Skip to content

Conversation

@swissbit-eis-admin
Copy link

@swissbit-eis-admin swissbit-eis-admin commented Dec 17, 2025

  • Let users choose during registration whether a passkey is stored as a discoverable credential; retry with the legacy flow if the authenticator can't do resident keys.
  • Simplify “Log in with a device”: a single field now accepts an optional login/email, using discoverable credentials when left empty and falling back gracefully otherwise.
  • Backend/WebAuthn services updated to handle optional usernames and return the credential source so the UID can be derived from the authenticator.

Please refer to PR to stable32: #57154
Both have similar function

Summary

This allows user to register discoverable and non-discoverable FIDO2 passkeys in user settings.
If user tries to login with second factor and omits email login -> discoverable credential attempted
if user fills in email at login -> classic host side credentials are used.

TODO

  • ...

Checklist

@swissbit-eis-admin swissbit-eis-admin requested review from a team as code owners December 17, 2025 16:02
@swissbit-eis-admin swissbit-eis-admin requested review from leftybournes, nfebe, skjnldsv, sorbaugh and yemkareems and removed request for a team December 17, 2025 16:02
@swissbit-eis-admin swissbit-eis-admin changed the title WebAuthn / FIDO2 : allow discoverable or legacy passkeys + runtime ch… WebAuthn / FIDO2 : allow discoverable or non-discoverable passkeys + runtime ch… Dec 17, 2025
@ChristophWurst ChristophWurst self-requested a review December 17, 2025 17:46
@swissbit-eis-admin swissbit-eis-admin changed the title WebAuthn / FIDO2 : allow discoverable or non-discoverable passkeys + runtime ch… WebAuthn / FIDO2 / 2fa: allow discoverable or non-discoverable passkeys Dec 21, 2025
@swissbit-eis-admin swissbit-eis-admin force-pushed the fido2-optional-discoverable-credentials branch 2 times, most recently from b70e65a to 9da50df Compare December 21, 2025 02:13
…oice

- Let users choose during registration whether a passkey is stored as a discoverable credential; retry with the legacy flow if the authenticator can't do resident keys.
- Simplify “Log in with a device”: a single field now accepts an optional login/email, using discoverable credentials when left empty and falling back gracefully otherwise.
- Backend/WebAuthn services updated to handle optional usernames and return the credential source so the UID can be derived from the authenticator.

Signed-off-by: swissbit-eis-admin <[email protected]>
@swissbit-eis-admin swissbit-eis-admin force-pushed the fido2-optional-discoverable-credentials branch from 9da50df to 6606ccb Compare December 21, 2025 02:51
@swissbit-eis-admin
Copy link
Author

@ChristophWurst can you give me feedback to my PR?

The idea was to extend Passkey Support by discoverable credentials (new), keep existing functionality for existing password less login (keep) and rephrase the technical wording (webauthn) to a more standard user centric view (modified).
Some EU and South America internationalisation is provided as well.
The commits show the stages of improvement.

Thank you.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

3. to review Waiting for reviews enhancement

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants