Difference between revisions of "Credential Management"

From MgmtWiki
Jump to: navigation, search
(Solutions)
m (Solutions)
Line 14: Line 14:
 
* [https://docs.aws.amazon.com/sdk-for-javascript/v2/developer-guide/loading-browser-credentials-federated-id.html Using Web Federated Identity to Authenticate Users] Amazon WS
 
* [https://docs.aws.amazon.com/sdk-for-javascript/v2/developer-guide/loading-browser-credentials-federated-id.html Using Web Federated Identity to Authenticate Users] Amazon WS
 
* [https://developer.mozilla.org/en-US/docs/Web/API/Web_Authentication_API Web Authentication API] from Mozilla
 
* [https://developer.mozilla.org/en-US/docs/Web/API/Web_Authentication_API Web Authentication API] from Mozilla
* [https://developers.google.com/web/updates/2020/10/webauthn-tab Wub AuthN debug tab] from Google
+
* [https://developers.google.com/web/updates/2020/10/webauthn-tab Web AuthN debug tab] from Google
 
* [https://condatis.com/news/blog/trust-in-self-sovereign-identity-ssi/ Trust in self-sovereign-ID] Condatus - SIOP and MS Authenticator
 
* [https://condatis.com/news/blog/trust-in-self-sovereign-identity-ssi/ Trust in self-sovereign-ID] Condatus - SIOP and MS Authenticator
  

Revision as of 21:15, 20 February 2021

Full Title

  • This page is about the W3C CredentialManagement API which is often abbreviated as CredMan..
  • This also is support by Web Authentication and WebAuthn 2.

Context

  • For general information about recovery or other topics see the web page Credential.

Problems Addressed

  • Protection against phishing: An attacker who creates a fake login website can't login as the user because the signature changes with the origin of the website.
  • Reduced impact of data breaches: Developers don't need to hash the public key, and if an attacker gets access to the public key used to verify the authentication, it can't authenticate because it needs the private key.
  • Invulnerable to password attacks: Some users might reuse passwords, and an attacker may obtain the user's password for another website (e.g. via a data breach). Also, text passwords are much easier to brute-force than a digital signature.

Solutions

References