On 3/25/26 6:38 p.m., Sam Goto wrote:

Thanks Alex and Mike for the review, some comments inline!

On Wed, Mar 25, 2026 at 8:31 AM Alex Russell <[email protected]> wrote:

LGTM1 per discussion in today's API OWNERs meeting.

Sweet, thanks you all, much appreciated, especially for the quick turnaround!

    From that conversation, wanted to capture a few points:

      * You're approved for the requested 6 releases, although it
        would be good if there were a check-in on how it's going
        after, say, 3 months

For sure. We'll report back as soon as we learn more.

      * We're OK with this pegged to 100% of applicable users because
        we know that population will be low across all impacted browsers

That matches our intuition too. It's hard to make predictions in this space, since it is moving so fast, but we do expect that it will take a while before the population becomes uncontrollably large.

      * We decided this doesn't need 3 LGTMs for the same reason (as
        outlined in the process
        
<https://www.chromium.org/blink/launching-features/#:~:text=Experimentation%20on%20higher%20percentages%20of%20Stable%20channel%20population%20(%3E%201%25)%20should%20be%20considered%20exceptional,%20and%20requires%203%20LGTMs%20from%20API%20owners.>)

    Best,

    Alex

    On Wednesday, March 25, 2026 at 5:59:41 AM UTC-7 Mike Taylor wrote:

        Hey Sam,

        On 3/23/26 5:35 p.m., 'Sam Goto' via blink-dev wrote:

        Contact emails

        [email protected]


        Explainer


        https://github.com/samuelgoto/agentic-federated-login
        <https://github.com/samuelgoto/agentic-federated-login>


        Specification

        Not yet


        Summary


        This is a proposal to experiment with a set of FedCM
        extensions to provide a structured tool to allow agentic
        browsers to log users in to websites safely using their
        federated accounts.


        Each individual proposal is independent from each other but
        are all necessary to enable agentic federated login:


        https://github.com/samuelgoto/agentic-federated-login
        <https://github.com/samuelgoto/agentic-federated-login>

        It's not super clear to me how many proposals are associated
        with this experiment after reading the explainer - I think
        it's "potentially_approved_sites" and
        https://github.com/fedidcg/idp-initiated, is that right?


That's correct. Specifically, as you said:

https://github.com/fedidcg/idp-initiated and
https://github.com/w3c-fedid/potentially-approved-sites

Note that these two were just recently accepted for incubation in the FedID CG, where we expect most of the discussion to happen, so no longer in my personal repo (as I originally posted this).
Cool - thanks for confirming.

        Or am I missing more?

I think it is worth reinforcing (as we noted in the explainer https://github.com/w3c-fedid/agentic-federated-login) that we still believe that the following will play a role:

https://github.com/fedidcg/login-element

We are not including this in this origin trial yet, because we want to see how well this https://github.com/w3c-fedid/potentially-approved-sites performs, but we think it might be necessary at some point (and a better end state).

If we get to it, we'll notify this thread.

        (The "The Proposal" section is where I think I'm missing
        something...)


        We could I2E each FedCM extension independently, but because
        they are needed all together (and abide to the same
        experimentation structure we describe below), we have bundled
        them here. Just let us know if that’s a preferred way to
        review them, and we'll break them apart.


        Blink component

        Blink>Identity>FedCM
        
<https://issues.chromium.org/issues?q=customfield1222907:%22Blink%3EIdentity%3EFedCM%22>


        Web Feature ID

        fedcm <https://webstatus.dev/features/fedcm>


        TAG review

        https://github.com/w3ctag/design-reviews/issues/1184
        <https://github.com/w3ctag/design-reviews/issues/1184>


        TAG review status

        Pending


        Goals for experimentation


        We are planning to run this experiment with the same
        properties we expect from origin trials:


         *

            We intend this to be a time-limited experiment of an
            extension of a Web Platform API (likely using the full
            extent of the 6 milestones that is given to origin trials)

         *

            We intend to reserve the right to make breaking API
            changes in the period of experimentation

         *

            We intend to experiment it with a small percentage of the
            user base

         *

            We intend to collect the data that we need to I2S if the
            experiment succeeds


        However, we are planning to deviate from the typical original
        trial in a couple of important ways.


        First, because these are extensions to FedCM that are
        primarily motivated to help agentic browsing, we would like
        to enable this origin trial to 100% of the users using
        agentic browsing, but to 0% of the users of regular browsing.
        This helps us isolate the experimentation of the APIs to
        agentic browsing, which is a significantly smaller and safer
        and controlled subset of users compared to non agentic
        browsing. We believe that, as we progress through this
        experiment, we’ll figure out how the APIs can be deployed to
        agentic browsing *and* to non-agentic browsing, and we
        believe that serving agentic browsers first is a prerequisite
        to addressing non-agentic browsing too (from a design of
        incentives perspective for IdPs).

        I don't know how big the population of agentic browsing is,
        but how should we think about burn-in here? I think you could
        squint at this and call it a launch?


We want to frame this as an experiment as much as we possibly can because we want to learn from deployment and reserve the right to make backwards incompatible changes.
Great - I'm glad to hear you're willing to change things and are setting the right expectations with partners around that.

There are few IdPs (and even fewer FedCM IdPs) compared to website authors, so we think it is a bit easier to set expectations regarding breaking changes and experimentation.

        Second, there are parts of the browser implementation that we
        still don’t know how to generalize and onboard an IdP in a
        self-servicing manner, namely, the account chooser UX and the
        machine learning models to detect federated login buttons on
        websites. Because of that, instead of using self-servicing
        origin trial tokens, we are planning to allow IdPs to submit
        a Google form to show their interest in participating in this
        experiment and manually onboard them (we’ll create a Google
        Form if this I2E gets LGTM-ed).

Just to report back on this thread, here it goes:

https://forms.gle/NLYucXSXFeeD1L4cA

        We believe that, as we make progress in this experiment,
        we’ll figure out how to onboard any IdP and website without
        any manual review, and we believe that the manual process is
        a step that is required for us to learn how to generalize.

        What happens after a submission is approved? Is a token then
        given to the IdP, or is an origin hard-coded somewhere else?


The latter, hardcoded.

We do believe, however, that by the end of this experiment, we will have figured out how to onboard IdPs in a self-service manner, but that's probably too soon to tell.
Cool - have fun, good luck, etc. :)


        Having said that, the goal of this experiment is to see if
        users are satisfied with the experiences that we can
        construct for the agentic browser, and if identity providers
        have the incentives / capacity to support that.


        Here are concrete goals with each specific API that we’ll be
        experimenting with:


        - The IdP-Iniated API: for developers, we'll be monitoring
        any implementation errors that might occur as users use
        agentic browsing across many websites. We think we covered
        most cases, but we still expect many unknown unknowns to show up.


        - The potentially_approved_sites: we'll be monitoring the
        rate of false positives and how users are going through them.
        False negatives are harder to quantify programatically, so we
        are planning to quantify them manually.


        Risks



        Interoperability and Compatibility

        No information provided


        Gecko: No signal


        WebKit: No signal


        Web developers: No signals


        Other signals:


        Ergonomics

        The proposals being evaluated move all of the work required
        to the identity provider and out of websites (since there are
        many orders of magnitude more of the latter compared to the
        former). For consumers, identity providers are typically well
        funded and sophisticated web developers, and so far we have
        not identified any ergonomic risk that concerns us.


        Activation

        We managed to find a way to pull all of the responsibility to
        the Identity Provider rather than to the websites, so we
        expect we'll be able to activate a large part of the web
        without having to redeploy it. It remains to be seen if/how
        IdPs are going to proactively support logging in with agentic
        browsers.


        Security

        We are aware of a false positive and false negative aspect of
        one of the proposals we have, but we think we have a
        mechanism that degrades gracefully when we detect these (we
        do not actually create an account and instead we stop the
        agent and let the user take over). We are going to be
        monitoring the experiment to understand the extent that these
        are happening and if users can go through the fallback.


        WebView application risks

        Does this intent deprecate or change behavior of existing
        APIs, such that it has potentially high risk for Android
        WebView-based applications?

        No information provided



        Ongoing technical constraints

        None


        Debuggability

        No information provided


        Will this feature be supported on all six Blink platforms
        (Windows, Mac, Linux, ChromeOS, Android, and Android WebView)?

        No. Just desktop (Windows, Mac, Linux and ChromeOS).


        Is this feature fully tested by web-platform-tests
        
<https://chromium.googlesource.com/chromium/src/+/main/docs/testing/web_platform_tests.md>?

        Yes,
        
https://source.chromium.org/chromium/chromium/src/+/main:third_party/blink/web_tests/external/wpt/fedcm/fedcm-navigation-interception/continue-on-redirect-POST.https.html
        
<https://source.chromium.org/chromium/chromium/src/+/main:third_party/blink/web_tests/external/wpt/fedcm/fedcm-navigation-interception/continue-on-redirect-POST.https.html>


        We’ll add more as we go along.



        Flag name on about://flags

        No information provided


        Finch feature name

        FedCmEmbedderInitiatedLogin


        Non-finch justification

        No information provided


        Requires code in //chrome?

        True


        Estimated milestones

        Origin trial desktop first

                

        148

        Origin trial desktop last

                

        154

        DevTrial on desktop

                

        148



        Link to entry on the Chrome Platform Status

        https://chromestatus.com/feature/5141084139290624?gate=6018425698779136
        
<https://chromestatus.com/feature/5141084139290624?gate=6018425698779136>


        This intent message was generated by Chrome Platform Status
        <https://chromestatus.com/>.
-- You received this message because you are subscribed to the
        Google Groups "blink-dev" group.
        To unsubscribe from this group and stop receiving emails from
        it, send an email to [email protected].
        To view this discussion visit
        
https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAMtUnc7FM0-e_zdX0S0US%3DhiG5e%2B51r%3DTfjR4%3DfW-TJbqrMS9A%40mail.gmail.com
        
<https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAMtUnc7FM0-e_zdX0S0US%3DhiG5e%2B51r%3DTfjR4%3DfW-TJbqrMS9A%40mail.gmail.com?utm_medium=email&utm_source=footer>.


--
You received this message because you are subscribed to the Google Groups 
"blink-dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To view this discussion visit 
https://groups.google.com/a/chromium.org/d/msgid/blink-dev/074a77f4-f437-43fc-a2f3-76dc16915f43%40chromium.org.

Reply via email to