@kpiris According to the current WebAuthn standards, if the Relying Party has specified that User Verification is required
, then the Authenticator must perform User Verification for every authentication request.
Per the analogy I proposed above, would it be reasonable if a hypothetical YubiKey Series 6 allowed a user to unlock the key (with a PIN) ahead of time, and set a timeout period during which the PIN would remain valid as User Verification for future authentication requests? What if the key is stolen/misappropriated while unlocked? Even if you think this type of functionality is reasonable, should there be any limits on the timeout period? For example, going back to Bitwarden, should Bitwarden passkeys produce an error (stop working) if the Relying Party requires User Verification, but the user has set their Vault Timeout to âNeverâ?
It seems to me that the whole purpose of the User Verification functionality is to empower the Relying Party to protect themselves against an impostor. That is to say, the role of the passkey is not solely to protect the user from unauthorized access to their digital assets, but also to protect the Relying Party from unauthorized access to their servers and resources. In this context, a Relying Party would need some assurance of the userâs identity at the time of the authentication. You may or may not agree with this, but my point is that I think it is highly unlikely that WebAuthn standards will be modified to the point that a user can defeat the requirement of User Verification at the time of the authentication.
Given this state of affairs, our best hope for relief is for Bitwarden to implement a User Verification method that is distinct from, and independent of the vault unlock method. Which is exactly what is proposed in this feature request.
This is an excellent point, and a not unlikely outcome of Bitwardenâs current implementation (which marries the vault unlock method to User Verification).
In fact, it is currently possible for Bitwarden users to set a vault unlock PIN that is not compliant with FIDO/CTAP standards (e.g., a PIN with fewer than 4 characters). There is no reason to forbid a user from using a vault unlock PIN that is 2â3 characters long (or even a single character!), if such a PIN is warranted by the userâs threat model; however, such a PIN would not be suitable for User Verification. Again, every issue boils down to the simple fact that User Verification requirements are substantially different from vault locking requirements, so it makes no sense to use a single password or PIN for both.