-
Notifications
You must be signed in to change notification settings - Fork 270
man: add sssd-passkey.5
#7637
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
man: add sssd-passkey.5
#7637
Conversation
|
@justin-stephenson and @sumit-bose here is the documentation that we agreed to create yesterday. Please take a look at it when you have some time. |
|
Thanks very much for working on this @ikerexxe To understand more clearly I did some testing of our current handling of passkey user-verification, specifically with kerberos-enabled passkey auth with IPA. When IPA When IPA Is this the expected behavior when a device does not match the IPA server side policy to require user verification? |
Yes, that's the expected behaviour and that's what I intended to convey with:
I know I mention
Should we mention this in the man page?
This doesn't align with the text I wrote. I based my understanding in the local case, where https://github.com/SSSD/sssd/blob/master/src/passkey_child/passkey_child_credentials.c#L133 is executed, and thus, the PIN is requested. Taking into account that the device won't allow the authentication without the PIN I think this is something that we need to improve in the online/kerberos workflow. As we'll run the |
src/man/sssd-passkey.5.xml
Outdated
| <row> | ||
| <entry>True</entry> | ||
| <entry>User verification is not configured</entry> | ||
| <entry>Authentication fails</entry> |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Hi,
I think might be more consistent to handle this case as if no (suitable) device is available at the pre-flight check. Then users have the chance to insert another device which requires a PIN before they enter the PIN.
bye,
Sumit
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
What I wrote refers to what happens in the authentication phase. By the previous message you mean that I should also explain the preflight phase in the man pages?
By the way, the behaviour that you mention is what is currently proposed in #7631, as errors are ignored at the passkey_child.c level, thus leaving an option for the user to insert another FIDO2 device between the preauth and auth phases.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Hi,
no, the pre-flight is is internal and should not be mentioned in the man page explicitly. What I meant is that "Authentication fails" give the impression that authentication fails immediately but I guess in reality what happens in the authentication phase is more a "User verification is requested but it is expected that authentication fails if no other device is inserted in between".
bye,
Sumit
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Can you take a look at the updated text? I think I have reflected what you mention, but I would prefer to have a confirmation.
We can mention this.
Okay, yes I agree that this is a better approach. If UV is false (whether sssd.conf or IPA require-user-verification) and the device has a PIN set then SSSD will automatically determine this when it queries if the device has a PIN set and effectively re-enable UV for this auth(prompt for a PIN). This is also something to clearly state in the man page IMO. |
I suppose this will need to be fixed in the code as part of #7631 or my SSSD PR when it comes. |
|
@justin-stephenson I updated the text to include the password fallback and the user verification from the device. Take a look at it when you have some time.
Yes, that would be the best approach. |
Looks good to me, thank you Iker.
|
|
@ikerexxe, please set backport labels. |
Include a new man page for passkey to explain the behaviour of `user_verification` option in the different scenarios. It is a complex option, so it has been decided to add a table to simplify its understanding. Signed-off-by: Iker Pedrosa <ipedrosa@redhat.com>
|
Hi @sumit-bose, Are you ok with the current proposal? If so, I'd like to close this PR and move the changes to #7631 to have everything centralized in one place. |
Hi, thank you for the reminder, I just added a comment to one of the conversations, but feel free to ignore it, if you think the current sentence is clear enough. Otherwise I do not have further comments. Please go on and move the changes to #7631. bye, |
Updated, so I'm closing this PR and moving the changes to the other one. Thank you both for your reviews! |
Include a new man page for passkey to explain the behaviour of
user_verificationoption in the different scenarios. It is a complex option, so it has been decided to add a table to simplify its understanding.