Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

New demo website for V1 to better explain capabilites and scenarios #82

Closed
2 of 4 tasks
abergs opened this issue Feb 16, 2019 · 10 comments
Closed
2 of 4 tasks

New demo website for V1 to better explain capabilites and scenarios #82

abergs opened this issue Feb 16, 2019 · 10 comments

Comments

@abergs
Copy link
Collaborator

abergs commented Feb 16, 2019

Work in progress: https://fido2test.azurewebsites.net/overview

I wanted to be able to explain better how/why FIDO2 and what is enables.

Todo:

  • Allow adjusting options (As current page does: require userverification etc..)
  • Show Dashboard of registered clients
  • Write more/correctly about the scenarios.
  • Add AD??

The story (with the scenarios) is heavily inspired by @herrjemand excellent blogpost https://medium.com/@herrjemand/introduction-to-webauthn-api-5fd1fb46c285. Will ask him if we could link to blog post and maybe cross-post some content (the images are golden!) to help explain for users.

@aseigler
Copy link
Collaborator

Love the look and feel of the new demo site! Expanding the options out to all options available including documented extensions I feel would be supremely beneficial to everyone.

Demonstrating how this would work with an on-premises LDAP directory like AD could be done, but we would have to figure out how to translate that to a web page in a way that makes sense. Maybe allow folks to register authenticators that create user objects and authenticators as child objects, and somehow display this in a read only tree of some sort? The beauty of the underlying tech is that you only need expose a credentialID, credentialPublicKey, and counter for each authenticator, and exposure of any or all of that data does not result in compromise of the authenticator.

I have been trying to noodle out the best sort of storage mechanism for information you need to have integrity via hash value verification and availability via distribution but not confidentiality because the data being stored is designed to be public. I keep coming back to some blockchain sort of solution.

@yackermann
Copy link
Contributor

@abergs I am for it!

@abergs
Copy link
Collaborator Author

abergs commented Mar 4, 2019

I've updated the wip site. I added illustrations and some explanations to the flow.

If you have any thoughts on the content i'd welcome your feedback: http:https://fido2test.azurewebsites.net/overview

Draft PR: #86

@abergs
Copy link
Collaborator Author

abergs commented Mar 4, 2019

Also I wrote all the JS scripts quite fast. Might have missed something important: https://github.com/abergs/fido2-net-lib/tree/design/Fido2Demo/wwwroot/js

What's the story with Base64 and WebAuthn? Is it safe to always use Base64Url encoding or is that only for some fields?

@yackermann
Copy link
Contributor

yackermann commented Mar 4, 2019 via email

@abergs
Copy link
Collaborator Author

abergs commented Mar 17, 2019

Dashboard and Custom scenario has now been added.
Any feedback before I merge this?
https://fido2test.azurewebsites.net/overview

PR: #86

@aseigler
Copy link
Collaborator

Did you test all the combinations in the custom area to make sure they all work? Platform vs cross platform has been an ongoing problem and seems to be currently broken again.

@aseigler
Copy link
Collaborator

The user handle/userid/public key are all displayed as ##-##-##, is that intentional? Some sort of string would probably be neater. We also seem to have lost attestation type?

@aseigler
Copy link
Collaborator

@aseigler
Copy link
Collaborator

Perhaps "contact us" link to Twitter handles?

@abergs abergs closed this as completed in ca80e1e Jul 22, 2019
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants