You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/en/docs/reference/terms/index.md
+17-2Lines changed: 17 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -75,6 +75,17 @@ See [_Autofill UI_](#autofill-ui)
75
75
76
76
See [_Autofill UI_](#autofill-ui)
77
77
78
+
## Conditional Create
79
+
80
+
A WebAuthn capability which allows a Relying Party to request the creation of a passkey after a successful sign in user another credential from their credential manager, such as a password.
81
+
82
+
Note:
83
+
84
+
- The browser, operating system, and credential manager must all support conditional create.
85
+
-`conditionalCreate` in getClientCapabilities() represents only the browser's support for the capability and does signal OS and/or credential manager support.
86
+
87
+
{{< button color="light" button-size="sm" icon="fas fa-circle-info" cue=false order="first" tooltip="Go to reference in the WebAuthn specification" href="https://www.w3.org/TR/webauthn-3/#sctn-createCredential" >}}WebAuthn Spec Reference{{< /button >}}
88
+
78
89
## Credential Exchange
79
90
80
91
A standardized process to securely transfer passkeys, passwords, and other types of information from one [passkey provider](#passkey-provider) to another.
@@ -83,7 +94,7 @@ A standardized process to securely transfer passkeys, passwords, and other types
83
94
84
95
## Device-bound passkey
85
96
86
-
A FIDO2[Discoverable Credential](#discoverable-credential) that is bound to a single authenticator. For example, FIDO2 security keys typically hold device-bound passkeys as the credential cannot leave the device. Device-bound passkeys have been previously referred to as _single-device passkeys_.
97
+
A WebAuthn[Discoverable Credential](#discoverable-credential) that is bound to a single authenticator. For example, FIDO2 security keys typically hold device-bound passkeys as the credential cannot leave the device. Device-bound passkeys have been previously referred to as _single-device passkeys_.
87
98
88
99
## Discoverable Credential
89
100
@@ -127,6 +138,10 @@ From the technical side, there are two flavors of passkeys: [synced](#synced-pas
127
138
128
139
An app and/or service that is responsible for storing and managing passkeys. Many operating systems include a default passkey provider ([first-party](#first-party-passkey-provider)), and many also support [third-party](#third-party-passkey-provider) providers. A passkey provider is a type of [credential manager](#credential-manager).
129
140
141
+
## Passkey Upgrades
142
+
143
+
See [_Conditional Create_](#conditional-create).
144
+
130
145
## Persistent Linking
131
146
132
147
The informal name for creating a relationship between a [Cross-Device Authentication authenticator](#cda-authenticator) (typically a phone or tablet) and [Cross-Device Authentication client](#cda-client) (typically a laptop or desktop), which enables future use without having to scan a QR code.
@@ -169,7 +184,7 @@ see [_Device-bound passkey_.](#device-bound-passkey)
169
184
170
185
## Synced passkey
171
186
172
-
A FIDO2[Discoverable Credential](#discoverable-credential) that can reliably be used for bootstrapping sign-in, without requiring other login challenges such as passwords and OTPs. "Reliable" here means that the passkey should be available to, and usable by, the user whenever they need to sign in. This availability can be achieved through different means: for example, passkey providers could sync passkeys in real-time across a user's devices, restore passkeys from a backup whenever a user sets up a new device, offer passkeys across different contexts (a passkey established from an app can be used in the browser when visiting the app’s website), or allow users to [exercise passkeys across devices](#cross-device-authentication-cda) (by, say, using the passkey from a nearby phone when signing in from a laptop).
187
+
A WebAuthn[Discoverable Credential](#discoverable-credential) that can reliably be used for bootstrapping sign-in, without requiring other login challenges such as passwords and OTPs. "Reliable" here means that the passkey should be available to, and usable by, the user whenever they need to sign in. This availability can be achieved through different means: for example, passkey providers could sync passkeys in real-time across a user's devices, restore passkeys from a backup whenever a user sets up a new device, offer passkeys across different contexts (a passkey established from an app can be used in the browser when visiting the app’s website), or allow users to [exercise passkeys across devices](#cross-device-authentication-cda) (by, say, using the passkey from a nearby phone when signing in from a laptop).
0 commit comments