From chris.messina at gmail.com Sun Jul 5 11:31:19 2009 From: chris.messina at gmail.com (Chris Messina) Date: Sun, 5 Jul 2009 11:31:19 -0700 Subject: [OpenID board] 7 Lessons from Mozilla Message-ID: <1bc4603e0907051131x7c049e45w1180fc2dc8f1f7be@mail.gmail.com> --0016e642d57a7e644c046df998af Content-Type: text/plain; charset=windows-1252 Content-Transfer-Encoding: quoted-printable Thought this presentation was interesting, especially from a communications/marketing perspective =97 on making messages reusable and global: http://john.jubjubs.net/2009/01/27/lessons-from-mozilla-talk-at-heise/ Chris --=20 Chris Messina Open Web Advocate Personal site: http://factoryjoe.com Twitter: http://twitter.com/chrismessina Diso Project: http://diso-project.org OpenID Foundation: http://openid.net This email is: [X] bloggable [ ] ask first [ ] private --0016e642d57a7e644c046df998af Content-Type: text/html; charset=windows-1252 Content-Transfer-Encoding: quoted-printable
Dear sender,
This message serves as notification that you will not receive any more courtesy notices from our members for two days. Messages you have sent will remain in a lower priority queue for our member to review at their leisure.
Future messages will be more likely to be viewed if you are on our member's priority Guest List.
Thank you,
sajjad.a.soomro at gmail.com
About this Notice
This courtesy notice is part of a free service to make email more
reliable and useful. Boxbe (www.boxbe.com)
uses your existing social network and that of your friends to keep your
inbox clean and make sure you receive email from people who matter to you.
Say Goodbye to Email Overload
www.boxbe.com
We are happy to announce that the=A0Google OpenID Federated Login API= =A0has been extended to Google Apps accounts used by businesses, schools, a= nd other organizations. The service is important not only to the individual= s in those organizations, who can interact with a variety of consumer websi= tes with a single credential <add link to Google code post>, but also to the organizati= ons themselves, who are increasingly reliant on multiple Software as a Serv= ice (SaaS) solutions from different vendors.
Another early adopter is=A0XXX, a SaaS project management vendo=
r who uses the new service to make it easier for any organization using Goo=
gle Apps to sign up for and deploy=A0XXX=A0o their users:
=A0
Supporting the API for Google Apps accounts is exciting news for the=A0OpenID community, as it adds numerous=
new trustworthy Identity Provider (IDP) domains and increases the OpenID e=
nd user base by millions. In order to allow web-sites to easily become Rely=
ing Parties for these many new IDPs and users, we defined a new=A0=
discovery protocol. The protocol allows Relying Parties to identify tha=
t a given domain is hosted on Google Apps and securely access its OpenID Pr=
ovider End Point. The current proposal is an interim solution, and we are p=
articipating in several standardization organizations, such as=A0OASIS=A0=
and the=A0OpenID Foundation=
a>, to generate a next-generation standard. Since the current protocol prop=
osal is not supported by the standard OpenID libraries, we provided an impl=
ementation of the Relying Party pieces at the Open Source project -=A0step2.googlecode.com. Goo=
gle is also offering a set of resource addressing the issues of designing a=
scalable Federated Login User Interface. You are welcome to visit the=A0User Experience summary for Federated Login=A0Go=
ogle Sites page, where you can find links do demos, mocks and usabilty rese=
arch data.=A0
<Add UserV= oice (or other proposed RPX website) screenshots>
=A0
For nitty gritty details, see=A0http://sites.google.com/site/oauthgoog/fedlogi= ninterp/openiddiscovery
So it sounds like this was actually intended= to go to the board-private list, but since it is public I'm going to t= hrow in my two cents. =A0I talked with Eric about this briefly at the last = IIW in March, and I'm happy to see that some of my previous concerns ha= ve been addressed. =A0Without seeing the actual discovery protocol document= , I can't be sure what is being proposed, but based on previous convers= ations and what is mentioned in Eric's post here, I have a pretty good = idea.
The way I understand it, the idea is that a relying party would attempt nor= mal OpenID discover on the claimed identifier provided by the user. =A0If t= hat was successful, then OpenID authentication continues as normal... nothi= ng unusual here. =A0But if the relying party is unable to discover an OpenI= D provider through normal discovery means, they make an API call to Google = asking if Google hosts OpenID services for that domain. =A0(As best as I ca= n tell, the path of the claimed ID is ignored, and the domain must match ex= actly. =A0If Google hosts services for "example.com", then "https://example.com:8443/foo"= would match, but "www.example.com" would not. =A0I'm sure the expectation is t= hat users will simply enter "example.com")
Having spent two years at USC helping to build both the policy and technica= l side of their identity management infrastructure, I do have very strong r= eservations about Google's actual product. =A0But the more concerning m= atter is that the OpenID Foundation is being asked to endorse one specific = vendor as THE fallback for OpenID discovery. =A0Now in practice, I'm no= t sure that there is anyone else offering a service like Google has. =A0I k= now JanRain has OPX, but I would imagine it uses traditional OpenID discove= ry... I'm not sure.
I understand that the existing discovery methods are a bit lacking. =A0My p= rimary focus for the past four weeks or so has been getting XRD to a Commit= tee Draft which people can start implementing. =A0Google has been very acti= ve in that effort, and Eric mentioned that in his post. =A0But endorsing a = vendor-specific fallback in the meantime is absolutely not something the fo= undation should be doing. =A0While it is not set in stone that the next ver= sion of OpenID Discovery is going to use XRD, that seems to be the general = consensus. =A0Publicizing this Google-specific discovery method, only to tu= rn around in a couple of months and start promoting XRD, is going to create= a lot of confusion with implementors.
-will
On Jul 8, 2009, at 11:05 AM, Eric Sachs wrote:
Below are drafts of two blog posts we will make in the upcoming weeks about=API<http://code.google.com/apis/apps/sso/op= enid_reference_implementation.html>
the fact that we are now operating an OpenID IDP for the million+
schools/enterprise/ISPs that are outsourcing their email to Google Apps. = =A0We
would appreciate this not being circulated beyond the board until it is
public. =A0This new support required that we work with the community to def= ine
some extensions to the OpenID discovery process. =A0While those discussions=
have been going on in the community the last few months, those extensions are not yet formalized and probably won't be until they are proven in production environments. =A0There is the potential for some community membe= rs
(or press) to assume (or at least imply in articles) some evil intent by
Google to co-opt OpenID with these extensions. =A0It would be nice to have = a
blog post on the formal OpenID blog that was supportive of our approach, so=
I wanted to see if the board members are comfortable with that.
On a somewhat related point, I also expect this will further increase the pressure on us as a community to find more scalable UI options since the
Nascar style approach obviously cannot include buttons for these million ne= w
IDPs. =A0We have also just posted a set of summary UI guidelines that we wi= ll
be referencing from our API documentation at
http://sites.google.com/site/oauthgoog/UXFedLogin/summary.= =A0The goal was to
keep it to one-page which forced us to cut additional background
information, but if you think we cut something critical, let me know.
Enterprise blog: Google Apps + OpenID =3D identity hub for all your SaaS
We are happy to announce that the Google OpenID Federated Login
has
been extended to Google Apps accounts used by businesses, schools, and othe= r
organizations. The service is important not only to the individuals in thos= e
organizations, who can interact with a variety of consumer websites with a<= br> single credential <add link to Google code post>, but also to the
organizations themselves, who are increasingly reliant on multiple Software=
as a Service (SaaS) solutions from different vendors.
For these organizations, Google Apps can now become an identity and data hu= b
for multiple SaaS providers. When integrated with partner solutions such as=
XXX from XXX, the Google Open ID Federated Login API enables a single Googl= e
Apps login to provide secure access to services like Salesforce.com,
SuccessFactors, and WebEX, as well as B2B partners, internal applications,<= br> and of course consumer web sites. See XXX's post <add link> to le= arn more
about their implementation and view the demo and case study <add links&g= t;.
Another early adopter is XXX, a SaaS project management vendor who uses the=
new service to make it easier for any organization using Google Apps to sig= n
up for and deploy XXX o their users:
< INSERT SCREEN SHOTS>
Activating the OpenID Federated Login service for your domain is simple and=
secure. To achieve that, we introduced a new experimental discovery
protocol<http://gro= ups.google.com/group/google-federated-login-api/web/openid-discovery-for-ho= sted-domains>OpenID<http://openid.net/specs/openid-authentication-2_0.html<= /a>>
addressing
some of the challenges with the current version (2.0) of
:
=A0- Reducing the hassle of hosting discovery documents on the domain=API<http://code.google.com/apis/apps/sso/op= enid_reference_implementation.html>
=A0web-site - the discovery protocol offer a solution that allows a hosted=
=A0domain to become an OpenID Provider without hosting any documents at al= l.
=A0Optionally, a domain may choose to host one simple file to support a mo= re
=A0complete discovery flow.
=A0- Being an OpenID Identity Provider requires strong security protection=
=A0again attacks that could modify web pages on the site. To avoid that
=A0requirement for businesses and organizations, we introduced digital
=A0signatures on the discovery documents and a verification flow to suppor= t
=A0that.
You can find more details in our
and Discovery<http:= //groups.google.com/group/google-federated-login-api/web/openid-discovery-f= or-hosted-domains>
documentation,Group<http= ://groups.google.com/group/google-federated-login-api/web/oauth-support-in-= googles-federated-login-api>,
or join the discussions in the Google Federated Login APIusers<http://code.google.com/apis/ap= ps/sso/openid_reference_implementation.html#cpanel>.
where you can ask any question and get answers from with other Identity
Providers, Relying Parties and Google engineers.
*The OpenID Federated Login Service is available for all Google Apps
editions. However, it is disabled by default for the Premier and Education<= br> and editions =A0, and it requires the Domain Admin to manually enable it fr= om
the Control Panel. So Admins - go turn this today for yourAPI<http://code.google.com/apis/apps/sso/op= enid_reference_implementation.html>
At Google.com - we already enabled it for our employees... *
Google Code blog: Over a million new OpenID Identity Providers !We are happ= y
to announce that the Google OpenID Federated Logincommunity <http://w= ww.openid.net/>, as it adds numerous new trustworthy
has been extended to Google Apps accounts used by businesses, schools, and<= br> other organizations. =A0Individuals in these organizations can now sign in = to
3rd party websites using their Google Apps account, without giving away
their credentials. In addition to the value for the end-users, the new
service also benefits the organizations themselves, who are increasingly
reliant on multiple Software as a Service (SaaS) solutions from different vendors. For example, XXX is an early adopter, allowing any organization
running Google Apps to more quickly sign up for and adopt their service:
<< INSERT SCREEN SHOTS>
See our post on the Google Enterprise Blog <add link> to learn more a= bout
the opportunities for the organizations.
Supporting the API for Google Apps accounts is exciting news for the OpenID=protocol<http://gro= ups.google.com/group/google-federated-login-api/web/openid-discovery-for-ho= sted-domains>.
Identity Provider (IDP) domains and increases the OpenID end user base by millions. In order to allow web-sites to easily become Relying Parties for<= br> these many new IDPs and users, we defined a new discovery
The protocol allows Relying Parties to identify that a given domain is
hosted on Google Apps and securely access its OpenID Provider End Point. Th= e
current proposal is an interim solution, and we are participating in severa= lstandardization organizations, such as OASIS <http://www.oasis-open.org/> and
= div> the OpenID Foundation <http://openid.net/foundation/>, to generate astep2.googl= ecode.com<http://code.google.com/p/step2/>.
next-generation standard. Since the current protocol proposal is not
supported by the standard OpenID libraries, we provided an implementation o= f
the Relying Party pieces at the Open Source project -
Login<http://sites.google.com/site/oauthgoog/UXFedLogin/sum= mary>
Google is also offering a set of resource addressing the issues of designin= g
a scalable Federated Login User Interface. You are welcome to visit the Use= r
Experience summary for FederatedJanRain<http://www= .janrain.com/>,
Sites page, where you can find links do demos, mocks and usabilty research<= br> data.
Prefer an out-of-the-box solution? We have been working with
a provider of OpenID solutions, which already support the new API as part o= ftheir RPX product <http= ://rpxnow.com/>. As demonstrated byusing JanRain's RPX <http://rpxnow.com/>, a user simply types in her Google
UserVoice<http://uservoice.com/session/new>API<http://code.google.com/apis/apps/sso/op= enid_reference_implementation.html>
Apps hosted domain name in the OpenID login box and everything else is bein= g
taken care of:
<Add UserVoice (or other proposed RPX website) screenshots>
You can find more details in our
and Discovery<http:= //groups.google.com/group/google-federated-login-api/web/openid-discovery-f= or-hosted-domains>
documentation,Group<http= ://groups.google.com/group/google-federated-login-api/web/oauth-support-in-= googles-federated-login-api>,
or join the discussions in the Google Federated Login APIusers<http://code.google.com/apis/ap= ps/sso/openid_reference_implementation.html#cpanel>.
where you can ask any question and get answers from with other Identity
Providers, Relying Parties and Google engineers.
*The OpenID Federated Login Service is available for all Google Apps
editions. However, it is disabled by default for the Premier =A0and Educati= on
editions, and it requires the Domain Admin to manually enable it from the Control Panel. So Admins - go turn this today for your
At Google.com - we already enabled it for our employees... *
_______________________________________________
board mailing list
board at openid.net<= br> http= ://openid.net/mailman/listinfo/board
_______________________________________________
board mailing list
board at openid.net<= br> http= ://openid.net/mailman/listinfo/board
On Jul 9, 2009, at 1:16 PM, Eric Sachs wrote:
So it sounds like this was actually intended to go to the board-private
list, but since it is public I'm going to throw in my two cents.
Feel free to discuss it on the main mailing list. =A0The discovery discussi= ons
are not meant to be private.
I recently posted a pointer in such a thread that says
For nitty gritty details, see
http://sites.google.com/site/oauthgoog/fedloginint= erp/openiddiscovery
okay, that is helpful. =A0The only thing linked to in your post was a docum= ent on a google group that I couldn't access. =A0This looks very famili= ar, because we talked about this in depth on various XRI TC calls.The document you mention all but actually recommends that approach:
But if the relying party is unable to discover an OpenID provider through normal discovery means, they make an API call to Google asking if Google
hosts OpenID services for that domain
The doc above has more details, including defining a way for a domain who outsources their IDP (or RP in the case of someone like Janrain) to publish=
a single simple file pointing to that SaaS provider. =A0An RP could also
choose to pole the SaaS providers directly, but that is a policy/UI decisio= n
for them, and by definition that type of one-off doesn't seem like it c= ould,
or needs to be, standardized.
There are two locations where the host-meta document might be found:
(1) http://examp= le.com/host-meta
(2) https://www.google.com/accounts/o8/host-meta?hd=3Dexam= ple.com
Google's endpoint will return a 400 on endpoint (2) if the domain provi= ded has not outsourced OpenID IdP funcionality to Google. So one possible s= trategy for an RP could be to first try endpoint (2), and if that returns a= 400, try endpoint (1), and if that doesn't yield anything, give up. Ot= her strategies (fetching both endpoints in parallel, for example), are poss= ible.
The idea of trying endpoint #2 first, and then failing back to #1 should NE= VER be proposed or encouraged. =A0Quite the opposite, it should be strongly= discouraged. =A0It's language like this that make this feel like a ven= dor-specific approach that the OpenID Foundation should have nothing to do = with. =A0RPs should be instructed to ALWAYS attempt #1 first, otherwise the= domain owner is no longer in control.The other thing that concerns me is how close we are to having a committee = draft of XRD. =A0Admittedly, no we're not there yet. =A0And part of tha= t delay has been because we're making sure that we have a solution that= all involved parties can live with, including Google. =A0But I get a bit f= rustrated when Google claims to be supporting the new standard (and I'l= l be the first to say how valuable their input has been), but appears to be= putting all their resources behind an incompatible approach to the same pr= oblem... one that I'm afraid will only lead to great confusion[0] if it= gets any kind of widespread adoption. =A0If Google wants to throw it out t= here as a possible stop-gap solution their customers can use until the next= version of OpenID Discovery is written, that is fine. =A0But I just don= 9;t believe it's the kind of approach the foundation should be endorsin= g when we're so close with XRD.
But the more concerning matter is that the OpenID Foundation is being
asked to endorse one specific vendor as THE fallback for OpenID discovery.<= br>
Sorry if it sounded like that is what we I was suggesting. =A0I was suggest= ing
the OIDF could be supportive of the "approach" we are taking of w= orking with
the community these last 6-9 months to establish standards for these types<= br> of use cases. =A0Even our documentation specifies that the current
implementation is just a proof-of-concept for how to do discovery when a
SaaS provider is involved, and describes a method that does NOT require &qu= ot;one
specific vendor as the fallback for OpenID discovery" though I agree s= ome
RPs may choose to do one-off polling of a few SaaS providers.
-will
_______________________________________________
board mailing list
board at openid.net<= br> http= ://openid.net/mailman/listinfo/board
Below are drafts of two blog posts we = will make in the upcoming weeks about the fact that we are now operating an= OpenID IDP for the million+ schools/enterprise/ISPs that are outsourcing t= heir email to Google Apps. =A0We would appreciate this not being circulated= beyond the board until it is public. =A0This new support required that we = work with the community to define some extensions to the OpenID discovery p= rocess. =A0While those discussions have been going on in the community the = last few months, those extensions are not yet formalized and probably won= 39;t be until they are proven in production environments. =A0There is the p= otential for some community members (or press) to assume (or at least imply= in articles) some evil intent by Google to co-opt OpenID with these extens= ions. =A0It would be nice to have a blog post on the formal OpenID blog tha= t was supportive of our approach, so I wanted to see if the board members a= re comfortable with that.On a somewhat related point, I also expect this will fu= rther increase the pressure on us as a community to find more scalable UI o= ptions since the Nascar style approach obviously cannot include buttons for= these million new IDPs. =A0We have also just posted a set of summary UI gu= idelines that we will be referencing from our API documentation at=A0http://sites.google.com/site/oauthgoog/UXFedLogin/summary. =A0Th= e goal was to keep it to one-page which forced us to cut additional backgro= und information, but if you think we cut something critical, let me know.= div>Enterprise blog: Google Apps= + OpenID =3D identity hub for all your SaaS
We are happy to announce that the=A0Google OpenID Federated Login API= =A0has been extended to Google Apps accounts used by businesses, schools, a= nd other organizations. The service is important not only to the individual= s in those organizations, who can interact with a variety of consumer websi= tes with a single credential <add link to Google code post>, but also to the organizati= ons themselves, who are increasingly reliant on multiple Software as a Serv= ice (SaaS) solutions from different vendors.
For these organizations, Google Apps can now become an identity= and data hub for multiple SaaS providers. When integrated with partner sol= utions such as XXX from=A0XXX, the Google Open ID Federated Login API enabl= es a single Google Apps login to provide secure access to services like Sal= esforce.com, SuccessFactors, and WebEX, as well as B2B partners, internal a= pplications, and of course consumer web sites. See=A0XXX's post <
add link> to learn= more about their implementation and view the demo and case study <add links>.
Another early adopter is=A0XXX, a SaaS project management vendo= r who uses the new service to make it easier for any organization using Goo= gle Apps to sign up for and deploy=A0XXX=A0o their users:
<= div style=3D"margin-top:0px;margin-bottom:0px;text-align:center">< INSER= T SCREEN SHOTS>Activating the OpenID Federated Login service for your domain is simple and= secure. To achieve that, we introduced a new experimental=A0discove= ry protocol=A0addressing some of the challenges with the=A0current version (2.0) of OpenID= :=A0
- Reducing the hassle of hosting discovery documents on the domain web-site -= the discovery protocol offer a solution that allows a hosted domain to bec= ome an OpenID Provider without hosting any documents at all. Optionally, a = domain may choose to host one simple file to support a more complete discov= ery flow.
- Being an OpenID Identity Provider requires stro= ng security protection again attacks that could modify web pages on the sit= e. To avoid that requirement for businesses and organizations, we introduce= d digital signatures on the discovery documents and a verification flow to = support that.
You can find more details in our=A0API=A0and=A0Discovery=A0documentation, or join the discus= sions in the=A0Google Federated Login API Gro= up, where you can ask any question and get answers from with other Iden= tity Providers, Relying Parties and Google engineers.
The OpenID Federated Login Service is available for all Goog= le Apps editions. However, it is disabled by default for the Premier and Ed= ucation and editions =A0, and it requires the Domain Admin to manually enab= le it from the Control Panel. So Admins -=A0go turn this today for you= r users. At Google.com - we already enabled it for our employees...=A0<= /b>
Google Code blog: Over a million new O= penID Identity Providers !
We are happy to announce that the=A0Google Op= enID Federated Login API=A0 has been extended to Google Apps accounts u= sed by businesses, schools, and other organizations. =A0Individuals in thes= e organizations can now sign in to 3rd party websites using their Google Ap= ps account, without giving away their credentials. In addition to the value= for the end-users, the new service also benefits the organizations themsel= ves, who are increasingly reliant on multiple Software as a Service (SaaS) = solutions from different vendors. For example, XXX=A0is an= early adopter, allowing any organization running Google Apps to more quick= ly sign up for and adopt their service:
<< INSERT SCREEN SHOTS>
See our post on the Google Enterprise Blog <<= span style=3D"background-color:rgb(255, 255, 0)">add link> to lea= rn more about the opportunities for the organizations.=A0
Supporting the API for Google Apps accounts is exciting news for the=A0OpenID community, as it adds numerous= new trustworthy Identity Provider (IDP) domains and increases the OpenID e= nd user base by millions. In order to allow web-sites to easily become Rely= ing Parties for these many new IDPs and users, we defined a new=A0= discovery protocol. The protocol allows Relying Parties to identify tha= t a given domain is hosted on Google Apps and securely access its OpenID Pr= ovider End Point. The current proposal is an interim solution, and we are p= articipating in several standardization organizations, such as=A0OASIS=A0= and the=A0OpenID Foundation= a>, to generate a next-generation standard. Since the current protocol prop= osal is not supported by the standard OpenID libraries, we provided an impl= ementation of the Relying Party pieces at the Open Source project -=A0step2.googlecode.com. Goo= gle is also offering a set of resource addressing the issues of designing a= scalable Federated Login User Interface. You are welcome to visit the=A0User Experience summary for Federated Login=A0Go= ogle Sites page, where you can find links do demos, mocks and usabilty rese= arch data.=A0
Prefer an out= -of-the-box solution? We have been working with=A0JanRain, a provider of OpenID solutions, which already support the= new API as part of their=A0RPX product. A= s demonstrated by=A0UserVoice= =A0using=A0JanRain's RPX, a user simply types in her Google Apps = hosted domain name in the OpenID login box and everything else is being tak= en care of:
<Add UserV= oice (or other proposed RPX website) screenshots>
=A0
You can find more details in our=A0API=A0and=A0Discovery= =A0documentation, or join the discussions in the=A0Google Federated Login API Group, where you can ask any que= stion and get answers from with other Identity Providers, Relying Parties a= nd Google engineers.=A0=A0
The OpenID Federated Login Service is available for all Google Apps = editions. However, it is disabled by default for the Premier =A0and Educati= on editions, and it requires the Domain Admin to manually enable it from th= e Control Panel. So Admins -=A0go turn this today for your users. = At Google.com - we already enabled it for our employees...=A0
I think you are not seeing the real issue here. This is not about Google. This is about a Company (it could have been anyone), who has a problem to solve. It so happens we are already working on a solution. It is just that<= br> we can't come up with a solution as fast as they would like it.
So why don't we at least give the Company credit for consulting with us= , and
why don't we try to come up with a good, usefull solution for them?
View this message in context: http://www.nabble.com/upcoming-Google-announcement-regarding-OpenI= D-tp24396556p24431020.html
Will Norris wrote:
>
>
> On Jul 9, 2009, at 8:44 PM, Santosh Rajan wrote:
>
>> Are you kidding? XRI TC hasnt even figured how to sign an XRD
>> document. XML
>> DSig has been around for 11 years and it cant reliably sign an XML=
>> document?
>> Why don't XRI TC come out with a simple XRD draft as soon as >> possible and
>> relieve everyone from all this pain. IS the XRI TC waiting for the=
>> cows to
>> come home?
>
>
> You're welcome to track the progress of XRD in the OASIS svn
> repository[0]. =A0There is only a docbook version there, we don't = have
> the HTML versions in subversion... unfortunately the OASIS document
> repository requires authentication.
>
> [0]: http://tools.oasis-open.org/version-control= /svn/xri/xrd/1.0/trunk/
>
> While this is not really the best place to talk about XRD specifics, > I'll address your point about signatures to say that XRD is in fac= t
> using XML DSig for signing. =A0More accurately, we're using a
> constrained profile of DSig using Exclusive Canonicalization that
> should be much easier to implement than full inclusive c14n. =A0This i= s
> the same approach taken in SAML 2.0.
>
> One of my personal qualms with Google's recommended discovery
> extension is that it significantly differs from XRD in this (they are<= br> > using their own signing method instead of traditional DSig) and other<= br> > ways , while being strikingly similar in others. =A0I believe this wil= l
> lead to unnecessary confusion. =A0To be clear, my opposition to a
> foundation endorsement of this is not based on the merits of the
> proposed protocol (aside from some specific language I've already<= br> > pointed out)... the XRI TC is the correct place to debate that.
> Rather, my opposition is based on my belief that widespread adoption > of the proposed protocol will confuse, and possibly fragment, the
> community if XRD does end up being the solution for OpenID discovery > in the not-too-distant future.
>
>
> On Jul 9, 2009, at 5:10 PM, Eric Sachs wrote:
>
>> We haven't formally announced it yet :-) =A0We keep delaying >> internally, but
>> at some point we'll have to launch it and I would be surprised= if we
>> can
>> hold off for longer then a few weeks given how many months we have=
>> already
>> delayed. =A0But when the drafts get finalized, we're hoping to= support
>> it
>> within a small number of days and remove documentation for the
>> proof-of-concept approach. =A0The partners we have already worked = with
>> have
>> read the warnings in our documentation that we will be switching t= he
>> discovery mechanism once the standards gets solidified, so they ar= e
>> prepared
>> to have to make that change on their side.
>
> This sounds great, it's good to know that you plan on migrating to= XRD
> in a timely fashion when it is ready. =A0I don't mean to discount = the
> contributions Google has made to the community both in helping to
> develop and implement these standards. =A0And if you need to go forwar= d
> with a temporary solution in the meantime in order to satisfy existing=
> customers, that's perfectly fine. =A0I understand that Google is f= ree to
> move forward with whatever is necessary for your business, I'm not=
> suggesting otherwise. =A0But if the work is being done with specific > partners, I'm not sure why that necessitates a public announcement=
> including endorsement from the foundation. =A0Is it not sufficient to<= br> > point implementors to the Google document on an individual basis,
> which is what I would assume you've been doing thus far? =A0You= 9;re
> absolutely right that a public announcement would likely lead at least=
> some in the community and the press to interpret this move as Google > trying to co-opt OpenID. =A0But I'm not sure that the foundation > publicly supporting the move is the right solution to that problem.
>
> I think my particular horse is pretty well dead enough already, so
> I'll shut up for now. =A0I've said my piece... it is of course= the
> board's decision to make.
>
> -will
> _______________________________________________
> board mailing list
> board at openid.net
> http://openid.net/mailman/listinfo/board
>
>
Sent from the OpenID - Foundation Board mailing list arch= ive at Nabble.com.
_______________________________________________
Yes, I now realiz= e I mistakenly posted this to the public instead or private board mailing l= ist :-) =A0Not a particularly big deal since we have been discussing this p= lanned launch in the discovery community.Feel free to respond on either the public or private mailing list. On Wed, Jul 8, 2009 at 11:= 05 AM, Eric Sachs <esachs at google.com> wrote:
Below are dr= afts of two blog posts we will make in the upcoming weeks about the fact th= at we are now operating an OpenID IDP for the million+ schools/enterprise/I= SPs that are outsourcing their email to Google Apps. =A0We would appreciate= this not being circulated beyond the board until it is public. =A0This new= support required that we work with the community to define some extensions= to the OpenID discovery process. =A0While those discussions have been goin= g on in the community the last few months, those extensions are not yet for= malized and probably won't be until they are proven in production envir= onments. =A0There is the potential for some community members (or press) to= assume (or at least imply in articles) some evil intent by Google to co-op= t OpenID with these extensions. =A0It would be nice to have a blog post on = the formal OpenID blog that was supportive of our approach, so I wanted to = see if the board members are comfortable with that.On a somewhat related point, I also expect this will fu= rther increase the pressure on us as a community to find more scalable UI o= ptions since the Nascar style approach obviously cannot include buttons for= these million new IDPs. =A0We have also just posted a set of summary UI gu= idelines that we will be referencing from our API documentation at=A0http://sites.google.com/site/oauthgoog/UXFedLogin/summary. =A0Th= e goal was to keep it to one-page which forced us to cut additional backgro= und information, but if you think we cut something critical, let me know.= div>Enterprise blog: Goo= gle Apps + OpenID =3D identity hub for all your SaaS
We are happy to announce that the=A0Google OpenID F= ederated Login API=A0has been extended to Google Apps accounts used by = businesses, schools, and other organizations. The service is important not = only to the individuals in those organizations, who can interact with a var= iety of consumer websites with a single credential <add link to Google code post>, bu= t also to the organizations themselves, who are increasingly reliant on mul= tiple Software as a Service (SaaS) solutions from different vendors.
For these organizations, Google Apps can = now become an identity and data hub for multiple SaaS providers. When integ= rated with partner solutions such as XXX from=A0XXX, the Google Open ID Fed= erated Login API enables a single Google Apps login to provide secure acces= s to services like Salesforce.com, SuccessFactors, and WebEX, as well as B2= B partners, internal applications, and of course consumer web sites. See=A0= XXX's post <add = link> to learn more about their implementation and view the demo = and case study <add = links>.
Another early adopter is=A0XXX, a SaaS pr= oject management vendor who uses the new service to make it easier for any = organization using Google Apps to sign up for and deploy=A0XXX=A0o their us= ers:
< INSERT SCREEN SHOTS>Activating the OpenID Federated Login service for your domain is simple and= secure. To achieve that, we introduced a new experimental=A0discove= ry protocol=A0addressing some of the challenges with the=A0current version (2.0) of OpenID= :=A0
Reducing the hassle of hosting discovery documents on the domain web-site -= the discovery protocol offer a solution that allows a hosted domain to bec= ome an OpenID Provider without hosting any documents at all. Optionally, a = domain may choose to host one simple file to support a more complete discov= ery flow.
- Being an OpenID Identity Provider requi= res strong security protection again attacks that could modify web pages on= the site. To avoid that requirement for businesses and organizations, we i= ntroduced digital signatures on the discovery documents and a verification = flow to support that.
You can find more details in our=A0API=A0and=A0Discovery=A0documentation, or join the discus= sions in the=A0Google Federated Login API Gro= up, where you can ask any question and get answers from with other Iden= tity Providers, Relying Parties and Google engineers.
The OpenID Federated Login Service is = available for all Google Apps editions. However, it is disabled by default = for the Premier and Education and editions =A0, and it requires the Domain = Admin to manually enable it from the Control Panel. So Admins -=A0go = turn this today for your users. At Google.com - we already enabled it f= or our employees...=A0
Google Code blog: Over a million new= OpenID Identity Providers !
We are happy to announce that the=A0Google O= penID Federated Login API=A0 has been extended to Google Apps accounts = used by businesses, schools, and other organizations. =A0Individuals in the= se organizations can now sign in to 3rd party websites using their Google A= pps account, without giving away their credentials. In addition to the valu= e for the end-users, the new service also benefits the organizations themse= lves, who are increasingly reliant on multiple Software as a Service (SaaS)= solutions from different vendors. For example, XXX=A0is a= n early adopter, allowing any organization running Google Apps to more quic= kly sign up for and adopt their service:
<< INSERT SCREEN SHOTS>
See our post on the Google Enterprise = Blog <add link> to learn more about the opportunities for the organizations.=A0
Supporting the API for Google Apps accounts is exciting news for the=A0OpenID community, as it adds numero= us new trustworthy Identity Provider (IDP) domains and increases the OpenID= end user base by millions. In order to allow web-sites to easily become Re= lying Parties for these many new IDPs and users, we defined a new=A0= discovery protocol. The protocol allows Relying Parties to identify tha= t a given domain is hosted on Google Apps and securely access its OpenID Pr= ovider End Point. The current proposal is an interim solution, and we are p= articipating in several standardization organizations, such as=A0OASIS=A0= and the=A0OpenID Foundation= , to generate a next-generation standard. Since the current protocol pr= oposal is not supported by the standard OpenID libraries, we provided an im= plementation of the Relying Party pieces at the Open Source project -=A0step2.googlecode.com.= Google is also offering a set of resource addressing the issues of designi= ng a scalable Federated Login User Interface. You are welcome to visit the= =A0User Experience summary for Federated Login= a>=A0Google Sites page, where you can find links do demos, mocks and usabil= ty research data.=A0
Prefer an= out-of-the-box solution? We have been working with=A0JanRain, a provider of OpenID solutions, which already supp= ort the new API as part of their=A0RPX produ= ct. As demonstrated by=A0Use= rVoice=A0using=A0JanRain's RPX, a user simply types in her Go= ogle Apps hosted domain name in the OpenID login box and everything else is= being taken care of:
<Add UserVoice (or other proposed RPX website) screenshots>= ;
=A0
You can find more details in our=A0API=A0and=A0Discovery=A0documentation, or join the discussions in the= =A0Google Federated Login API Group, wher= e you can ask any question and get answers from with other Identity Provide= rs, Relying Parties and Google engineers.=A0=A0
The OpenID Federated Login Service is available for all Google Apps = editions. However, it is disabled by default for the Premier =A0and Educati= on editions, and it requires the Domain Admin to manually enable it from th= e Control Panel. So Admins -=A0go turn this today for your users. = At Google.com - we already enabled it for our employees...=A0
Yes, I now realize I mi= stakenly posted this to the public instead or private board mailing list :-= ) =A0Not a particularly big deal since we have been discussing this planned= launch in the discovery community.Feel free to respond on either the public or private mailing list. On Wed, Jul 8, 2009 at 11:= 05 AM, Eric Sachs <esachs at google.com> wrote:
Below are drafts o= f two blog posts we will make in the upcoming weeks about the fact that we = are now operating an OpenID IDP for the million+ schools/enterprise/ISPs th= at are outsourcing their email to Google Apps. =A0We would appreciate this = not being circulated beyond the board until it is public. =A0This new suppo= rt required that we work with the community to define some extensions to th= e OpenID discovery process. =A0While those discussions have been going on i= n the community the last few months, those extensions are not yet formalize= d and probably won't be until they are proven in production environment= s. =A0There is the potential for some community members (or press) to assum= e (or at least imply in articles) some evil intent by Google to co-opt Open= ID with these extensions. =A0It would be nice to have a blog post on the fo= rmal OpenID blog that was supportive of our approach, so I wanted to see if= the board members are comfortable with that.On a somewhat related point, I also expect this will fu= rther increase the pressure on us as a community to find more scalable UI o= ptions since the Nascar style approach obviously cannot include buttons for= these million new IDPs. =A0We have also just posted a set of summary UI gu= idelines that we will be referencing from our API documentation at=A0http://sites.google.com/site/oauthgoog/UXFedLogin/summary. =A0Th= e goal was to keep it to one-page which forced us to cut additional backgro= und information, but if you think we cut something critical, let me know.= div>Enterprise blog: Google Apps= + OpenID =3D identity hub for all your SaaS
We are happy to announce that the=A0Google OpenID Fed= erated Login API=A0has been extended to Google Apps accounts used by bu= sinesses, schools, and other organizations. The service is important not on= ly to the individuals in those organizations, who can interact with a varie= ty of consumer websites with a single credential <add link to Google code post>, but al= so to the organizations themselves, who are increasingly reliant on multipl= e Software as a Service (SaaS) solutions from different vendors.
For these organizations, Google Apps can no= w become an identity and data hub for multiple SaaS providers. When integra= ted with partner solutions such as XXX from=A0XXX, the Google Open ID Feder= ated Login API enables a single Google Apps login to provide secure access = to services like Salesforce.com, SuccessFactors, and WebEX, as well as B2B = partners, internal applications, and of course consumer web sites. See=A0XX= X's post <add link= > to learn more about their implementation and view the demo and = case study <add links<= /span>>.
Another early adopter is=A0XXX, a SaaS proj= ect management vendor who uses the new service to make it easier for any or= ganization using Google Apps to sign up for and deploy=A0XXX=A0o their user= s:
<= div style=3D"margin-top:0px;margin-bottom:0px;text-align:center">< INSER= T SCREEN SHOTS>Activating the OpenID Federated Login service for your domain is simple and= secure. To achieve that, we introduced a new experimental=A0discove= ry protocol=A0addressing some of the challenges with the=A0current version (2.0) of OpenID= :=A0
- Reducing the hassle of hosting discovery documents on the domain web-site -= the discovery protocol offer a solution that allows a hosted domain to bec= ome an OpenID Provider without hosting any documents at all. Optionally, a = domain may choose to host one simple file to support a more complete discov= ery flow.
- Being an OpenID Identity Provider requires stro= ng security protection again attacks that could modify web pages on the sit= e. To avoid that requirement for businesses and organizations, we introduce= d digital signatures on the discovery documents and a verification flow to = support that.
You can find more details in our=A0API=A0and=A0Discovery=A0documentation, or join the discus= sions in the=A0Google Federated Login API Gro= up, where you can ask any question and get answers from with other Iden= tity Providers, Relying Parties and Google engineers.
The OpenID Federated Login Service is av= ailable for all Google Apps editions. However, it is disabled by default fo= r the Premier and Education and editions =A0, and it requires the Domain Ad= min to manually enable it from the Control Panel. So Admins -=A0go tur= n this today for your users. At Google.com - we already enabled it for = our employees...=A0
Google Code blog: Over a million new O= penID Identity Providers !
We are happy to announce that the=A0Google Op= enID Federated Login API=A0 has been extended to Google Apps accounts u= sed by businesses, schools, and other organizations. =A0Individuals in thes= e organizations can now sign in to 3rd party websites using their Google Ap= ps account, without giving away their credentials. In addition to the value= for the end-users, the new service also benefits the organizations themsel= ves, who are increasingly reliant on multiple Software as a Service (SaaS) = solutions from different vendors. For example, XXX=A0is an= early adopter, allowing any organization running Google Apps to more quick= ly sign up for and adopt their service:
<< INSERT SCREEN SHOTS>
See our post on the Google Enterprise Blog <<= span style=3D"background-color:rgb(255, 255, 0)">add link> to lea= rn more about the opportunities for the organizations.=A0
Supporting the API for Google Apps accounts is exciting news for the=A0OpenID community, as it adds numerous= new trustworthy Identity Provider (IDP) domains and increases the OpenID e= nd user base by millions. In order to allow web-sites to easily become Rely= ing Parties for these many new IDPs and users, we defined a new=A0= discovery protocol. The protocol allows Relying Parties to identify tha= t a given domain is hosted on Google Apps and securely access its OpenID Pr= ovider End Point. The current proposal is an interim solution, and we are p= articipating in several standardization organizations, such as=A0OASIS=A0= and the=A0OpenID Foundation= a>, to generate a next-generation standard. Since the current protocol prop= osal is not supported by the standard OpenID libraries, we provided an impl= ementation of the Relying Party pieces at the Open Source project -=A0step2.googlecode.com. Goo= gle is also offering a set of resource addressing the issues of designing a= scalable Federated Login User Interface. You are welcome to visit the=A0User Experience summary for Federated Login=A0Go= ogle Sites page, where you can find links do demos, mocks and usabilty rese= arch data.=A0
Prefer an out= -of-the-box solution? We have been working with=A0JanRain, a provider of OpenID solutions, which already support the= new API as part of their=A0RPX product. A= s demonstrated by=A0UserVoice= =A0using=A0JanRain's RPX, a user simply types in her Google Apps = hosted domain name in the OpenID login box and everything else is being tak= en care of:
<Add UserVoice (or other proposed RPX website) screenshots>
=A0
You can find more details in our=A0API=A0and=A0Discovery=A0documentation, or join the discussions in the= =A0Google Federated Login API Group, wher= e you can ask any question and get answers from with other Identity Provide= rs, Relying Parties and Google engineers.=A0=A0
The OpenID Federated Login Service is available for all Google Apps = editions. However, it is disabled by default for the Premier =A0and Educati= on editions, and it requires the Domain Admin to manually enable it from th= e Control Panel. So Admins -=A0go turn this today for your users. = At Google.com - we already enabled it for our employees...=A0
Forwarding these three posts from the General list. =A0Not because I agree = with all of the sentiments expressed, but because it shows how we as a boar= d and organization are clearly not being transparent enough in the activiti= es that are actually being taken on.
Two ideas I think that we should seriously consider are:
1) making use of a project management tool like Basecamp (http://www.basecamphq.com/) so = that at least the entire board and Don know the status of each project that= is underway
2) having Don write a monthly blog post about OpenID's achievements the= past month and what the Foundation has accomplished
Thoughts?
--David
Begin forwarded message:
From: Santosh Rajan <santrajan at gmail.com>
Date: July 28, 2009 11:11:03 PM PDT
To: general at openid.= net
Subject: Re: [OpenID] Google's proprietary discovery extension?
Hehe! Shade for once I am going to agree with you.
Why do we have a chairman? Isnt he supposed to be leading the flock and
showing the way?
And what about the rest of the board. This is the "coldest" board= I have
ever seen.
I think Eran Hammer should have been the chairman of the board! I wonder wh= y
he disappeared from here 2 yrs back. (I have seen some posts from him from<= br> 2007).
SitG Admin wrote:
There is no sign of the "STD mechanism" coming soon.
Perhaps it will arrive after Chris Messina's "Policy Expression
Extension" passes ;)
Apathy on the part of the OpenID Foundation.
Inaction, or so it may appear; timely, though?
Half the Identity folk have moved on to Kantara Initiative.
The Other half to the Open Web foundation.
XRI TC has tied itself in knots.
And the hilarious part is that there are folk involved in all these three foundations!
Sounds like good separation of duties to me. If the rest of us can
still interop (and work is still being done that *needs* to be done
before we can move forward), it doesn't really matter where most of
the various communities is doing that work.
No idea were the rest of us should bail out to!?
If the development of OpenID were to halt now, I think it would be
Federated implementations that found themselves hardest hit; small,
independent operators such as myself (working with libraries already
distributed "in the wild") might not even notice.
-Shade
_______________________________________________
general mailing list
general at openid.net<= /a>
ht= tp://openid.net/mailman/listinfo/general
-----
Santosh Rajan
http://santraja= n.blogspot.com http://santrajan.blogspot.com
--
View this message in context: http://www.nabble.com/Re%3A-Google%27s-proprietary-discovery-extensi= on--tp24414092p24713025.html
Sent from the OpenID - General mailing list archive at Nabble.com.
_______________________________________________
general mailing list
general at openid.net<= /a>
ht= tp://openid.net/mailman/listinfo/general
_______________________________________________
board mailing list
board at openid.net<= br> http= ://openid.net/mailman/listinfo/board
Allen I think you missed a major point here.
It is nice to know about Yahoo's work. Other coorporates have also done= a
lot of work, like Google, Facebook etc.
But what about the independent community members? Nothing!! Or atleast I
haven't seen any work coming from then.
I think in Open Communities the most important contributions must come from=
the independant members and not the coorporate members. Independent members=
are not "boxed in" by coorporate objectives.
Corporate members are focussed by their companies. Independent individuals<= br> need community leadership, otherwise they will end up running around like headless chicken. Which is more or less what is happenning now.
View this message in context: http= ://www.nabble.com/Perception-of-the-Foundation-%28Was%3A-Fwd%3A--OpenID--Go= ogle%27s-proprietary-discovery-extension-%29-tp24724040p24730408.html Sent from the OpenID - Foundation Board mailing list archive at Nabble.com.=
Allen Tom-2 wrote:
>
> Hi all,
>
> Yahoo is very heavily invested in OpenID and we have a bunch of
> engineers and designers currently working on enhancements to our OpenI= D
> service. =A0Earlier this year, we worked with the community to write t= he
> OpenID UI and OAuth/Hybrid Extensions, and the Yahoo OP will be
> implementing both of these extensions in the very near future.
>
> In addition to protocol enhancements, we have a crack team of UI/Produ= ct
> designers and researchers who are actively experimenting with ways to<= br> > improve the overall usability of our OpenID service. We'll be depl= oying
> many significant upgrades to the Yahoo OpenID Provider's user inte= rface
> later this year. The new OpenID UI, along with support for the UI and<= br> > Hybrid Extensions, and our soon to be released support for Open Social= 's
> REST based APIs (including Portable Contacts) will be a huge upgrade t= o
> our existing Open Stack offering.
>
> We've also been working behind the scenes to line up several new a= nd
> exciting Relying Parties to accept OpenID. Every potential Relying Par= ty
> that I've been working with wants to accept not just Yahoo OpenID,= but
> also OpenIDs from other Providers, which is making a really strong cas= e
> for interoperability and open standards.
>
> Yahoo along with other OPs and Relying Parties are committing plenty o= f
> resources for OpenID =A0and are actively working towards the goal of > having OpenID reach widespread usage and adoption. =A0Many of these
> efforts are behind the scenes, and aren't really visible on the pu= blic
> mailing lists, so perhaps the OpenID Foundation can take the lead in > publicizing the activities that its membership is actively working on.=
>
> Allen
>
>
> Nat wrote:
>> Hi
>>
>> Inline below:
>>
>> =3Dnat at Tokyo via iPhone
>>
>> On 2009/07/30, at 2:22, David Recordon <david at sixapart.com> wrote:
>>
>>> Forwarding these three posts from the General list. =A0Not bec= ause I
>>> agree with all of the sentiments expressed, but because it sho= ws how
>>> we as a board and organization are clearly not being transpare= nt
>>> enough in the activities that are actually being taken on.
>>>
>>> Two ideas I think that we should seriously consider are:
>>> 1) making use of a project management tool like Basecamp
>>> (http= ://www.basecamphq.com/) so that at least the entire board and
>>> Don know the status of each project that is underway
>>
>> I strongly agree to this.
>>
>>> 2) having Don write a monthly blog post about OpenID's ach= ievements
>>> the past month and what the Foundation has accomplished
>>
>> +1
>>
>>>
>>> Thoughts?
>>>
>>> --David
>>>
>>> Begin forwarded message:
>>>
>>>> From: Santosh Rajan <santrajan at gmail.com>
>>>> Date: July 28, 2009 11:11:03 PM PDT
>>>> To: general at openid.n= et
>>>> Subject: Re: [OpenID] Google's proprietary discovery e= xtension?
>>>>
>>>>
>>>> Hehe! Shade for once I am going to agree with you.
>>>> Why do we have a chairman? Isnt he supposed to be leading = the flock and
>>>> showing the way?
>>>> And what about the rest of the board. This is the "co= ldest" board I
>>>> have
>>>> ever seen.
>>>> I think Eran Hammer should have been the chairman of the b= oard! I
>>>> wonder why
>>>> he disappeared from here 2 yrs back. (I have seen some pos= ts from
>>>> him from
>>>> 2007).
>>>>
>>>>
>>>> SitG Admin wrote:
>>>>>
>>>>>> There is no sign of the "STD mechanism" = coming soon.
>>>>>
>>>>> Perhaps it will arrive after Chris Messina's "= ;Policy Expression
>>>>> Extension" passes ;)
>>>>>
>>>>>> Apathy on the part of the OpenID Foundation.
>>>>>
>>>>> Inaction, or so it may appear; timely, though?
>>>>>
>>>>>> Half the Identity folk have moved on to Kantara In= itiative.
>>>>>> The Other half to the Open Web foundation.
>>>>>> XRI TC has tied itself in knots.
>>>>>> And the hilarious part is that there are folk invo= lved in all
>>>>>> these three
>>>>>> foundations!
>>>>>
>>>>> Sounds like good separation of duties to me. If the re= st of us can
>>>>> still interop (and work is still being done that *need= s* to be done
>>>>> before we can move forward), it doesn't really mat= ter where most of
>>>>> the various communities is doing that work.
>>>>>
>>>>>> No idea were the rest of us should bail out to!? >>>>>
>>>>> If the development of OpenID were to halt now, I think= it would be
>>>>> Federated implementations that found themselves hardes= t hit; small,
>>>>> independent operators such as myself (working with lib= raries already
>>>>> distributed "in the wild") might not even no= tice.
>>>>>
>>>>> -Shade
>>>>> _______________________________________________
>>>>> general mailing list
>>>>> general at openid.n= et
>>>>> http://openid.net/mailman/listinfo/general
>>>>>
>>>>>
>>>>
>>>>
>>>> -----
>>>>
>>>> Santosh Rajan
>>>> http://santrajan.blogspot.com http://santrajan.blogspot.com
>>>> --
>>>> View this message in context:
>>>> http:/= /www.nabble.com/Re%3A-Google%27s-proprietary-discovery-extension--tp2441409= 2p24713025.html
>>>>
>>>> Sent from the OpenID - General mailing list archive at Nab= ble.com.
>>>>
>>>> _______________________________________________
>>>> general mailing list
>>>> general at openid.net= a>
>>>> http://openid.net/mailman/listinfo/general
>>>
>>> _______________________________________________
>>> board mailing list
>>> board at openid.net
>>> http://openid.net/mailman/listinfo/board
>> _______________________________________________
>> board mailing list
>> board at openid.net
>> http://openid.net/mailman/listinfo/board
>
>
> _______________________________________________
> board mailing list
> board at openid.net
> http://openid.net/mailman/listinfo/board
>
>
-----
Santosh Rajan
http://santraja= n.blogspot.com http://santrajan.blogspot.com
--
_______________________________________________
board mailing list
board at openid.net
http= ://openid.net/mailman/listinfo/board
Dari: Chr= is Messina <chris.messina at gmail.com>
Kepada: board at openid.net
Terkirim: Kamis, 30 Juli, 2009 10:13:18
Judul: Re: [OpenID board] Perception= of the Foundation (Was: Fwd: [OpenID] Google's proprietary discovery exten= sion?)
Santosh, I'm not sure what you're proposing.=0A
<= /div>If there is a leadership vacuum in the community, complaining about it doesn'= t seem like an effective way to address it.=0ATha= t said, I certainly think that the Foundation via the board has not been te= rribly effective in its communications and outreach since the elections. Th= at said, much has been happening, albeit in many different places so keepin= g track of everything is very challenging =E2=80=94 even for those directly= working on these things.=0AA couple weeks back I= sent Don a list of interview-style questions that I had hoped would have m= ade it to the blog by now, but alas I've not heard back from him yet. Don h= as pointed out that he is more of an infrastructure kind of guy =E2=80=94 w= ho likes to operate behind the scenes, and so combining that style of leade= rship with an otherwise quiet board can of course lead to questions of prog= ress.=0AI also noticed that the board's meeting m= inutes have not been published to the wiki recently, so I'll go an make sur= e that they are copied from this list to the wiki, so at least you can trac= e the conversations that have gone on over the last several months.= =0AI would be interested in hearing solid proposals for= rallying the community =E2=80=94 and coordinating efforts if the board is = unable or unavailable to do so. I have ideas myself, but not the time or ab= ility to implement them at the moment.=0AChrisOn Wed, Jul 29, 2009 at 5:30 PM, Santosh Ra= jan <santrajan at g= mail.com> wrote:=0A
=0AAllen I think you missed a major point here.=0AIt is nice to know about Yahoo's work. Other coorporates have also don= e a
=0Alot of work, like Google, Facebook etc.
=0A
=0ABut what abo= ut the independent community members? Nothing!! Or atleast I
=0Ahaven't = seen any work coming from then.
=0A
=0AI think in Open Communities th= e most important contributions must come from
=0Athe independant members= and not the coorporate members. Independent members
=0Aare not "boxed i= n" by coorporate objectives.
=0A
=0ACorporate members are focussed by= their companies. Independent individuals
=0Aneed community leadership, = otherwise they will end up running around like
=0Aheadless chicken. Whic= h is more or less what is happenning now.
=0AView this message in = context: http://www.nabble.co= m/Perception-of-the-Foundation-%28Was%3A-Fwd%3A--OpenID--Google%27s-proprie= tary-discovery-extension-%29-tp24724040p24730408.html
=0A
=0A
=0AAllen Tom-2 wrote:
=0A>
=0A> Hi al= l,
=0A>
=0A> Yahoo is very heavily invested in OpenID and we ha= ve a bunch of
=0A> engineers and designers currently working on enhan= cements to our OpenID
=0A> service. Earlier this year, we worke= d with the community to write the
=0A> OpenID UI and OAuth/Hybrid Ext= ensions, and the Yahoo OP will be
=0A> implementing both of these ext= ensions in the very near future.
=0A>
=0A> In addition to proto= col enhancements, we have a crack team of UI/Product
=0A> designers a= nd researchers who are actively experimenting with ways to
=0A> impro= ve the overall usability of our OpenID service. We'll be deploying
=0A&g= t; many significant upgrades to the Yahoo OpenID Provider's user interface<= br>=0A> later this year. The new OpenID UI, along with support for the U= I and
=0A> Hybrid Extensions, and our soon to be released support for= Open Social's
=0A> REST based APIs (including Portable Contacts) wil= l be a huge upgrade to
=0A> our existing Open Stack offering.
=0A&= gt;
=0A> We've also been working behind the scenes to line up several= new and
=0A> exciting Relying Parties to accept OpenID. Every potent= ial Relying Party
=0A> that I've been working with wants to accept no= t just Yahoo OpenID, but
=0A> also OpenIDs from other Providers, whic= h is making a really strong case
=0A> for interoperability and open s= tandards.
=0A>
=0A> Yahoo along with other OPs and Relying Part= ies are committing plenty of
=0A> resources for OpenID and are = actively working towards the goal of
=0A> having OpenID reach widespr= ead usage and adoption. Many of these
=0A> efforts are behind t= he scenes, and aren't really visible on the public
=0A> mailing lists= , so perhaps the OpenID Foundation can take the lead in
=0A> publiciz= ing the activities that its membership is actively working on.
=0A>=0A> Allen
=0A>
=0A>
=0A> Nat wrote:
=0A>> = Hi
=0A>>
=0A>> Inline below:
=0A>>
=0A>>= ; =3Dnat at Tokyo via iPhone
=0A>>
=0A>> On 2009/07/30, at 2= :22, David Recordon <david at sixapart.= com> wrote:
=0A>>
=0A>>> Forwarding these three= posts from the General list. Not because I
=0A>>> agree = with all of the sentiments expressed, but because it shows how
=0A>&g= t;> we as a board and organization are clearly not being transparent
= =0A>>> enough in the activities that are actually being taken on.<= br>=0A>>>
=0A>>> Two ideas I think that we should seri= ously consider are:
=0A>>> 1) making use of a project managemen= t tool like Basecamp
=0A>>> (http://www.basecamphq.com/) so = that at least the entire board and
=0A>>> Don know the status o= f each project that is underway
=0A>>
=0A>> I strongly ag= ree to this.
=0A>>
=0A>>> 2) having Don write a monthl= y blog post about OpenID's achievements
=0A>>> the past month a= nd what the Foundation has accomplished
=0A>>
=0A>> +1
=0A>>
=0A>>>
=0A>>> Thoughts?
=0A>>= >
=0A>>> --David
=0A>>>
=0A>>> Begin= forwarded message:
=0A>>>
=0A>>>> From: Santosh= Rajan <santrajan at gmail.com>= ;
=0A>>>> Date: July 28, 2009 11:11:03 PM PDT
=0A>>= >> To: general at openid.net
= =0A>>>> Subject: Re: [OpenID] Google's proprietary discovery ex= tension?
=0A>>>>
=0A>>>>
=0A>>>&g= t; Hehe! Shade for once I am going to agree with you.
=0A>>>>= ; Why do we have a chairman? Isnt he supposed to be leading the flock and=0A>>>> showing the way?
=0A>>>> And what abou= t the rest of the board. This is the "coldest" board I
=0A>>>&g= t; have
=0A>>>> ever seen.
=0A>>>> I think Er= an Hammer should have been the chairman of the board! I
=0A>>>&= gt; wonder why
=0A>>>> he disappeared from here 2 yrs back. = (I have seen some posts from
=0A>>>> him from
=0A>>= >> 2007).
=0A>>>>
=0A>>>>
=0A>>= ;>> SitG Admin wrote:
=0A>>>>>
=0A>>>&g= t;>> There is no sign of the "STD mechanism" coming soon.
=0A>&= gt;>>>
=0A>>>>> Perhaps it will arrive after Chr= is Messina's "Policy Expression
=0A>>>>> Extension" passe= s ;)
=0A>>>>>
=0A>>>>>> Apathy on th= e part of the OpenID Foundation.
=0A>>>>>
=0A>>&= gt;>> Inaction, or so it may appear; timely, though?
=0A>>&g= t;>>
=0A>>>>>> Half the Identity folk have moved= on to Kantara Initiative.
=0A>>>>>> The Other half to= the Open Web foundation.
=0A>>>>>> XRI TC has tied it= self in knots.
=0A>>>>>> And the hilarious part is tha= t there are folk involved in all
=0A>>>>>> these three=
=0A>>>>>> foundations!
=0A>>>>>
= =0A>>>>> Sounds like good separation of duties to me. If the= rest of us can
=0A>>>>> still interop (and work is still= being done that *needs* to be done
=0A>>>>> before we ca= n move forward), it doesn't really matter where most of
=0A>>>&= gt;> the various communities is doing that work.
=0A>>>>&= gt;
=0A>>>>>> No idea were the rest of us should bail = out to!?
=0A>>>>>
=0A>>>>> If the devel= opment of OpenID were to halt now, I think it would be
=0A>>>&g= t;> Federated implementations that found themselves hardest hit; small,<= br>=0A>>>>> independent operators such as myself (working wi= th libraries already
=0A>>>>> distributed "in the wild") = might not even notice.
=0A>>>>>
=0A>>>>>= ; -Shade
=0A>>>>> _______________________________________= ________
=0A>>>>> general mailing list
=0A>>>= >> general at openid.net
= =0A>>>>> http://openid.net/mailman/listinfo/g= eneral
=0A>>>>>
=0A>>>>>
=0A>= >>>
=0A>>>>
=0A>>>> -----
=0A>= >>>
=0A>>>> Santosh Rajan
=0A>>>> = http://santrajan.blogspot.com http://santrajan.blogspot.com
= =0A>>>> --
=0A>>>> View this message in context:=
=0A>>>> http://www.nabble.com/Re%3A-Google%27s-proprietary-discov= ery-extension--tp24414092p24713025.html
=0A=0A>>>>
= =0A>>>> Sent from the OpenID - General mailing list archive at = Nabble.com.
=0A>>>>
=0A>>>> _________________= ______________________________
=0A>>>> general mailing list<= br>=0A>>>> general at openid.n= et
=0A>>>> http://openid.net/mailman/list= info/general
=0A>>>
=0A>>> ____________________= ___________________________
=0A>>> board mailing list
=0A>= ;>> board at openid.net
=0A>&g= t;> http://openid.net/mailman/listinfo/board
=0A>= > _______________________________________________
=0A>> board m= ailing list
=0A>> board at openid.net=
=0A>> http://openid.net/mailman/listinfo/board= a>
=0A>
=0A>
=0A> _______________________________________= ________
=0A> board mailing list
=0A> board at openid.net
=0A> http://openid.net/mailm= an/listinfo/board
=0A>
=0A>
=0A
=0A
=0A-----
= =0A
=0ASantosh Rajan
=0Ahttp://santrajan.blogspot.com http://= santrajan.blogspot.com
=0A--
=0A
=0A=0ASent fro= m the OpenID - Foundation Board mailing list archive at Nabble.com.
=0A<= div>
=0A___________________________________= ____________
=0Aboard mailing list
=0Aboard at openid.net
=0Ahttp://openid.net/mailman/listinfo= /board
=0A
-= -
Chris Messina
Open Web Advocate
Personal site: http://factoryjoe.= com
Twitter: http://twitter.com/chrismessina
=0A
Diso = Project: http://diso-project.org
OpenID Foundation: http://openid.net
T= his email is: [ ] bloggable [X] ask first [ ] pr= ivate
=0A=0A