SlideShare a Scribd company logo
1 of 21
FedCM Update
where we are and where we are
going
yigu@chromium.org cbiesinger@chromium.org BlinkOn 16
BlinkOn 16
Why Federated Credentials?
What is it?
Users sign-in to an RP (relying party) with an
IdP (Identity provider)
Why do we think it’s important?
- Ease of use
- passwordless
- Security
- resistance to phishing
- Trustworthiness
- per-site username and password
BlinkOn 16
The problem
By design, identity federation was built
on top of low-level primitives*.
By accident, the same primitives also
enable cross-site tracking.
Unfortunately, we can’t distinguish
tracking from federation.
* iframes, third party cookies, redirects
your@email.com
******
Sign Up
https://example1.com
John Doe
johndoe@email.com
Sign-in to example.com with IDP
Continue as John
forgot password
your@email.com
******
Sign Up
https://example2.com
John Doe
johndoe@email.com
Sign-in to example.com with IDP
Continue as John
forgot password
Browser RP IDP
The classification Problem
BlinkOn 16
How?
BlinkOn 16
How?
O(B)
Users
No behavioral changes
O(100s)
Identity Providers
Moderate change
O(10s)
Browsers
Heavy change
O(M)
Relying Parties
Backwards compatible
BlinkOn 16
Demo time!
BlinkOn 16
Demo time!
BlinkOn 16
How? The JavaScript API
var credential = navigator.credentials.get(
{provider: “https://idp.example/”, client_id: “123”}
);
{id_token} = credential.login();
// Also available:
credential.logout();
credential.revoke();
BlinkOn 16
How? The HTTP API
https://developer.chrome.com/blog/fedcm-origin-trial/
2023
2020 2021 2022
Here are 3 options
I2P
Oops, we have a
problem
Prototyping
Hello WICG, OIDF
Is this even a problem?
Would these even work?
This could work. How can I try?
Q1/2022
This works!
Origin Trials
Q2 /2022
Let’s see then.
2024
Fast Follows Phase out
Q3/2022
Ready
Q3/2023
Phasing out
Q4/2023
3PCD
Devtrials
I2E I2S
When?
MVP
Feature
Complete
Today
BlinkOn 16
Ecosystem Feedback
- Federated Identity Community Group
- Identity Providers
- Better understanding of the use cases (primitives by use cases)
- Firmer validation that front-channel logout is important to them
- Better understanding of the alternatives and trade-offs (alternatives considered)
- First Party Sets, CHIPS, Storage Access API, FedCM, CNAMES, Back channel logout, etc.
- Increasingly more concerned about bounce tracking mitigations longer term
- Browsers
- Edge: no institutional position yet. currently running the origin trial too.
- Safari: early institutional position: generally supportive, but still very early / shallow
- Firefox: no institutional position yet. informally, supportive of development, concerned about a few privacy
issues which we are working on together.
BlinkOn 16
The Timing Attack
- Tracker can learn about which website a user is visiting without user
permission by conducting the timing attack
BlinkOn 16
BlinkOn 16
BlinkOn 16
Proposal - pull accounts iff it’s necessary
- Site engagement score: users must have interacted with the provider origin in the past
- { provider: “https://idp.example/”, client_id: “123” }
- Aggregate metrics to penalize suspicious “providers”
- Click-through rate
- Invisible UI rate
- We want the timing attack to be economically impractical, not mathematically impossible
BlinkOn 16
What’s next: Multiple IDPs? Company logos are illustrative only
What’s next: Branding? Company logos are illustrative only
What’s next: Other Use Cases? Company logos are illustrative only
What’s next: previously inaccessible UX opportunities? Company logos are illustrative only
What’s next: Other IdP use cases
● Personalized button
● Early explorations
○ Access tokens
○ Refresh tokens (silent access)
○ DPoP API (proof of possession)
○ Non-email user identification (e.g. phone number)
○ Multiple iframes sharing one login prompt
Q & A

More Related Content

Similar to (Public) FedCM BlinkOn 16 fedcm and privacy sandbox apis

Honeypots, Deception, and Frankenstein
Honeypots, Deception, and FrankensteinHoneypots, Deception, and Frankenstein
Honeypots, Deception, and FrankensteinPhillip Maddux
 
Honeypots, Deception, and Frankenstein
Honeypots, Deception, and FrankensteinHoneypots, Deception, and Frankenstein
Honeypots, Deception, and FrankensteinPhillip Maddux
 
Comment pirater le site de mon concurrent.. et securiser le mien
Comment pirater le site de mon concurrent.. et securiser le mienComment pirater le site de mon concurrent.. et securiser le mien
Comment pirater le site de mon concurrent.. et securiser le mienJulien Dereumaux
 
OISF Aniversary: Active Defense - Helping threat actors hack themselves!
OISF Aniversary: Active Defense - Helping threat actors hack themselves!OISF Aniversary: Active Defense - Helping threat actors hack themselves!
OISF Aniversary: Active Defense - Helping threat actors hack themselves!ThreatReel Podcast
 
E-commerce Lab work
E-commerce Lab workE-commerce Lab work
E-commerce Lab workPragya Bisht
 
Gareth Young - Creating A Global Internet Anti-Piracy Strategy
Gareth Young - Creating A Global Internet Anti-Piracy StrategyGareth Young - Creating A Global Internet Anti-Piracy Strategy
Gareth Young - Creating A Global Internet Anti-Piracy StrategyEleonora Rosati
 
Online Brand Protection: Fighting Domain Name Typosquatting, Website Spoofing...
Online Brand Protection:Fighting Domain Name Typosquatting, Website Spoofing...Online Brand Protection:Fighting Domain Name Typosquatting, Website Spoofing...
Online Brand Protection: Fighting Domain Name Typosquatting, Website Spoofing...WhoisXML API
 
Internal host-reputation-webinar
Internal host-reputation-webinarInternal host-reputation-webinar
Internal host-reputation-webinarLancope, Inc.
 
Meetup which approach to choose?
Meetup   which approach to choose?Meetup   which approach to choose?
Meetup which approach to choose?Joe Mbaya
 
Data Science vs. the Bad Guys: Defending LinkedIn from Fraud and Abuse
Data Science vs. the Bad Guys: Defending LinkedIn from Fraud and AbuseData Science vs. the Bad Guys: Defending LinkedIn from Fraud and Abuse
Data Science vs. the Bad Guys: Defending LinkedIn from Fraud and AbuseDavid Freeman
 
Bot how to find them 2014_27_03
Bot how to find them 2014_27_03Bot how to find them 2014_27_03
Bot how to find them 2014_27_03IABmembership
 
Better Metrics, Less Hacks: Online Travel and The Future of Web Security
Better Metrics, Less Hacks: Online Travel and The Future of Web SecurityBetter Metrics, Less Hacks: Online Travel and The Future of Web Security
Better Metrics, Less Hacks: Online Travel and The Future of Web SecurityDistil Networks
 
Testing experience in web application P3 what should pay attention to
Testing experience in web application P3 what should pay attention toTesting experience in web application P3 what should pay attention to
Testing experience in web application P3 what should pay attention toVu Tran
 
Iab bots how to_find_them_webinar_2014_03_27
Iab bots how to_find_them_webinar_2014_03_27Iab bots how to_find_them_webinar_2014_03_27
Iab bots how to_find_them_webinar_2014_03_27IABmembership
 
AUDIENCE - Things Brands Should Consider Before Going Programmatic
AUDIENCE - Things Brands Should Consider Before Going ProgrammaticAUDIENCE - Things Brands Should Consider Before Going Programmatic
AUDIENCE - Things Brands Should Consider Before Going ProgrammaticLiam Boogar-Azoulay
 
Unit 8 e commerce
Unit 8 e commerceUnit 8 e commerce
Unit 8 e commerceadamlawson
 
Unit 8 e commerce
Unit 8 e commerceUnit 8 e commerce
Unit 8 e commerceadamlawson
 
10 Ways to Speed Up and Secure your WP Site
10 Ways to Speed Up and Secure your WP Site10 Ways to Speed Up and Secure your WP Site
10 Ways to Speed Up and Secure your WP SiteFLBlogCon
 

Similar to (Public) FedCM BlinkOn 16 fedcm and privacy sandbox apis (20)

Honeypots, Deception, and Frankenstein
Honeypots, Deception, and FrankensteinHoneypots, Deception, and Frankenstein
Honeypots, Deception, and Frankenstein
 
Honeypots, Deception, and Frankenstein
Honeypots, Deception, and FrankensteinHoneypots, Deception, and Frankenstein
Honeypots, Deception, and Frankenstein
 
Comment pirater le site de mon concurrent.. et securiser le mien
Comment pirater le site de mon concurrent.. et securiser le mienComment pirater le site de mon concurrent.. et securiser le mien
Comment pirater le site de mon concurrent.. et securiser le mien
 
OISF Aniversary: Active Defense - Helping threat actors hack themselves!
OISF Aniversary: Active Defense - Helping threat actors hack themselves!OISF Aniversary: Active Defense - Helping threat actors hack themselves!
OISF Aniversary: Active Defense - Helping threat actors hack themselves!
 
E-commerce Lab work
E-commerce Lab workE-commerce Lab work
E-commerce Lab work
 
Gareth Young - Creating A Global Internet Anti-Piracy Strategy
Gareth Young - Creating A Global Internet Anti-Piracy StrategyGareth Young - Creating A Global Internet Anti-Piracy Strategy
Gareth Young - Creating A Global Internet Anti-Piracy Strategy
 
Online Brand Protection: Fighting Domain Name Typosquatting, Website Spoofing...
Online Brand Protection:Fighting Domain Name Typosquatting, Website Spoofing...Online Brand Protection:Fighting Domain Name Typosquatting, Website Spoofing...
Online Brand Protection: Fighting Domain Name Typosquatting, Website Spoofing...
 
Internal host-reputation-webinar
Internal host-reputation-webinarInternal host-reputation-webinar
Internal host-reputation-webinar
 
Meetup which approach to choose?
Meetup   which approach to choose?Meetup   which approach to choose?
Meetup which approach to choose?
 
Data Science vs. the Bad Guys: Defending LinkedIn from Fraud and Abuse
Data Science vs. the Bad Guys: Defending LinkedIn from Fraud and AbuseData Science vs. the Bad Guys: Defending LinkedIn from Fraud and Abuse
Data Science vs. the Bad Guys: Defending LinkedIn from Fraud and Abuse
 
Bot how to find them 2014_27_03
Bot how to find them 2014_27_03Bot how to find them 2014_27_03
Bot how to find them 2014_27_03
 
Better Metrics, Less Hacks: Online Travel and The Future of Web Security
Better Metrics, Less Hacks: Online Travel and The Future of Web SecurityBetter Metrics, Less Hacks: Online Travel and The Future of Web Security
Better Metrics, Less Hacks: Online Travel and The Future of Web Security
 
Testing experience in web application P3 what should pay attention to
Testing experience in web application P3 what should pay attention toTesting experience in web application P3 what should pay attention to
Testing experience in web application P3 what should pay attention to
 
Iab bots how to_find_them_webinar_2014_03_27
Iab bots how to_find_them_webinar_2014_03_27Iab bots how to_find_them_webinar_2014_03_27
Iab bots how to_find_them_webinar_2014_03_27
 
AUDIENCE - Things Brands Should Consider Before Going Programmatic
AUDIENCE - Things Brands Should Consider Before Going ProgrammaticAUDIENCE - Things Brands Should Consider Before Going Programmatic
AUDIENCE - Things Brands Should Consider Before Going Programmatic
 
Unit 8 e commerce
Unit 8 e commerceUnit 8 e commerce
Unit 8 e commerce
 
Unit 8 e commerce
Unit 8 e commerceUnit 8 e commerce
Unit 8 e commerce
 
Nbt con december-2014-slides
Nbt con december-2014-slidesNbt con december-2014-slides
Nbt con december-2014-slides
 
Nbt con december-2014-slides
Nbt con december-2014-slidesNbt con december-2014-slides
Nbt con december-2014-slides
 
10 Ways to Speed Up and Secure your WP Site
10 Ways to Speed Up and Secure your WP Site10 Ways to Speed Up and Secure your WP Site
10 Ways to Speed Up and Secure your WP Site
 

More from DivyanshGupta922023

More from DivyanshGupta922023 (17)

DevOps The Buzzword - everything about devops
DevOps The Buzzword - everything about devopsDevOps The Buzzword - everything about devops
DevOps The Buzzword - everything about devops
 
Git Basics walkthough to all basic concept and commands of git
Git Basics walkthough to all basic concept and commands of gitGit Basics walkthough to all basic concept and commands of git
Git Basics walkthough to all basic concept and commands of git
 
jquery summit presentation for large scale javascript applications
jquery summit  presentation for large scale javascript applicationsjquery summit  presentation for large scale javascript applications
jquery summit presentation for large scale javascript applications
 
Next.js - ReactPlayIO.pptx
Next.js - ReactPlayIO.pptxNext.js - ReactPlayIO.pptx
Next.js - ReactPlayIO.pptx
 
Management+team.pptx
Management+team.pptxManagement+team.pptx
Management+team.pptx
 
DHC Microbiome Presentation 4-23-19.pptx
DHC Microbiome Presentation 4-23-19.pptxDHC Microbiome Presentation 4-23-19.pptx
DHC Microbiome Presentation 4-23-19.pptx
 
developer-burnout.pdf
developer-burnout.pdfdeveloper-burnout.pdf
developer-burnout.pdf
 
AzureIntro.pptx
AzureIntro.pptxAzureIntro.pptx
AzureIntro.pptx
 
api-driven-development.pdf
api-driven-development.pdfapi-driven-development.pdf
api-driven-development.pdf
 
Internet of Things.pptx
Internet of Things.pptxInternet of Things.pptx
Internet of Things.pptx
 
Functional JS+ ES6.pptx
Functional JS+ ES6.pptxFunctional JS+ ES6.pptx
Functional JS+ ES6.pptx
 
AAAI19-Open.pptx
AAAI19-Open.pptxAAAI19-Open.pptx
AAAI19-Open.pptx
 
10-security-concepts-lightning-talk 1of2.pptx
10-security-concepts-lightning-talk 1of2.pptx10-security-concepts-lightning-talk 1of2.pptx
10-security-concepts-lightning-talk 1of2.pptx
 
Introduction to Directed Acyclic Graphs.pptx
Introduction to Directed Acyclic Graphs.pptxIntroduction to Directed Acyclic Graphs.pptx
Introduction to Directed Acyclic Graphs.pptx
 
ReactJS presentation.pptx
ReactJS presentation.pptxReactJS presentation.pptx
ReactJS presentation.pptx
 
01-React js Intro.pptx
01-React js Intro.pptx01-React js Intro.pptx
01-React js Intro.pptx
 
Nextjs13.pptx
Nextjs13.pptxNextjs13.pptx
Nextjs13.pptx
 

Recently uploaded

Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTbhaskargani46
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaOmar Fathy
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VDineshKumar4165
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXssuser89054b
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptMsecMca
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfKamal Acharya
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Standamitlee9823
 
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoordharasingh5698
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayEpec Engineered Technologies
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfJiananWang21
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptNANDHAKUMARA10
 
22-prompt engineering noted slide shown.pdf
22-prompt engineering noted slide shown.pdf22-prompt engineering noted slide shown.pdf
22-prompt engineering noted slide shown.pdf203318pmpc
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...tanu pandey
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptDineshKumar4165
 
Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086anil_gaur
 

Recently uploaded (20)

Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
 
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
22-prompt engineering noted slide shown.pdf
22-prompt engineering noted slide shown.pdf22-prompt engineering noted slide shown.pdf
22-prompt engineering noted slide shown.pdf
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
 
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086
 

(Public) FedCM BlinkOn 16 fedcm and privacy sandbox apis

  • 1. FedCM Update where we are and where we are going yigu@chromium.org cbiesinger@chromium.org BlinkOn 16
  • 2. BlinkOn 16 Why Federated Credentials? What is it? Users sign-in to an RP (relying party) with an IdP (Identity provider) Why do we think it’s important? - Ease of use - passwordless - Security - resistance to phishing - Trustworthiness - per-site username and password
  • 3. BlinkOn 16 The problem By design, identity federation was built on top of low-level primitives*. By accident, the same primitives also enable cross-site tracking. Unfortunately, we can’t distinguish tracking from federation. * iframes, third party cookies, redirects your@email.com ****** Sign Up https://example1.com John Doe johndoe@email.com Sign-in to example.com with IDP Continue as John forgot password your@email.com ****** Sign Up https://example2.com John Doe johndoe@email.com Sign-in to example.com with IDP Continue as John forgot password Browser RP IDP The classification Problem
  • 5. BlinkOn 16 How? O(B) Users No behavioral changes O(100s) Identity Providers Moderate change O(10s) Browsers Heavy change O(M) Relying Parties Backwards compatible
  • 8. BlinkOn 16 How? The JavaScript API var credential = navigator.credentials.get( {provider: “https://idp.example/”, client_id: “123”} ); {id_token} = credential.login(); // Also available: credential.logout(); credential.revoke();
  • 9. BlinkOn 16 How? The HTTP API https://developer.chrome.com/blog/fedcm-origin-trial/
  • 10. 2023 2020 2021 2022 Here are 3 options I2P Oops, we have a problem Prototyping Hello WICG, OIDF Is this even a problem? Would these even work? This could work. How can I try? Q1/2022 This works! Origin Trials Q2 /2022 Let’s see then. 2024 Fast Follows Phase out Q3/2022 Ready Q3/2023 Phasing out Q4/2023 3PCD Devtrials I2E I2S When? MVP Feature Complete Today
  • 11. BlinkOn 16 Ecosystem Feedback - Federated Identity Community Group - Identity Providers - Better understanding of the use cases (primitives by use cases) - Firmer validation that front-channel logout is important to them - Better understanding of the alternatives and trade-offs (alternatives considered) - First Party Sets, CHIPS, Storage Access API, FedCM, CNAMES, Back channel logout, etc. - Increasingly more concerned about bounce tracking mitigations longer term - Browsers - Edge: no institutional position yet. currently running the origin trial too. - Safari: early institutional position: generally supportive, but still very early / shallow - Firefox: no institutional position yet. informally, supportive of development, concerned about a few privacy issues which we are working on together.
  • 12. BlinkOn 16 The Timing Attack - Tracker can learn about which website a user is visiting without user permission by conducting the timing attack
  • 15. BlinkOn 16 Proposal - pull accounts iff it’s necessary - Site engagement score: users must have interacted with the provider origin in the past - { provider: “https://idp.example/”, client_id: “123” } - Aggregate metrics to penalize suspicious “providers” - Click-through rate - Invisible UI rate - We want the timing attack to be economically impractical, not mathematically impossible
  • 16. BlinkOn 16 What’s next: Multiple IDPs? Company logos are illustrative only
  • 17. What’s next: Branding? Company logos are illustrative only
  • 18. What’s next: Other Use Cases? Company logos are illustrative only
  • 19. What’s next: previously inaccessible UX opportunities? Company logos are illustrative only
  • 20. What’s next: Other IdP use cases ● Personalized button ● Early explorations ○ Access tokens ○ Refresh tokens (silent access) ○ DPoP API (proof of possession) ○ Non-email user identification (e.g. phone number) ○ Multiple iframes sharing one login prompt
  • 21. Q & A

Editor's Notes

  1. Note: pulling the changes towards the left is an OPTIMIZATION factor, not a HARD requirement. it is simply facilitating the deployment of FedCM, but if some things fall into RPs or Users it won't be a failure: it will just be harder.
  2. Christian talks for slides 6-8
  3. https://blog.google/products/chrome/updated-timeline-privacy-sandbox-milestones/#:~:text=finishing%20in%20late%202023 https://developer.chrome.com/blog/origin-trials/
  4. Christian talks for slides 14-17