Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
3 changes: 2 additions & 1 deletion content/docs/demos-examples/demos.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
title: "Demo Sites & Services"
description: "Sites and services to demo passkeys"
lead: "Sites and services to demo passkeys"
date: 2023-09-19T16:45:00.148Z
date: 2024-06-25T16:45:00.148Z
draft: false
images: []
menu:
Expand All @@ -24,3 +24,4 @@ These demo sites have been created and are maintained by FIDO2/WebAuthn vendors
- [passkeys.guru (Descope)](https://passkeys.guru/)
- [passkey.org (Yubico)](https://passkey.org)
- [패스키 체험 (SK Telecom)](https://www.passkey-sktelecom.com/experience)
- [try-webauthn.appspot.com (Google)](https://try-webauthn.appspot.com/)
9 changes: 9 additions & 0 deletions content/docs/guides/_index.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,9 @@
---
title: "Guides"
description: "Guides for passkeys developers"
lead: ""
date: 2024-06-25T16:08:00+09:00
draft: false
images: []
weight: 400
---
17 changes: 17 additions & 0 deletions content/docs/guides/codelabs.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,17 @@
---
title: "Codelabs"
description: "Passkeys developer codelabs"
date: 2024-06-25T16:09:38.358Z
draft: false
images: []
menu:
docs:
parent: "guides"
weight: 2001
toc: true
---

## Codelabs

* <a href="https://developers.google.com/codelabs/passkey-form-autofill" target="_blank"><button type="button" class="btn btn-light">Implement passkeys with form autofill in a web app {{< icon-external-link size=24 >}}</i></button></a>
* <a href="https://codelabs.developers.google.com/credential-manager-api-for-android" target="_blank"><button type="button" class="btn btn-light">Implement passkeys using Credential Manager API in your Android app {{< icon-external-link size=24 >}}</i></button></a>
33 changes: 33 additions & 0 deletions content/docs/guides/developer-guides.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,33 @@
---
title: "Developer guides"
description: "Passkeys developer guides"
date: 2024-06-25T16:09:38.358Z
draft: false
images: []
menu:
docs:
parent: "guides"
weight: 1001
toc: true
---

## Server side guides

* <a href="https://developers.google.com/identity/passkeys/developer-guides/server-introduction" target="_blank"><button type="button" class="btn btn-light">Introduction to server-side passkey implementation {{< icon-external-link size=24 >}}</i></button></a>
* <a href="https://developers.google.com/identity/passkeys/developer-guides/server-registration" target="_blank"><button type="button" class="btn btn-light">Server-side passkey registration {{< icon-external-link size=24 >}}</i></button></a>
* <a href="https://developers.google.com/identity/passkeys/developer-guides/server-authentication" target="_blank"><button type="button" class="btn btn-light">Server-side passkey authentication {{< icon-external-link size=24 >}}</i></button></a>

## iOS/iPadOS

* <a href="https://developer.apple.com/documentation/authenticationservices/supporting-passkeys" target="_blank"><button type="button" class="btn btn-light">Supporting passkeys {{< icon-external-link size=24 >}}</i></button></a>

## Android

* <a href="https://developer.android.com/identity/sign-in/credential-manager" target="_blank"><button type="button" class="btn btn-light">Sign in your user with Credential Manager {{< icon-external-link size=24 >}}</i></button></a>

## Deep dives

* <a href="https://web.dev/articles/webauthn-user-verification" target="_blank"><button type="button" class="btn btn-light">User verification deep dive {{< icon-external-link size=24 >}}</i></button></a>
* <a href="https://web.dev/articles/webauthn-discoverable-credentials" target="_blank"><button type="button" class="btn btn-light">Discoverable credentials deep dive {{< icon-external-link size=24 >}}</i></button></a>
* <a href="https://web.dev/articles/webauthn-exclude-credentials" target="_blank"><button type="button" class="btn btn-light">Prevent creation of a new passkey if one already exists {{< icon-external-link size=24 >}}</i></button></a>
* <a href="https://web.dev/articles/webauthn-aaguid" target="_blank"><button type="button" class="btn btn-light">Determine the passkey provider with AAGUID {{< icon-external-link size=24 >}}</i></button></a>
6 changes: 6 additions & 0 deletions content/docs/reference/terms/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -22,6 +22,12 @@ A user whose account has [2FA](#2-factor-authentication-2fa) turned on, i.e., wh

This refers to a contract between a user and a [Relying Party (RP)](#relying-party-rp) where the RP must collect at least two distinct authentication factors from the user during a [bootstrap](#account-bootstrapping) sign-in.

## Authenticator Attestation Globally Unique Identifier (AAGUID)

AAGUID is a unique number that identifies the model of the authenticator (not the specific instance of the authenticator). AAGUID can be found as part of a public key credential's authenticator data. RPs can use AAGUID to identify the [passkey provider](#passkey-provider).

<a href="https://w3c.github.io/webauthn/#aaguid" target="_blank"><button type="button" class="btn btn-light">WebAuthn Spec Reference {{< icon-external-link size=24 >}}</button></a>

## Account bootstrapping

A [Relying Party (RP)](#relying-party-rp) authenticates a user without any prior knowledge of who the user is. This means that the RP not only has to verify the identity of the user (checking the password, verifying cryptographic signatures, etc), it also has to establish the identity of the user (figure out the user id, username, etc. of the user who’s signing in). This may happen when a user signs into an existing account for the first time on a newly-purchased device; or when a user logs into a website for the first time in a given browser instance. Or when a user logs into a website in a private browsing session. Or when a user signs into a mobile app for the first time on a given device (contrast this with [reauthentication](#reauthentication) below).
Expand Down