W3C home > Mailing lists > Public > public-webauthn@w3.org > May 2021

Re: [webauthn] Managing FIDO keys (#1612)

From: John Bradley <ve7jtb@ve7jtb.com>
Date: Thu, 13 May 2021 23:52:59 -0400
Message-ID: <CAANoGh+DbRVTqTQqRKqqkeDUGivSEDKTSVDw5L6cpd8-bEMLrQ@mail.gmail.com>
To: Ki-Eun Shin via GitHub <sysbot+gh@w3.org>
Cc: W3C Web Authn WG <public-webauthn@w3.org>
For a roaming authenticator CTAP2.1 or 2.1_pre keys support the credential
management API.

The windows platform authenticator makes all credentials as
resident/discoverable.

When testing you can wind up with a long list of discoverable credentials.


Unfourtunatly Microsoft has not publicly released the credential management
API for the platform authenticator.

It is a Windows issue.

I don't know how apple is planning on dealing with it for their platform
authenticators if they don't release some form of credential management.

John B.

On Thu, May 13, 2021, 11:37 PM Ki-Eun Shin via GitHub <sysbot+gh@w3.org>
wrote:

> There is no Web API for deleting keys from the security keys. But, you can
> manage your keys through platform provided settings like Windows Hello or
> you can delete the keys through Chrome settings.
> chrome://settings/securityKeys
>
> --
> GitHub Notification of comment by Kieun
> Please view or discuss this issue at
> https://github.com/w3c/webauthn/issues/1612#issuecomment-840982748 using
> your GitHub account
>
>
> --
> Sent via github-notify-ml as configured in
> https://github.com/w3c/github-notify-ml-config
>
>
Received on Friday, 14 May 2021 03:53:24 UTC

This archive was generated by hypermail 2.4.0 : Tuesday, 5 July 2022 07:26:43 UTC