-
Notifications
You must be signed in to change notification settings - Fork 1.5k
[PM-26177] Allow mobile clients to create passkeys #6383
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
|
|
|
Codecov Report✅ All modified and coverable lines are covered by tests. Additional details and impacted files@@ Coverage Diff @@
## main #6383 +/- ##
=======================================
Coverage 54.57% 54.57%
=======================================
Files 1921 1921
Lines 85405 85405
Branches 7635 7635
=======================================
+ Hits 46607 46612 +5
+ Misses 37027 37020 -7
- Partials 1771 1773 +2 ☔ View full report in Codecov by Sentry. 🚀 New features to boost your workflow:
|
610d18e to
1589f3e
Compare
|
Claude finished @iinuwa's task in 2m 42s —— View job Code Review CompleteOverall Assessment: APPROVE I've reviewed the authorization policy changes that enable mobile clients to create passkeys while maintaining web-only restrictions for assertion operations. The implementation correctly separates creation (now allowed for all authenticated clients via Key FindingsFinding 1 - Documentation typo in Policies.cs:65: Finding 2 - Authorization policy consistency question: Finding 3 - Authorization policy consistency question: Security Analysis✅ Zero-knowledge principles maintained - passkeys are authentication credentials, not vault data The change achieves its objective of enabling mobile clients to create passkeys for unphishable onboarding while keeping assertion operations web-only. |
1589f3e to
6da6998
Compare
|
Overall Assessment: APPROVE Reviewed authorization policy changes for mobile passkey creation support. The change correctly enables mobile clients to create passkeys while maintaining web-only restrictions for assertion operations, aligning with the unphishable onboarding objectives. |
Patrick-Pimentel-Bitwarden
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
While you are in here and updating the webauthn access, could you update this comment in the src/Core/Auth/Identity/Policies.cs to more appropriately reflect how these policies are being used? Looks like we probably should have done that in a previous commit and didn't catch it, apologies for that.
/// <summary>
/// Policy for managing access to the Send feature.
/// </summary>
Otherwise, I think this all looks great!
6da6998 to
31f9700
Compare
|
Thanks for the review @Patrick-Pimentel-Bitwarden. Did you mean that I should add similar comments to the rest of the I went ahead and made them all uniform (except for |
31f9700 to
ddf4822
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
👍 Thank you @iinuwa! Yeah just more clarity on how the different policies were being applied / updating them to be correct.





🎟️ Tracking
PM-26177
PM-27177
PM-27265
PM-27264
📔 Objective
As part of the initiative to have unphishable onboarding from mobile clients to the web vault or browser extension, we need to allow mobile clients to be able to create new passkeys.
This PR allows mobile clients to create and update passkeys. At this time, we are not expecting mobile clients to authenticate directly with passkeys, so the assertion endpoint was left restricted to the web vault.
⏰ Reminders before review
🦮 Reviewer guidelines
:+1:) or similar for great changes:memo:) or ℹ️ (:information_source:) for notes or general info:question:) for questions:thinking:) or 💭 (:thought_balloon:) for more open inquiry that's not quite a confirmed issue and could potentially benefit from discussion:art:) for suggestions / improvements:x:) or:warning:) for more significant problems or concerns needing attention:seedling:) or ♻️ (:recycle:) for future improvements or indications of technical debt:pick:) for minor or nitpick changes