-
-
Notifications
You must be signed in to change notification settings - Fork 32
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Password requirement for WebAuthn external key (like YubiKey) should be optional #89
Comments
I don't know what you mean by this. My webauthn implementation doesn't support or require a password. |
This looks like it's using the windows hello based webauthn instead of the physical security key. I use webauthn with a u2f key and I do not get a prompt like this. |
Good to know that it works for you, I'll check my setup then. It is definitely the key, though. I entered a password once, and the key had a password at that time. |
I found a detailed destription why this is happening in mastodon (mastodon/mastodon#16545) together with a two-line change in Ruby (mastodon/mastodon@11a7861). The summary: If the userVerification is to preferred (probably the default) and you use a fido2 key that support a pin in windows then the pin it is requested and you cannot avoid setting it. This is also descibed in https://developers.yubico.com/WebAuthn/WebAuthn_Developer_Guide/User_Presence_vs_User_Verification.html. The solution would be to set it to discouraged, like in the mastodon commit. Changes could maybe be done in this two places:
Maybe I'll look into it myself when I got a Go setup running. |
Sweet! Thanks for finding that, I'll have a look at setting it in wag. Just as there is on-going work this change might not be released for quite some time |
This is now on unstable, thanks for the excellent recommendation and resources! |
When using a YubiKey for WebAuthn MFA, a password is mandatory for the key. Other platforms and applications (such as Google and Proxmox) permit the use of the key without a password, which, in my opinion, is more practical as a second factor of authentication.
I've briefly looked through the code in your repository at https://github.com/NHAS/webauthn but couldn't pinpoint the exact location where this configuration might be modified. Could you provide some guidance on how to adjust this setting?
The text was updated successfully, but these errors were encountered: