For relying parties that previously enrolled security keys via the U2F enrollment protocol, keys are bound to an application identifier, rather than the relying party id to which WebAuthn enrollments are bound. Since WebAuthn is meant to be backwards compatible with enrollments via U2F, the authentication extension appid can be provided during authentication [1]. Similarly, to prevent reregistration of the same credential when doing a WebAuthn enrollment, an extension [appidExclude] was added to the WebAuthn specification to first check if a key was enrolled via U2F before completing the WebAuthn enrollment [2][3] and report the key already registered if so. [1] https://bugs.webkit.org/show_bug.cgi?id=143491 [2] https://github.com/w3c/webauthn/pull/1244 [3] https://w3c.github.io/webauthn/#sctn-appid-exclude-extension
Will track this in an upcoming level 2 umbrella.
*** Bug 217050 has been marked as a duplicate of this bug. ***
<rdar://problem/96257224>