Step # | Action | Expected | Actual | Matches Expected | Details |
1. | |||||
Simulate an old security key registration | |||||
2. | |||||
3. | |||||
Attempt to register as trusted device | |||||
4. | |||||
Upgrade security key registration to trusted device | |||||
5. | |||||
6. | |||||
7. |
This journey simulates a situation where an RP implements a trusted device feature, but has users with legacy registrations whose UV & PA status is not known.
These steps simulate the "worst case" where the RP has no
information during step 4 about any potential existing registrations that
may work with the current device (and therefore all registrations are
listed in excludeCredentials
).
Step 2 uses:
"authenticatorSelection": {
"userVerification": "discouraged"
}
Step 4 uses:
"authenticatorSelection": {
"authenticatorAttachment": "platform",
"userVerification": "required"
}
// ...
"excludeCredentials: [/* all registered credentials */]"
"authenticatorSelection": {
"authenticatorAttachment": "platform",
"userVerification": "required"
}
// ...
"excludeCredentials: [/* all registered credentials except the one identified in step 5 */]"