Difference between revisions of "Credential Management"

From MgmtWiki
Jump to: navigation, search
m (Solutions)
(References)
 
(2 intermediate revisions by the same user not shown)
Line 8: Line 8:
 
* Protection against phishing: An attacker who creates a fake login website can't login as the user because the signature changes with the origin of the website.
 
* Protection against phishing: An attacker who creates a fake login website can't login as the user because the signature changes with the origin of the website.
 
*Reduced impact of data breaches: Developers don't need to hash the public key, and if an attacker gets access to the public key used to verify the authentication, it can't authenticate because it needs the private key.
 
*Reduced impact of data breaches: Developers don't need to hash the public key, and if an attacker gets access to the public key used to verify the authentication, it can't authenticate because it needs the private key.
* Invulnerable to password attacks: Some users might reuse passwords, and an attacker may obtain the user's password for another website (e.g. via a data breach). Also, text passwords are much easier to brute-force than a digital signature.
+
* Invulnerable to password attacks: Some users might reuse passwords, and an attacker may obtain the user's password for another website (e.g. via a data breach). Also, text passwords are much easier to brute-force than a [[Digital Signature]].
  
 
==Solutions==
 
==Solutions==
Line 16: Line 16:
 
* [https://developers.google.com/web/updates/2020/10/webauthn-tab Web AuthN debug tab] from Google
 
* [https://developers.google.com/web/updates/2020/10/webauthn-tab Web AuthN debug tab] from Google
 
* [https://condatis.com/news/blog/trust-in-self-sovereign-identity-ssi/ Trust in self-sovereign-ID] Condatus - SIOP and MS Authenticator
 
* [https://condatis.com/news/blog/trust-in-self-sovereign-identity-ssi/ Trust in self-sovereign-ID] Condatus - SIOP and MS Authenticator
 +
* [https://didproject.azurewebsites.net/docs/overview.html Verifiable Credentials Preview by Azure AD] from Microsoft
  
 
==References==
 
==References==
  
[[Category:Standard]]
+
[[Category: Standard]]
 +
[[Category: Credential]]

Latest revision as of 18:29, 18 November 2021

Full Title

  • This page is about the W3C CredentialManagement API which is often abbreviated as CredMan..
  • This also is support by Web Authentication and WebAuthn 2.

Context

  • For general information about recovery or other topics see the web page Credential.

Problems Addressed

  • Protection against phishing: An attacker who creates a fake login website can't login as the user because the signature changes with the origin of the website.
  • Reduced impact of data breaches: Developers don't need to hash the public key, and if an attacker gets access to the public key used to verify the authentication, it can't authenticate because it needs the private key.
  • Invulnerable to password attacks: Some users might reuse passwords, and an attacker may obtain the user's password for another website (e.g. via a data breach). Also, text passwords are much easier to brute-force than a Digital Signature.

Solutions

References