Federated Credential Management API (FedCM)
Experimental: This is an experimental technology
Check the Browser compatibility table carefully before using this in production.
The Federated Credential Management API (or FedCM API) provides a standard mechanism for identity providers to enable identity federation services in a privacy-preserving way without relying on third-party cookies and redirects, and a JavaScript API for sites that depend on those services for sign-in functionality to make use of them.
FedCM concepts
Identity federation is the delegation of user authentication from a website that requires user sign-in such as an e-commerce or social networking site (also known as a relying party or RP) to a trusted third party identity provider (IdP). Users will sign up an account with the IdP, which can then be used to sign-in to one or more RPs. Identity federation via a small set of dedicated identity providers has improved web authentication in terms of security, consumer confidence, and user experience, versus having every site handling their own sign-in needs with a separate username and password.
The problem is that traditional identity federation relies on <iframe>
s, redirects, and third-party cookies, which are also used for third-party tracking. Browsers are limiting the usage of these features in an effort to preserve user privacy, but a side effect is that this makes valid, non-tracking uses more difficult to implement, and this includes identity federation.
Affected identity federation use cases that rely on third-party cookies:
- OIDC front-channel logout: This flow requires the IDP to embed several RP
<iframe>
s, which rely on RP cookies. - Social Widgets: In order to provide social widgets, the IdP third-party cookie must be provided from the RP top-level origin.
- Personalized buttons: The display of personalized sign in information on a
<button>
in the RP origin is implemented as an IdP<iframe>
that requires third party cookies. - Session Refresh without top-level navigation or popups.
FedCM aims to work around this problem, providing a dedicated mechanism for federated identity flows on the web, and enabling supporting browsers to provide special UI elements on RPs, allowing users to choose an IdP account to use for sign-in.
There are two sides to using the FedCM API — IdP integration with FedCM, and RP sign-in using the JavaScript API.
IdP integration with FedCM
To integrate with FedCM, an identity provider needs to do the following:
- Provide a well-known file to identify the IdP.
- Provide a config file and endpoints for accounts list and assertion issuance (and optionally, client metadata).
Provide a well-known file
There is a potential privacy issue whereby an IdP is able to discern whether a user visited an RP without explicit consent. This has tracking implications, so an IdP is required to provide a well-known file to verify its identity and mitigate this issue.
The well-known file must be served from the eTLD+1 of the IdP at /.well-known/web-identity
.
For example, if the IdP endpoints are served under https://accounts.idp.example/
, they must serve a well-known file at https://idp.example/.well-known/web-identity
. The well-known file's content should have the following JSON structure:
json
{
"provider_urls": ["https://accounts.idp.example/config.json"]
}
The provider_urls
member should contain an array of URLs pointing to valid IdP config files that can be used by RPs to interact with the IdP. The array length is current limited to one.
Provide a config file
The IdP config file provides a list of the endpoints required by the browser to process the identity federation flow and sign the user in. IdPs will host this config file and the required endpoints.
The config file (hosted at https://accounts.idp.example/config.json
in our example) should have the following JSON structure:
json
{
"accounts_endpoint": "/accounts.php",
"client_metadata_endpoint": "/client_metadata.php",
"id_assertion_endpoint": "/assertion.php",
"branding": {
"background_color": "green",
"color": "0xFFEEAA",
"icons": [
{
"url": "https://idp.example/icon.ico",
"size": 25
}
]
}
}
The properties are as follows:
accounts_endpoint
-
The URL for the accounts list endpoint, which returns a list of accounts that the user is currently signed in to on the IdP. The browser uses these to create a list of sign-in choices to show to the user in the sign-in UI.
client_metadata_endpoint
Optional-
The URL for the client metadata endpoint, which provides URLs pointing to the RP's metadata and terms of service pages, to be used in the browser-supplied sign-in UI.
id_assertion_endpoint
-
The URL for the ID assertion endpoint, which when sent valid user credentials should respond with a validation token that the RP can use to validate the authentication.
branding
Optional-
Contains branding information that will be used in the browser-supplied sign-in UI to customize its appearance as desired by the IdP.
The accounts list endpoint
This endpoint returns a list of all the IdP accounts that the user is currently signed in with, with a JSON structure that matches the following:
json
{
"accounts": [{
"id": "1234",
"given_name": "John",
"name": "John Doe",
"email": "john_doe@idp.example",
"picture": "https://idp.example/profile/123",
"approved_clients": ["123", "456", "789"],
}, {
"id": "5678",
"given_name": "Johnny",
"name": "Johnny",
"email": "johnny@idp.example",
"picture": "https://idp.example/profile/456"
"approved_clients": ["abc", "def", "ghi"],
}]
}
This includes the following information:
id
-
The unique ID of the user.
name
-
The family name of the user.
email
-
The email address of the user.
given_name
Optional-
The given name of the user.
picture
Optional-
The URL of the user's avatar image.
approved_clients
Optional-
An array of RP clients that the user has registered with.
Note:: If the user is not signed in to any IdP accounts, the endpoint should respond with HTTP 401 (Unauthorized).
The client metadata endpoint
Provides URLs pointing to the RP's metadata and terms of service pages, to be used in the browser-supplied sign-in UI. This should follow the JSON structure seen below:
json
{
"privacy_policy_url": "https://rp.example/privacy_policy.html",
"terms_of_service_url": "https://rp.example/terms_of_service.html"
}
The ID assertion endpoint
When sent valid user credentials, this endpoint should respond with a validation token that the RP can use to validate the authentication:
json
{
"token": "***********"
}
RP sign-in using the JavaScript API
RPs can call navigator.credentials.get()
with an identity
option to make a request for users to sign in to the RP with the IdP, using the available IdP config and endpoints (as described above). A typical request would look like this:
js
async function signIn() {
const identityCredential = await navigator.credentials.get({
identity: {
providers: [
{
configURL: "https://accounts.idp.example/config.json",
clientId: "********",
nonce: "******",
},
],
},
});
}
The identity.providers
property takes an array of objects containing the path to an IdP config file, the RP's client identifier issued by the IdP, and an optional random nonce that ensures the response is issued for this specific request, preventing replay attacks.
The browser requests the IdP config file and carries out the sign-in flow detailed below. For more information on the kind of interaction a user might expect from the browser-supplied UI, see Sign in to the relying party with the identity provider.
FedCM sign-in flow
- The RP invokes
navigator.credentials.get()
to start off the sign-in flow. -
From the
configURL
provided in theget()
call, the browser requests two files:- The well-known file (
/.well-known/web-identity
), available from/.well-known/web-identity
at the eTLD+1 of theconfigURL
. - The config file (
/config.json
), available at theconfigURL
.
GET
requests, which don't have cookies and don't follow redirects. This effectively prevents the IdP from learning who made the request and which RP is attempting to connect. For example, the config file request would look like so:http
GET /config.json HTTP/1.1 Host: accounts.idp.example Accept: application/json Sec-Fetch-Dest: webidentity
Note: All requests sent from the browser via FedCM include a
Sec-Fetch-Dest: webidentity
header to prevent CSRF attacks. All IdP endpoints must confirm this header is included. - The well-known file (
- The IdP responds with the requested files. The config file URL is validated against the list of valid config URLs inside the well-known file.
-
The browser makes a request to the
accounts_endpoint
inside the config file for the list of accounts that the user is currently signed in to on the IdP. This is aGET
request with cookies, but without aclient_id
parameter or theOrigin
header. This effectively prevents the IdP from learning which RP the user is trying to sign in to. For example:http
GET /accounts.php HTTP/1.1 Host: accounts.idp.example Accept: application/json Cookie: 0x23223 Sec-Fetch-Dest: webidentity
- The IdP responds with the account information.
-
Optional If included in the config file, the browser makes a request to the
client_metadata_endpoint
for the location of the RP's terms of service and privacy policy pages. This is aGET
request sent with theclientId
passed into theget()
call included as a parameter, and without cookies. For example:http
GET /client_metadata.php?client_id=1234 HTTP/1.1 Host: accounts.idp.example Origin: https://rp.example/ Accept: application/json Sec-Fetch-Dest: webidentity
- Optional The IdP responds with the requested URLs.
- The browser uses the information obtained by the previous two requests to create the UI asking the user for permission to sign in to the RP using their federated IdP account.
-
If the user grants permission to do so, the browser sends some credentials to the
id_assertion_endpoint
and requests a validation token from the IdP. The credentials are sent in an HTTPPOST
request with cookies and a content type ofapplication/x-www-form-urlencoded
. It should look something like this:The payload should contain the following:http
POST /assertion.php HTTP/1.1 Host: accounts.idp.example Origin: https://rp.example/ Content-Type: application/x-www-form-urlencoded Cookie: 0x23223 Sec-Fetch-Dest: webidentity account_id=123&client_id=client1234&nonce=Ct60bD&disclosure_text_shown=true
client_id
-
The RP's client identifier.
account_id
-
The unique ID of the user to be signed in.
nonce
Optional-
The request nonce, provided by the RP.
disclosure_text_shown
-
A string of "true" or "false" indicating whether the disclosure text was shown or not. The disclosure text is the information shown to the user (which can include the terms of service and privacy policy links, if provided) if the user is signed in to the IdP but doesn't have an account specifically on the current RP (in which case they'd need to choose to "Continue as..." their IdP identity and then create a corresponding account on the RP).
- The IdP checks that the account ID sent by the RP matches the ID for the account that is already signed in, and that the
Origin
matches the origin of the RP, which will have been registered in advance with the IdP. If everything looks good, it responds with the validation token.
Note: The origin of the RP will be registered with the IdP in a completely separate process when the RP first integrates with the IdP. This process will be specific to each IdP.
When the flow is complete, the RP validates the validation token. If validation is successful, the get()
promise resolves with an IdentityCredential
object, which provides further RP functionality. Additionally, at this point the RP may register the user or let them sign in and start a new session.
Features available via IdentityCredential
The IdentityCredential
object obtained from a successful FedCM sign-in provides access to the token used to validate the sign-in (see IdentityCredential.token
).
Permissions Policy integration and IFrame support
The identity-credentials-get
Permissions-Policy can be used to control permission to use FedCM, more specifically usage of the navigator.credentials.get()
method.
Developers can explicitly grant permission for an <iframe>
to use FedCM via the allow
attribute:
html
<iframe src="3rd-party.example" allow="identity-credentials-get"></iframe>
The availability of FedCM within <iframe>
s enables a couple of use cases:
- Larger sites won't want a third-party sign-in script to gain control over the top-level frame; instead they will want to add that script and invoke FedCM from within an
<iframe>
. - Some
<iframes>
may themselves require federated sign-in.
Interfaces
IdentityCredential
-
Represents a user identity credential arising from a successful federated sign-in. A successful
navigator.credentials.get()
call that includes anidentity
option fulfills with anIdentityCredential
instance.
Extensions to other interfaces
CredentialsContainer.get()
, theidentity
option.-
identity
is an object containing details of federated identity providers (IdPs) that a relying party (RP) website can use to sign users in. Causes aget()
call to initiate a request for a user to sign in to a RP with an IdP.
Examples
Specifications
Specification |
---|
Federated Credential Management API # browser-api-identity-credential-interface |
Browser compatibility
BCD tables only load in the browser