public-webauthn@w3.org from August 2016 by subject

08/03/2106 W3C WebAuthentication WG Agenda

08/10/2016 W3C Web Authentication WG Agenda

08/17/2016 W3C Web Authentication WG Agenda

08/24/2016 W3C Web Authentication WG Cancelled

08/31/2016 W3C Web Authentication WG Agenda

10 August: 90 minute meeting

[w3c/webauthn]

[w3c/webauthn] 00fe43: move IDL frags to applicable sections. fixes #112 ...

[w3c/webauthn] 056c63: Address comments from @equalsJeffH

[w3c/webauthn] 066351: TravisCI Fix: Don't update gh-pages for non-master...

[w3c/webauthn] 212de8: Clean up attestation

[w3c/webauthn] 2b4d1f: Built by Travis-CI: a7817009bf82bd1ef3bca7d7c05ab3...

[w3c/webauthn] 2d50c2: Built by Travis-CI: 62b67c02a37ab54ca8b3c1f7606bb7...

[w3c/webauthn] 615084: Token Binding ID: JWK -> opaque

[w3c/webauthn] 62b67c: Cleaned up exposition of processing rules (#154)

[w3c/webauthn] 80bb3f: clarify optionality of FIDO MDS. Fixes #47.

[w3c/webauthn] 966e41: Built by Travis-CI: 2b72ddfb805a4a0e2797afccea88cf...

[w3c/webauthn] 98fb91: Allow caller to pick between strict and eTLD+1 mat...

[w3c/webauthn] 9c7d00: Fix typo (thanks Travis!)

[w3c/webauthn] a78170: Update index.bs with proposed location extension (...

[w3c/webauthn] c79e21: IDL cleanup: don't require callers to create Crede...

[w3c/webauthn] d5b952: first draft of new proposal. See #156

[w3c/webauthn] ee8715: fix xref

[webauthn] "web origin of the script"

[webauthn] 4.1 heading should appear before the IDL

[webauthn] Add Android "N" attestation type.

[webauthn] Add opaque data extension

[webauthn] Adding the User Verification Mode extension as per discussions in theā€¦

[webauthn] Allow caller to pick between strict and eTLD+1 matching

[webauthn] also cite the other extant TLS channel binding mechanisms?

[webauthn] breakup IDL

[webauthn] callerOrigin

[webauthn] Change Android SafetyNet attestation type identifier ?

[webauthn] clarify content of algorithm member of ScopedCredentialParameters

[webauthn] Clarify meaning of UVI

[webauthn] clarify normality of authenticator model - is it actually authenticator API ?

[webauthn] clarify that at least one model of attestation must be employed

[webauthn] Clarify the definition of "origin"

[webauthn] Cleaned up exposition of processing rules

[webauthn] Consider using USVString instead of DOMString sometimes

[webauthn] Define UTF-8 string

[webauthn] do not entirely lose distinctions distinctions between External and Embedded Authenticators

[webauthn] do not totally lose the term "WebAuthn Relying Party"

[webauthn] DOMString[] should be FrozenArray<DOMString>

[webauthn] facet should be defined in terms of the HTML Standard

[webauthn] facet should be USVString

[webauthn] Fixed spelling, grammar, and document syntax issues

[webauthn] hostname canonicalization in {#makeCredential} section?

[webauthn] IDL cleanup: don't require callers to create Credential objects

[webauthn] lowercase form of this RP ID

[webauthn] Make attestation more modular

[webauthn] makeCredential() should use a dictionary

[webauthn] new commits pushed by equalsJeffH

[webauthn] new commits pushed by jcjones

[webauthn] new commits pushed by rlin1

[webauthn] new commits pushed by vijaybh

[webauthn] new commits pushed by WebAuthnBot

[webauthn] normalize RFC2119 language

[webauthn] Privacy concerns with blacklist/whitelist

[webauthn] Problem with authn selection extension

[webauthn] Relying Party or Server

[webauthn] Remove attestation specification from spec

[webauthn] Section 4.3: add reference to privacy

[webauthn] Section 4: Mention requirement for user to give consent for key to be used

[webauthn] Secure context should be MUST not SHOULD

[webauthn] should authenticator layer send hashed or unhashed rpId to authenticators?

[webauthn] Should rpId be removed from clientData?

[webauthn] Silent Authn? clarification of bit 0 in AuthenticatorData

[webauthn] Spec draft points to wrong GitHub issues page

[webauthn] Token Binding ID: JWK -> opaque

[webauthn] tokenBinding in ClientData should be a binary type (perhaps base64) and not JsonWebKey

[webauthn] Update index.bs with proposed location extension

[webauthn] What if callerOrigin is an opaque origin

AW: returning a multi-factor authenticator's factor-in-use and protection scheme to the server - UVM extension proposal v2

Call for Exclusions (Update): Web Authentication: A Web API for accessing scoped credentials

Can we remove the PSL dependency?

Closed: [webauthn] Add opaque data extension

Closed: [webauthn] Client processing steps are not aligned with authenticator model

Closed: [webauthn] makeCredential() should use a dictionary

Closed: [webauthn] Problem with authn selection extension

Closed: [webauthn] Remove attestation specification from spec

draft-hodges-webauthn-registries-00

issues with latest bikeshed

our cloud bikeshed? (was: issues with latest bikeshed

Patent exclusions (Re: 08/17/2016 W3C Web Authentication WG Agenda)

Proposal for a Location Extension, rev 4

Proposal for W3C-style Attestation Registry

returning a multi-factor authenticator's factor-in-use and protection scheme to the server

returning a multi-factor authenticator's factor-in-use and protection scheme to the server - UVM extension proposal

returning a multi-factor authenticator's factor-in-use and protection scheme to the server - UVM extension proposal v2

Spec status

WebAuthn API Specification Review

work-in-progress: jeffh-editorial-cleanups

wrt deprecating eTLD+1 (was: Can we remove the PSL dependency?)

Last message date: Wednesday, 31 August 2016 20:47:22 UTC