Re: wrt all those "FIDO" terms, e.g. "FIDO Credentials" - new names?

Having the FIDO name inside the CredentialType enumeration is acceptable to
me personally, but the assertions, extensions and like that Jeff brought up
in the original posting _still_ need to be made web-generic, as we seem to
all be in agreement that FIDO-compatible devices are only one way to
perform authentication within the resulting standard.

To cite a specific example,when we are rewording a line from the JS API
that currently says: "The script asks the client platform for a FIDO
identity assertion," I think it reads alright after `s/FIDO/scoped
credential/g`: "The script asks the client platform for a scoped credential
[identity] assertion," (possibly omitting "identity", depending on context).

I think we should focus on whether "scoped credential" a viable bit of
vocabulary for the rest of the documents, or how we would like to reword
that.

On Wed, Mar 9, 2016 at 4:40 PM, Vijay Bharadwaj <vijaybh@microsoft.com>
wrote:

> Tony beat me to this one.
>
>
>
> This seems to add unnecessary cognitive overhead for web developers. They
> have to just know that if they want to support those flashy dongles with
> the FIDO logo, they need to use “ScopedSignature” (having a CredentialType
> enum value include Credential in its name seems like a redundant bit of
> redundancy) in their code. Moreover, using “FIDO” as an enum value in no
> way prevents the existence of other possible enum values. The API names and
> namespaces remain generic after all.
>
>
>
> *From:* Anthony Nadalin [mailto:tonynad@microsoft.com]
> *Sent:* Wednesday, March 09, 2016 3:06 PM
> *To:* Richard Barnes <rbarnes@mozilla.com>; Hodges, Jeff <
> jeff.hodges@paypal.com>
> *Cc:* W3C WebAuthn WG <public-webauthn@w3.org>
> *Subject:* RE: wrt all those "FIDO" terms, e.g. "FIDO Credentials" - new
> names?
>
>
>
> I’m getting a little worried that we are now in meaningless territory as
> “FIDO” had a specific meaning the “ScopedSignatureCredentails” can mean
> anything. The use of FIDO is just like the use of RSA here.
>
>
>
> *From:* Richard Barnes [mailto:rbarnes@mozilla.com <rbarnes@mozilla.com>]
> *Sent:* Wednesday, March 9, 2016 1:30 PM
> *To:* Hodges, Jeff <jeff.hodges@paypal.com>
> *Cc:* W3C WebAuthn WG <public-webauthn@w3.org>
> *Subject:* Re: wrt all those "FIDO" terms, e.g. "FIDO Credentials" - new
> names?
>
>
>
>
>
>
>
> On Wed, Mar 9, 2016 at 4:28 PM, Hodges, Jeff <jeff.hodges@paypal.com>
> wrote:
>
> On 3/9/16, 1:20 PM, "Richard Barnes" <rbarnes@mozilla.com> wrote:
>
>
>
> """
> API Features in scope are: (1) Requesting generation of an asymmetric key
> pair within a specific scope (e.g., an origin); (2) Proving that the
> browser has possession of a specific private key, where the proof can only
> be done within the scope of the key pair. In other words, authentication
> should obey the same origin policy.
> """
>
> So this is a credential that provides authentication based on proof of
> possession of a signing key (i.e., a signature), where that signature is
> limited to some scope via the signing protocol we will define.
>
> Could people live with "ScopedSignatureCredential"?
>
>
>
> so you are suggesting..
>
>
>
> enum CredentialType {
>
>     "ScopedSignatureCredential"
>
> };
>
> .. yes?
>
> Precisely.
>
>
>
>
> sure, I can live with that.
>
>
>
> =JeffH
>
>
>
>
>

Received on Thursday, 10 March 2016 00:39:20 UTC