public-webauthn@w3.org from June 2022 by subject

06/15/2022 W3C Web Authentication Meeting CANCELLED

06/29/2022 W3C Web Authentication Meeting

[w3c/webauthn]

[w3c/webauthn] 0c7405: #1692 backup states in authenticator data

[w3c/webauthn] 12e507: Incorporate feedback on wording for exceptions

[w3c/webauthn] 27d089: Introduce unsigned extension outputs and use it to...

[w3c/webauthn] 36c7f9: Change "create any credentials" to "create any ass...

[w3c/webauthn] 3dbff5: Merge pull request #1695 from w3c/timcappalli-1692...

[w3c/webauthn] 4cd4ed: Remove extraneous brackets

[w3c/webauthn] 582b2e: Incorporate Emil's feedback

[w3c/webauthn] 59ecbf: Add sections for new API methods

[w3c/webauthn] 656e61: Add "hybrid" as a transport.

[w3c/webauthn] 67f1df: Order Terminology definitions alphabetically

[w3c/webauthn] 684cd9: Use [RP] and [WRP] macros

[w3c/webauthn] 74eb1b: Address review comments

[w3c/webauthn] 750efd: Use "public key credential source" consistently

[w3c/webauthn] 88bd8f: Attempt to define rules for when encoding fails

[w3c/webauthn] 8ad944: Non-modal "conditionally mediated" UI (#1576)

[w3c/webauthn] 91473c: Non-modal "conditionally mediated" UI (#1576)

[w3c/webauthn] a376e3: Fix trailing whitespace

[w3c/webauthn] ae3a7d: Rename options methods from `get-` to `parse-`

[w3c/webauthn] b1b5fd: Incorporate @emlun's copy advice

[w3c/webauthn] c62b77: Use [RP] and [WRP] macros

[w3c/webauthn] e106da: Merge pull request #1703 from w3c/masterkale-1683-...

[w3c/webauthn] e42a23: Merge pull request #1736 from w3c/issue-1734-sign-...

[w3c/webauthn] f1f8b5: Remove Generic Passthrough Operations

[w3c/webauthn] f2fb63: Merge pull request #1737 from w3c/remove-generic-p...

[w3c/webauthn] f6db88: Add draft of backup eligibility parameter during r...

[w3c/webauthn] f9ccf4: Mention constant-zero signature counter in §6.1.1 ...

[webauthn] Add a way to use webauthn without Javascript (#1255)

[webauthn] Advice on language to use? (#1708)

[webauthn] Attestation on Get Assertion (#1741)

[webauthn] backup states in authenticator data (#1695)

[webauthn] Better specify what an unknown type credential descriptor being ignored means (#1748)

[webauthn] caBLE for Payments (#1681)

[webauthn] Clarify how a user can authenticate from multiple devices (#151)

[webauthn] Closed Pull Request: Introduce unsigned extension outputs in DPK PR

[webauthn] Closed Pull Request: Refer to options for the user verification check

[webauthn] Conditional Mediation feature discovery should really return a promise (#1745)

[webauthn] Credential Creation Options are inconsistent to Request (#1716)

[webauthn] Discussing mechanisms for enterprise RP's to enforce bound properties of credentials (#1739)

[webauthn] DRAFT: Backup eligibility parameter during registration (#1744)

[webauthn] Drop generic client extension processing? (#1730)

[webauthn] How to declare that a registration only awaits for a Security Key? (#1750)

[webauthn] How to know if a user has already registered a device? (#1749)

[webauthn] Inconsistencies in backup state flags (#1740)

[webauthn] Incorrect use of _options_ variable in `create()` and `get()` definitions (#1752)

[webauthn] Introduce unsigned extension outputs in DPK PR (#1753)

[webauthn] Merged Pull Request: backup states in authenticator data

[webauthn] Merged Pull Request: Introduce unsigned extension outputs in DPK PR

[webauthn] Merged Pull Request: Mention constant-zero case in §6.1.1 Signature Counter Considerations

[webauthn] Merged Pull Request: New PublicKeyCredential methods for JSON (de)serialization

[webauthn] Merged Pull Request: non-modal "conditionally mediated" UI

[webauthn] Merged Pull Request: Remove Generic Passthrough

[webauthn] new commits pushed by agl

[webauthn] new commits pushed by emlun

[webauthn] new commits pushed by github-actions[bot]

[webauthn] new commits pushed by MasterKale

[webauthn] new commits pushed by nicksteele

[webauthn] new commits pushed by nsatragno

[webauthn] New PublicKeyCredential methods for JSON (de)serialization (#1703)

[webauthn] No mechanisms in place for enterprise RP's to opt out of auth with a "shared" passkey (#1739)

[webauthn] non-modal "conditionally mediated" UI (#1576)

[webauthn] Platform authentication registration promotion when the user has authenticated with the external authenticator (#1759)

[webauthn] Process to report non-compliant credentials (#1713)

[webauthn] Provide request deserialization, response serialization (#1683)

[webauthn] Pull Request: Add "hybrid" as a transport.

[webauthn] Pull Request: DRAFT: Backup eligibility parameter during registration

[webauthn] Pull Request: Fix some editorial issues

[webauthn] Pull Request: Introduce unsigned extension outputs in DPK PR

[webauthn] Pull Request: Remove Generic Passthrough

[webauthn] Read the PRF extension. (#1732)

[webauthn] Reconsider having unknown "enum" values being ignored (#1738)

[webauthn] Refer to options for the user verification check (#1718)

[webauthn] Should an RP be able to provide finer grained authenticator filtering in attestation options? (#1688)

[webauthn] Should enterprise attestation support be flagged explicitly? (#1742)

[webauthn] Spec abstract is out of date on the eve of multi-device credentials and cross-device auth (#1743)

[webauthn] Split the standard by focus driven use cases. (#1751)

[webauthn] Use aPAKE/OPAQUE for FIDO multi-device credentials (PassKey) (#1747)

[webauthn] Use aPAKE/QPAQUE for FIDO multi-device credentials (PassKey) (#1747)

[webauthn] User verification policy leads to ambiguous usage situations. (#1510)

[webauthn] Which "pubKeyCredParams" to use? (#1757)

[webauthn] Why not make things simple? (#1709)

Closed: [webauthn] Add support for non-modal UI (#1545)

Closed: [webauthn] Advice on language to use? (#1708)

Closed: [webauthn] Backup state of credentials (#1692)

Closed: [webauthn] caBLE for Payments (#1681)

Closed: [webauthn] Credential Creation Options are inconsistent to Request (#1716)

Closed: [webauthn] Drop generic client extension processing? (#1730)

Closed: [webauthn] How to know if a user has already registered a device? (#1749)

Closed: [webauthn] Process to report non-compliant credentials (#1713)

Closed: [webauthn] Reconsider having unknown "enum" values being ignored (#1738)

Closed: [webauthn] Why not make things simple? (#1709)

Closed: [webauthn] §6.1.1. Signature Counter Considerations does not explicitly mention constant-zero case (#1734)

Event Invitation: WebAuthn WG

Event Updated: WebAuthn WG

Weekly github digest (WebAuthn)

Last message date: Thursday, 30 June 2022 12:21:44 UTC