Issues
- 14
- 8
- 1
Really supportive of this effort!
#22 opened by miketheitguy - 1
[Fetch] What's stopping us from using the Fetch API configuration to support this?
#39 opened by wparad - 1
- 2
jti/nonce/challenge value?
#43 opened by bc-pi - 1
iat is a number
#42 opened by bc-pi - 13
how are endpoints conveyed from server to browser?
#45 opened by bc-pi - 56
A simpler flow proposal
#46 opened by el1s7 - 5
JWTs are not themselves base64url encoded
#47 opened by bc-pi - 2
- 11
`Sec-` prefix for a server header
#59 opened by yoavweiss - 4
- 2
- 2
- 2
Use Outside of Google
#62 opened by amitassaraf - 17
HTTP 401 MUST return a WWW-Authenticate header
#65 opened by danmarg - 2
- 1
CORS integration
#81 opened by annevk - 1
- 2
PoC using swtpm
#63 opened by theMiddleBlue - 2
- 5
- 5
- 2
Why send JWTs two different ways?
#53 opened by sbweeden - 0
البلاغ عن موقع احتيال مالي
#70 opened by Norah0-0 - 9
Public key in JWT
#44 opened by bc-pi - 1
Use DBSC without Browser support?
#72 opened by longzhou - 6
- 9
An attack vector for DBSC:
#35 opened by maxhata - 14
JWS algorithms are case-sensitive
#41 opened by bc-pi - 9
- 2
- 3
- 1
Reduce latency by including refresh challenge
#29 opened by dickhardt - 2
Explicitly type the JWT
#27 opened by dickhardt - 18
- 9
MVP Recommendation: TOTP
#36 opened by wparad - 5
Need for attestation?
#34 opened by jackevans43 - 3
explain `excluded scope`
#30 opened by dickhardt - 1
Login Status API?
#32 opened by dickhardt - 1
timed refresh mechanism
#33 opened by dickhardt - 4
- 0
JWT clarifications needed
#28 opened by dickhardt - 2
IP binding with Cookies cant be enough ?
#25 opened by threatdecoder - 1
Question RE: Tracking and Identity Providers
#24 opened by whitehatguy - 2
- 3
Diagram mismatch
#16 opened by alextok - 0
Origin trial updates
#17 opened by kmonsen - 2
key_registration_header.svg is hard to read when the reader's browser is dark mode.
#15 opened by aawc