To ensure a successful test of the authenticator, please follow these steps:
What about using custom environments, such as those with password managers supporting passkeys? Use only vanilla ones?
It is not mentioned how the authenticator should be set up above (UV). Can it be an option on the different platforms besides Yubikey?
If you encounter an error message like "Authenticator data cannot be parsed", it indicates that the combination of arguments used is not supported by the authenticator being tested.
Fill in the detailed results in the following template (perhaps it is better to pre-define the authenticator setup and choices to be made and then provide clear placeholders for entering outcomes and outputs):
Authenticator vendor | |
---|---|
Authenticator model (or phone/laptop model?) | |
I registered a PIN/fingerprint/face etc. (PIN/password or biometric) in the authenticator before the test. (shorten this label?) | yes/no |
OS and its version | |
Browser and its version | |
Platform authenticator (isUVPAA) | |
Conditional Mediation (Autofill UI) | |
CTAP2 support (Firefox) | |
1. User Verification: Discouraged | |
2. User Verification: Required | |
3. Attestation: Enterprise | |
4. Attestation: Direct | |
5. Attestation: Indirect | |
6. Attestation: None | |
7. CredProtect Extension: userVerificationOptional | |
8. CredProtect Extension: userVerificationOptionalWithCredentialIDList | |
9. CredProtect Extension: userVerificationRequired | |
10. ES256 | |
11. ES384 | |
12. ES512 | |
13. RS256 | |
14. EdDSA | |
Attach screenshots of the system/browser dialogues (where/how? - Better to use a GDoc?) |
Add a comment to the page with the completed table filled out. The results will be aggregated into the summarised table below.
What about trying or at least screenshotting platform-specific passkey options that might be offered during registration? Is there anything else we are interested in? E.g., if several user identities (existing on the device) are selectable here, per passkey single device use of a passkey (i.e. forbidding passkey syncing by user), user notes about passkey...?
Are we interested in the platform's general options, like those on the last screen here?
I guess that we won't be testing sign-in features supported by the platform, as these may easily change and others will be testing them anyway!?
Authenticator vendor | Authenticator model | Authenticator was set up for UV before the test | OS+version | browser+version | |
---|---|---|---|---|---|
Yubico | YubiKey 5 | no | |||
Yubico | YubiKey 5 | yes | |||
Microsoft | Windows Hello | Windows 10 without TPM | |||
Microsoft | Windows Hello | Windows 10 with TPM | |||
Microsoft | Windows Hello | Windows 11 (with TPM) | |||
Apple | iPhone XY | iOS | |||
MacBook year size | macOS versionNo | ||||
MacBook Air year size | macOS versionNo | ||||
MacBook Pro year size | macOS versionNo | ||||
Android phone brand | Android phone model | Android XY | |||
Samsung | S22+ | Android 13 |