[Openid-specs-ab] Fwd: [blink-dev] Intent to Prototype: WebID
thomasclinganjones at gmail.com
Fri Oct 9 19:31:41 UTC 2020
This is not auspicious! Sam went ahead without even responding to some of
the comments provided. Note that at its core this proposal would add some
requirements on IdP to provide metadata that could be absorbed by the
browser. It has been suggested that the user would need to be involved in
the process. Both George & I have suggested that the browser password
manager needs to be modified to assure that if the user is hassled, that
the user's response be stored and they not be hassled again.
My suggestion is that we work on a user experience doc and send that as a
CR (bug) to the blink mailing list or perhaps as a comment to the
WICG m/l. I or John could do that.
In the meantime, I will try to collect a user experience plan. If anyone
has suggestions, please forward them to me.
Can we put this on the agenda for next week?
---------- Forwarded message ---------
From: Sam Goto <goto at chromium.org>
Date: Fri, Oct 9, 2020 at 12:21 PM
Subject: [blink-dev] Intent to Prototype: WebID
To: blink-dev <blink-dev at chromium.org>
Cc: Brad Lassey <lassey at chromium.org>, David Benjamin <davidben at chromium.org>,
<mjv at chromium.org>, Justin Toupin <jtoupin at google.com>, <kenrb at chromium.org>,
Majid Valipour <majidvp at chromium.org>, <balfanz at google.com>, <
mknowles at chromium.org>, Sam Goto <goto at google.com>
goto at google.com <goto at chromium.org>, jtoupin at google.com
Link to explainer <https://github.com/WICG/WebID/> (in HTML
We will update this thread when our design doc firms up.
We will kick off a TAG review and update this thread as we go along.
Provide a new API that mediates the exchange of identity-related data
between websites (relying parties) and identity providers (e.g. Google Sign
In, Apple Sign In, Facebook Login, etc) while mitigating cross-site
Over the last decade, identity federation has played a central role in
raising the bar for sign-in on the web, in terms of ease-of-use (e.g.
password-free sign-on), security (e.g. improved resistance to phishing and
credential stuffing attacks) and trustworthiness compared to its preceding
common pattern: per-site usernames and passwords.
However, it has relied on general-purpose primitives (namely top-level
redirects, popups and third party cookies) which are subject to
identity-agnostic browser policies (e.g. blocking popups used in identity
flows). These policies are increasingly getting tightened due to cross-site
(e.g. by constraining third-party cookies and disabling navigational
tracking). In addition to that, federated login distributes global user
identifiers (most notably email addresses) which can be joined by multiple
relying parties to build a shared profile of the user's activity across
In this exploration, we plan to prototype a high-level login-oriented API
with the goal of ensuring federation on the Web is better streamlined,
separable from other types of cross-site information exchanges, and more
private for users by default.
We are engaging with identity providers in this process, for both consumers
Interoperability and Compatibility
This is a hard problem because of the diversity of stakeholders,
requirements and existing protocols that exist in the identity ecosystem.
Accordingly, we are starting not with a defined solution but rather a
framework that can accommodate different levels of browser mediation, each
with different sets of usability, privacy and deployment trade-offs. We
expect to refine this into an API specification as discussions progress
with other browsers, identity providers and relying parties.
Edge: No Signals
Firefox: early discussions
Safari: No Signals
Framework developers: early discussions with the Google Sign-In team
Web developers: early discussions with relying parties, No Signals
We have also engaged with the OpenID foundation, and there is ongoing
public discussion in the WICG repository <https://github.com/WICG/WebID/>.
We expect this project to go through design, implementation and rollout
over a long period of time, in conjunction and coordination with IDPs, RPs,
browser vendors and evolving privacy enhancements.
Will this feature be supported on all six Blink platforms (Windows, Mac,
Linux, Chrome OS, Android, and Android WebView)?
Link to entry on the feature dashboard <https://www.chromestatus.com/>
Requesting approval to ship?
You received this message because you are subscribed to the Google Groups
To unsubscribe from this group and stop receiving emails from it, send an
email to blink-dev+unsubscribe at chromium.org.
To view this discussion on the web visit
-------------- next part --------------
An HTML attachment was scrubbed...
More information about the Openid-specs-ab