Skip to content

Commit 1e28d5b

Browse files
committed
Add Google documents
1 parent 963a664 commit 1e28d5b

File tree

5 files changed

+77
-1
lines changed

5 files changed

+77
-1
lines changed

content/docs/demos-examples/demos.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: "Demo Sites & Services"
33
description: "Sites and services to demo passkeys"
44
lead: "Sites and services to demo passkeys"
5-
date: 2023-09-19T16:45:00.148Z
5+
date: 2024-06-25T16:45:00.148Z
66
draft: false
77
images: []
88
menu:
@@ -24,3 +24,4 @@ These demo sites have been created and are maintained by FIDO2/WebAuthn vendors
2424
- [passkeys.guru (Descope)](https://passkeys.guru/)
2525
- [passkey.org (Yubico)](https://passkey.org)
2626
- [패스키 체험 (SK Telecom)](https://www.passkey-sktelecom.com/experience)
27+
- [try-webauthn.appspot.com (Google)](https://try-webauthn.appspot.com/)

content/docs/guides/_index.md

Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,9 @@
1+
---
2+
title: "Guides"
3+
description: "Guides for passkeys developers"
4+
lead: ""
5+
date: 2024-06-25T16:08:00+09:00
6+
draft: false
7+
images: []
8+
weight: 400
9+
---

content/docs/guides/codelabs.md

Lines changed: 17 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,17 @@
1+
---
2+
title: "Codelabs"
3+
description: "Passkeys developer codelabs"
4+
date: 2024-06-25T16:09:38.358Z
5+
draft: false
6+
images: []
7+
menu:
8+
docs:
9+
parent: "guides"
10+
weight: 2001
11+
toc: true
12+
---
13+
14+
## Codelabs
15+
16+
* <a href="https://developers.google.com/codelabs/passkey-form-autofill" target="_blank"><button type="button" class="btn btn-light">Implement passkeys with form autofill in a web app {{< icon-external-link size=24 >}}</i></button></a>
17+
* <a href="https://codelabs.developers.google.com/credential-manager-api-for-android" target="_blank"><button type="button" class="btn btn-light">Implement passkeys using Credential Manager API in your Android app {{< icon-external-link size=24 >}}</i></button></a>
Lines changed: 33 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,33 @@
1+
---
2+
title: "Developer guides"
3+
description: "Passkeys developer guides"
4+
date: 2024-06-25T16:09:38.358Z
5+
draft: false
6+
images: []
7+
menu:
8+
docs:
9+
parent: "guides"
10+
weight: 1001
11+
toc: true
12+
---
13+
14+
## Server side guides
15+
16+
* <a href="https://developers.google.com/identity/passkeys/developer-guides/server-introduction" target="_blank"><button type="button" class="btn btn-light">Introduction to server-side passkey implementation {{< icon-external-link size=24 >}}</i></button></a>
17+
* <a href="https://developers.google.com/identity/passkeys/developer-guides/server-registration" target="_blank"><button type="button" class="btn btn-light">Server-side passkey registration {{< icon-external-link size=24 >}}</i></button></a>
18+
* <a href="https://developers.google.com/identity/passkeys/developer-guides/server-authentication" target="_blank"><button type="button" class="btn btn-light">Server-side passkey authentication {{< icon-external-link size=24 >}}</i></button></a>
19+
20+
## iOS/iPadOS
21+
22+
* <a href="https://developer.apple.com/documentation/authenticationservices/supporting-passkeys" target="_blank"><button type="button" class="btn btn-light">Supporting passkeys {{< icon-external-link size=24 >}}</i></button></a>
23+
24+
## Android
25+
26+
* <a href="https://developer.android.com/identity/sign-in/credential-manager" target="_blank"><button type="button" class="btn btn-light">Sign in your user with Credential Manager {{< icon-external-link size=24 >}}</i></button></a>
27+
28+
## Deep dives
29+
30+
* <a href="https://web.dev/articles/webauthn-user-verification" target="_blank"><button type="button" class="btn btn-light">User verification deep dive {{< icon-external-link size=24 >}}</i></button></a>
31+
* <a href="https://web.dev/articles/webauthn-discoverable-credentials" target="_blank"><button type="button" class="btn btn-light">Discoverable credentials deep dive {{< icon-external-link size=24 >}}</i></button></a>
32+
* <a href="https://web.dev/articles/webauthn-exclude-credentials" target="_blank"><button type="button" class="btn btn-light">Prevent creation of a new passkey if one already exists {{< icon-external-link size=24 >}}</i></button></a>
33+
* <a href="https://web.dev/articles/webauthn-aaguid" target="_blank"><button type="button" class="btn btn-light">Determine the passkey provider with AAGUID {{< icon-external-link size=24 >}}</i></button></a>

content/docs/reference/terms/index.md

Lines changed: 16 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -22,6 +22,14 @@ A user whose account has [2FA](#2-factor-authentication-2fa) turned on, i.e., wh
2222
2323
This refers to a contract between a user and a [Relying Party (RP)](#relying-party-rp) where the RP must collect at least two distinct authentication factors from the user during a [bootstrap](#account-bootstrapping) sign-in.
2424

25+
## Authenticator Attestation Globally Unique Identifier (AAGUID)
26+
27+
AAGUID is a unique number that identifies the model of the authenticator (not the specific instance of the authenticator). AAGUID can be found as part of a public key credential's authenticator data. RPs can use AAGUID to identify the [passkey provider](#passkey-provider).
28+
29+
<a href="https://web.dev/articles/webauthn-aaguid" target="_blank"><button type="button" class="btn btn-light">web.dev {{< icon-external-link size=24 >}}</button></a>
30+
31+
<a href="https://w3c.github.io/webauthn/#aaguid" target="_blank"><button type="button" class="btn btn-light">WebAuthn Spec Reference {{< icon-external-link size=24 >}}</button></a>
32+
2533
## Account bootstrapping
2634

2735
A [Relying Party (RP)](#relying-party-rp) authenticates a user without any prior knowledge of who the user is. This means that the RP not only has to verify the identity of the user (checking the password, verifying cryptographic signatures, etc), it also has to establish the identity of the user (figure out the user id, username, etc. of the user who’s signing in). This may happen when a user signs into an existing account for the first time on a newly-purchased device; or when a user logs into a website for the first time in a given browser instance. Or when a user logs into a website in a private browsing session. Or when a user signs into a mobile app for the first time on a given device (contrast this with [reauthentication](#reauthentication) below).
@@ -50,6 +58,8 @@ A generic example of an autofill UI for passkeys is shown below:
5058

5159
The technical name for this feature in the WebAuthn and Credential Management specifications is "Conditional Mediation".
5260

61+
<a href="https://web.dev/articles/passkey-form-autofill" target="_blank"><button type="button" class="btn btn-light">web.dev {{< icon-external-link size=24 >}}</button></a>
62+
5363
<a href="https://w3c.github.io/webauthn/#dom-publickeycredential-isconditionalmediationavailable" target="_blank"><button type="button" class="btn btn-light">WebAuthn Spec Reference {{< icon-external-link size=24 >}}</button></a>
5464

5565
<a href="https://w3c.github.io/webappsec-credential-management/#mediation-requirements" target="_blank"><button type="button" class="btn btn-light">Credential Management Spec Reference {{< icon-external-link size=24 >}}</button></a>
@@ -86,6 +96,8 @@ A Discoverable Credential (known in previous version of WebAuthn as a "resident
8696

8797
[Passkeys](#passkey) are Discoverable Credentials.
8898

99+
<a href="https://web.dev/articles/webauthn-discoverable-credentials" target="_blank"><button type="button" class="btn btn-light">web.dev {{< icon-external-link size=24 >}}</button></a>
100+
89101
<a href="https://www.w3.org/TR/webauthn-2/#discoverable-credential" target="_blank"><button type="button" class="btn btn-light">Spec Reference {{< icon-external-link size=24 >}}</button></a>
90102

91103
## First-Party Passkey Provider
@@ -178,12 +190,16 @@ A [Passkey Provider](#passkey-provider) that plugs in to the OS via platform API
178190

179191
A test of User Presence (UP) is used to ensure the user is in local proximity to the authenticator during an authentication or credential creation ceremony. UP is often satisfied by pressing a button or metallic area of a security key, or interacting with a platform authenticator on a device.
180192

193+
<a href="https://web.dev/articles/webauthn-user-verification" target="_blank"><button type="button" class="btn btn-light">web.dev {{< icon-external-link size=24 >}}</i></button></a>
194+
181195
<a href="https://www.w3.org/TR/webauthn-2/#test-of-user-presence" target="_blank"><button type="button" class="btn btn-light">Spec Reference {{< icon-external-link size=24 >}}</button></a>
182196

183197
## User Verification (UV)
184198

185199
User Verification (UV) requires the user to either perform a biometric gesture, enter the device PIN, or enter the device password for the authenticator to authorize creation and/or use of the credential.
186200

201+
<a href="https://web.dev/articles/webauthn-user-verification" target="_blank"><button type="button" class="btn btn-light">web.dev {{< icon-external-link size=24 >}}</i></button></a>
202+
187203
<a href="https://www.w3.org/TR/webauthn-2/#user-verification" target="_blank"><button type="button" class="btn btn-light">Spec Reference {{< icon-external-link size=24 >}}</button></a>
188204

189205
## User-Verifying Roaming Authenticator

0 commit comments

Comments
 (0)