generated from Firehed/php-library-template
-
-
Notifications
You must be signed in to change notification settings - Fork 1
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Adopt changes from level 3 of spec #48
Comments
Note: I think the credential record changes specifically are going to necessitate some large modifications to the codec logic, and could result in a fairly major BC break. |
A couple additional notes:
|
Firehed
added a commit
that referenced
this issue
Dec 3, 2023
…mat (#61) This reduces the need for RP servers to use internal methods by directly exposing the challenge as base64url, which is used by the (limited support) native formats as noted in #48 (a tool to produce the entire format will come as well!). Additionally, this matches up the storage id formats for both credential formats, which as-is would not function as expected (new authorizations would return a v2, and subsequently could fail to find an existing matching v1 format depending on the lookup approach) > [!WARNING] > BC BREAK: this changes the storage identifier for the older credential format. This was noted in tests as a pre-1.0 possibility. Fixes #59
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
https://www.w3.org/TR/webauthn-3/
So far, I've found the following (non-comprehensive) list of changes:
topOrigin
andcrossOrigin
fields to ClientDataJSONThe text was updated successfully, but these errors were encountered: