feat(passkey): expose AAGUID in passkey API response and accept optional friendly name during registration#2426
Open
Diizzayy wants to merge 1 commit intosupabase:masterfrom
Open
Conversation
…ame during registration
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Summary
Motivation
AAGUID in responses: The AAGUID is already stored on the
WebAuthnCredentialmodel but was never surfaced to API consumers. Clients need this to display provider-specific context, for example, showing the Google, iCloud Passkey, or 1Password icon next to each passkey in a management UI. Without it, every passkey looks identical, making it harder for users to distinguish between credentials from different providers.friendly_nameat registration: Currently, clients that want a custom passkey name (e.g. "Google Password Manager (Mar 14, 2026, 2:30 PM)") must register the passkey first, then immediately make a second PATCH request to rename it. Since the AAGUID is available in theauthenticatorDatareturned by the browser's WebAuthn ceremony, clients can resolve the provider name before the verify call. Acceptingfriendly_nameduring registration eliminates that extra round-trip while remaining fully backward-compatible, omitting it preserves the existing AAGUID-based default name.p.s. @fadymak have a look and let me know your thoughts