[go: nahoru, domu]

Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

FedCM multi IDP support #803

Open
1 task done
npm1 opened this issue Jan 11, 2023 · 9 comments
Open
1 task done

FedCM multi IDP support #803

npm1 opened this issue Jan 11, 2023 · 9 comments
Assignees
Labels
Progress: in progress Review type: CG early review An early review of general direction from a Community Group Topic: identity & credentials

Comments

@npm1
Copy link
npm1 commented Jan 11, 2023

Wotcher TAG!

I'm requesting a TAG review of FedCM multi IDP support.

The Federated Credential Management (FedCM) API is a Web Platform API which allows users to login to websites with their federated accounts in a privacy preserving manner. Currently, it only supports a single identity provider (IDP) at a time. Users can only login with their federated accounts from a single IDP at a time. With multi IDP support, we want to allow users to login with their federated accounts from a set of IDPs at a time.

  • Explainer: url
  • Security and Privacy self-review: url: same as the general one for FedCM because I think the answers are the same. Let me know if you have questions or if I have missed something though!
  • GitHub repo: url
  • Primary contacts (and their relationship to the specification):
  • Organization/project driving the design: Google Chrome, Mozilla
  • External status/issue trackers for this feature (publicly visible, e.g. Chrome Status):

Further details:

  • I have reviewed the TAG's Web Platform Design Principles
  • The group where the incubation/design work on this is being done (or is intended to be done in the future): FedID CG
  • The group where standardization of this work is intended to be done ("unknown" if not known): unclear
  • Existing major pieces of multi-stakeholder review or discussion of this design: see relevant issue
  • Major unresolved issues with or opposition to this design: the use of onload to ensure that multiple IDPs are loaded by the time the initial UI is shown is not great. But we have not come up with something that is much better given all the constraints and requirements. Ideas welcome!
  • This work is being funded by: Google Chrome, Mozilla

You should also know that the initial FedCM TAG review is here. We're requesting a review specifically on the multi IDP design.

We'd prefer the TAG provide feedback as (please delete all but the desired option):

💬 leave review feedback as a comment in this issue and @-notify @npm1

@plinss
Copy link
Member
plinss commented Feb 8, 2023

@rhiaro @atanassov and I took a look at this today in our virtual f2f. We had some minor concerns but it appears that the CG is already aware of those and is working on solutions. We're happy to see this move forward.

@plinss plinss closed this as completed Feb 8, 2023
@plinss plinss added the Resolution: satisfied The TAG is satisfied with this design label Feb 8, 2023
@npm1
Copy link
Author
npm1 commented Oct 19, 2023

Hey TAG,

I wanted to reopen this issue based on discussion during BlinkOn (and the suggestion by @slightlyoff), where we presented some ideas on how to solve multi IdP support. The key constraints about the solution space are:

  • We want to allow IdPs to work independently. RPs should be able to just embed SDKs of different IdPs.
  • This means it would be hard for IdPs to all be included in the same get() call. But if we wait for all get() calls, how do we ensure all IdPs are shown in the FedCM UI?
  • RPs may also have a preference for an IdP even when they support more than one.

So we have some ideas on how to go about this:

  1. Have an array of providers. This is a simple solution that is easy to understand, but requires IdP collaboration and RP changes. Also, the RP might need to determine which IdP the token received is from, and direct to the relevant IdP code to parse it. We think we can start with this solution as a baseline to enable multi IdP support, but might still need to supplement this to allow non-collaborative multi IdP support.
  2. Wait until a certain point in time. For example, we explored gathering all get() calls received until onload, and showing UI which includes all IdPs that have invoked FedCM until that point in time. This has the advantage of not requiring IdP collaboration, but it is unpredictable, hard to understand, and causes performance concerns (the UI will show much later now even in the single IdP case).
  3. Dynamically update the UI: show accounts as they are received. This has the disadvantage of producing shifts which may be annoying to users. In particular, if we want to surface returning accounts more prominently, we might need to reorder all accounts every time an IdP returns accounts. This option also makes it harder for the user agent to let RPs specify a preference on IdP ordering.
  4. IdP registration: add a new method IdentityProvider.register() so that the IdP can tell the user agent that it wants to be part of the FedCM UI. There are two options here: have separate get() calls for each IdP (but then the waiting problem is just moved to the register method), or have a single get() call to show all registered IdPs (but then it puts the burden on the RP to determine when all IdPs have been registered).
  5. Cache to estimate when to wait until. We will already know logged in IdPs via IdP login status API. We keep track of a global idps_used, a map from RP origin to a list of IdPs that we see the RP uses via FedCM. When we first see a get() call in the page, if idps_used is nonempty for the RP then we wait for those (with some cutoff like in solution 2), otherwise we wait (with the same cutoff) for all IdPs that are marked logged in according to IDP login status. Along with having some form of IdP registration / unregistration for RPs to update idps_used, we expect most cases to not hit the cutoff but instead meet the conditions and hence we eliminate performance concerns of solution 2.

In order to enable RP to state their preference of some IdPs, we also have some ideas:

  1. Order in which IdPs are mentioned in array (applies to solution 1).
  2. New JS method to state ordering.
  3. Use the order in which RP embeds IdP SDKs.

Does TAG have an opinion on the solutions presented, or any other alternative?

@npm1
Copy link
Author
npm1 commented Oct 19, 2023

I can't reopen issues here it seems, so appreciate it if someone can reopen on my behalf. Thanks!

@plinss plinss reopened this Oct 19, 2023
@plinss plinss removed the Resolution: satisfied The TAG is satisfied with this design label Oct 23, 2023
@rhiaro
Copy link
Contributor
rhiaro commented Feb 19, 2024

Hi @npm1, really sorry it's taken us so long to get back around to this issue. Since several months have passed, could you update if you've made any progress on the questions you posed? Which route seems the most promising to you at this point?

@npm1
Copy link
Author
npm1 commented Feb 20, 2024

Hi, are current plan is to first solve a subset of the problem: allowing multiple providers in a single get() call. Under the constrained version of the problem, we allow multiple IDPs but only if they are specified in a single get() call. We don't think this poses too many API questions as we already shaped the API to allow passing an array of providers, so I think we are good on that front.

Having said that, we have not made much progress on the other question, which is how to aggregate the providers from multiple get() calls. For our initial proposal of waiting until onload, we gathered metrics which showed that this would result in a fairly large regression, so we are probably not moving forward with that solution. Hence the brainstorm ideas from Oct 19 above still apply.

@rhiaro
Copy link
Contributor
rhiaro commented Mar 11, 2024

We discussed this in our call today. It seems like a good solution from a UX perspective would be if the IDPs are loaded dynamically, but without causing layout shifts in the content of the webpage (we all hate when a button we were about to click on is suddenly displaced from under our pointer). Have you thought about making this part of the browser chrome, rather than the site? Essentially moving the rendering responsibilities from the RP to the user agent.

User agents have historically had horrible UX with basic auth and certificate auth, it would be good for users if the UA could play a more active, and consitent, role in managing logged in state and UX for all forms of authentication. This implies creating other APIs beyond FedCM to handle other forms of authentication, but they could have a uniform UX. Do you think this is a direction you could see FedCM going in, in the future?

@plinss plinss added the Progress: pending external feedback The TAG is waiting on response to comments/questions asked by the TAG during the review label Mar 11, 2024
@npm1
Copy link
Author
npm1 commented Mar 11, 2024

We discussed this in our call today. It seems like a good solution from a UX perspective would be if the IDPs are loaded dynamically, but without causing layout shifts in the content of the webpage (we all hate when a button we were about to click on is suddenly displaced from under our pointer). Have you thought about making this part of the browser chrome, rather than the site? Essentially moving the rendering responsibilities from the RP to the user agent.

That is how the API works today. The current API lets the user agent take control over the UI shown for a single get() call. In the future, it will be possible for the RP to only invoke get()s and get the user agent UI 'for free'.

User agents have historically had horrible UX with basic auth and certificate auth, it would be good for users if the UA could play a more active, and consitent, role in managing logged in state and UX for all forms of authentication. This implies creating other APIs beyond FedCM to handle other forms of authentication, but they could have a uniform UX. Do you think this is a direction you could see FedCM going in, in the future?

Yes, this is indeed the direction FedCM is going in. This also enables future work like reconciling different authentication choices (password/federation/passkeys) in a single user agent UI.

@torgo torgo removed this from the 2024-03-11-week:b milestone Mar 17, 2024
@torgo torgo added this to the 2024-03-18-week milestone Mar 17, 2024
@hober
Copy link
Contributor
hober commented Mar 18, 2024

It looks like the explainer link is 404ing. Where'd it move to?

@npm1
Copy link
Author
npm1 commented Mar 19, 2024

It moved to the issue fedidcg/FedCM#319 (comment). The explainer is a bit more detailed in that it talks about an onload heuristic (idea 2 above) but it turned out to be not performant enough (delays showing too much). I can write something up if that is too unclear.

@plinss plinss removed this from the 2024-03-18-week milestone Mar 25, 2024
@plinss plinss added Progress: in progress and removed Progress: pending external feedback The TAG is waiting on response to comments/questions asked by the TAG during the review labels Apr 15, 2024
@plinss plinss added this to the 2024-04-22-week milestone Apr 15, 2024
@plinss plinss removed this from the 2024-04-22-week milestone Apr 29, 2024
@torgo torgo added this to the 2024-06-17-week:b milestone Jun 16, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Progress: in progress Review type: CG early review An early review of general direction from a Community Group Topic: identity & credentials
Projects
None yet
Development

No branches or pull requests

5 participants