Conversation
|
@justin-stephenson and @sumit-bose here is the documentation that we agreed to create yesterday. Please take a look at it when you have some time. |
|
Thanks very much for working on this @ikerexxe To understand more clearly I did some testing of our current handling of passkey user-verification, specifically with kerberos-enabled passkey auth with IPA. When IPA When IPA Is this the expected behavior when a device does not match the IPA server side policy to require user verification? |
Yes, that's the expected behaviour and that's what I intended to convey with:
I know I mention
Should we mention this in the man page?
This doesn't align with the text I wrote. I based my understanding in the local case, where https://github.com/SSSD/sssd/blob/master/src/passkey_child/passkey_child_credentials.c#L133 is executed, and thus, the PIN is requested. Taking into account that the device won't allow the authentication without the PIN I think this is something that we need to improve in the online/kerberos workflow. As we'll run the |
src/man/sssd-passkey.5.xml
Outdated
| <row> | ||
| <entry>True</entry> | ||
| <entry>User verification is not configured</entry> | ||
| <entry>Authentication fails</entry> |
There was a problem hiding this comment.
Hi,
I think might be more consistent to handle this case as if no (suitable) device is available at the pre-flight check. Then users have the chance to insert another device which requires a PIN before they enter the PIN.
bye,
Sumit
There was a problem hiding this comment.
What I wrote refers to what happens in the authentication phase. By the previous message you mean that I should also explain the preflight phase in the man pages?
By the way, the behaviour that you mention is what is currently proposed in #7631, as errors are ignored at the passkey_child.c level, thus leaving an option for the user to insert another FIDO2 device between the preauth and auth phases.
There was a problem hiding this comment.
Hi,
no, the pre-flight is is internal and should not be mentioned in the man page explicitly. What I meant is that "Authentication fails" give the impression that authentication fails immediately but I guess in reality what happens in the authentication phase is more a "User verification is requested but it is expected that authentication fails if no other device is inserted in between".
bye,
Sumit
There was a problem hiding this comment.
Can you take a look at the updated text? I think I have reflected what you mention, but I would prefer to have a confirmation.
We can mention this.
Okay, yes I agree that this is a better approach. If UV is false (whether sssd.conf or IPA require-user-verification) and the device has a PIN set then SSSD will automatically determine this when it queries if the device has a PIN set and effectively re-enable UV for this auth(prompt for a PIN). This is also something to clearly state in the man page IMO. |
I suppose this will need to be fixed in the code as part of #7631 or my SSSD PR when it comes. |
|
@justin-stephenson I updated the text to include the password fallback and the user verification from the device. Take a look at it when you have some time.
Yes, that would be the best approach. |
Looks good to me, thank you Iker.
|
|
@ikerexxe, please set backport labels. |
Include a new man page for passkey to explain the behaviour of `user_verification` option in the different scenarios. It is a complex option, so it has been decided to add a table to simplify its understanding. Signed-off-by: Iker Pedrosa <ipedrosa@redhat.com>
|
Hi @sumit-bose, Are you ok with the current proposal? If so, I'd like to close this PR and move the changes to #7631 to have everything centralized in one place. |
Hi, thank you for the reminder, I just added a comment to one of the conversations, but feel free to ignore it, if you think the current sentence is clear enough. Otherwise I do not have further comments. Please go on and move the changes to #7631. bye, |
Updated, so I'm closing this PR and moving the changes to the other one. Thank you both for your reviews! |
Include a new man page for passkey to explain the behaviour of
user_verificationoption in the different scenarios. It is a complex option, so it has been decided to add a table to simplify its understanding.