-
Notifications
You must be signed in to change notification settings - Fork 4
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Remove account information from returned IdentityCredential #56
Comments
Yeah, correct. Specifically, in this example in the explainer: const {profile: {id, name, email, picture}} = await navigator.credentials.get({
identity: {providers: [{url: "https://example.com"}]}
}); The RP is getting the user's name/email/picture. I'm suggesting that we do not share that metadata to the RP from the What I intended to say was that, IF it was useful for lightweight fedcm to allow the IdP to implement the So, my mental model is that For example: // On example.com
navigator.credentials.create({
identity: {
profile: {
name: "Sam",
email: "sam@goto.com"
}
}
});
// On the RP
const {profile: {id, name, email, picture}} = await navigator.credentials.get({
identity: {providers: [{url: "https://example.com"}]}
});
// now name = "Sam" and email = "sam@goto.com"
Correct. I think it is going to be useful to have a client-side JS alternative to the |
Sam's suggestion makes sense to me. |
I don't follow why from your logic. If, as you said, " |
The data that is shared to the RP in the |
Is there a PR # that has this? I can't find it and the Editor's Draft only has the token and continue_on coming from the |
The RP gets an The accounts_endpoint is only used to construct an account chooser, but nothing else. |
Ah, I misunderstood- I thought FedCM currently gave the account information on the returned the IdentityCredential via the |
Ah, interesting! It never occurred to me that we could use the mixin! That's great to know actually! But yeah, we don't currently use it at the moment.
I just wanted to note that, what I hope to suggest is that, in the absence of an In other words, setting I think I'm not able to quite express my suggestion precisely, but I hope this is more or less making sense to you all :) |
@samuelgoto has suggested that we should not provide the login-status-stored account information in the IdentityCredential. Effectively, the login-status-stored account information would only be for presentation via the browser-controlled account selection UI, a replacement/precaching mechanism for the
accounts_endpoint
fetch.This would allow future extension where information on the IdentityCredential could be a verifiable identity assertion, such as in the proposed Delegation-Oriented FedCM.
Would like to hear @bvandersloot-mozilla 's thoughts on this.
The text was updated successfully, but these errors were encountered: