View Source WebauthnComponents
A collection of drop-in LiveComponents for password-less authentication.
status-beta
Status: Beta 💅🏻
Please do not use WebauthnComponents in a production environment until it has completed beta testing.
This package is a work in progress, and it is in early beta status.
Feel free to experiment with this package and contribute feedback through GitHub discussions or the related topic in Elixir Forum.
roadmap
Roadmap
View the planned work for this repo in the public WebauthnComponents v1 project on GitHub.
quick-start
Quick Start
During the beta phase, generators will be added to streamline initial setup, including running migrations, generating related modules, etc. Steps marked (TODO) need additional documentation, and some may be streamlined by Mix tasks during the beta phase.
- Add Mix dependency
- Add
WebAuthnhook toapp.js - Run Mix task to create
user_keysschema & migrationmix phx.gen.context --binary-id Authentication UserKey user_keys key_id:binary label last_used:utc_datetime public_key:binary user_id:references:users
- Update
UserKeyschema (TODO)- Add default value to the
labelfield - Update the
public_keyfield to useWebauthnComponents.CoseKeyas its type - Add
new_changeset/2&update_changeset/2(TODO)
- Add default value to the
- Run Mix task to create
user_tokensschema & migrationmix phx.gen.context --binary-id Authentication UserToken user_tokens user_id:references:users token:binary context
- Update
UserTokenschema- Update the
contextfield to useEcto.Enumas its type withvalues: [:session, :device_code]anddefault: :session - Replace
user_idfield withbelongs_toUserassociation - Add
foreign_key_constraint:user_id - Add token helper functions (TODO)
- Update the
- Update
Userand/or relevant schemas to include keys association (TODO)
installation
Installation
Add webauthn_components to your list of dependencies in mix.exs:
def deps do
[
{:webauthn_components, "~> 0.3"}
]
end
usage
Usage
See USAGE.md for detailed usage instructions.
webauthn-flows
WebAuthn Flows
WebauthnComponents contains a few modular components which may be combined to detect passkey support, register new keys, authenticate keys for existing users, and manage session tokens in the client.
See module documentation for each component for more detailed descriptions.
Support Detection
sequenceDiagram
autonumber
participant Client
participant SupportComponent
participant ParentLiveView
participant RegistrationComponent
participant AuthenticationComponent
Client->>SupportComponent: "passkeys-supported"
SupportComponent->>ParentLiveView: `{:passkeys_supported, boolean}`
ParentLiveView->>RegistrationComponent: `@disabled = !@passkeys_supported`
ParentLiveView->>AuthenticationComponent: `@disabled = !@passkeys_supported`Registration
Sign Up
sequenceDiagram
autonumber
actor User
participant Client
participant RegistrationComponent
participant ParentLiveView
User->>Client: Click `register`
Client->>RegistrationComponent: "register"
RegistrationComponent->>Client: "registration-challenge"
Client->>RegistrationComponent: "registration-attestation"
RegistrationComponent->>ParentLiveView: `{:registration_successful, ...}`Once the parent LiveView receives the {:registration_successful, ...} message, it must persist the user, the user's new key. To keep the user signed in, the LiveView may create a session token, Base64-encode the token, and pass it to TokenComponent for persistence in the client's sessionStorage.
Token Management
Successful Sign Up / Sign In
sequenceDiagram
autonumber
participant Client
participant TokenComponent
participant ParentLiveView
ParentLiveView->>TokenComponent: `@token = b64_token`
TokenComponent->>Client: "store-token"
Client->>TokenComponent: "token-stored"
TokenComponent->>ParentLiveView: `{:token_stored, ...}`Active Session
sequenceDiagram
autonumber
participant Client
participant TokenComponent
participant ParentLiveView
Client->>TokenComponent: "token-exists"
TokenComponent->>ParentLiveView: `{:token_exists, ...}`
ParentLiveView-->ParentLiveView: "[user lookup by token]"Sign Out
sequenceDiagram
autonumber
participant Client
participant TokenComponent
participant ParentLiveView
ParentLiveView->>TokenComponent: `@token = :clear`
TokenComponent->>Client: "clear-token"
Client->>TokenComponent: "token-cleared"
TokenComponent->>ParentLiveView: `{:token_cleared}`Authentication
Sign In
sequenceDiagram
autonumber
actor User
participant Client
participant AuthenticationComponent
participant ParentLiveView
User->>Client: Click `authenticate`
Client->>AuthenticationComponent: "authenticate"
AuthenticationComponent->>Client: "authentication-challenge"
Client->>AuthenticationComponent: "authentication-attestation"
AuthenticationComponent->>ParentLiveView: `{:find_credentials, ...}`Once the parent LiveView receives the {:find_credentials, ...} message, it must lookup the user via the user's existing key. To keep the user signed in, the LiveView may create a session token, Base64-encode the token, and pass it to TokenComponent for persistence in the client's sessionStorage.
webauthn-passkeys
WebAuthn & Passkeys
The Web Authentication API is an extension of the Credential Management API that enables strong authentication with public key cryptography, enabling passwordless authentication and/or secure second-factor authentication without SMS texts.
https://developer.mozilla.org/en-US/docs/Web/API/Web_Authentication_API
A passkey is a FIDO login credential, tied to an origin (website or application) and a physical device. Passkeys allow users to authenticate without having to enter a username, password, or provide any additional authentication factor. This technology aims to replace passwords as the primary authentication mechanism.
Passkeys are essentially a standard to sync WebAuthn credentials with cloud platforms like iCloud Keychain, Android, 1Password, with more to come.
benefits
Benefits
There are many benefits to users and application maintainers when passwords are decommissioned.
- Eliminates password reuse by users.
- Mitigates credential stuffing attacks by hackers.
- Eliminates phishing attacks by hackers.
For users on a device with Passkey support, WebAuthn credentials may be stored in the cloud. This allows the user to authenticate from other cloud-connected devices without registering each device individually.
known-issues
Known Issues
While WebAuthn provides an API for improved authentication security, there are a few limitations to consider before adopting this component.
- As of 2022, Passkeys are not universally supported.
- If a user registers or authenticates on a device without Passkey support, the generated key pair will not be synced, and each device must be registered in order to access an account.
- Cloud-synced credentials are only accessible to devices authenticated to the cloud account.
- For example, a credential saved to iCloud Keychain will not be synced automatically to Android's credential manager.
browser-support
Browser Support
The WebAuthn API has broad support across the most common modern browsers.
https://caniuse.com/?search=webauthn