Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Reason why UVPA not recommended as second factors for account bootstrapping ? #5

Open
maxhata opened this issue Jul 10, 2020 · 2 comments

Comments

@maxhata
Copy link

maxhata commented Jul 10, 2020

Note: We do not recommend allowing users to register user-verifying platform authenticators as second factors for account bootstrapping. If you want to give your users the convenience of biometric sign-in, follow the steps above to register a user-verifying platform authenticator as a password replacement for reauthentication, not as a second factor for account bootstrapping.

Why "We do not recommend allowing users to register user-verifying platform authenticators as second factors for account bootstrapping"? We should explain the reason why we make this recommendation, so that implementers can understand the recommendation.

@maxhata
Copy link
Author

maxhata commented Oct 30, 2020

I think the main reason for

not to recommend allowing users to register user-verifying platform authenticators as second factor for bootstrapping.

is to prevent potential account recovery problem. Users may have no other way but to login using the UVPA if users use user-verifying platform authenticators as second factor ; this model creates potential for account recovery problem if the user loses the UVPA. We should explain this reason clearly in the text.

Additionally, some readers will think;
if the user has already registered a roaming authenticator as a second factor, the user can be allowed to register a UVPA as a second factor, since the roaming authenticator can solve the account recovery problem even if the user looses the UVPA.

So the current recommendation sounds confusing.

=======
I think we should first explain the lock-out issue by UVPA including additional roaming authenticators to be registered as a solution to break the lock-out. Then, all these recommendations will become easier to be understood by using the lock-out issue as the reason.

I know it is difficult in many consumer use cases to expect every consumers owning roaming authenticators and you end up with this recommendation. But the reasoning to come up with this recommendation should be communicated to the readers.

@maxhata
Copy link
Author

maxhata commented Nov 1, 2020

Created a PR, #24

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant