Skip to content

Commit

Permalink
added platform behaviors regarding user verification
Browse files Browse the repository at this point in the history
  • Loading branch information
dagnelies committed Oct 14, 2024
1 parent 5804ab2 commit 44af0f7
Showing 1 changed file with 18 additions and 1 deletion.
19 changes: 18 additions & 1 deletion docs/concepts.md
Original file line number Diff line number Diff line change
Expand Up @@ -126,7 +126,7 @@ This is very important to ensure protection against replay attacks. Such an atta

By verifying server-side, that the signed authentication payload contains the freshly generated challenge, it ensures a copied and reused payload will not work since the challenge.


You can use `server.randomChallenge()` to generate a cryptographically strong password.


### Device-bound vs synced
Expand All @@ -150,6 +150,23 @@ While device-bound keys offer a higher security level, synced software-based key
I'm not quite sure of all factors that might affect this, but I had both kind of keys in Windows.


## `userVerification` behavior depends on platform

| **iCloud Keychain** | `discouraged` | `preferred` | `required`
| Biometrics available | ✅ | ✅ | ✅
| Biometrics not available | ❌ | ❌ | ✅

| **Google password manager (desktop)** | `discouraged` | `preferred` | `required`
| Biometrics available | ❌ | ✅ | ✅
| Biometrics not available | ❌ | ❌ | ✅

| **Windows Hello** | `discouraged` | `preferred` | `required`
| Biometrics available | ✅ | ✅ | ✅
| Biometrics not available | ✅ | ✅ | ✅

> ⚠️ Be warry of most password managers. As you will see below, most of them even lie about the `userVerified` flag in the response.


🪳 Compatibility and bugs
-------------------------
Expand Down

0 comments on commit 44af0f7

Please sign in to comment.