Difference between revisions of "Credential Management"

From MgmtWiki
Jump to: navigation, search
(Solutions)
(Context)
Line 4: Line 4:
 
==Context==
 
==Context==
 
* For general information about recovery or other topics see the web page [[Credential]].
 
* For general information about recovery or other topics see the web page [[Credential]].
 +
==Problems Addressed==
 +
* Protection against phishing: An attacker who creates a fake login website can't login as the user because the signature changes with the origin of the website.
 +
*Reduced impact of data breaches: Developers don't need to hash the public key, and if an attacker gets access to the public key used to verify the authentication, it can't authenticate because it needs the private key.
 +
* Invulnerable to password attacks: Some users might reuse passwords, and an attacker may obtain the user's password for another website (e.g. via a data breach). Also, text passwords are much easier to brute-force than a digital signature.
  
 
==Solutions==
 
==Solutions==

Revision as of 12:44, 20 February 2021

Full Title

This page is about the W3C CredentialManagement API which is often abbreviated as CredMan..

Context

  • For general information about recovery or other topics see the web page Credential.

Problems Addressed

  • Protection against phishing: An attacker who creates a fake login website can't login as the user because the signature changes with the origin of the website.
  • Reduced impact of data breaches: Developers don't need to hash the public key, and if an attacker gets access to the public key used to verify the authentication, it can't authenticate because it needs the private key.
  • Invulnerable to password attacks: Some users might reuse passwords, and an attacker may obtain the user's password for another website (e.g. via a data breach). Also, text passwords are much easier to brute-force than a digital signature.

Solutions

References