CredentialsContainer: create() method
The create()
method of the CredentialsContainer
interface returns a Promise
that resolves with a new credential instance based on the provided options, the information from which can then be stored and later used to authenticate users via navigator.credentials.get()
.
This is used by multiple different credential-related APIs with significantly different purposes:
- The Credential Management API uses
create()
to create basic federated credentials or username/password credentials. - The Web Authentication API uses
create()
to create public key credentials (based on asymmetric cryptography).
The below reference page starts with a syntax section that explains the general method call structure and parameters that apply to all the different APIs. After that, it is split into separate sections providing parameters, return values, and examples specific to each API.
Note: This method is restricted to top-level browsing contexts (i.e., a document running directly inside a browser tab, and not embedded inside another document). Calls to it from within an <iframe>
element will resolve without effect.
General syntax
js
create()
create(options)
Parameters
options
Optional-
An object that contains options for the requested new
Credentials
object. It can contain the following properties:- A credential type
-
An object defining the type of credential being requested — this can be one of one of:
federated
: An object containing requirements for creating a federated identify provider credential. Bear in mind that the Federated Credential Management API (FedCM) supersedes this credential type. See the Credential Management API section below for more details.password
: An object containing requirements for creating a password credential. See the Credential Management API section below for more details.publicKey
: An object containing requirements for creating a public key credential. Causes thecreate()
call to request that the user agent creates new credentials via an authenticator — either for registering a new account or for associating a new asymmetric key pair with an existing account. See the Web Authentication API section below for more details.
signal
Optional-
An
AbortSignal
object instance that allows an ongoingcreate()
operation to be aborted. An aborted operation may complete normally (generally if the abort was received after the operation finished) or reject with an "AbortError
"DOMException
.
Credential Management API
The Credential Management API lets a website store and retrieve password and federated credentials. These capabilities allow users to sign in without typing passwords, see the federated account they used to sign in to a site, and resume a session without the explicit sign-in flow of an expired session.
federated
object structure
federated
can contain the following properties:
iconURL
Optional-
A string representing the URL of an icon or avatar to be associated with the credential.
id
-
A string representing a unique ID for the credential.
name
Optional-
A string representing the credential username.
origin
-
A string representing the credential's origin.
FederatedCredential
objects are origin-bound, which means that they will only be usable on the specified origin they were intended to be used on. protocol
Optional-
A string representing the protocol of the credentials' federated identity provider (for example,
"openidconnect"
). provider
-
A string representing the credentials' federated identity provider (for example
"https://www.facebook.com"
or"https://accounts.google.com"
).
password
object structure
A password
object can be a reference to an object literal or an HTMLFormElement
. In both cases, they need to provide the following data:
iconURL
Optional-
A string representing the URL of an icon or avatar to be associated with the credential.
id
-
A string representing a unique ID for the credential.
name
Optional-
A string representing the credential username.
origin
-
A string representing the credential's origin.
PasswordCredential
objects are origin-bound, which means that they will only be usable on the specified origin they were intended to be used on. password
-
A string representing the credential password.
In the case of the string literal, the properties are provided as-is. In the case of the HTMLFormElement
, the values need to be provided in form input fields (this can include <input>
, <select>
, or <textarea>
elements) with the following name
attribute values:
id
:"username"
name
:"name"
or"nickname"
iconURL
:"photo"
password
:"new-password"
or"current-password"
The exception to this is origin
— this is set to the origin of the document the HTMLFormElement
is contained within.
Return value
A Promise
that resolves with a Credential
instance matching the provided parameters:
- If the created credential type was a
federated
object, the returned instance will be aFederatedCredential
. - If the created credential type was a
password
object, the returned instance will be aPasswordCredential
.
If a single credential cannot be successfully created, the Promise will resolve to null
.
Exceptions
TypeError
-
In the case of a
PasswordCredential
creation request,id
,origin
, orpassword
were not provided (empty).
Examples
js
navigator.credentials
.create({
id: "ergnjregoith5y9865jhokmfdskl;vmfdl;kfd...",
name: "fluffybunny",
origin: "example.com",
password: "fluffyhaxx0r",
})
.then((pwdCred) => {
console.log(pwdCred.name);
});
Web Authentication API
The Web Authentication API enables strong authentication with public key cryptography, enabling passwordless authentication and/or secure multi-authentication (MFA) without SMS texts. Check out the linked API landing page for more usage information.
Note: Usage of create()
with the publicKey
parameter may be blocked by a publickey-credentials-create
Permissions Policy set on your server.
publicKey
object structure
The publicKey
object can contain the following properties:
attestation
Optional-
A string specifying the relying party's preference for how the attestation statement (i.e., provision of verifiable evidence of the authenticity of the authenticator and its data) is conveyed during credential creation. The value can be one of the following:
"none"
: Specifies that the relying party is not interested in authenticator attestation. This might be to avoid additional user consent for round trips to the relying party server to relay identifying information, or round trips to an attestation certificate authority (CA), with the aim of making the authentication process smoother. If"none"
is chosen as theattestation
value, and the authenticator signals that it uses a CA to generate its attestation statement, the client app will replace it with a "None" attestation statement, indicating that no attestation statement is available."direct"
: Specifies that the relying party wants to receive the attestation statement as generated by the authenticator."enterprise"
: Specifies that the Relying Party wants to receive an attestation statement that may include uniquely identifying information. This is intended for controlled deployments within an enterprise where the organization wishes to tie registrations to specific authenticators."indirect"
: Specifies that the relying party wants to receive a verifiable attestation statement, but it will allow the client to decide how to receive it. For example, the client could choose to replace the authenticator's assertion statement with one generated by an Anonymization CA to protect user privacy.
If
attestation
is omitted, it will default to"none"
. attestationFormats
Optional-
An array of strings specifying the relying party's preference for the attestation statement format used by the authenticator. Values should be ordered from highest to lowest preference, and should be considered hints — the authenticator may choose to issue an attestation statement in a different format. For a list of valid formats, see WebAuthn Attestation Statement Format Identifiers.
If omitted,
attestationFormats
defaults to an empty array. authenticatorSelection
Optional-
An object whose properties are criteria used to filter out the potential authenticators for the credential creation operation. This object can contain the properties:
authenticatorAttachment
Optional: A string indicating which authenticator attachment type should be permitted for the chosen authenticator. Possible values are: Allowed values are:"platform"
: The authenticator is part of the device WebAuthn is running on (termed a platform authenticator), therefore WebAuthn will communicate with it using a transport available to that platform, such as a platform-specific API. A public key credential bound to a platform authenticator is called a platform credential."cross-platform"
: The authenticator is not a part of the device WebAuthn is running on (termed a roaming authenticator as it can roam between different devices), therefore WebAuthn will communicate with it using a cross-platform transport protocol such as Bluetooth or NFC. A public key credential bound to a roaming authenticator is called a roaming credential.
-
requireResidentKey
Optional : A boolean. If set totrue
, it indicates that a resident key is required (seeresidentKey
) This property is deprecated, but still available in some implementations for backwards compatibility with WebAuthn Level 1. The value should be set totrue
ifresidentKey
is set to"required"
. If omitted,requireResidentKey
defaults tofalse
. residentKey
Optional: A string that specifies the extent to which the relying party desires to create a client-side discoverable credential (i.e., one that is usable in authentication requests where the relying party does not provide credential IDs —navigator.credentials.get()
is called with an emptyallowCredentials
value). The alternative is a server-side credential, where the relying party must provide credential IDs in theget()
allowCredentials
value. Possible values are:"discouraged"
: The relying party prefers creation of a server-side credential, but will accept a client-side discoverable credential."preferred"
: The relying party strongly prefers creation of a client-side discoverable credential, but will accept a server-side credential. The user agent should guide the user through setting up user verification, if needed, to create a discoverable credential. This takes precedence over theuserVerification
setting."required"
: The relying party requires a client-side discoverable credential. If one cannot be created, an error is thrown.
residentKey
defaults to"required"
ifrequireResidentKey
istrue
, otherwise the default value is"discouraged"
.userVerification
Optional: A string that specifies the relying party's requirements for user verification for thecreate()
operation. Possible values are:"discouraged"
: The relying party prefers no user verification for thecreate()
operation, in the interests of minimizing disruption to the user experience."preferred"
: The relying party prefers user verification for thecreate()
operation, but it will not fail if user verification cannot be performed."required"
: The relying party requires user verification for thecreate()
operation — if user verification cannot be performed, an error is thrown.
userVerification
defaults to"preferred"
.
challenge
-
An
ArrayBuffer
,TypedArray
, orDataView
provided by the relying party's server and used as a cryptographic challenge. This value will be signed by the authenticator and the signature will be sent back as part ofAuthenticatorAttestationResponse.attestationObject
. excludeCredentials
Optional-
An
Array
of objects describing existing credentials that are already mapped to this user account (as identified byuser.id
). This is provided by the relying party, and checked by the user agent to avoid creating a new public key credential on an authenticator that already has a credential mapped to the specified user account. for an existing user who already has some. Each item should be of the form:id
: AnArrayBuffer
,TypedArray
, orDataView
representing the existing credential ID.transports
Optional: AnArray
of strings representing allowed transports. Possible transports are:"ble"
,"hybrid"
,"internal"
,"nfc"
, and"usb"
(seegetTransports()
for more details).type
: A string defining the type of public key credential to create. This can currently take a single value,"public-key"
, but more values may be added in the future.
If the
create()
call is attempting to create a duplicate public key credential on an authenticator, the user agent will guide to user to create the credential using a different authenticator, or fail if that is not possible.If
excludeCredentials
is omitted, it defaults to an empty array. extensions
Optional-
An object containing properties representing the input values for any requested extensions. These extensions are used to specific additional processing by the client or authenticator during the credential creation process. Examples include specifying whether a returned credential is discoverable, or whether the relying party will be able to store large blob data associated with a credential.
Extensions are optional and different browsers may recognize different extensions. Processing extensions is always optional for the client: if a browser does not recognize a given extension, it will just ignore it. For information on using extensions, and which ones are supported by which browsers, see Web Authentication extensions.
pubKeyCredParams
-
An
Array
of objects which specify the key types and signature algorithms the Relying Party supports, ordered from most preferred to least preferred. The client and authenticator will make a best-effort to create a credential of the most preferred type possible. These objects will contain the following properties:alg
: A number that is equal to a COSE Algorithm Identifier, representing the cryptographic algorithm to use for this credential type. It is recommended that relying parties that wish to support a wide range of authenticators should include at least the following values in the provided choices:-8
: Ed25519-7
: ES256-257
: RS256
type
: A string defining the type of public key credential to create. This can currently take a single value,"public-key"
, but more values may be added in the future.
If none of the listed credential types can be created, the
create()
operation fails. rp
-
An object describing the relying party that requested the credential creation. It can contain the following properties:
-
id
Optional: A string representing the ID of the relying party. A public key credential can only be used for authentication with the same relying party (as identified by thepublicKey.rpId
in anavigator.credentials.get()
call) it was registered with — the IDs need to match. Theid
cannot include a port or scheme like a standard origin, but the domain scheme must behttps
scheme. Theid
needs to equal the origin's effective domain, or a domain suffix thereof. So for example if the relying party's origin ishttps://login.example.com:1337
, the followingid
s are valid:login.example.com
example.com
m.login.example.com
com
id
defaults to the document origin — which would belogin.example.com
in the above example. name
: A string representing the name of the relying party (e.g."Facebook"
). This is the name the user will be presented with when creating or validating a WebAuthn operation.
-
timeout
Optional-
A numerical hint, in milliseconds, which indicates the time the calling web app is willing to wait for the creation operation to complete. This hint may be overridden by the browser.
user
-
An object describing the user account for which the credential is generated. It can contain the following properties:
displayName
: A string providing a human-friendly user display name (example:"John Doe"
), which will have been set by user during initial registration with the relying party.id
: AnArrayBuffer
,TypedArray
, orDataView
representing a unique ID for the user account. This value has a maximum length of 64 bytes, and is not intended to be displayed to the user.name
: A string providing a human-friendly identifier for the user's account, to help distinguish between different accounts with similardisplayName
s. This could be an email address (such as"john.doe@example.com"
), phone number (for example"+12345678901"
), or some other kind of user account identifier (for example"johndoe667"
).
Return value
A Promise
that resolves with an PublicKeyCredential
instance matching the provided parameters. If no credential object can be created, the promise resolves with null
.
Exceptions
SecurityError
DOMException
-
Usage was blocked by a
publickey-credentials-create
Permissions Policy.
Examples
The following snippet shows a typical create()
call with the WebAuthn publicKey
option:
js
const publicKey = {
challenge: new Uint8Array([117, 61, 252, 231, 191, 241, ...]),
rp: { id: "acme.com", name: "ACME Corporation" },
user: {
id: new Uint8Array([79, 252, 83, 72, 214, 7, 89, 26]),
name: "jamiedoe",
displayName: "Jamie Doe"
},
pubKeyCredParams: [ {type: "public-key", alg: -7} ]
}
navigator.credentials.create({ publicKey })
A successful create()
call returns a promise that resolves with a PublicKeyCredential
object instance, representing a public key credential that can later be used to authenticate a user via a WebAuthn get()
call. Its PublicKeyCredential.response
property contains an AuthenticatorAttestationResponse
object providing access to several useful pieces of information including the authenticator data, public key, transport mechanisms, and more.
js
navigator.credentials.create({ publicKey }).then((publicKeyCredential) => {
const response = publicKeyCredential.response;
// Access attestationObject ArrayBuffer
const attestationObj = response.attestationObject;
// Access client JSON
const clientJSON = response.clientDataJSON;
// Return authenticator data ArrayBuffer
const authenticatorData = response.getAuthenticatorData();
// Return public key ArrayBuffer
const pk = response.getPublicKey();
// Return public key algorithm identifier
const pkAlgo = response.getPublicKeyAlgorithm();
// Return permissable transports array
const transports = response.getTransports();
});
Some of this data will need to be stored on the server for future authentication operations against this credential — for example the public key, the algorithm used, and the permissable transports.
Note: See Creating a key pair and registering a user for more information about how the overall flow works.
Specifications
Specification |
---|
Credential Management Level 1 # dom-credentialscontainer-create |
Browser compatibility
BCD tables only load in the browser