-
-
Notifications
You must be signed in to change notification settings - Fork 157
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Showcase recommended usage patterns #54
Comments
Not sure if it helps, but one of my main points of confusion is how to safely register a 2nd device when using a TPM authenticator type. Edit: Might be better to look into this at "spec" level? For example, I found this discussion: w3c/webauthn#151 |
Yes, that is a topic that has come up. Generally the recommendation is using a roaming authenticator to bootstrap multiple platform authenticators. You could come up with a way to use a device to on board another device. The way Keybase works always comes to mind. |
These patterns do not need to include code but could simply serve as guidance for developers, describing the flow for different popular patterns.
e.g:
Login a user
describe use case and flow
Verify user action
describe use case and flow
The text was updated successfully, but these errors were encountered: