully satisfy). Specifically
|
Imported from AB/Connect bitbucket - Original Commenter: tomcjonesI think that you are confusing protocol syntax and governance or policy. There is no reason that email cannot satisfy those conditions, which have been discussed long before VCs were even articulated. None of these ideas has anything whatsoever to do with support of multiple devices. I have multiple devices and use the same authenticators on those devices already. I suspect you guys need to examine existing solutions first. My understanding was that ION was sked to work on MSFT authenticator - can anyone get the current status of that? |
Imported from AB/Connect bitbucket - Original Commenter: KristinaYasudaI think in SIOP case, when you making a choice to use a HW-bound key as a user identifier, you are making a choice for a user to have a separate identifier. Having said that I understand this is not the best user experience and partially what has driven passkey. passkey has a mechanism where user has two private keys - one that is synced, and one that is a HW-bound. Equivalent one in SIOP would be defining a second subject identifier - one that is HW-bound and a second one that can be common across devices. How to prove control of both, and prevent other claims being inserted is up to discussion. btw, subject identifier is an ID Token claim. I am confused why you are talking about VC claims. |
Imported from AB/Connect bitbucket - Original Commenter: KristinaYasuda@tom, ION is an overlay on Bitcoin, did:ion can be used by anyone, not just MSFT Authenticator |
Imported from AB/Connect bitbucket - Original Commenter: dwc8Given that ID Token is mandatory and VP token is not, I am now in favour of the VP being included in the ID Token since many of the fields are duplicated e.g. iss, sub, aud etc. We can then talk about VC claims in the ID Token that refer to the subject identifier. This will allow multiple devices to still use the same subject identifier using a VC property. |
Imported from AB/Connect bitbucket - Original Commenter: dwc8I have drawn a diagram to show one possible solution to this issue. You can see the diagram here https://drive.google.com/file/d/1R3kUk5Z1BcdaORTdOOQnayig430bS3UK/view?usp=sharing This proposal allows the user to always be identified by the same subject identifier created by the OP/VC Issuer, regardless of how the user contacts the RP i.e. with a browser from a laptop, or with a VC from a wallet using SIOPv2 (where the keys are held in the hardware or software of the mobile phone). |
Imported from AB/Connect bitbucket - Original Commenter: KristinaYasudaI would need to think deeper, but attestation claim might help. same user identifier coming from different SIOP software. |
Imported from AB/Connect bitbucket - Original Commenter: dwc8Surely SIOP software is not as trustworthy as a VC Issuer? So the same identifier coming from the same VC Issuer by different routes is surely more preferable (from both a trustworthiness perspective and from a practical one, in that we already have the VC route and we dont have trustworthy SIOP software). |
Imported from AB/Connect bitbucket - Original Commenter: mbjThis was discussed during the 24-Feb-22 SIOP special topic call. People are encouraged to continue discussion on the issue. |
Imported from AB/Connect bitbucket - Original Commenter: KristinaYasudaPR #515 - super simple text |
Imported from AB/Connect bitbucket: https://bitbucket.org/openid/connect/issues/1381
Original Reporter: dwc8
In OIDC it does not matter which device or browser the user uses, since the RP always redirects the user to the same OP, which always returns the same sub identifier. But with SIOP, the sub identifier is (the hash of) the public key of the user created by the SIOP on the device. So if a user has multiple devices they will have multiple key pairs, and therefore multiple sub identifiers. Can someone please explain how the user can authenticate with the same identifier from different devices using SIOP.
The text was updated successfully, but these errors were encountered: