Skip to content

Latest commit

 

History

History
28 lines (14 loc) · 2.85 KB

related_problems.md

File metadata and controls

28 lines (14 loc) · 2.85 KB

Related Problems

Authentication and authorization is a large problem space. There are several related federation issues where the browser maybe able to provide an enhanced experience.

The NASCAR flag problem

Every website has a different sign-in process and has to show a list of supported identity providers for users to pick from. The user is left to determine which identity provider to choose. The implications of their choice may be significant: choosing a different option than they chose last time might create a new account, and picking a different provider may result in different data getting shared. Typically, the user must make their selection without any support from the browser in remembering their past choice or highlighting relevant options. We believe that, by pulling some of the responsibility into the browser, we can offer a personalized IDP disambiguation UI which can lead to higher conversion rates, while maintaining user privacy.

Identity Attribute Verification

Verifying phone numbers and emails is tedious: currently, verification is often done manually by users without assistance from the browser or IDP. For example, to verify email addresses, a service typically sends an OTP (one-time code) to the user’s inbox to be copied/pasted. Similarly, for phone numbers, an SMS message is sent to the user’s phone to be copied/pasted too. There are clear ways here where the browser can step in to help (e.g. WebOTP), and it would generally be preferable for authoritative identity providers to leverage these features wherever possible.

Cross-device sign-in

Because cookies are not propagated across devices, a user has to sign in (and remember account info, etc.) on new devices. Often they end up going through a recovery flow, creating a duplicate account, or abandoning sign-in completely. Identity providers play an important role in facilitating cross-device sign-in, but we may be able to solve this more generally for users irrespective of their chosen authentication mechanism, by expanding on Web Platform functionality such as the Credential Management API.

The Session State Opacity Problem

Because session state management is implemented via general purpose low-level primitives (namely, cookies), when users intend to “log-out”, there are no guarantees that anything necessarily happens (e.g. the origin can still identify the user while pretending that it cannot). Currently, only clearing all cookies makes it significantly harder for an origin to adversarially track a user post log-out. There are proposals such as IsLoggedIn to address this issue.