-
Notifications
You must be signed in to change notification settings - Fork 10
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Can we cater for link-based logins, e.g. tap link in email => logged in #26
Comments
Should there be a prompt in cases where the login isn't coming from a Web Authentication? It can be as simple as |
Are you suggesting that the browser prompt if it can not tell if the user as explicitly entered credentials via the browser itself (e.g. webauthn or a password manager)? Are there not other ways that the browser could determine the user explicitly requested a login? Possibly data exposed at the RP via a .well-known/FILE or metadata markup on the login button? In addition, there are many out-of-band strong authentication mechanisms where the browser won't "see" the presentation of credentials. For example, I'm logging into a site using the browser on my laptop and the site uses ZenKey (strong authentication supported by all the major US mobile operators) so my phone buzzes, I approve the authentication, and I'm logged into the site. The browser never saw any part of the credentials presentation and yet the user login was a strong authentication. Other forms of authentication that do not involve the browser are Pushed Authentication and QR code scanning (I'm sure there are more I'm forgetting off the top of my head:) |
This is about the distinction between browser mediated and non-mediated logins. If the browser has not detected a mediated login and the site calls |
From a pure security perspective, link-based logins are less secure that push-to-phone-app (and many other authentications) so as users move to increase the security of their identities online, Identity Providers will move away from the linked-based logins. So it may help some but it's not a great solution from an identity perspective :) |
It's not quite "link in email => logged in" but there are lots of cases where an employee has a portal page of sorts with links to applications (SaaS and/or internal apps) to which they have access. Taping/clicking such a link will result (after checking authentication) in a so-called IDP initiated single-sign on where some login token (typically but not always SAML) is delivered unsolicited to the application in conjunction with the user navigating there. Resulting in the user being seamlessly logged into the application. |
Both account recovery flows and so called password-less logins may use links with authentication tokens in them. A tap or click logs the user in as long as the token is valid. Could we formalize such links and usage of them to the point where it could be reliably detected as a login flow?
The text was updated successfully, but these errors were encountered: