Move beyond passwords

RSS for tag

Discuss the WWDC21 session Move beyond passwords.

View Session

Posts under wwdc21-10106 tag

12 Posts
Sort by:
Post not yet marked as solved
0 Replies
162 Views
In the same way that servers become a target when they contain secrets as mentioned in "Move beyond passwords" video, won't this make all of a person's Apple devices an even bigger target as they would provide ready access to the Keychain contents? When this is rolled out it will be imperative to no longer allow weak device authentication methods since this would make the iCloud Keychain and contents vulnerable from any single device with access to the keychain.
Posted
by
Post not yet marked as solved
0 Replies
184 Views
I have a very specific problem with multiple associated domains + password autofill and have not been able to find documentation regarding this. Basically my app has 3 associated domains: domainA, domainB and domainC. All are set up correctly with an apple-app-site-association file and links from any of these domains are recognised and handled by the app as expected (so far so good). The issue is that in password autofill (in the default OS and 3rd party managers), domainC always appears as the association. The order of applinks in the entitlements file does not affect which domain appears in the password manager. The only "pattern" I found here is that it seems the longest domain (in this case domainC) is the one appearing in the manager but could not find any documentation confirming this. Does anyone have any experience with password autofill?
Posted
by
Post not yet marked as solved
0 Replies
244 Views
Regarding the beta feature of storing WebAuthn passkeys in the iCloud Keychain, does anybody know if the unencrypted passkeys ever leave the secure enclave, getting stored in RAM or anything? With traditional WebAuthn on a Yubikey or similar device, my understanding is that the private key never leaves the Yubikey, that the requester just inputs the ID of the passkey they'd like to use and supplies a challenge to sign to the Yubikey, and the Yubikey spits out the signed challenge. That way, even if an attacker has root access to your machine, they still can't get that passkey. I'm hoping it works a similar way for iCloud Keychain passkeys: that the encrypted passkey and the challenge are fed to the secure enclave, which then decrypts the encrypted passkey, and then uses it to sign the challenge and then spits out the result, all with the unencrypted passkey never leaving the secure enclave. But I can't find anything definitively stating this. Anyone know for sure / have sources to back it up?
Posted
by
Post not yet marked as solved
0 Replies
437 Views
I add Webauthn authentication for the website. Faced the fact that TouchId on MacOS does not work cross-browser. If the authenticator was registered in Chrome, then I can only log in to Chrome. When I try to log in with TouchId in Safari, I get an error (found no credentials on this device). Conversely, if the authenticator is registered in Safari, then I can only log in to Safari, but I get an error in Chrome. To register the authenticator, I call navigator.credential.create (), with the parameters: { "rp": { "name": "localhost", "id": "localhost" }, "user": { "id": Unit8Array, "name": "alex", "displayName": "alex" }, "attestation": "none", "pubKeyCredParams": [ { "type": "public-key", "alg": -7 } ], "timeout": 60000, "authenticatorSelection": { "userVerification": "preferred", "requireResidentKey": false, "authenticatorAttachment": "platform" }, "challenge": Unit8Array, "excludeCredentials": [ { "type": "public-key", "id": Unit8Array } ], "status": "ok", "errorMessage": "" }
Posted
by
Post not yet marked as solved
1 Replies
694 Views
Hi Developers, I am wondering how is it possible for other smartphone-based FIDO authenticators to use the same iCloud Keychain storage as Passkey does so those credentials can be used on non-apple devices too, and also on the smartphone at the same time. There are some other iOS authenticators that have implemented BLE and are working on all devices including Windows, but the problem is that those apps cannot support signing in to the website on the smartphone itself (neither in apps nor inside the browser) using the previously registered credential of 'cross-platform' type.
Posted
by
Post not yet marked as solved
0 Replies
265 Views
Can password less authentication to mac desktop be configured using third party authenticator that manages private and public key lefecycle ? https://developer.apple.com/documentation/authenticationservices/public-private_key_authentication
Posted
by
Post marked as solved
1 Replies
666 Views
In the recent Move Beyond Passwords developer video, a demo application, called 'Shiny' is shown as part of the lecture. It's stated in the transcript of the video that the source code for the demo application can be found in the related links posted with the video. However, it does not appear that such a link exists. Is this demo application source available anywhere else? If not, will it be posted at a later date? Thanks.
Posted
by
Post not yet marked as solved
0 Replies
631 Views
It's currently possible to use a security key (ex. Yubikey 5 NFC) with an iPhone via NFC, but such functionality is seemingly not possible on any current versions of MacOS. Is support for NFC hardware authenticators (over an NFC-to-USB interface/device, such as the ACS ACR122U) planned for MacOS Monterey or any future release?
Posted
by
Post not yet marked as solved
2 Replies
606 Views
I tried to use Passkeys with our own FIDO-Server, but i encountered a problem. After the user confirmed the authenticationRequest created with createCredentialAssertionRequest you get a ASAuthorizationPlatformPublicKeyCredentialAssertion. When i send the contents of it to our sever it fails, because it doesn't known which credential public key it should use to verify the signature. The browser webauthn API returns something like this: { "id": "...", "rawId": "...", "type": "public-key", "response": { "authenticatorData": "...", "clientDataJSON": "...", "signature": "...", "userHandle": "..." } } where id is the credential id used to sign the challenge, which our FIDO-Server can use to look up the public-key in its database. With the current state of the iOS API our server would need to look up all public keys for the user and then try one by one in order to verify the signature. So my question is, am i missing something? Or is this intended behaviour?
Posted
by