- From: lisa.seeman <lisa.seeman@zoho.com>
- Date: Tue, 28 Nov 2017 20:45:32 +0200
- To: Alastair Campbell <acampbell@nomensa.com>
- Cc: "W3c-Wai-Gl-Request@W3. Org" <w3c-wai-gl@w3.org>
- Message-Id: <16003f0f55e.adb3e6ee109420.4702210235002684452@zoho.com>
Hi Alistair
Web authentication specification standardizes how to offer alternatives, but you can offer alternative logins without using the specification.
For example, https://ecas.ec.europa.eu/cas/login?loginRequestId allows you to choose between a using a long password , their app with a pin, their app with a QR code (conferment alternative) mobile phone with sms, mobile phone with token (conferment alternative) , token (conferment alternative)
My email provider lets you log in with alternative mechanisms as well.
All the best
Lisa Seeman
LinkedIn, Twitter
---- On Tue, 28 Nov 2017 20:00:00 +0200 Alastair Campbell<acampbell@nomensa.com> wrote ----
Hi Lisa,
> LS: there are lots of ways to do this securely. such as…
I covered this in the email yesterday, but there are two types of implementations we are confusing:
Hardware / apps that supply the secure token / biometrics
Browser support that connects to those secure devices.
WebAuth is the right standard to refer to, but the current browser support is Chrome-only, and that is desktop-only as the U2F devices generally use USB.
Is there another way that I’m missing? Otherwise I can’t see how we could get 2 implementations (which is probably why WebAuth is still in draft).
> there are thousands of conforming sites. examples of conforming sites That I use only yesterday include: the w3c and the EU site for research funding which allows multiple log in methods
I’m confused about that as I was given a password for W3C which I have to type in every time. (Well, I use lastpass, but we seem to be ignoring auto-filling password tools).
I assume those are sites which let you reset email, for which my question was: Is the intent that the email reset logs you in automatically?
A typical implementation would have you copy the new password into a username/password form to login, which I wouldn’t have thought conforms?
> Any level of security can be reached. including use of tokens and dongles , smartcards etc.
But we haven’t shown that for *web content*, I don’t think “use desktop chrome” is a good answer here.
Also, how do you get past the username/password bit? You can set the second factor to remember your device for a set time (usually 30 days), but at some point you would still have to login with a password and with the 2nd factor, otherwise there is no security
Then the last (more complex) level, how do you conform if you are the email-provider? If you can’t provide an email-loop, and you use 2FA, I can’t see how that would work in theory, let alone practice.
If this is getting a security review, can we make sure that is considered? Otherwise it is very hypothetical.
Cheers,
-Alastair
Received on Tuesday, 28 November 2017 18:46:10 UTC