also finished extracting the metadata client: https://github.com/bdewater/fido_metadata
This is awesome :rocket: !!!!
https://developer.apple.com/documentation/ios_ipados_release_notes/ios_ipados_13_3_beta_2_release_notes is the changelog btw
Nice, we were actually talking about that yesterday with Gonzalo :muscle: I think he saw it on Twitter yesterday
https://developer.apple.com/documentation/ios_ipados_release_notes/ios_ipados_13_3_beta_2_release_notes is the changelog btw
This is awesome!
also finished extracting the metadata client: https://github.com/bdewater/fido_metadata
Thank you, nice work!
haha! good luck :D
Thank you very much! It went well. We got lot of positive feedback.
People gets excited about WebAuthn which is cool.
Nice! Thank you :-)
Yes, I would like this to work in hand with an admin account. The idea is that I would first sign in with username and password, followed by inserting a Yubikey as a multifactor sign in process.
Now I did have this originally using devise-u2f gem, but since Microsoft only allowed Webauthn authentication through Windows 10, I've been forced to look at different solutions. I did email the guy who was running the devise-webauthn gem if he had a working version. However, he said he was caught up with other projects that he didn't know when he would get around to it. Which was what lead me to the webauthn-ruby gem since you guys had a really cool working demo.
Hi @callags ,
There a bunch of WebAuthn tutorials in https://github.com/herrjemand/awesome-webauthn#resources. From that you can learn how WebAuthn works, what goes on the frontend and on the backend. Once you're ready to code the backend side, you can see https://github.com/cedarcode/webauthn-rails-demo-app to have as a reference implementation.
In one of the PRs for attestation I argued for being able to inject Time objects as a dependency so you could easily later re-verify attestation statements to see if authenticators are still reliable. Today I saw an article about Intel TPM flaws which illustrate why I feel it's a legit use case that ought to be supported :) https://blog.ptsecurity.com/2020/03/intelx86-root-of-trust-loss-of-trust.html
doesn't need to be part of #304 which big enough as it is I think. Trying to find some time soon to test it by resurrecting https://github.com/cedarcode/webauthn-rails-demo-app/pull/113/
congrats in finalizing the MDS work Gonzalo! have you submitted the test results using the conformance tool? :)
hope y'all are staying safe in these weird times
Hi @bdewater Congrats to you too! I practically recycled what your implementation and adapted it to master
! :-) Haven't submitted yet
I have been playing around for the new RelyingParty based model in the context of the PR we have open. I wrote a functional test to see the different usages we might have with the new interface and the transition we would go through as well as folks staying on the old interface (the one in the README, not an older one :smile: ).
Showing it here to get early feedback and bc I don't have a PR open for it as I'm waiting on the SignatureVerifier removal to get in for the main topic branch.
some interesting notes on the caBLE proposal to make Android phones usable as an authenticator for laptops/desktops: https://github.com/w3c/webauthn/issues/1381#issuecomment-624808667
Interesting. This would allow much more flexibility specially for desktops computers and people that want to rely on their phones instead of security keys. Hope they make progress there! Given we're usually on laptops with fingerprints and sec. keys, etc I haven't put much thought about desktop computers and how limited they probably are to use only keys... Thanks for sharing!