From chris.messina at gmail.com Sun Jul 5 11:31:19 2009 From: chris.messina at gmail.com (Chris Messina) Date: Sun, 5 Jul 2009 11:31:19 -0700 Subject: [OpenID board] 7 Lessons from Mozilla Message-ID: <1bc4603e0907051131x7c049e45w1180fc2dc8f1f7be@mail.gmail.com> --0016e642d57a7e644c046df998af Content-Type: text/plain; charset=windows-1252 Content-Transfer-Encoding: quoted-printable Thought this presentation was interesting, especially from a communications/marketing perspective =97 on making messages reusable and global: http://john.jubjubs.net/2009/01/27/lessons-from-mozilla-talk-at-heise/ Chris --=20 Chris Messina Open Web Advocate Personal site: http://factoryjoe.com Twitter: http://twitter.com/chrismessina Diso Project: http://diso-project.org OpenID Foundation: http://openid.net This email is: [X] bloggable [ ] ask first [ ] private --0016e642d57a7e644c046df998af Content-Type: text/html; charset=windows-1252 Content-Transfer-Encoding: quoted-printable
Thought this presentation was interesting, especially from a communica= tions/marketing perspective =97 on making messages reusable and global:

http://john.jubjubs.net/2009/01/27/lessons-from-mo= zilla-talk-at-heise/

Chris

--
Chris Messina
Open Web Advocate
<= br>Personal site: http://factoryjoe.com
Twitter:
http://twitter.c= om/chrismessina

Diso Project: http://diso-project.o= rg
OpenID Foundation: http://openid.ne= t

This email is: =A0 [X] bloggable =A0 =A0[=A0] ask first =A0 [ = ] private
--0016e642d57a7e644c046df998af-- From postmaster at boxbe.com Sun Jul 5 12:01:11 2009 From: postmaster at boxbe.com (postmaster at boxbe.com) Date: Sun, 5 Jul 2009 12:01:11 -0700 (PDT) Subject: [OpenID board] board Digest, Vol 31, Issue 1 (Action Required) Message-ID: <855904398.51915.1246820471407.JavaMail.prod@app005.boxbe.com> ------=_Part_51914_1143254509.1246820471405 Content-Type: multipart/alternative; boundary="----=_Part_51913_1549163140.1246820471405" Content-Disposition: inline Content-Description: Notification The contents of this message require a modern email client for correct display. If you are reading this message, it may be because your reader is without MIME support. You can visit http://www.boxbe.com for more information about this problem, or consult the provider of your email reader. ------=_Part_51913_1549163140.1246820471405 Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit Content-Disposition: inline Dear sender, This message serves as notification that you will not receive any more courtesy notices from our members for two days. Messages you have sent will remain in a lower priority queue for our member to review at their leisure. Future messages will be more likely to be viewed if you are on our member's priority Guest List. Thank you, sajjad.a.soomro at gmail.com About Boxbe This courtesy notice is part of a free service to make email more reliable and useful. Boxbe (http://www.boxbe.com) uses your existing social network and that of your friends to keep your inbox clean and make sure you receive email from people who matter to you. Boxbe: Say Goodbye to Email Overload Visit http://www.boxbe.com/how-it-works?tc=198571011_1310433938 ------=_Part_51913_1549163140.1246820471405 Content-Type: text/html; charset=us-ascii Content-Transfer-Encoding: 7bit Content-Disposition: inline

Dear sender,

This message serves as notification that you will not receive any more courtesy notices from our members for two days. Messages you have sent will remain in a lower priority queue for our member to review at their leisure.

Future messages will be more likely to be viewed if you are on our member's priority Guest List.

Thank you,
sajjad.a.soomro at gmail.com

About this Notice
This courtesy notice is part of a free service to make email more reliable and useful. Boxbe (www.boxbe.com) uses your existing social network and that of your friends to keep your inbox clean and make sure you receive email from people who matter to you.

Boxbe
Say Goodbye to Email Overload
www.boxbe.com

------=_Part_51913_1549163140.1246820471405-- ------=_Part_51914_1143254509.1246820471405 Content-Type: message/delivery-status Content-Transfer-Encoding: 7bit Content-Description: Delivery report Reporting-MTA: dns; boxbe.com Remote-MTA: dns; yahoo.com Action: failed Arrival-Date: Sun, 5 Jul 2009 12:00:23 -0700 (PDT) Final-Recipient: rfc822; sajjad.a.soomro at gmail.com Diagnostic-Code: X-Boxbe-Notice; Sender not pre-approved, delivery likely delayed. Follow instructions in above notice Status: 4.7.0 ------=_Part_51914_1143254509.1246820471405 Content-Description: Undelivered Message MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit An embedded message was scrubbed... From: board-request at openid.net Subject: board Digest, Vol 31, Issue 1 Date: Sun, 05 Jul 2009 12:00:23 -0700 Size: 2376 URL: ------=_Part_51914_1143254509.1246820471405-- From esachs at google.com Wed Jul 8 11:05:24 2009 From: esachs at google.com (Eric Sachs) Date: Wed, 8 Jul 2009 11:05:24 -0700 Subject: [OpenID board] upcoming Google announcement regarding OpenID Message-ID: --0016364eef744df4d5046e35950c Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit Below are drafts of two blog posts we will make in the upcoming weeks about the fact that we are now operating an OpenID IDP for the million+ schools/enterprise/ISPs that are outsourcing their email to Google Apps. We would appreciate this not being circulated beyond the board until it is public. This new support required that we work with the community to define some extensions to the OpenID discovery process. While those discussions have been going on in the community the last few months, those extensions are not yet formalized and probably won't be until they are proven in production environments. There is the potential for some community members (or press) to assume (or at least imply in articles) some evil intent by Google to co-opt OpenID with these extensions. It would be nice to have a blog post on the formal OpenID blog that was supportive of our approach, so I wanted to see if the board members are comfortable with that. On a somewhat related point, I also expect this will further increase the pressure on us as a community to find more scalable UI options since the Nascar style approach obviously cannot include buttons for these million new IDPs. We have also just posted a set of summary UI guidelines that we will be referencing from our API documentation at http://sites.google.com/site/oauthgoog/UXFedLogin/summary. The goal was to keep it to one-page which forced us to cut additional background information, but if you think we cut something critical, let me know. Enterprise blog: Google Apps + OpenID = identity hub for all your SaaS We are happy to announce that the Google OpenID Federated Login API has been extended to Google Apps accounts used by businesses, schools, and other organizations. The service is important not only to the individuals in those organizations, who can interact with a variety of consumer websites with a single credential , but also to the organizations themselves, who are increasingly reliant on multiple Software as a Service (SaaS) solutions from different vendors. For these organizations, Google Apps can now become an identity and data hub for multiple SaaS providers. When integrated with partner solutions such as XXX from XXX, the Google Open ID Federated Login API enables a single Google Apps login to provide secure access to services like Salesforce.com, SuccessFactors, and WebEX, as well as B2B partners, internal applications, and of course consumer web sites. See XXX's post to learn more about their implementation and view the demo and case study . Another early adopter is XXX, a SaaS project management vendor who uses the new service to make it easier for any organization using Google Apps to sign up for and deploy XXX o their users: < INSERT SCREEN SHOTS> Activating the OpenID Federated Login service for your domain is simple and secure. To achieve that, we introduced a new experimental discovery protocol addressing some of the challenges with the current version (2.0) of OpenID : - Reducing the hassle of hosting discovery documents on the domain web-site - the discovery protocol offer a solution that allows a hosted domain to become an OpenID Provider without hosting any documents at all. Optionally, a domain may choose to host one simple file to support a more complete discovery flow. - Being an OpenID Identity Provider requires strong security protection again attacks that could modify web pages on the site. To avoid that requirement for businesses and organizations, we introduced digital signatures on the discovery documents and a verification flow to support that. You can find more details in our API and Discovery documentation, or join the discussions in the Google Federated Login API Group, where you can ask any question and get answers from with other Identity Providers, Relying Parties and Google engineers. *The OpenID Federated Login Service is available for all Google Apps editions. However, it is disabled by default for the Premier and Education and editions , and it requires the Domain Admin to manually enable it from the Control Panel. So Admins - go turn this today for your users. At Google.com - we already enabled it for our employees... * Google Code blog: Over a million new OpenID Identity Providers !We are happy to announce that the Google OpenID Federated Login API has been extended to Google Apps accounts used by businesses, schools, and other organizations. Individuals in these organizations can now sign in to 3rd party websites using their Google Apps account, without giving away their credentials. In addition to the value for the end-users, the new service also benefits the organizations themselves, who are increasingly reliant on multiple Software as a Service (SaaS) solutions from different vendors. For example, XXX is an early adopter, allowing any organization running Google Apps to more quickly sign up for and adopt their service: << INSERT SCREEN SHOTS> See our post on the Google Enterprise Blog to learn more about the opportunities for the organizations. Supporting the API for Google Apps accounts is exciting news for the OpenID community , as it adds numerous new trustworthy Identity Provider (IDP) domains and increases the OpenID end user base by millions. In order to allow web-sites to easily become Relying Parties for these many new IDPs and users, we defined a new discovery protocol. The protocol allows Relying Parties to identify that a given domain is hosted on Google Apps and securely access its OpenID Provider End Point. The current proposal is an interim solution, and we are participating in several standardization organizations, such as OASIS and the OpenID Foundation , to generate a next-generation standard. Since the current protocol proposal is not supported by the standard OpenID libraries, we provided an implementation of the Relying Party pieces at the Open Source project - step2.googlecode.com. Google is also offering a set of resource addressing the issues of designing a scalable Federated Login User Interface. You are welcome to visit the User Experience summary for Federated Login Google Sites page, where you can find links do demos, mocks and usabilty research data. Prefer an out-of-the-box solution? We have been working with JanRain, a provider of OpenID solutions, which already support the new API as part of their RPX product . As demonstrated by UserVoice using JanRain's RPX , a user simply types in her Google Apps hosted domain name in the OpenID login box and everything else is being taken care of: You can find more details in our API and Discovery documentation, or join the discussions in the Google Federated Login API Group, where you can ask any question and get answers from with other Identity Providers, Relying Parties and Google engineers. *The OpenID Federated Login Service is available for all Google Apps editions. However, it is disabled by default for the Premier and Education editions, and it requires the Domain Admin to manually enable it from the Control Panel. So Admins - go turn this today for your users. At Google.com - we already enabled it for our employees... * --0016364eef744df4d5046e35950c Content-Type: text/html; charset=ISO-8859-1 Content-Transfer-Encoding: quoted-printable
Below are drafts of two blog posts we will make in the upcoming weeks = about the fact that we are now operating an OpenID IDP for the million+ sch= ools/enterprise/ISPs that are outsourcing their email to Google Apps. =A0We= would appreciate this not being circulated beyond the board until it is pu= blic. =A0This new support required that we work with the community to defin= e some extensions to the OpenID discovery process. =A0While those discussio= ns have been going on in the community the last few months, those extension= s are not yet formalized and probably won't be until they are proven in= production environments. =A0There is the potential for some community memb= ers (or press) to assume (or at least imply in articles) some evil intent b= y Google to co-opt OpenID with these extensions. =A0It would be nice to hav= e a blog post on the formal OpenID blog that was supportive of our approach= , so I wanted to see if the board members are comfortable with that.

On a somewhat related point, I also expect this will fu= rther increase the pressure on us as a community to find more scalable UI o= ptions since the Nascar style approach obviously cannot include buttons for= these million new IDPs. =A0We have also just posted a set of summary UI gu= idelines that we will be referencing from our API documentation at=A0http://sites.google.com/site/oauthgoog/UXFedLogin/summary. =A0Th= e goal was to keep it to one-page which forced us to cut additional backgro= und information, but if you think we cut something critical, let me know.

Enterprise blog: Google Apps= + OpenID =3D identity hub for all your SaaS

We are happy to announce that the=A0Google OpenID Federated Login API= =A0has been extended to Google Apps accounts used by businesses, schools, a= nd other organizations. The service is important not only to the individual= s in those organizations, who can interact with a variety of consumer websi= tes with a single credential <add link to Google code post>, but also to the organizati= ons themselves, who are increasingly reliant on multiple Software as a Serv= ice (SaaS) solutions from different vendors.


For these organizations, Google Apps can now become an identity= and data hub for multiple SaaS providers. When integrated with partner sol= utions such as XXX from=A0XXX, the Google Open ID Federated Login API enabl= es a single Google Apps login to provide secure access to services like Sal= esforce.com, SuccessFactors, and WebEX, as well as B2B partners, internal a= pplications, and of course consumer web sites. See=A0XXX's post <add link> to learn= more about their implementation and view the demo and case study <add links>.


Another early adopter is=A0XXX, a SaaS project management vendo= r who uses the new service to make it easier for any organization using Goo= gle Apps to sign up for and deploy=A0XXX=A0o their users:


<= div style=3D"margin-top:0px;margin-bottom:0px;text-align:center">< INSER= T SCREEN SHOTS>


Activating the OpenID Federated Login service for your domain is simple and= secure. To achieve that, we introduced a new experimental=A0discove= ry protocol=A0addressing some of the challenges with the=A0current version (2.0) of OpenID= :

=A0

  • Reducing the hassle of hosting discovery documents on the domain web-site -= the discovery protocol offer a solution that allows a hosted domain to bec= ome an OpenID Provider without hosting any documents at all. Optionally, a = domain may choose to host one simple file to support a more complete discov= ery flow.

  • Being an OpenID Identity Provider requires stro= ng security protection again attacks that could modify web pages on the sit= e. To avoid that requirement for businesses and organizations, we introduce= d digital signatures on the discovery documents and a verification flow to = support that.

You can find more details in our=A0API=A0and=A0Discovery=A0documentation, or join the discus= sions in the=A0Google Federated Login API Gro= up, where you can ask any question and get answers from with other Iden= tity Providers, Relying Parties and Google engineers.


The OpenID Federated Login Service is available for all Goog= le Apps editions. However, it is disabled by default for the Premier and Ed= ucation and editions =A0, and it requires the Domain Admin to manually enab= le it from the Control Panel. So Admins -=A0go turn this today for you= r users. At Google.com - we already enabled it for our employees...=A0<= /b>


Google Code blog: Over a million new O= penID Identity Providers !

We are happy to announce that the=A0Google Op= enID Federated Login API=A0 has been extended to Google Apps accounts u= sed by businesses, schools, and other organizations. =A0Individuals in thes= e organizations can now sign in to 3rd party websites using their Google Ap= ps account, without giving away their credentials. In addition to the value= for the end-users, the new service also benefits the organizations themsel= ves, who are increasingly reliant on multiple Software as a Service (SaaS) = solutions from different vendors. For example, XXX=A0is an= early adopter, allowing any organization running Google Apps to more quick= ly sign up for and adopt their service:

<< INSERT SCREEN SHOTS>


See our post on the Google Enterprise Blog <<= span style=3D"background-color:rgb(255, 255, 0)">add link> to lea= rn more about the opportunities for the organizations.=A0


Supporting the API for Google Apps accounts is exciting news for the=A0OpenID community, as it adds numerous= new trustworthy Identity Provider (IDP) domains and increases the OpenID e= nd user base by millions. In order to allow web-sites to easily become Rely= ing Parties for these many new IDPs and users, we defined a new=A0= discovery protocol. The protocol allows Relying Parties to identify tha= t a given domain is hosted on Google Apps and securely access its OpenID Pr= ovider End Point. The current proposal is an interim solution, and we are p= articipating in several standardization organizations, such as=A0OASIS=A0= and the=A0OpenID Foundation, to generate a next-generation standard. Since the current protocol prop= osal is not supported by the standard OpenID libraries, we provided an impl= ementation of the Relying Party pieces at the Open Source project -=A0step2.googlecode.com. Goo= gle is also offering a set of resource addressing the issues of designing a= scalable Federated Login User Interface. You are welcome to visit the=A0User Experience summary for Federated Login=A0Go= ogle Sites page, where you can find links do demos, mocks and usabilty rese= arch data.=A0


Prefer an out= -of-the-box solution? We have been working with=A0JanRain, a provider of OpenID solutions, which already support the= new API as part of their=A0RPX product. A= s demonstrated by=A0UserVoice= =A0using=A0JanRain's RPX, a user simply types in her Google Apps = hosted domain name in the OpenID login box and everything else is being tak= en care of:


<Add UserV= oice (or other proposed RPX website) screenshots>

=A0


You can find more details in our=A0API=A0and=A0Discovery= =A0documentation, or join the discussions in the=A0Google Federated Login API Group, where you can ask any que= stion and get answers from with other Identity Providers, Relying Parties a= nd Google engineers.=A0=A0

The OpenID Federated Login Service is available for all Google Apps = editions. However, it is disabled by default for the Premier =A0and Educati= on editions, and it requires the Domain Admin to manually enable it from th= e Control Panel. So Admins -=A0go turn this today for your users. = At Google.com - we already enabled it for our employees...=A0
--0016364eef744df4d5046e35950c-- From will at willnorris.com Thu Jul 9 12:02:00 2009 From: will at willnorris.com (Will Norris) Date: Thu, 9 Jul 2009 12:02:00 -0700 Subject: [OpenID board] upcoming Google announcement regarding OpenID In-Reply-To: References: Message-ID: So it sounds like this was actually intended to go to the board- private list, but since it is public I'm going to throw in my two cents. I talked with Eric about this briefly at the last IIW in March, and I'm happy to see that some of my previous concerns have been addressed. Without seeing the actual discovery protocol document, I can't be sure what is being proposed, but based on previous conversations and what is mentioned in Eric's post here, I have a pretty good idea. The way I understand it, the idea is that a relying party would attempt normal OpenID discover on the claimed identifier provided by the user. If that was successful, then OpenID authentication continues as normal... nothing unusual here. But if the relying party is unable to discover an OpenID provider through normal discovery means, they make an API call to Google asking if Google hosts OpenID services for that domain. (As best as I can tell, the path of the claimed ID is ignored, and the domain must match exactly. If Google hosts services for "example.com", then "https://example.com:8443/foo" would match, but "www.example.com" would not. I'm sure the expectation is that users will simply enter "example.com") Having spent two years at USC helping to build both the policy and technical side of their identity management infrastructure, I do have very strong reservations about Google's actual product. But the more concerning matter is that the OpenID Foundation is being asked to endorse one specific vendor as THE fallback for OpenID discovery. Now in practice, I'm not sure that there is anyone else offering a service like Google has. I know JanRain has OPX, but I would imagine it uses traditional OpenID discovery... I'm not sure. I understand that the existing discovery methods are a bit lacking. My primary focus for the past four weeks or so has been getting XRD to a Committee Draft which people can start implementing. Google has been very active in that effort, and Eric mentioned that in his post. But endorsing a vendor-specific fallback in the meantime is absolutely not something the foundation should be doing. While it is not set in stone that the next version of OpenID Discovery is going to use XRD, that seems to be the general consensus. Publicizing this Google- specific discovery method, only to turn around in a couple of months and start promoting XRD, is going to create a lot of confusion with implementors. -will On Jul 8, 2009, at 11:05 AM, Eric Sachs wrote: > Below are drafts of two blog posts we will make in the upcoming > weeks about > the fact that we are now operating an OpenID IDP for the million+ > schools/enterprise/ISPs that are outsourcing their email to Google > Apps. We > would appreciate this not being circulated beyond the board until it > is > public. This new support required that we work with the community > to define > some extensions to the OpenID discovery process. While those > discussions > have been going on in the community the last few months, those > extensions > are not yet formalized and probably won't be until they are proven in > production environments. There is the potential for some community > members > (or press) to assume (or at least imply in articles) some evil > intent by > Google to co-opt OpenID with these extensions. It would be nice to > have a > blog post on the formal OpenID blog that was supportive of our > approach, so > I wanted to see if the board members are comfortable with that. > > On a somewhat related point, I also expect this will further > increase the > pressure on us as a community to find more scalable UI options since > the > Nascar style approach obviously cannot include buttons for these > million new > IDPs. We have also just posted a set of summary UI guidelines that > we will > be referencing from our API documentation at > http://sites.google.com/site/oauthgoog/UXFedLogin/summary. The goal > was to > keep it to one-page which forced us to cut additional background > information, but if you think we cut something critical, let me know. > > Enterprise blog: Google Apps + OpenID = identity hub for all your SaaS > > We are happy to announce that the Google OpenID Federated Login > API > > has > been extended to Google Apps accounts used by businesses, schools, > and other > organizations. The service is important not only to the individuals > in those > organizations, who can interact with a variety of consumer websites > with a > single credential , but also to the > organizations themselves, who are increasingly reliant on multiple > Software > as a Service (SaaS) solutions from different vendors. > > > For these organizations, Google Apps can now become an identity and > data hub > for multiple SaaS providers. When integrated with partner solutions > such as > XXX from XXX, the Google Open ID Federated Login API enables a > single Google > Apps login to provide secure access to services like Salesforce.com, > SuccessFactors, and WebEX, as well as B2B partners, internal > applications, > and of course consumer web sites. See XXX's post to learn > more > about their implementation and view the demo and case study links>. > > > Another early adopter is XXX, a SaaS project management vendor who > uses the > new service to make it easier for any organization using Google Apps > to sign > up for and deploy XXX o their users: > > < INSERT SCREEN SHOTS> > > > Activating the OpenID Federated Login service for your domain is > simple and > secure. To achieve that, we introduced a new experimental discovery > protocol > > addressing > some of the challenges with the current version (2.0) of > OpenID > : > > > > - Reducing the hassle of hosting discovery documents on the domain > web-site - the discovery protocol offer a solution that allows a > hosted > domain to become an OpenID Provider without hosting any documents > at all. > Optionally, a domain may choose to host one simple file to support > a more > complete discovery flow. > > > > - Being an OpenID Identity Provider requires strong security > protection > again attacks that could modify web pages on the site. To avoid that > requirement for businesses and organizations, we introduced digital > signatures on the discovery documents and a verification flow to > support > that. > > > You can find more details in our > API > > and Discovery > > documentation, > or join the discussions in the Google Federated Login API > Group >, > where you can ask any question and get answers from with other > Identity > Providers, Relying Parties and Google engineers. > > > *The OpenID Federated Login Service is available for all Google Apps > editions. However, it is disabled by default for the Premier and > Education > and editions , and it requires the Domain Admin to manually enable > it from > the Control Panel. So Admins - go turn this today for your > users >. > At Google.com - we already enabled it for our employees... * > > > Google Code blog: Over a million new OpenID Identity Providers !We > are happy > to announce that the Google OpenID Federated Login > API > > has been extended to Google Apps accounts used by businesses, > schools, and > other organizations. Individuals in these organizations can now > sign in to > 3rd party websites using their Google Apps account, without giving > away > their credentials. In addition to the value for the end-users, the new > service also benefits the organizations themselves, who are > increasingly > reliant on multiple Software as a Service (SaaS) solutions from > different > vendors. For example, XXX is an early adopter, allowing any > organization > running Google Apps to more quickly sign up for and adopt their > service: > > << INSERT SCREEN SHOTS> > > > See our post on the Google Enterprise Blog to learn more > about > the opportunities for the organizations. > > > Supporting the API for Google Apps accounts is exciting news for the > OpenID > community , as it adds numerous new > trustworthy > Identity Provider (IDP) domains and increases the OpenID end user > base by > millions. In order to allow web-sites to easily become Relying > Parties for > these many new IDPs and users, we defined a new discovery > protocol >. > The protocol allows Relying Parties to identify that a given domain is > hosted on Google Apps and securely access its OpenID Provider End > Point. The > current proposal is an interim solution, and we are participating in > several > standardization organizations, such as OASIS > and > the OpenID Foundation , to generate a > next-generation standard. Since the current protocol proposal is not > supported by the standard OpenID libraries, we provided an > implementation of > the Relying Party pieces at the Open Source project - > step2.googlecode.com. > Google is also offering a set of resource addressing the issues of > designing > a scalable Federated Login User Interface. You are welcome to visit > the User > Experience summary for Federated > Login > Google > Sites page, where you can find links do demos, mocks and usabilty > research > data. > > Prefer an out-of-the-box solution? We have been working with > JanRain, > a provider of OpenID solutions, which already support the new API as > part of > their RPX product . As demonstrated by > UserVoice > using JanRain's RPX , a user simply types in her > Google > Apps hosted domain name in the OpenID login box and everything else > is being > taken care of: > > > > > > > You can find more details in our > API > > and Discovery > > documentation, > or join the discussions in the Google Federated Login API > Group >, > where you can ask any question and get answers from with other > Identity > Providers, Relying Parties and Google engineers. > > *The OpenID Federated Login Service is available for all Google Apps > editions. However, it is disabled by default for the Premier and > Education > editions, and it requires the Domain Admin to manually enable it > from the > Control Panel. So Admins - go turn this today for your > users >. > At Google.com - we already enabled it for our employees... * > _______________________________________________ > board mailing list > board at openid.net > http://openid.net/mailman/listinfo/board From esachs at google.com Thu Jul 9 13:16:46 2009 From: esachs at google.com (Eric Sachs) Date: Thu, 9 Jul 2009 13:16:46 -0700 Subject: [OpenID board] upcoming Google announcement regarding OpenID In-Reply-To: References: Message-ID: --0016e64695acf3ebe4046e4b880b Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit >> So it sounds like this was actually intended to go to the board-private list, but since it is public I'm going to throw in my two cents. Feel free to discuss it on the main mailing list. The discovery discussions are not meant to be private. I recently posted a pointer in such a thread that says For nitty gritty details, see http://sites.google.com/site/oauthgoog/fedlogininterp/openiddiscovery >> But if the relying party is unable to discover an OpenID provider through normal discovery means, they make an API call to Google asking if Google hosts OpenID services for that domain The doc above has more details, including defining a way for a domain who outsources their IDP (or RP in the case of someone like Janrain) to publish a single simple file pointing to that SaaS provider. An RP could also choose to pole the SaaS providers directly, but that is a policy/UI decision for them, and by definition that type of one-off doesn't seem like it could, or needs to be, standardized. >> But the more concerning matter is that the OpenID Foundation is being asked to endorse one specific vendor as THE fallback for OpenID discovery. Sorry if it sounded like that is what we I was suggesting. I was suggesting the OIDF could be supportive of the "approach" we are taking of working with the community these last 6-9 months to establish standards for these types of use cases. Even our documentation specifies that the current implementation is just a proof-of-concept for how to do discovery when a SaaS provider is involved, and describes a method that does NOT require "one specific vendor as the fallback for OpenID discovery" though I agree some RPs may choose to do one-off polling of a few SaaS providers. On Thu, Jul 9, 2009 at 12:02 PM, Will Norris wrote: > So it sounds like this was actually intended to go to the board-private > list, but since it is public I'm going to throw in my two cents. I talked > with Eric about this briefly at the last IIW in March, and I'm happy to see > that some of my previous concerns have been addressed. Without seeing the > actual discovery protocol document, I can't be sure what is being proposed, > but based on previous conversations and what is mentioned in Eric's post > here, I have a pretty good idea. > > The way I understand it, the idea is that a relying party would attempt > normal OpenID discover on the claimed identifier provided by the user. If > that was successful, then OpenID authentication continues as normal... > nothing unusual here. But if the relying party is unable to discover an > OpenID provider through normal discovery means, they make an API call to > Google asking if Google hosts OpenID services for that domain. (As best as > I can tell, the path of the claimed ID is ignored, and the domain must match > exactly. If Google hosts services for "example.com", then " > https://example.com:8443/foo" would match, but "www.example.com" would > not. I'm sure the expectation is that users will simply enter " > example.com") > > Having spent two years at USC helping to build both the policy and > technical side of their identity management infrastructure, I do have very > strong reservations about Google's actual product. But the more concerning > matter is that the OpenID Foundation is being asked to endorse one specific > vendor as THE fallback for OpenID discovery. Now in practice, I'm not sure > that there is anyone else offering a service like Google has. I know > JanRain has OPX, but I would imagine it uses traditional OpenID discovery... > I'm not sure. > > I understand that the existing discovery methods are a bit lacking. My > primary focus for the past four weeks or so has been getting XRD to a > Committee Draft which people can start implementing. Google has been very > active in that effort, and Eric mentioned that in his post. But endorsing a > vendor-specific fallback in the meantime is absolutely not something the > foundation should be doing. While it is not set in stone that the next > version of OpenID Discovery is going to use XRD, that seems to be the > general consensus. Publicizing this Google-specific discovery method, only > to turn around in a couple of months and start promoting XRD, is going to > create a lot of confusion with implementors. > > -will > > On Jul 8, 2009, at 11:05 AM, Eric Sachs wrote: > > Below are drafts of two blog posts we will make in the upcoming weeks >> about >> the fact that we are now operating an OpenID IDP for the million+ >> schools/enterprise/ISPs that are outsourcing their email to Google Apps. >> We >> would appreciate this not being circulated beyond the board until it is >> public. This new support required that we work with the community to >> define >> some extensions to the OpenID discovery process. While those discussions >> have been going on in the community the last few months, those extensions >> are not yet formalized and probably won't be until they are proven in >> production environments. There is the potential for some community >> members >> (or press) to assume (or at least imply in articles) some evil intent by >> Google to co-opt OpenID with these extensions. It would be nice to have a >> blog post on the formal OpenID blog that was supportive of our approach, >> so >> I wanted to see if the board members are comfortable with that. >> >> On a somewhat related point, I also expect this will further increase the >> pressure on us as a community to find more scalable UI options since the >> Nascar style approach obviously cannot include buttons for these million >> new >> IDPs. We have also just posted a set of summary UI guidelines that we >> will >> be referencing from our API documentation at >> http://sites.google.com/site/oauthgoog/UXFedLogin/summary. The goal was >> to >> keep it to one-page which forced us to cut additional background >> information, but if you think we cut something critical, let me know. >> >> Enterprise blog: Google Apps + OpenID = identity hub for all your SaaS >> >> We are happy to announce that the Google OpenID Federated Login >> API< >> http://code.google.com/apis/apps/sso/openid_reference_implementation.html >> > >> has >> been extended to Google Apps accounts used by businesses, schools, and >> other >> organizations. The service is important not only to the individuals in >> those >> organizations, who can interact with a variety of consumer websites with a >> single credential , but also to the >> organizations themselves, who are increasingly reliant on multiple >> Software >> as a Service (SaaS) solutions from different vendors. >> >> >> For these organizations, Google Apps can now become an identity and data >> hub >> for multiple SaaS providers. When integrated with partner solutions such >> as >> XXX from XXX, the Google Open ID Federated Login API enables a single >> Google >> Apps login to provide secure access to services like Salesforce.com, >> SuccessFactors, and WebEX, as well as B2B partners, internal applications, >> and of course consumer web sites. See XXX's post to learn more >> about their implementation and view the demo and case study . >> >> >> Another early adopter is XXX, a SaaS project management vendor who uses >> the >> new service to make it easier for any organization using Google Apps to >> sign >> up for and deploy XXX o their users: >> >> < INSERT SCREEN SHOTS> >> >> >> Activating the OpenID Federated Login service for your domain is simple >> and >> secure. To achieve that, we introduced a new experimental discovery >> protocol< >> http://groups.google.com/group/google-federated-login-api/web/openid-discovery-for-hosted-domains >> > >> addressing >> some of the challenges with the current version (2.0) of >> OpenID >> : >> >> >> >> - Reducing the hassle of hosting discovery documents on the domain >> web-site - the discovery protocol offer a solution that allows a hosted >> domain to become an OpenID Provider without hosting any documents at all. >> Optionally, a domain may choose to host one simple file to support a more >> complete discovery flow. >> >> >> >> - Being an OpenID Identity Provider requires strong security protection >> again attacks that could modify web pages on the site. To avoid that >> requirement for businesses and organizations, we introduced digital >> signatures on the discovery documents and a verification flow to support >> that. >> >> >> You can find more details in our >> API< >> http://code.google.com/apis/apps/sso/openid_reference_implementation.html >> > >> and Discovery< >> http://groups.google.com/group/google-federated-login-api/web/openid-discovery-for-hosted-domains >> > >> documentation, >> or join the discussions in the Google Federated Login API >> Group< >> http://groups.google.com/group/google-federated-login-api/web/oauth-support-in-googles-federated-login-api >> >, >> where you can ask any question and get answers from with other Identity >> Providers, Relying Parties and Google engineers. >> >> >> *The OpenID Federated Login Service is available for all Google Apps >> editions. However, it is disabled by default for the Premier and Education >> and editions , and it requires the Domain Admin to manually enable it >> from >> the Control Panel. So Admins - go turn this today for your >> users< >> http://code.google.com/apis/apps/sso/openid_reference_implementation.html#cpanel >> >. >> At Google.com - we already enabled it for our employees... * >> >> >> Google Code blog: Over a million new OpenID Identity Providers !We are >> happy >> to announce that the Google OpenID Federated Login >> API< >> http://code.google.com/apis/apps/sso/openid_reference_implementation.html >> > >> has been extended to Google Apps accounts used by businesses, schools, and >> other organizations. Individuals in these organizations can now sign in >> to >> 3rd party websites using their Google Apps account, without giving away >> their credentials. In addition to the value for the end-users, the new >> service also benefits the organizations themselves, who are increasingly >> reliant on multiple Software as a Service (SaaS) solutions from different >> vendors. For example, XXX is an early adopter, allowing any organization >> running Google Apps to more quickly sign up for and adopt their service: >> >> << INSERT SCREEN SHOTS> >> >> >> See our post on the Google Enterprise Blog to learn more about >> the opportunities for the organizations. >> >> >> Supporting the API for Google Apps accounts is exciting news for the >> OpenID >> community , as it adds numerous new trustworthy >> Identity Provider (IDP) domains and increases the OpenID end user base by >> millions. In order to allow web-sites to easily become Relying Parties for >> these many new IDPs and users, we defined a new discovery >> protocol< >> http://groups.google.com/group/google-federated-login-api/web/openid-discovery-for-hosted-domains >> >. >> The protocol allows Relying Parties to identify that a given domain is >> hosted on Google Apps and securely access its OpenID Provider End Point. >> The >> current proposal is an interim solution, and we are participating in >> several >> standardization organizations, such as OASIS >> and >> the OpenID Foundation , to generate a >> next-generation standard. Since the current protocol proposal is not >> supported by the standard OpenID libraries, we provided an implementation >> of >> the Relying Party pieces at the Open Source project - >> step2.googlecode.com. >> Google is also offering a set of resource addressing the issues of >> designing >> a scalable Federated Login User Interface. You are welcome to visit the >> User >> Experience summary for Federated >> Login >> Google >> Sites page, where you can find links do demos, mocks and usabilty research >> data. >> >> Prefer an out-of-the-box solution? We have been working with >> JanRain, >> a provider of OpenID solutions, which already support the new API as part >> of >> their RPX product . As demonstrated by >> UserVoice >> using JanRain's RPX , a user simply types in her >> Google >> Apps hosted domain name in the OpenID login box and everything else is >> being >> taken care of: >> >> >> >> >> >> >> You can find more details in our >> API< >> http://code.google.com/apis/apps/sso/openid_reference_implementation.html >> > >> and Discovery< >> http://groups.google.com/group/google-federated-login-api/web/openid-discovery-for-hosted-domains >> > >> documentation, >> or join the discussions in the Google Federated Login API >> Group< >> http://groups.google.com/group/google-federated-login-api/web/oauth-support-in-googles-federated-login-api >> >, >> where you can ask any question and get answers from with other Identity >> Providers, Relying Parties and Google engineers. >> >> *The OpenID Federated Login Service is available for all Google Apps >> editions. However, it is disabled by default for the Premier and >> Education >> editions, and it requires the Domain Admin to manually enable it from the >> Control Panel. So Admins - go turn this today for your >> users< >> http://code.google.com/apis/apps/sso/openid_reference_implementation.html#cpanel >> >. >> At Google.com - we already enabled it for our employees... * >> _______________________________________________ >> board mailing list >> board at openid.net >> http://openid.net/mailman/listinfo/board >> > > _______________________________________________ > board mailing list > board at openid.net > http://openid.net/mailman/listinfo/board > --0016e64695acf3ebe4046e4b880b Content-Type: text/html; charset=ISO-8859-1 Content-Transfer-Encoding: quoted-printable
>>=A0So it sounds like this was actually intended to go to the = board-private list, but since it is public I'm going to throw in my two= cents.
Feel free to discuss it on the main m= ailing list. =A0The discovery discussions are not meant to be private. =A0<= /div>

I recently posted a pointer in such a thread that says= =A0
For nitty gritty details, see=A0http://sites.google.com/site/oauthgoog/fedlogi= ninterp/openiddiscovery

>>=A0But if the relying party is unable to discover an OpenID pr= ovider through normal discovery means, they make an API call to Google aski= ng if Google hosts OpenID services for that domain
The doc above has more details, including defining a way for a domain = who outsources their IDP (or RP in the case of someone like Janrain) to pub= lish a single simple file pointing to that SaaS provider. =A0An RP could al= so choose to pole the SaaS providers directly, but that is a policy/UI deci= sion for them, and by definition that type of one-off doesn't seem like= it could, or needs to be, standardized.

>>=A0But the more concerning matter is that the OpenI= D Foundation is being asked to endorse one specific vendor as THE fallback = for OpenID discovery.
Sorry if it sounded like that is what we I was suggesting. =A0I was sugges= ting the OIDF could be supportive of the "approach" we are taking= of working with the community these last 6-9 months to establish standards= for these types of use cases. =A0Even our documentation specifies that the= current implementation is just a proof-of-concept for how to do discovery = when a SaaS provider is involved, and describes a method that does NOT requ= ire "one specific vendor as the fallback for OpenID discovery" th= ough I agree some RPs may choose to do one-off polling of a few SaaS provid= ers.


On Thu, Jul 9, 2009 at 1= 2:02 PM, Will Norris <will at willnorris.com> wrote:
So it sounds like this was actually intended= to go to the board-private list, but since it is public I'm going to t= hrow in my two cents. =A0I talked with Eric about this briefly at the last = IIW in March, and I'm happy to see that some of my previous concerns ha= ve been addressed. =A0Without seeing the actual discovery protocol document= , I can't be sure what is being proposed, but based on previous convers= ations and what is mentioned in Eric's post here, I have a pretty good = idea.

The way I understand it, the idea is that a relying party would attempt nor= mal OpenID discover on the claimed identifier provided by the user. =A0If t= hat was successful, then OpenID authentication continues as normal... nothi= ng unusual here. =A0But if the relying party is unable to discover an OpenI= D provider through normal discovery means, they make an API call to Google = asking if Google hosts OpenID services for that domain. =A0(As best as I ca= n tell, the path of the claimed ID is ignored, and the domain must match ex= actly. =A0If Google hosts services for "example.com", then "https://example.com:8443/foo"= would match, but "www.example.com" would not. =A0I'm sure the expectation is t= hat users will simply enter "example.com")

Having spent two years at USC helping to build both the policy and technica= l side of their identity management infrastructure, I do have very strong r= eservations about Google's actual product. =A0But the more concerning m= atter is that the OpenID Foundation is being asked to endorse one specific = vendor as THE fallback for OpenID discovery. =A0Now in practice, I'm no= t sure that there is anyone else offering a service like Google has. =A0I k= now JanRain has OPX, but I would imagine it uses traditional OpenID discove= ry... I'm not sure.

I understand that the existing discovery methods are a bit lacking. =A0My p= rimary focus for the past four weeks or so has been getting XRD to a Commit= tee Draft which people can start implementing. =A0Google has been very acti= ve in that effort, and Eric mentioned that in his post. =A0But endorsing a = vendor-specific fallback in the meantime is absolutely not something the fo= undation should be doing. =A0While it is not set in stone that the next ver= sion of OpenID Discovery is going to use XRD, that seems to be the general = consensus. =A0Publicizing this Google-specific discovery method, only to tu= rn around in a couple of months and start promoting XRD, is going to create= a lot of confusion with implementors.

-will


On Jul 8, 2009, at 11:05 AM, Eric Sachs wrote:

Below are drafts of two blog posts we will make in the upcoming weeks about=
the fact that we are now operating an OpenID IDP for the million+
schools/enterprise/ISPs that are outsourcing their email to Google Apps. = =A0We
would appreciate this not being circulated beyond the board until it is
public. =A0This new support required that we work with the community to def= ine
some extensions to the OpenID discovery process. =A0While those discussions=
have been going on in the community the last few months, those extensions are not yet formalized and probably won't be until they are proven in production environments. =A0There is the potential for some community membe= rs
(or press) to assume (or at least imply in articles) some evil intent by Google to co-opt OpenID with these extensions. =A0It would be nice to have = a
blog post on the formal OpenID blog that was supportive of our approach, so=
I wanted to see if the board members are comfortable with that.

On a somewhat related point, I also expect this will further increase the pressure on us as a community to find more scalable UI options since the Nascar style approach obviously cannot include buttons for these million ne= w
IDPs. =A0We have also just posted a set of summary UI guidelines that we wi= ll
be referencing from our API documentation at
http://sites.google.com/site/oauthgoog/UXFedLogin/summary.= =A0The goal was to
keep it to one-page which forced us to cut additional background
information, but if you think we cut something critical, let me know.

Enterprise blog: Google Apps + OpenID =3D identity hub for all your SaaS
We are happy to announce that the Google OpenID Federated Login
API<http://code.google.com/apis/apps/sso/op= enid_reference_implementation.html>

has
been extended to Google Apps accounts used by businesses, schools, and othe= r
organizations. The service is important not only to the individuals in thos= e
organizations, who can interact with a variety of consumer websites with a<= br> single credential <add link to Google code post>, but also to the
organizations themselves, who are increasingly reliant on multiple Software=
as a Service (SaaS) solutions from different vendors.


For these organizations, Google Apps can now become an identity and data hu= b
for multiple SaaS providers. When integrated with partner solutions such as=
XXX from XXX, the Google Open ID Federated Login API enables a single Googl= e
Apps login to provide secure access to services like Salesforce.com,
SuccessFactors, and WebEX, as well as B2B partners, internal applications,<= br> and of course consumer web sites. See XXX's post <add link> to le= arn more
about their implementation and view the demo and case study <add links&g= t;.


Another early adopter is XXX, a SaaS project management vendor who uses the=
new service to make it easier for any organization using Google Apps to sig= n
up for and deploy XXX o their users:

< INSERT SCREEN SHOTS>


Activating the OpenID Federated Login service for your domain is simple and=
secure. To achieve that, we introduced a new experimental discovery
protocol<http://gro= ups.google.com/group/google-federated-login-api/web/openid-discovery-for-ho= sted-domains>

addressing
some of the challenges with the current version (2.0) of
OpenID<http://openid.net/specs/openid-authentication-2_0.html<= /a>>
:



=A0- Reducing the hassle of hosting discovery documents on the domain
=
=A0web-site - the discovery protocol offer a solution that allows a hosted=
=A0domain to become an OpenID Provider without hosting any documents at al= l.
=A0Optionally, a domain may choose to host one simple file to support a mo= re
=A0complete discovery flow.



=A0- Being an OpenID Identity Provider requires strong security protection=
=A0again attacks that could modify web pages on the site. To avoid that =A0requirement for businesses and organizations, we introduced digital
=A0signatures on the discovery documents and a verification flow to suppor= t
=A0that.


You can find more details in our
API<
http://code.google.com/apis/apps/sso/op= enid_reference_implementation.html>
documentation,
or join the discussions in the Google Federated Login API
Group<http= ://groups.google.com/group/google-federated-login-api/web/oauth-support-in-= googles-federated-login-api>,

where you can ask any question and get answers from with other Identity
Providers, Relying Parties and Google engineers.


*The OpenID Federated Login Service is available for all Google Apps
editions. However, it is disabled by default for the Premier and Education<= br> and editions =A0, and it requires the Domain Admin to manually enable it fr= om
the Control Panel. So Admins - go turn this today for your
users<http://code.google.com/apis/ap= ps/sso/openid_reference_implementation.html#cpanel>.

At Google.com - we already enabled it for our employees... *


Google Code blog: Over a million new OpenID Identity Providers !We are happ= y
to announce that the Google OpenID Federated Login
API<http://code.google.com/apis/apps/sso/op= enid_reference_implementation.html>

has been extended to Google Apps accounts used by businesses, schools, and<= br> other organizations. =A0Individuals in these organizations can now sign in = to
3rd party websites using their Google Apps account, without giving away
their credentials. In addition to the value for the end-users, the new
service also benefits the organizations themselves, who are increasingly reliant on multiple Software as a Service (SaaS) solutions from different vendors. For example, XXX is an early adopter, allowing any organization running Google Apps to more quickly sign up for and adopt their service:
<< INSERT SCREEN SHOTS>


See our post on the Google Enterprise Blog <add link> to learn more a= bout
the opportunities for the organizations.


Supporting the API for Google Apps accounts is exciting news for the OpenID=
community <http://w= ww.openid.net/>, as it adds numerous new trustworthy

Identity Provider (IDP) domains and increases the OpenID end user base by millions. In order to allow web-sites to easily become Relying Parties for<= br> these many new IDPs and users, we defined a new discovery
protocol<http://gro= ups.google.com/group/google-federated-login-api/web/openid-discovery-for-ho= sted-domains>.

The protocol allows Relying Parties to identify that a given domain is
hosted on Google Apps and securely access its OpenID Provider End Point. Th= e
current proposal is an interim solution, and we are participating in severa= l
standardization organizations, such as OASIS <http://www.oasis-open.org/> and
the OpenID Foundation <http://openid.net/foundation/>, to generate a

next-generation standard. Since the current protocol proposal is not
supported by the standard OpenID libraries, we provided an implementation o= f
the Relying Party pieces at the Open Source project -
step2.googl= ecode.com<http://code.google.com/p/step2/>.

Google is also offering a set of resource addressing the issues of designin= g
a scalable Federated Login User Interface. You are welcome to visit the Use= r
Experience summary for Federated
Login<http://sites.google.com/site/oauthgoog/UXFedLogin/sum= mary>

Google
Sites page, where you can find links do demos, mocks and usabilty research<= br> data.

Prefer an out-of-the-box solution? We have been working with
JanRain<http://www= .janrain.com/>,

a provider of OpenID solutions, which already support the new API as part o= f
their RPX product <http= ://rpxnow.com/>. As demonstrated by
UserVoice<http://uservoice.com/session/new>
using JanRain's RPX <http://rpxnow.com/>, a user simply types in her Google

Apps hosted domain name in the OpenID login box and everything else is bein= g
taken care of:


<Add UserVoice (or other proposed RPX website) screenshots>



You can find more details in our
API<http://code.google.com/apis/apps/sso/op= enid_reference_implementation.html>
documentation,
or join the discussions in the Google Federated Login API
Group<http= ://groups.google.com/group/google-federated-login-api/web/oauth-support-in-= googles-federated-login-api>,

where you can ask any question and get answers from with other Identity
Providers, Relying Parties and Google engineers.

*The OpenID Federated Login Service is available for all Google Apps
editions. However, it is disabled by default for the Premier =A0and Educati= on
editions, and it requires the Domain Admin to manually enable it from the Control Panel. So Admins - go turn this today for your
users<http://code.google.com/apis/ap= ps/sso/openid_reference_implementation.html#cpanel>.
At Google.com - we already enabled it for our employees... *

_______________________________________________
board mailing list
board at openid.net<= br> http= ://openid.net/mailman/listinfo/board

_______________________________________________
board mailing list
board at openid.net<= br> http= ://openid.net/mailman/listinfo/board

--0016e64695acf3ebe4046e4b880b-- From will at willnorris.com Thu Jul 9 16:21:19 2009 From: will at willnorris.com (Will Norris) Date: Thu, 9 Jul 2009 16:21:19 -0700 Subject: [OpenID board] upcoming Google announcement regarding OpenID In-Reply-To: References: Message-ID: On Jul 9, 2009, at 1:16 PM, Eric Sachs wrote: >> So it sounds like this was actually intended to go to the board- >> private >> list, but since it is public I'm going to throw in my two cents. >> > > Feel free to discuss it on the main mailing list. The discovery > discussions > are not meant to be private. > > I recently posted a pointer in such a thread that says > > For nitty gritty details, see > http://sites.google.com/site/oauthgoog/fedlogininterp/openiddiscovery okay, that is helpful. The only thing linked to in your post was a document on a google group that I couldn't access. This looks very familiar, because we talked about this in depth on various XRI TC calls. >> But if the relying party is unable to discover an OpenID provider >> through >> normal discovery means, they make an API call to Google asking if >> Google >> hosts OpenID services for that domain >> > > The doc above has more details, including defining a way for a > domain who > outsources their IDP (or RP in the case of someone like Janrain) to > publish > a single simple file pointing to that SaaS provider. An RP could also > choose to pole the SaaS providers directly, but that is a policy/UI > decision > for them, and by definition that type of one-off doesn't seem like > it could, > or needs to be, standardized. The document you mention all but actually recommends that approach: > There are two locations where the host-meta document might be found: > > (1) http://example.com/host-meta > (2) https://www.google.com/accounts/o8/host-meta?hd=example.com > > Google's endpoint will return a 400 on endpoint (2) if the domain > provided has not outsourced OpenID IdP funcionality to Google. So > one possible strategy for an RP could be to first try endpoint (2), > and if that returns a 400, try endpoint (1), and if that doesn't > yield anything, give up. Other strategies (fetching both endpoints > in parallel, for example), are possible. The idea of trying endpoint #2 first, and then failing back to #1 should NEVER be proposed or encouraged. Quite the opposite, it should be strongly discouraged. It's language like this that make this feel like a vendor-specific approach that the OpenID Foundation should have nothing to do with. RPs should be instructed to ALWAYS attempt #1 first, otherwise the domain owner is no longer in control. >> But the more concerning matter is that the OpenID Foundation is being >> asked to endorse one specific vendor as THE fallback for OpenID >> discovery. >> > > Sorry if it sounded like that is what we I was suggesting. I was > suggesting > the OIDF could be supportive of the "approach" we are taking of > working with > the community these last 6-9 months to establish standards for these > types > of use cases. Even our documentation specifies that the current > implementation is just a proof-of-concept for how to do discovery > when a > SaaS provider is involved, and describes a method that does NOT > require "one > specific vendor as the fallback for OpenID discovery" though I agree > some > RPs may choose to do one-off polling of a few SaaS providers. The other thing that concerns me is how close we are to having a committee draft of XRD. Admittedly, no we're not there yet. And part of that delay has been because we're making sure that we have a solution that all involved parties can live with, including Google. But I get a bit frustrated when Google claims to be supporting the new standard (and I'll be the first to say how valuable their input has been), but appears to be putting all their resources behind an incompatible approach to the same problem... one that I'm afraid will only lead to great confusion[0] if it gets any kind of widespread adoption. If Google wants to throw it out there as a possible stop- gap solution their customers can use until the next version of OpenID Discovery is written, that is fine. But I just don't believe it's the kind of approach the foundation should be endorsing when we're so close with XRD. -will From mart at degeneration.co.uk Thu Jul 9 16:38:40 2009 From: mart at degeneration.co.uk (Martin Atkins) Date: Thu, 09 Jul 2009 16:38:40 -0700 Subject: [OpenID board] upcoming Google announcement regarding OpenID In-Reply-To: References: Message-ID: <4A567F80.30504@degeneration.co.uk> Will Norris wrote: > > > The document you mention all but actually recommends that approach: > >> There are two locations where the host-meta document might be found: >> >> (1) http://example.com/host-meta >> (2) https://www.google.com/accounts/o8/host-meta?hd=example.com >> >> Google's endpoint will return a 400 on endpoint (2) if the domain >> provided has not outsourced OpenID IdP funcionality to Google. So one >> possible strategy for an RP could be to first try endpoint (2), and if >> that returns a 400, try endpoint (1), and if that doesn't yield >> anything, give up. Other strategies (fetching both endpoints in >> parallel, for example), are possible. > > > The idea of trying endpoint #2 first, and then failing back to #1 should > NEVER be proposed or encouraged. Quite the opposite, it should be > strongly discouraged. It's language like this that make this feel like > a vendor-specific approach that the OpenID Foundation should have > nothing to do with. RPs should be instructed to ALWAYS attempt #1 > first, otherwise the domain owner is no longer in control. > This is also a pretty good argument for why "magic" paths under a domain are bad, and is a good example of the issue I brought up months ago with relying on HTTP for discovery: a domain's website is very often hosted by a completely different organisation than the one that hosts everything else. I even used Google Apps as an example in my original blog post about this back in October: http://www.apparently.me.uk/19059.html From esachs at google.com Thu Jul 9 17:10:26 2009 From: esachs at google.com (Eric Sachs) Date: Thu, 9 Jul 2009 17:10:26 -0700 Subject: [OpenID board] upcoming Google announcement regarding OpenID In-Reply-To: References: Message-ID: --0016364ef40ab9210d046e4ecca7 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit >> The idea of trying endpoint #2 first, and then failing back to #1 should NEVER be proposed or encouraged.In a publicly documented standard, I agree with you. However, whitelists are common in actual practice. We see them today in the consumer space, though the eventual goal is to minimize that approach. In the case of Google Apps, most of the interest in this feature has come from SaaS vendors who are developing products that ONLY work for existing users of Google Apps, and that also require using the hybrid OAuth/OpenID integration with Google to access our APIs. So by definition, the only IDP/OAuth-SP they can "trust" is Google Apps. >> The other thing that concerns me is how close we are to having a committee draft of XRD. We haven't formally announced it yet :-) We keep delaying internally, but at some point we'll have to launch it and I would be surprised if we can hold off for longer then a few weeks given how many months we have already delayed. But when the drafts get finalized, we're hoping to support it within a small number of days and remove documentation for the proof-of-concept approach. The partners we have already worked with have read the warnings in our documentation that we will be switching the discovery mechanism once the standards gets solidified, so they are prepared to have to make that change on their side. On Thu, Jul 9, 2009 at 4:21 PM, Will Norris wrote: > > On Jul 9, 2009, at 1:16 PM, Eric Sachs wrote: > > So it sounds like this was actually intended to go to the board-private >>> list, but since it is public I'm going to throw in my two cents. >>> >>> >> Feel free to discuss it on the main mailing list. The discovery >> discussions >> are not meant to be private. >> >> I recently posted a pointer in such a thread that says >> >> For nitty gritty details, see >> http://sites.google.com/site/oauthgoog/fedlogininterp/openiddiscovery >> > > okay, that is helpful. The only thing linked to in your post was a > document on a google group that I couldn't access. This looks very > familiar, because we talked about this in depth on various XRI TC calls. > > > But if the relying party is unable to discover an OpenID provider through >>> normal discovery means, they make an API call to Google asking if Google >>> hosts OpenID services for that domain >>> >>> >> The doc above has more details, including defining a way for a domain who >> outsources their IDP (or RP in the case of someone like Janrain) to >> publish >> a single simple file pointing to that SaaS provider. An RP could also >> choose to pole the SaaS providers directly, but that is a policy/UI >> decision >> for them, and by definition that type of one-off doesn't seem like it >> could, >> or needs to be, standardized. >> > > > The document you mention all but actually recommends that approach: > > There are two locations where the host-meta document might be found: >> >> (1) http://example.com/host-meta >> (2) https://www.google.com/accounts/o8/host-meta?hd=example.com >> >> Google's endpoint will return a 400 on endpoint (2) if the domain provided >> has not outsourced OpenID IdP funcionality to Google. So one possible >> strategy for an RP could be to first try endpoint (2), and if that returns a >> 400, try endpoint (1), and if that doesn't yield anything, give up. Other >> strategies (fetching both endpoints in parallel, for example), are possible. >> > > > The idea of trying endpoint #2 first, and then failing back to #1 should > NEVER be proposed or encouraged. Quite the opposite, it should be strongly > discouraged. It's language like this that make this feel like a > vendor-specific approach that the OpenID Foundation should have nothing to > do with. RPs should be instructed to ALWAYS attempt #1 first, otherwise the > domain owner is no longer in control. > > > But the more concerning matter is that the OpenID Foundation is being >>> asked to endorse one specific vendor as THE fallback for OpenID >>> discovery. >>> >>> >> Sorry if it sounded like that is what we I was suggesting. I was >> suggesting >> the OIDF could be supportive of the "approach" we are taking of working >> with >> the community these last 6-9 months to establish standards for these types >> of use cases. Even our documentation specifies that the current >> implementation is just a proof-of-concept for how to do discovery when a >> SaaS provider is involved, and describes a method that does NOT require >> "one >> specific vendor as the fallback for OpenID discovery" though I agree some >> RPs may choose to do one-off polling of a few SaaS providers. >> > > The other thing that concerns me is how close we are to having a committee > draft of XRD. Admittedly, no we're not there yet. And part of that delay > has been because we're making sure that we have a solution that all involved > parties can live with, including Google. But I get a bit frustrated when > Google claims to be supporting the new standard (and I'll be the first to > say how valuable their input has been), but appears to be putting all their > resources behind an incompatible approach to the same problem... one that > I'm afraid will only lead to great confusion[0] if it gets any kind of > widespread adoption. If Google wants to throw it out there as a possible > stop-gap solution their customers can use until the next version of OpenID > Discovery is written, that is fine. But I just don't believe it's the kind > of approach the foundation should be endorsing when we're so close with XRD. > > -will > > > _______________________________________________ > board mailing list > board at openid.net > http://openid.net/mailman/listinfo/board > --0016364ef40ab9210d046e4ecca7 Content-Type: text/html; charset=ISO-8859-1 Content-Transfer-Encoding: quoted-printable >>=A0The idea of trying endpoint #2 first, and then failing back to #1 sh= ould NEVER be proposed or encouraged.
In a publicly documented standa= rd, I agree with you.
=
However, whitelists are common in actual practice. =A0We s= ee them today in the consumer space, though the eventual goal is to minimiz= e that approach. =A0In the case of Google Apps, most of the interest in thi= s feature has come from SaaS vendors who are developing products that ONLY = work for existing users of Google Apps, and that also require using the hyb= rid OAuth/OpenID integration with Google to access our APIs. =A0So by defin= ition, the only IDP/OAuth-SP they can "trust" is Google Apps.
=
>>=A0The other thing that concerns me is how close w= e are to having a committee draft of XRD.
= We haven't formally announced it yet :-) =A0We keep delaying internally= , but at some point we'll have to launch it and I would be surprised if= we can hold off for longer then a few weeks given how many months we have = already delayed. =A0But=A0when the drafts get finalized, we're hoping t= o support it within a small number of days and remove documentation for the= proof-of-concept approach. =A0The partners we have already worked with hav= e read the warnings in our documentation that we will be switching the disc= overy mechanism once the standards gets solidified, so they are prepared to= have to make that change on their side.
=

On Thu, Jul 9, 2009 at= 4:21 PM, Will Norris <will at willnorris.com> wrote:

On Jul 9, 2009, at 1:16 PM, Eric Sachs wrote:

So it sounds like this was actually intended to go to the board-private
list, but since it is public I'm going to throw in my two cents.


Feel free to discuss it on the main mailing list. =A0The discovery discussi= ons
are not meant to be private.

I recently posted a pointer in such a thread that says

For nitty gritty details, see
http://sites.google.com/site/oauthgoog/fedloginint= erp/openiddiscovery

okay, that is helpful. =A0The only thing linked to in your post was a docum= ent on a google group that I couldn't access. =A0This looks very famili= ar, because we talked about this in depth on various XRI TC calls.



But if the relying party is unable to discover an OpenID provider through normal discovery means, they make an API call to Google asking if Google hosts OpenID services for that domain


The doc above has more details, including defining a way for a domain who outsources their IDP (or RP in the case of someone like Janrain) to publish=
a single simple file pointing to that SaaS provider. =A0An RP could also choose to pole the SaaS providers directly, but that is a policy/UI decisio= n
for them, and by definition that type of one-off doesn't seem like it c= ould,
or needs to be, standardized.


The document you mention all but actually recommends that approach:

There are two locations where the host-meta document might be found:

(1) http://examp= le.com/host-meta
(2) https://www.google.com/accounts/o8/host-meta?hd=3Dexam= ple.com

Google's endpoint will return a 400 on endpoint (2) if the domain provi= ded has not outsourced OpenID IdP funcionality to Google. So one possible s= trategy for an RP could be to first try endpoint (2), and if that returns a= 400, try endpoint (1), and if that doesn't yield anything, give up. Ot= her strategies (fetching both endpoints in parallel, for example), are poss= ible.


The idea of trying endpoint #2 first, and then failing back to #1 should NE= VER be proposed or encouraged. =A0Quite the opposite, it should be strongly= discouraged. =A0It's language like this that make this feel like a ven= dor-specific approach that the OpenID Foundation should have nothing to do = with. =A0RPs should be instructed to ALWAYS attempt #1 first, otherwise the= domain owner is no longer in control.



But the more concerning matter is that the OpenID Foundation is being
asked to endorse one specific vendor as THE fallback for OpenID discovery.<= br>

Sorry if it sounded like that is what we I was suggesting. =A0I was suggest= ing
the OIDF could be supportive of the "approach" we are taking of w= orking with
the community these last 6-9 months to establish standards for these types<= br> of use cases. =A0Even our documentation specifies that the current
implementation is just a proof-of-concept for how to do discovery when a SaaS provider is involved, and describes a method that does NOT require &qu= ot;one
specific vendor as the fallback for OpenID discovery" though I agree s= ome
RPs may choose to do one-off polling of a few SaaS providers.

The other thing that concerns me is how close we are to having a committee = draft of XRD. =A0Admittedly, no we're not there yet. =A0And part of tha= t delay has been because we're making sure that we have a solution that= all involved parties can live with, including Google. =A0But I get a bit f= rustrated when Google claims to be supporting the new standard (and I'l= l be the first to say how valuable their input has been), but appears to be= putting all their resources behind an incompatible approach to the same pr= oblem... one that I'm afraid will only lead to great confusion[0] if it= gets any kind of widespread adoption. =A0If Google wants to throw it out t= here as a possible stop-gap solution their customers can use until the next= version of OpenID Discovery is written, that is fine. =A0But I just don= 9;t believe it's the kind of approach the foundation should be endorsin= g when we're so close with XRD.

-will


_______________________________________________
board mailing list
board at openid.net<= br> http= ://openid.net/mailman/listinfo/board

--0016364ef40ab9210d046e4ecca7-- From esachs at google.com Wed Jul 8 11:47:00 2009 From: esachs at google.com (Eric Sachs) Date: Wed, 8 Jul 2009 11:47:00 -0700 Subject: [OpenID board] upcoming Google announcement regarding OpenID In-Reply-To: References: Message-ID: --00163646d40216fd6e046e362a52 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit Yes, I now realize I mistakenly posted this to the public instead or private board mailing list :-) Not a particularly big deal since we have been discussing this planned launch in the discovery community. Feel free to respond on either the public or private mailing list. On Wed, Jul 8, 2009 at 11:05 AM, Eric Sachs wrote: > Below are drafts of two blog posts we will make in the upcoming weeks about > the fact that we are now operating an OpenID IDP for the million+ > schools/enterprise/ISPs that are outsourcing their email to Google Apps. We > would appreciate this not being circulated beyond the board until it is > public. This new support required that we work with the community to define > some extensions to the OpenID discovery process. While those discussions > have been going on in the community the last few months, those extensions > are not yet formalized and probably won't be until they are proven in > production environments. There is the potential for some community members > (or press) to assume (or at least imply in articles) some evil intent by > Google to co-opt OpenID with these extensions. It would be nice to have a > blog post on the formal OpenID blog that was supportive of our approach, so > I wanted to see if the board members are comfortable with that. > > On a somewhat related point, I also expect this will further increase the > pressure on us as a community to find more scalable UI options since the > Nascar style approach obviously cannot include buttons for these million new > IDPs. We have also just posted a set of summary UI guidelines that we will > be referencing from our API documentation at > http://sites.google.com/site/oauthgoog/UXFedLogin/summary. The goal was > to keep it to one-page which forced us to cut additional background > information, but if you think we cut something critical, let me know. > > Enterprise blog: Google Apps + OpenID = identity hub for all your SaaS > > We are happy to announce that the Google OpenID Federated Login API has > been extended to Google Apps accounts used by businesses, schools, and other > organizations. The service is important not only to the individuals in those > organizations, who can interact with a variety of consumer websites with a > single credential , but also to the > organizations themselves, who are increasingly reliant on multiple Software > as a Service (SaaS) solutions from different vendors. > > > For these organizations, Google Apps can now become an identity and data > hub for multiple SaaS providers. When integrated with partner solutions such > as XXX from XXX, the Google Open ID Federated Login API enables a single > Google Apps login to provide secure access to services like Salesforce.com, > SuccessFactors, and WebEX, as well as B2B partners, internal applications, > and of course consumer web sites. See XXX's post to learn more > about their implementation and view the demo and case study . > > > Another early adopter is XXX, a SaaS project management vendor who uses the > new service to make it easier for any organization using Google Apps to sign > up for and deploy XXX o their users: > > < INSERT SCREEN SHOTS> > > > Activating the OpenID Federated Login service for your domain is simple and > secure. To achieve that, we introduced a new experimental discovery > protocol addressing > some of the challenges with the current version (2.0) of OpenID > : > > > > - Reducing the hassle of hosting discovery documents on the domain > web-site - the discovery protocol offer a solution that allows a hosted > domain to become an OpenID Provider without hosting any documents at all. > Optionally, a domain may choose to host one simple file to support a more > complete discovery flow. > > > > - Being an OpenID Identity Provider requires strong security protection > again attacks that could modify web pages on the site. To avoid that > requirement for businesses and organizations, we introduced digital > signatures on the discovery documents and a verification flow to support > that. > > > You can find more details in our API > and Discovery documentation, > or join the discussions in the Google Federated Login API Group, > where you can ask any question and get answers from with other Identity > Providers, Relying Parties and Google engineers. > > > *The OpenID Federated Login Service is available for all Google Apps > editions. However, it is disabled by default for the Premier and Education > and editions , and it requires the Domain Admin to manually enable it from > the Control Panel. So Admins - go turn this today for your users. > At Google.com - we already enabled it for our employees... * > > > Google Code blog: Over a million new OpenID Identity Providers !We are > happy to announce that the Google OpenID Federated Login API > has been extended to Google Apps accounts used by businesses, schools, and > other organizations. Individuals in these organizations can now sign in to > 3rd party websites using their Google Apps account, without giving away > their credentials. In addition to the value for the end-users, the new > service also benefits the organizations themselves, who are increasingly > reliant on multiple Software as a Service (SaaS) solutions from different > vendors. For example, XXX is an early adopter, allowing any organization > running Google Apps to more quickly sign up for and adopt their service: > > << INSERT SCREEN SHOTS> > > > See our post on the Google Enterprise Blog to learn more about > the opportunities for the organizations. > > > Supporting the API for Google Apps accounts is exciting news for the OpenID > community , as it adds numerous new trustworthy > Identity Provider (IDP) domains and increases the OpenID end user base by > millions. In order to allow web-sites to easily become Relying Parties for > these many new IDPs and users, we defined a new discovery protocol. > The protocol allows Relying Parties to identify that a given domain is > hosted on Google Apps and securely access its OpenID Provider End Point. The > current proposal is an interim solution, and we are participating in several > standardization organizations, such as OASIS and > the OpenID Foundation , to generate a > next-generation standard. Since the current protocol proposal is not > supported by the standard OpenID libraries, we provided an implementation of > the Relying Party pieces at the Open Source project - step2.googlecode.com. > Google is also offering a set of resource addressing the issues of designing > a scalable Federated Login User Interface. You are welcome to visit the User > Experience summary for Federated Login Google > Sites page, where you can find links do demos, mocks and usabilty research > data. > > Prefer an out-of-the-box solution? We have been working with JanRain, > a provider of OpenID solutions, which already support the new API as part of > their RPX product . As demonstrated by UserVoice > using JanRain's RPX , a user simply types in her > Google Apps hosted domain name in the OpenID login box and everything else > is being taken care of: > > > > > > > You can find more details in our API > and Discovery documentation, > or join the discussions in the Google Federated Login API Group, > where you can ask any question and get answers from with other Identity > Providers, Relying Parties and Google engineers. > > *The OpenID Federated Login Service is available for all Google Apps > editions. However, it is disabled by default for the Premier and Education > editions, and it requires the Domain Admin to manually enable it from the > Control Panel. So Admins - go turn this today for your users. > At Google.com - we already enabled it for our employees... * > --00163646d40216fd6e046e362a52 Content-Type: text/html; charset=ISO-8859-1 Content-Transfer-Encoding: quoted-printable Yes, I now realize I mistakenly posted this to the public instead or privat= e board mailing list :-) =A0Not a particularly big deal since we have been = discussing this planned launch in the discovery community.

Feel free to respond on either the public or private mailing list.
On Wed, Jul 8, 2009 at 11:05 AM, Eric Sachs <esachs at google.com> wrote:
Below are drafts of two blog posts we = will make in the upcoming weeks about the fact that we are now operating an= OpenID IDP for the million+ schools/enterprise/ISPs that are outsourcing t= heir email to Google Apps. =A0We would appreciate this not being circulated= beyond the board until it is public. =A0This new support required that we = work with the community to define some extensions to the OpenID discovery p= rocess. =A0While those discussions have been going on in the community the = last few months, those extensions are not yet formalized and probably won&#= 39;t be until they are proven in production environments. =A0There is the p= otential for some community members (or press) to assume (or at least imply= in articles) some evil intent by Google to co-opt OpenID with these extens= ions. =A0It would be nice to have a blog post on the formal OpenID blog tha= t was supportive of our approach, so I wanted to see if the board members a= re comfortable with that.

On a somewhat related point, I also expect this will fu= rther increase the pressure on us as a community to find more scalable UI o= ptions since the Nascar style approach obviously cannot include buttons for= these million new IDPs. =A0We have also just posted a set of summary UI gu= idelines that we will be referencing from our API documentation at=A0http://sites.google.com/site/oauthgoog/UXFedLogin/summary. =A0Th= e goal was to keep it to one-page which forced us to cut additional backgro= und information, but if you think we cut something critical, let me know.

Enterprise blog: Google Apps= + OpenID =3D identity hub for all your SaaS

We are happy to announce that the=A0Google OpenID Federated Login API= =A0has been extended to Google Apps accounts used by businesses, schools, a= nd other organizations. The service is important not only to the individual= s in those organizations, who can interact with a variety of consumer websi= tes with a single credential <add link to Google code post>, but also to the organizati= ons themselves, who are increasingly reliant on multiple Software as a Serv= ice (SaaS) solutions from different vendors.


For these organizations, Google Apps can now become an identity= and data hub for multiple SaaS providers. When integrated with partner sol= utions such as XXX from=A0XXX, the Google Open ID Federated Login API enabl= es a single Google Apps login to provide secure access to services like Sal= esforce.com, SuccessFactors, and WebEX, as well as B2B partners, internal a= pplications, and of course consumer web sites. See=A0XXX's post <add link> to learn= more about their implementation and view the demo and case study <add links>.


Another early adopter is=A0XXX, a SaaS project management vendo= r who uses the new service to make it easier for any organization using Goo= gle Apps to sign up for and deploy=A0XXX=A0o their users:


<= div style=3D"margin-top:0px;margin-bottom:0px;text-align:center">< INSER= T SCREEN SHOTS>


Activating the OpenID Federated Login service for your domain is simple and= secure. To achieve that, we introduced a new experimental=A0discove= ry protocol=A0addressing some of the challenges with the=A0current version (2.0) of OpenID= :

=A0

  • Reducing the hassle of hosting discovery documents on the domain web-site -= the discovery protocol offer a solution that allows a hosted domain to bec= ome an OpenID Provider without hosting any documents at all. Optionally, a = domain may choose to host one simple file to support a more complete discov= ery flow.

  • Being an OpenID Identity Provider requires stro= ng security protection again attacks that could modify web pages on the sit= e. To avoid that requirement for businesses and organizations, we introduce= d digital signatures on the discovery documents and a verification flow to = support that.

You can find more details in our=A0API=A0and=A0Discovery=A0documentation, or join the discus= sions in the=A0Google Federated Login API Gro= up, where you can ask any question and get answers from with other Iden= tity Providers, Relying Parties and Google engineers.


The OpenID Federated Login Service is available for all Goog= le Apps editions. However, it is disabled by default for the Premier and Ed= ucation and editions =A0, and it requires the Domain Admin to manually enab= le it from the Control Panel. So Admins -=A0go turn this today for you= r users. At Google.com - we already enabled it for our employees...=A0<= /b>


Google Code blog: Over a million new O= penID Identity Providers !

We are happy to announce that the=A0Google Op= enID Federated Login API=A0 has been extended to Google Apps accounts u= sed by businesses, schools, and other organizations. =A0Individuals in thes= e organizations can now sign in to 3rd party websites using their Google Ap= ps account, without giving away their credentials. In addition to the value= for the end-users, the new service also benefits the organizations themsel= ves, who are increasingly reliant on multiple Software as a Service (SaaS) = solutions from different vendors. For example, XXX=A0is an= early adopter, allowing any organization running Google Apps to more quick= ly sign up for and adopt their service:

<< INSERT SCREEN SHOTS>


See our post on the Google Enterprise Blog <<= span style=3D"background-color:rgb(255, 255, 0)">add link> to lea= rn more about the opportunities for the organizations.=A0


Supporting the API for Google Apps accounts is exciting news for the=A0OpenID community, as it adds numerous= new trustworthy Identity Provider (IDP) domains and increases the OpenID e= nd user base by millions. In order to allow web-sites to easily become Rely= ing Parties for these many new IDPs and users, we defined a new=A0= discovery protocol. The protocol allows Relying Parties to identify tha= t a given domain is hosted on Google Apps and securely access its OpenID Pr= ovider End Point. The current proposal is an interim solution, and we are p= articipating in several standardization organizations, such as=A0OASIS=A0= and the=A0OpenID Foundation, to generate a next-generation standard. Since the current protocol prop= osal is not supported by the standard OpenID libraries, we provided an impl= ementation of the Relying Party pieces at the Open Source project -=A0step2.googlecode.com. Goo= gle is also offering a set of resource addressing the issues of designing a= scalable Federated Login User Interface. You are welcome to visit the=A0User Experience summary for Federated Login=A0Go= ogle Sites page, where you can find links do demos, mocks and usabilty rese= arch data.=A0


Prefer an out= -of-the-box solution? We have been working with=A0JanRain, a provider of OpenID solutions, which already support the= new API as part of their=A0RPX product. A= s demonstrated by=A0UserVoice= =A0using=A0JanRain's RPX, a user simply types in her Google Apps = hosted domain name in the OpenID login box and everything else is being tak= en care of:


<Add UserV= oice (or other proposed RPX website) screenshots>

=A0


You can find more details in our=A0API=A0and=A0Discovery= =A0documentation, or join the discussions in the=A0Google Federated Login API Group, where you can ask any que= stion and get answers from with other Identity Providers, Relying Parties a= nd Google engineers.=A0=A0

The OpenID Federated Login Service is available for all Google Apps = editions. However, it is disabled by default for the Premier =A0and Educati= on editions, and it requires the Domain Admin to manually enable it from th= e Control Panel. So Admins -=A0go turn this today for your users. = At Google.com - we already enabled it for our employees...=A0

--00163646d40216fd6e046e362a52-- From santrajan at gmail.com Thu Jul 9 20:44:19 2009 From: santrajan at gmail.com (Santosh Rajan) Date: Thu, 9 Jul 2009 20:44:19 -0700 (PDT) Subject: [OpenID board] upcoming Google announcement regarding OpenID In-Reply-To: References: Message-ID: <24421338.post@talk.nabble.com> Will Norris wrote: > > > > > The other thing that concerns me is how close we are to having a > committee draft of XRD. Admittedly, no we're not there yet. And part > of that delay has been because we're making sure that we have a > solution that all involved parties can live with, including Google. > But I get a bit frustrated when Google claims to be supporting the new > standard (and I'll be the first to say how valuable their input has > been), but appears to be putting all their resources behind an > incompatible approach to the same problem... one that I'm afraid will > only lead to great confusion[0] if it gets any kind of widespread > adoption. If Google wants to throw it out there as a possible stop- > gap solution their customers can use until the next version of OpenID > Discovery is written, that is fine. But I just don't believe it's the > kind of approach the foundation should be endorsing when we're so > close with XRD. > > > Are you kidding? XRI TC hasnt even figured how to sign an XRD document. XML DSig has been around for 11 years and it cant reliably sign an XML document? Why don't XRI TC come out with a simple XRD draft as soon as possible and relieve everyone from all this pain. IS the XRI TC waiting for the cows to come home? ----- Santosh Rajan http://santrajan.blogspot.com http://santrajan.blogspot.com -- View this message in context: http://www.nabble.com/upcoming-Google-announcement-regarding-OpenID-tp24396556p24421338.html Sent from the OpenID - Foundation Board mailing list archive at Nabble.com. From will at willnorris.com Fri Jul 10 09:28:46 2009 From: will at willnorris.com (Will Norris) Date: Fri, 10 Jul 2009 09:28:46 -0700 Subject: [OpenID board] upcoming Google announcement regarding OpenID In-Reply-To: <24421338.post@talk.nabble.com> References: <24421338.post@talk.nabble.com> Message-ID: <593F6E9C-E46B-4938-813C-7DC42CFCD2ED@willnorris.com> On Jul 9, 2009, at 8:44 PM, Santosh Rajan wrote: > Are you kidding? XRI TC hasnt even figured how to sign an XRD > document. XML > DSig has been around for 11 years and it cant reliably sign an XML > document? > Why don't XRI TC come out with a simple XRD draft as soon as > possible and > relieve everyone from all this pain. IS the XRI TC waiting for the > cows to > come home? You're welcome to track the progress of XRD in the OASIS svn repository[0]. There is only a docbook version there, we don't have the HTML versions in subversion... unfortunately the OASIS document repository requires authentication. [0]: http://tools.oasis-open.org/version-control/svn/xri/xrd/1.0/trunk/ While this is not really the best place to talk about XRD specifics, I'll address your point about signatures to say that XRD is in fact using XML DSig for signing. More accurately, we're using a constrained profile of DSig using Exclusive Canonicalization that should be much easier to implement than full inclusive c14n. This is the same approach taken in SAML 2.0. One of my personal qualms with Google's recommended discovery extension is that it significantly differs from XRD in this (they are using their own signing method instead of traditional DSig) and other ways , while being strikingly similar in others. I believe this will lead to unnecessary confusion. To be clear, my opposition to a foundation endorsement of this is not based on the merits of the proposed protocol (aside from some specific language I've already pointed out)... the XRI TC is the correct place to debate that. Rather, my opposition is based on my belief that widespread adoption of the proposed protocol will confuse, and possibly fragment, the community if XRD does end up being the solution for OpenID discovery in the not-too-distant future. On Jul 9, 2009, at 5:10 PM, Eric Sachs wrote: > We haven't formally announced it yet :-) We keep delaying > internally, but > at some point we'll have to launch it and I would be surprised if we > can > hold off for longer then a few weeks given how many months we have > already > delayed. But when the drafts get finalized, we're hoping to support > it > within a small number of days and remove documentation for the > proof-of-concept approach. The partners we have already worked with > have > read the warnings in our documentation that we will be switching the > discovery mechanism once the standards gets solidified, so they are > prepared > to have to make that change on their side. This sounds great, it's good to know that you plan on migrating to XRD in a timely fashion when it is ready. I don't mean to discount the contributions Google has made to the community both in helping to develop and implement these standards. And if you need to go forward with a temporary solution in the meantime in order to satisfy existing customers, that's perfectly fine. I understand that Google is free to move forward with whatever is necessary for your business, I'm not suggesting otherwise. But if the work is being done with specific partners, I'm not sure why that necessitates a public announcement including endorsement from the foundation. Is it not sufficient to point implementors to the Google document on an individual basis, which is what I would assume you've been doing thus far? You're absolutely right that a public announcement would likely lead at least some in the community and the press to interpret this move as Google trying to co-opt OpenID. But I'm not sure that the foundation publicly supporting the move is the right solution to that problem. I think my particular horse is pretty well dead enough already, so I'll shut up for now. I've said my piece... it is of course the board's decision to make. -will From santrajan at gmail.com Fri Jul 10 09:46:18 2009 From: santrajan at gmail.com (Santosh Rajan) Date: Fri, 10 Jul 2009 09:46:18 -0700 (PDT) Subject: [OpenID board] upcoming Google announcement regarding OpenID In-Reply-To: <593F6E9C-E46B-4938-813C-7DC42CFCD2ED@willnorris.com> References: <24421338.post@talk.nabble.com> <593F6E9C-E46B-4938-813C-7DC42CFCD2ED@willnorris.com> Message-ID: <24431020.post@talk.nabble.com> I think you are not seeing the real issue here. This is not about Google. This is about a Company (it could have been anyone), who has a problem to solve. It so happens we are already working on a solution. It is just that we can't come up with a solution as fast as they would like it. So why don't we at least give the Company credit for consulting with us, and why don't we try to come up with a good, usefull solution for them? Will Norris wrote: > > > On Jul 9, 2009, at 8:44 PM, Santosh Rajan wrote: > >> Are you kidding? XRI TC hasnt even figured how to sign an XRD >> document. XML >> DSig has been around for 11 years and it cant reliably sign an XML >> document? >> Why don't XRI TC come out with a simple XRD draft as soon as >> possible and >> relieve everyone from all this pain. IS the XRI TC waiting for the >> cows to >> come home? > > > You're welcome to track the progress of XRD in the OASIS svn > repository[0]. There is only a docbook version there, we don't have > the HTML versions in subversion... unfortunately the OASIS document > repository requires authentication. > > [0]: http://tools.oasis-open.org/version-control/svn/xri/xrd/1.0/trunk/ > > While this is not really the best place to talk about XRD specifics, > I'll address your point about signatures to say that XRD is in fact > using XML DSig for signing. More accurately, we're using a > constrained profile of DSig using Exclusive Canonicalization that > should be much easier to implement than full inclusive c14n. This is > the same approach taken in SAML 2.0. > > One of my personal qualms with Google's recommended discovery > extension is that it significantly differs from XRD in this (they are > using their own signing method instead of traditional DSig) and other > ways , while being strikingly similar in others. I believe this will > lead to unnecessary confusion. To be clear, my opposition to a > foundation endorsement of this is not based on the merits of the > proposed protocol (aside from some specific language I've already > pointed out)... the XRI TC is the correct place to debate that. > Rather, my opposition is based on my belief that widespread adoption > of the proposed protocol will confuse, and possibly fragment, the > community if XRD does end up being the solution for OpenID discovery > in the not-too-distant future. > > > On Jul 9, 2009, at 5:10 PM, Eric Sachs wrote: > >> We haven't formally announced it yet :-) We keep delaying >> internally, but >> at some point we'll have to launch it and I would be surprised if we >> can >> hold off for longer then a few weeks given how many months we have >> already >> delayed. But when the drafts get finalized, we're hoping to support >> it >> within a small number of days and remove documentation for the >> proof-of-concept approach. The partners we have already worked with >> have >> read the warnings in our documentation that we will be switching the >> discovery mechanism once the standards gets solidified, so they are >> prepared >> to have to make that change on their side. > > This sounds great, it's good to know that you plan on migrating to XRD > in a timely fashion when it is ready. I don't mean to discount the > contributions Google has made to the community both in helping to > develop and implement these standards. And if you need to go forward > with a temporary solution in the meantime in order to satisfy existing > customers, that's perfectly fine. I understand that Google is free to > move forward with whatever is necessary for your business, I'm not > suggesting otherwise. But if the work is being done with specific > partners, I'm not sure why that necessitates a public announcement > including endorsement from the foundation. Is it not sufficient to > point implementors to the Google document on an individual basis, > which is what I would assume you've been doing thus far? You're > absolutely right that a public announcement would likely lead at least > some in the community and the press to interpret this move as Google > trying to co-opt OpenID. But I'm not sure that the foundation > publicly supporting the move is the right solution to that problem. > > I think my particular horse is pretty well dead enough already, so > I'll shut up for now. I've said my piece... it is of course the > board's decision to make. > > -will > _______________________________________________ > board mailing list > board at openid.net > http://openid.net/mailman/listinfo/board > > ----- Santosh Rajan http://santrajan.blogspot.com http://santrajan.blogspot.com -- View this message in context: http://www.nabble.com/upcoming-Google-announcement-regarding-OpenID-tp24396556p24431020.html Sent from the OpenID - Foundation Board mailing list archive at Nabble.com. From esachs at google.com Fri Jul 10 10:43:36 2009 From: esachs at google.com (Eric Sachs) Date: Fri, 10 Jul 2009 10:43:36 -0700 Subject: [OpenID board] upcoming Google announcement regarding OpenID In-Reply-To: <24431020.post@talk.nabble.com> References: <24421338.post@talk.nabble.com> <593F6E9C-E46B-4938-813C-7DC42CFCD2ED@willnorris.com> <24431020.post@talk.nabble.com> Message-ID: --0016364ef4d619fd67046e5d8329 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit At Google we had some discussion of moving up the data of our formal announcement, but we are going to try to continue to delay the posts until we at least finish some minor functional work we are doing in the Google Apps admin panel. It would certainly be great if the discovery standards discussions evolved between now and then. In the meantime, though, the functionality does work for free Google Apps domains, so feel free to use it for "proof-of-concept" testing if that helps the discovery standards discussions. On Fri, Jul 10, 2009 at 9:46 AM, Santosh Rajan wrote: > > I think you are not seeing the real issue here. This is not about Google. > This is about a Company (it could have been anyone), who has a problem to > solve. It so happens we are already working on a solution. It is just that > we can't come up with a solution as fast as they would like it. > > So why don't we at least give the Company credit for consulting with us, > and > why don't we try to come up with a good, usefull solution for them? > > > Will Norris wrote: > > > > > > On Jul 9, 2009, at 8:44 PM, Santosh Rajan wrote: > > > >> Are you kidding? XRI TC hasnt even figured how to sign an XRD > >> document. XML > >> DSig has been around for 11 years and it cant reliably sign an XML > >> document? > >> Why don't XRI TC come out with a simple XRD draft as soon as > >> possible and > >> relieve everyone from all this pain. IS the XRI TC waiting for the > >> cows to > >> come home? > > > > > > You're welcome to track the progress of XRD in the OASIS svn > > repository[0]. There is only a docbook version there, we don't have > > the HTML versions in subversion... unfortunately the OASIS document > > repository requires authentication. > > > > [0]: http://tools.oasis-open.org/version-control/svn/xri/xrd/1.0/trunk/ > > > > While this is not really the best place to talk about XRD specifics, > > I'll address your point about signatures to say that XRD is in fact > > using XML DSig for signing. More accurately, we're using a > > constrained profile of DSig using Exclusive Canonicalization that > > should be much easier to implement than full inclusive c14n. This is > > the same approach taken in SAML 2.0. > > > > One of my personal qualms with Google's recommended discovery > > extension is that it significantly differs from XRD in this (they are > > using their own signing method instead of traditional DSig) and other > > ways , while being strikingly similar in others. I believe this will > > lead to unnecessary confusion. To be clear, my opposition to a > > foundation endorsement of this is not based on the merits of the > > proposed protocol (aside from some specific language I've already > > pointed out)... the XRI TC is the correct place to debate that. > > Rather, my opposition is based on my belief that widespread adoption > > of the proposed protocol will confuse, and possibly fragment, the > > community if XRD does end up being the solution for OpenID discovery > > in the not-too-distant future. > > > > > > On Jul 9, 2009, at 5:10 PM, Eric Sachs wrote: > > > >> We haven't formally announced it yet :-) We keep delaying > >> internally, but > >> at some point we'll have to launch it and I would be surprised if we > >> can > >> hold off for longer then a few weeks given how many months we have > >> already > >> delayed. But when the drafts get finalized, we're hoping to support > >> it > >> within a small number of days and remove documentation for the > >> proof-of-concept approach. The partners we have already worked with > >> have > >> read the warnings in our documentation that we will be switching the > >> discovery mechanism once the standards gets solidified, so they are > >> prepared > >> to have to make that change on their side. > > > > This sounds great, it's good to know that you plan on migrating to XRD > > in a timely fashion when it is ready. I don't mean to discount the > > contributions Google has made to the community both in helping to > > develop and implement these standards. And if you need to go forward > > with a temporary solution in the meantime in order to satisfy existing > > customers, that's perfectly fine. I understand that Google is free to > > move forward with whatever is necessary for your business, I'm not > > suggesting otherwise. But if the work is being done with specific > > partners, I'm not sure why that necessitates a public announcement > > including endorsement from the foundation. Is it not sufficient to > > point implementors to the Google document on an individual basis, > > which is what I would assume you've been doing thus far? You're > > absolutely right that a public announcement would likely lead at least > > some in the community and the press to interpret this move as Google > > trying to co-opt OpenID. But I'm not sure that the foundation > > publicly supporting the move is the right solution to that problem. > > > > I think my particular horse is pretty well dead enough already, so > > I'll shut up for now. I've said my piece... it is of course the > > board's decision to make. > > > > -will > > _______________________________________________ > > board mailing list > > board at openid.net > > http://openid.net/mailman/listinfo/board > > > > > > > ----- > > Santosh Rajan > http://santrajan.blogspot.com http://santrajan.blogspot.com > -- > View this message in context: > http://www.nabble.com/upcoming-Google-announcement-regarding-OpenID-tp24396556p24431020.html > Sent from the OpenID - Foundation Board mailing list archive at Nabble.com. > > _______________________________________________ > board mailing list > board at openid.net > http://openid.net/mailman/listinfo/board > --0016364ef4d619fd67046e5d8329 Content-Type: text/html; charset=ISO-8859-1 Content-Transfer-Encoding: quoted-printable
At Google we had some discussion of moving up the data of our formal a= nnouncement, but we=A0are going to try to continue to delay the posts until we = at least finish some minor functional work we are doing in the Google Apps = admin panel. =A0It would certainly be great if the discovery standards disc= ussions evolved between now and then.
=
In the meantime, though, the functionality does work for f= ree Google Apps domains, so feel free to use it for "proof-of-concept&= quot; testing if that helps the discovery standards discussions.


On Fri, Jul 10, 2009 at 9:46 = AM, Santosh Rajan <santrajan at gmail.com> wrote:

I think you are not seeing the real issue here. This is not about Google. This is about a Company (it could have been anyone), who has a problem to solve. It so happens we are already working on a solution. It is just that<= br> we can't come up with a solution as fast as they would like it.

So why don't we at least give the Company credit for consulting with us= , and
why don't we try to come up with a good, usefull solution for them?


Will Norris wrote:
>
>
> On Jul 9, 2009, at 8:44 PM, Santosh Rajan wrote:
>
>> Are you kidding? XRI TC hasnt even figured how to sign an XRD
>> document. XML
>> DSig has been around for 11 years and it cant reliably sign an XML=
>> document?
>> Why don't XRI TC come out with a simple XRD draft as soon as >> possible and
>> relieve everyone from all this pain. IS the XRI TC waiting for the=
>> cows to
>> come home?
>
>
> You're welcome to track the progress of XRD in the OASIS svn
> repository[0]. =A0There is only a docbook version there, we don't = have
> the HTML versions in subversion... unfortunately the OASIS document > repository requires authentication.
>
> [0]: http://tools.oasis-open.org/version-control= /svn/xri/xrd/1.0/trunk/
>
> While this is not really the best place to talk about XRD specifics, > I'll address your point about signatures to say that XRD is in fac= t
> using XML DSig for signing. =A0More accurately, we're using a
> constrained profile of DSig using Exclusive Canonicalization that
> should be much easier to implement than full inclusive c14n. =A0This i= s
> the same approach taken in SAML 2.0.
>
> One of my personal qualms with Google's recommended discovery
> extension is that it significantly differs from XRD in this (they are<= br> > using their own signing method instead of traditional DSig) and other<= br> > ways , while being strikingly similar in others. =A0I believe this wil= l
> lead to unnecessary confusion. =A0To be clear, my opposition to a
> foundation endorsement of this is not based on the merits of the
> proposed protocol (aside from some specific language I've already<= br> > pointed out)... the XRI TC is the correct place to debate that.
> Rather, my opposition is based on my belief that widespread adoption > of the proposed protocol will confuse, and possibly fragment, the
> community if XRD does end up being the solution for OpenID discovery > in the not-too-distant future.
>
>
> On Jul 9, 2009, at 5:10 PM, Eric Sachs wrote:
>
>> We haven't formally announced it yet :-) =A0We keep delaying >> internally, but
>> at some point we'll have to launch it and I would be surprised= if we
>> can
>> hold off for longer then a few weeks given how many months we have=
>> already
>> delayed. =A0But when the drafts get finalized, we're hoping to= support
>> it
>> within a small number of days and remove documentation for the
>> proof-of-concept approach. =A0The partners we have already worked = with
>> have
>> read the warnings in our documentation that we will be switching t= he
>> discovery mechanism once the standards gets solidified, so they ar= e
>> prepared
>> to have to make that change on their side.
>
> This sounds great, it's good to know that you plan on migrating to= XRD
> in a timely fashion when it is ready. =A0I don't mean to discount = the
> contributions Google has made to the community both in helping to
> develop and implement these standards. =A0And if you need to go forwar= d
> with a temporary solution in the meantime in order to satisfy existing=
> customers, that's perfectly fine. =A0I understand that Google is f= ree to
> move forward with whatever is necessary for your business, I'm not=
> suggesting otherwise. =A0But if the work is being done with specific > partners, I'm not sure why that necessitates a public announcement=
> including endorsement from the foundation. =A0Is it not sufficient to<= br> > point implementors to the Google document on an individual basis,
> which is what I would assume you've been doing thus far? =A0You= 9;re
> absolutely right that a public announcement would likely lead at least=
> some in the community and the press to interpret this move as Google > trying to co-opt OpenID. =A0But I'm not sure that the foundation > publicly supporting the move is the right solution to that problem. >
> I think my particular horse is pretty well dead enough already, so
> I'll shut up for now. =A0I've said my piece... it is of course= the
> board's decision to make.
>
> -will
> _______________________________________________
> board mailing list
> board at openid.net
> http://openid.net/mailman/listinfo/board
>
>


View this message in context: http://www.nabble.com/upcoming-Google-announcement-regarding-OpenI= D-tp24396556p24431020.html
Sent from the OpenID - Foundation Board mailing list arch= ive at Nabble.com.

_______________________________________________

--0016364ef4d619fd67046e5d8329-- From esachs at google.com Tue Jul 28 08:28:04 2009 From: esachs at google.com (Eric Sachs) Date: Tue, 28 Jul 2009 08:28:04 -0700 Subject: [OpenID board] upcoming Google announcement regarding OpenID In-Reply-To: References: Message-ID: --001636456f967cc861046fc5b719 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit The Google announcement of this new OpenID service has now been formally posted at http://googlecode.blogspot.com/2009/07/google-apps-openid-identity-hub-for.html On Wed, Jul 8, 2009 at 11:47 AM, Eric Sachs wrote: > Yes, I now realize I mistakenly posted this to the public instead or > private board mailing list :-) Not a particularly big deal since we have > been discussing this planned launch in the discovery community. > Feel free to respond on either the public or private mailing list. > > On Wed, Jul 8, 2009 at 11:05 AM, Eric Sachs wrote: > >> Below are drafts of two blog posts we will make in the upcoming weeks >> about the fact that we are now operating an OpenID IDP for the million+ >> schools/enterprise/ISPs that are outsourcing their email to Google Apps. We >> would appreciate this not being circulated beyond the board until it is >> public. This new support required that we work with the community to define >> some extensions to the OpenID discovery process. While those discussions >> have been going on in the community the last few months, those extensions >> are not yet formalized and probably won't be until they are proven in >> production environments. There is the potential for some community members >> (or press) to assume (or at least imply in articles) some evil intent by >> Google to co-opt OpenID with these extensions. It would be nice to have a >> blog post on the formal OpenID blog that was supportive of our approach, so >> I wanted to see if the board members are comfortable with that. >> >> On a somewhat related point, I also expect this will further increase the >> pressure on us as a community to find more scalable UI options since the >> Nascar style approach obviously cannot include buttons for these million new >> IDPs. We have also just posted a set of summary UI guidelines that we will >> be referencing from our API documentation at >> http://sites.google.com/site/oauthgoog/UXFedLogin/summary. The goal was >> to keep it to one-page which forced us to cut additional background >> information, but if you think we cut something critical, let me know. >> >> Enterprise blog: Google Apps + OpenID = identity hub for all your SaaS >> >> We are happy to announce that the Google OpenID Federated Login API has >> been extended to Google Apps accounts used by businesses, schools, and other >> organizations. The service is important not only to the individuals in those >> organizations, who can interact with a variety of consumer websites with a >> single credential , but also to the >> organizations themselves, who are increasingly reliant on multiple Software >> as a Service (SaaS) solutions from different vendors. >> >> >> For these organizations, Google Apps can now become an identity and data >> hub for multiple SaaS providers. When integrated with partner solutions such >> as XXX from XXX, the Google Open ID Federated Login API enables a single >> Google Apps login to provide secure access to services like Salesforce.com, >> SuccessFactors, and WebEX, as well as B2B partners, internal applications, >> and of course consumer web sites. See XXX's post to learn more >> about their implementation and view the demo and case study . >> >> >> Another early adopter is XXX, a SaaS project management vendor who uses >> the new service to make it easier for any organization using Google Apps to >> sign up for and deploy XXX o their users: >> >> < INSERT SCREEN SHOTS> >> >> >> Activating the OpenID Federated Login service for your domain is simple >> and secure. To achieve that, we introduced a new experimental discovery >> protocol addressing >> some of the challenges with the current version (2.0) of OpenID >> : >> >> >> >> - Reducing the hassle of hosting discovery documents on the domain >> web-site - the discovery protocol offer a solution that allows a hosted >> domain to become an OpenID Provider without hosting any documents at all. >> Optionally, a domain may choose to host one simple file to support a more >> complete discovery flow. >> >> >> >> - Being an OpenID Identity Provider requires strong security >> protection again attacks that could modify web pages on the site. To avoid >> that requirement for businesses and organizations, we introduced digital >> signatures on the discovery documents and a verification flow to support >> that. >> >> >> You can find more details in our API >> and Discovery documentation, >> or join the discussions in the Google Federated Login API Group, >> where you can ask any question and get answers from with other Identity >> Providers, Relying Parties and Google engineers. >> >> >> *The OpenID Federated Login Service is available for all Google Apps >> editions. However, it is disabled by default for the Premier and Education >> and editions , and it requires the Domain Admin to manually enable it from >> the Control Panel. So Admins - go turn this today for your users. >> At Google.com - we already enabled it for our employees... * >> >> >> Google Code blog: Over a million new OpenID Identity Providers !We are >> happy to announce that the Google OpenID Federated Login API >> has been extended to Google Apps accounts used by businesses, schools, and >> other organizations. Individuals in these organizations can now sign in to >> 3rd party websites using their Google Apps account, without giving away >> their credentials. In addition to the value for the end-users, the new >> service also benefits the organizations themselves, who are increasingly >> reliant on multiple Software as a Service (SaaS) solutions from different >> vendors. For example, XXX is an early adopter, allowing any organization >> running Google Apps to more quickly sign up for and adopt their service: >> >> << INSERT SCREEN SHOTS> >> >> >> See our post on the Google Enterprise Blog to learn more about >> the opportunities for the organizations. >> >> >> Supporting the API for Google Apps accounts is exciting news for the OpenID >> community , as it adds numerous new trustworthy >> Identity Provider (IDP) domains and increases the OpenID end user base by >> millions. In order to allow web-sites to easily become Relying Parties for >> these many new IDPs and users, we defined a new discovery protocol. >> The protocol allows Relying Parties to identify that a given domain is >> hosted on Google Apps and securely access its OpenID Provider End Point. The >> current proposal is an interim solution, and we are participating in several >> standardization organizations, such as OASIS and >> the OpenID Foundation , to generate a >> next-generation standard. Since the current protocol proposal is not >> supported by the standard OpenID libraries, we provided an implementation of >> the Relying Party pieces at the Open Source project - >> step2.googlecode.com . Google is also >> offering a set of resource addressing the issues of designing a scalable >> Federated Login User Interface. You are welcome to visit the User >> Experience summary for Federated Login Google >> Sites page, where you can find links do demos, mocks and usabilty research >> data. >> >> Prefer an out-of-the-box solution? We have been working with JanRain, >> a provider of OpenID solutions, which already support the new API as part of >> their RPX product . As demonstrated by UserVoice >> using JanRain's RPX , a user simply types in her >> Google Apps hosted domain name in the OpenID login box and everything else >> is being taken care of: >> >> >> >> >> >> >> You can find more details in our API >> and Discovery documentation, >> or join the discussions in the Google Federated Login API Group, >> where you can ask any question and get answers from with other Identity >> Providers, Relying Parties and Google engineers. >> >> *The OpenID Federated Login Service is available for all Google Apps >> editions. However, it is disabled by default for the Premier and Education >> editions, and it requires the Domain Admin to manually enable it from the >> Control Panel. So Admins - go turn this today for your users. >> At Google.com - we already enabled it for our employees... * >> > > --001636456f967cc861046fc5b719 Content-Type: text/html; charset=ISO-8859-1 Content-Transfer-Encoding: quoted-printable The Google announcement of this new OpenID service has now been formally po= sted at

On Wed, Jul 8, 2009 at 11:47 AM, Eric = Sachs <esachs at google.com> wrote:
Yes, I now realiz= e I mistakenly posted this to the public instead or private board mailing l= ist :-) =A0Not a particularly big deal since we have been discussing this p= lanned launch in the discovery community.

Feel free to respond on either the public or private mailing list.

On Wed, Jul 8, 2009 at 11:= 05 AM, Eric Sachs <esachs at google.com> wrote:
Below are dr= afts of two blog posts we will make in the upcoming weeks about the fact th= at we are now operating an OpenID IDP for the million+ schools/enterprise/I= SPs that are outsourcing their email to Google Apps. =A0We would appreciate= this not being circulated beyond the board until it is public. =A0This new= support required that we work with the community to define some extensions= to the OpenID discovery process. =A0While those discussions have been goin= g on in the community the last few months, those extensions are not yet for= malized and probably won't be until they are proven in production envir= onments. =A0There is the potential for some community members (or press) to= assume (or at least imply in articles) some evil intent by Google to co-op= t OpenID with these extensions. =A0It would be nice to have a blog post on = the formal OpenID blog that was supportive of our approach, so I wanted to = see if the board members are comfortable with that.

On a somewhat related point, I also expect this will fu= rther increase the pressure on us as a community to find more scalable UI o= ptions since the Nascar style approach obviously cannot include buttons for= these million new IDPs. =A0We have also just posted a set of summary UI gu= idelines that we will be referencing from our API documentation at=A0http://sites.google.com/site/oauthgoog/UXFedLogin/summary. =A0Th= e goal was to keep it to one-page which forced us to cut additional backgro= und information, but if you think we cut something critical, let me know.

Enterprise blog: Goo= gle Apps + OpenID =3D identity hub for all your SaaS

We are happy to announce that the=A0Google OpenID F= ederated Login API=A0has been extended to Google Apps accounts used by = businesses, schools, and other organizations. The service is important not = only to the individuals in those organizations, who can interact with a var= iety of consumer websites with a single credential <add link to Google code post>, bu= t also to the organizations themselves, who are increasingly reliant on mul= tiple Software as a Service (SaaS) solutions from different vendors.


For these organizations, Google Apps can = now become an identity and data hub for multiple SaaS providers. When integ= rated with partner solutions such as XXX from=A0XXX, the Google Open ID Fed= erated Login API enables a single Google Apps login to provide secure acces= s to services like Salesforce.com, SuccessFactors, and WebEX, as well as B2= B partners, internal applications, and of course consumer web sites. See=A0= XXX's post <add = link> to learn more about their implementation and view the demo = and case study <add = links>.


Another early adopter is=A0XXX, a SaaS pr= oject management vendor who uses the new service to make it easier for any = organization using Google Apps to sign up for and deploy=A0XXX=A0o their us= ers:


Activating the OpenID Federated Login service for your domain is simple and= secure. To achieve that, we introduced a new experimental=A0discove= ry protocol=A0addressing some of the challenges with the=A0current version (2.0) of OpenID= :

=A0

    Reducing the hassle of hosting discovery documents on the domain web-site -= the discovery protocol offer a solution that allows a hosted domain to bec= ome an OpenID Provider without hosting any documents at all. Optionally, a = domain may choose to host one simple file to support a more complete discov= ery flow.

  • Being an OpenID Identity Provider requi= res strong security protection again attacks that could modify web pages on= the site. To avoid that requirement for businesses and organizations, we i= ntroduced digital signatures on the discovery documents and a verification = flow to support that.

You can find more details in our=A0API=A0and=A0Discovery=A0documentation, or join the discus= sions in the=A0Google Federated Login API Gro= up, where you can ask any question and get answers from with other Iden= tity Providers, Relying Parties and Google engineers.


The OpenID Federated Login Service is = available for all Google Apps editions. However, it is disabled by default = for the Premier and Education and editions =A0, and it requires the Domain = Admin to manually enable it from the Control Panel. So Admins -=A0go = turn this today for your users. At Google.com - we already enabled it f= or our employees...=A0


Google Code blog: Over a million new= OpenID Identity Providers !

We are happy to announce that the=A0Google O= penID Federated Login API=A0 has been extended to Google Apps accounts = used by businesses, schools, and other organizations. =A0Individuals in the= se organizations can now sign in to 3rd party websites using their Google A= pps account, without giving away their credentials. In addition to the valu= e for the end-users, the new service also benefits the organizations themse= lves, who are increasingly reliant on multiple Software as a Service (SaaS)= solutions from different vendors. For example, XXX=A0is a= n early adopter, allowing any organization running Google Apps to more quic= kly sign up for and adopt their service:

<< INSERT SCREEN SHOTS>


See our post on the Google Enterprise = Blog <add link> to learn more about the opportunities for the organizations.=A0


Supporting the API for Google Apps accounts is exciting news for the=A0OpenID community, as it adds numero= us new trustworthy Identity Provider (IDP) domains and increases the OpenID= end user base by millions. In order to allow web-sites to easily become Re= lying Parties for these many new IDPs and users, we defined a new=A0= discovery protocol. The protocol allows Relying Parties to identify tha= t a given domain is hosted on Google Apps and securely access its OpenID Pr= ovider End Point. The current proposal is an interim solution, and we are p= articipating in several standardization organizations, such as=A0OASIS=A0= and the=A0OpenID Foundation= , to generate a next-generation standard. Since the current protocol pr= oposal is not supported by the standard OpenID libraries, we provided an im= plementation of the Relying Party pieces at the Open Source project -=A0step2.googlecode.com.= Google is also offering a set of resource addressing the issues of designi= ng a scalable Federated Login User Interface. You are welcome to visit the= =A0User Experience summary for Federated Login=A0Google Sites page, where you can find links do demos, mocks and usabil= ty research data.=A0


Prefer an= out-of-the-box solution? We have been working with=A0
JanRain, a provider of OpenID solutions, which already supp= ort the new API as part of their=A0RPX produ= ct. As demonstrated by=A0Use= rVoice=A0using=A0JanRain's RPX, a user simply types in her Go= ogle Apps hosted domain name in the OpenID login box and everything else is= being taken care of:


<Add UserVoice (or other proposed RPX website) screenshots>= ;

=A0


You can find more details in our=A0API=A0and=A0Discovery=A0documentation, or join the discussions in the= =A0Google Federated Login API Group, wher= e you can ask any question and get answers from with other Identity Provide= rs, Relying Parties and Google engineers.=A0=A0

The OpenID Federated Login Service is available for all Google Apps = editions. However, it is disabled by default for the Premier =A0and Educati= on editions, and it requires the Domain Admin to manually enable it from th= e Control Panel. So Admins -=A0go turn this today for your users. = At Google.com - we already enabled it for our employees...=A0


--001636456f967cc861046fc5b719-- From santrajan at gmail.com Tue Jul 28 08:48:43 2009 From: santrajan at gmail.com (Santosh Rajan) Date: Tue, 28 Jul 2009 21:18:43 +0530 Subject: [OpenID board] upcoming Google announcement regarding OpenID In-Reply-To: References: Message-ID: --001636458338543cb9046fc6013b Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit Hehe! First time Google is formally using the word "OpenID" for their Federated Login!This is also the first positive development for OpenID (technically) I am seeing in months. Gr8 work! On Tue, Jul 28, 2009 at 8:58 PM, Eric Sachs wrote: > The Google announcement of this new OpenID service has now been formally > posted at > > http://googlecode.blogspot.com/2009/07/google-apps-openid-identity-hub-for.html > > On Wed, Jul 8, 2009 at 11:47 AM, Eric Sachs wrote: > >> Yes, I now realize I mistakenly posted this to the public instead or >> private board mailing list :-) Not a particularly big deal since we have >> been discussing this planned launch in the discovery community. >> Feel free to respond on either the public or private mailing list. >> >> On Wed, Jul 8, 2009 at 11:05 AM, Eric Sachs wrote: >> >>> Below are drafts of two blog posts we will make in the upcoming weeks >>> about the fact that we are now operating an OpenID IDP for the million+ >>> schools/enterprise/ISPs that are outsourcing their email to Google Apps. We >>> would appreciate this not being circulated beyond the board until it is >>> public. This new support required that we work with the community to define >>> some extensions to the OpenID discovery process. While those discussions >>> have been going on in the community the last few months, those extensions >>> are not yet formalized and probably won't be until they are proven in >>> production environments. There is the potential for some community members >>> (or press) to assume (or at least imply in articles) some evil intent by >>> Google to co-opt OpenID with these extensions. It would be nice to have a >>> blog post on the formal OpenID blog that was supportive of our approach, so >>> I wanted to see if the board members are comfortable with that. >>> >>> On a somewhat related point, I also expect this will further increase the >>> pressure on us as a community to find more scalable UI options since the >>> Nascar style approach obviously cannot include buttons for these million new >>> IDPs. We have also just posted a set of summary UI guidelines that we will >>> be referencing from our API documentation at >>> http://sites.google.com/site/oauthgoog/UXFedLogin/summary. The goal was >>> to keep it to one-page which forced us to cut additional background >>> information, but if you think we cut something critical, let me know. >>> >>> Enterprise blog: Google Apps + OpenID = identity hub for all your SaaS >>> >>> We are happy to announce that the Google OpenID Federated Login API has >>> been extended to Google Apps accounts used by businesses, schools, and other >>> organizations. The service is important not only to the individuals in those >>> organizations, who can interact with a variety of consumer websites with a >>> single credential , but also to the >>> organizations themselves, who are increasingly reliant on multiple Software >>> as a Service (SaaS) solutions from different vendors. >>> >>> >>> For these organizations, Google Apps can now become an identity and data >>> hub for multiple SaaS providers. When integrated with partner solutions such >>> as XXX from XXX, the Google Open ID Federated Login API enables a single >>> Google Apps login to provide secure access to services like Salesforce.com, >>> SuccessFactors, and WebEX, as well as B2B partners, internal applications, >>> and of course consumer web sites. See XXX's post to learn >>> more about their implementation and view the demo and case study >> links>. >>> >>> >>> Another early adopter is XXX, a SaaS project management vendor who uses >>> the new service to make it easier for any organization using Google Apps to >>> sign up for and deploy XXX o their users: >>> >>> < INSERT SCREEN SHOTS> >>> >>> >>> Activating the OpenID Federated Login service for your domain is simple >>> and secure. To achieve that, we introduced a new experimental discovery >>> protocol addressing >>> some of the challenges with the current version (2.0) of OpenID >>> : >>> >>> >>> >>> - Reducing the hassle of hosting discovery documents on the domain >>> web-site - the discovery protocol offer a solution that allows a hosted >>> domain to become an OpenID Provider without hosting any documents at all. >>> Optionally, a domain may choose to host one simple file to support a more >>> complete discovery flow. >>> >>> >>> >>> - Being an OpenID Identity Provider requires strong security >>> protection again attacks that could modify web pages on the site. To avoid >>> that requirement for businesses and organizations, we introduced digital >>> signatures on the discovery documents and a verification flow to support >>> that. >>> >>> >>> You can find more details in our API >>> and Discovery documentation, >>> or join the discussions in the Google Federated Login API Group, >>> where you can ask any question and get answers from with other Identity >>> Providers, Relying Parties and Google engineers. >>> >>> >>> *The OpenID Federated Login Service is available for all Google Apps >>> editions. However, it is disabled by default for the Premier and Education >>> and editions , and it requires the Domain Admin to manually enable it from >>> the Control Panel. So Admins - go turn this today for your users. >>> At Google.com - we already enabled it for our employees... * >>> >>> >>> Google Code blog: Over a million new OpenID Identity Providers !We are >>> happy to announce that the Google OpenID Federated Login API >>> has been extended to Google Apps accounts used by businesses, schools, and >>> other organizations. Individuals in these organizations can now sign in to >>> 3rd party websites using their Google Apps account, without giving away >>> their credentials. In addition to the value for the end-users, the new >>> service also benefits the organizations themselves, who are increasingly >>> reliant on multiple Software as a Service (SaaS) solutions from different >>> vendors. For example, XXX is an early adopter, allowing any organization >>> running Google Apps to more quickly sign up for and adopt their service: >>> >>> << INSERT SCREEN SHOTS> >>> >>> >>> See our post on the Google Enterprise Blog to learn more >>> about the opportunities for the organizations. >>> >>> >>> Supporting the API for Google Apps accounts is exciting news for the OpenID >>> community , as it adds numerous new trustworthy >>> Identity Provider (IDP) domains and increases the OpenID end user base by >>> millions. In order to allow web-sites to easily become Relying Parties for >>> these many new IDPs and users, we defined a new discovery protocol. >>> The protocol allows Relying Parties to identify that a given domain is >>> hosted on Google Apps and securely access its OpenID Provider End Point. The >>> current proposal is an interim solution, and we are participating in several >>> standardization organizations, such as OASIS and >>> the OpenID Foundation , to generate a >>> next-generation standard. Since the current protocol proposal is not >>> supported by the standard OpenID libraries, we provided an implementation of >>> the Relying Party pieces at the Open Source project - >>> step2.googlecode.com . Google is also >>> offering a set of resource addressing the issues of designing a scalable >>> Federated Login User Interface. You are welcome to visit the User >>> Experience summary for Federated Login Google >>> Sites page, where you can find links do demos, mocks and usabilty research >>> data. >>> >>> Prefer an out-of-the-box solution? We have been working with JanRain, >>> a provider of OpenID solutions, which already support the new API as part of >>> their RPX product . As demonstrated by UserVoice >>> using JanRain's RPX , a user simply types in her >>> Google Apps hosted domain name in the OpenID login box and everything else >>> is being taken care of: >>> >>> >>> >>> >>> >>> >>> You can find more details in our API >>> and Discovery documentation, >>> or join the discussions in the Google Federated Login API Group, >>> where you can ask any question and get answers from with other Identity >>> Providers, Relying Parties and Google engineers. >>> >>> *The OpenID Federated Login Service is available for all Google Apps >>> editions. However, it is disabled by default for the Premier and Education >>> editions, and it requires the Domain Admin to manually enable it from the >>> Control Panel. So Admins - go turn this today for your users. >>> At Google.com - we already enabled it for our employees... * >>> >> >> > > _______________________________________________ > board mailing list > board at openid.net > http://openid.net/mailman/listinfo/board > > --001636458338543cb9046fc6013b Content-Type: text/html; charset=ISO-8859-1 Content-Transfer-Encoding: quoted-printable Hehe! First time Google is formally using the word "OpenID" for t= heir Federated Login!
This is also the first positive development for O= penID (technically) I am seeing in months.
Gr8 work!=A0

On Tue, Jul 28, 2009 at 8:58 PM, Eric Sachs <esachs at google.com> wrote:
The Google announcement of this new OpenID service has now been formally po= sted at

On W= ed, Jul 8, 2009 at 11:47 AM, Eric Sachs <esachs at google.com> = wrote:
Yes, I now realize I mi= stakenly posted this to the public instead or private board mailing list :-= ) =A0Not a particularly big deal since we have been discussing this planned= launch in the discovery community.

Feel free to respond on either the public or private mailing list.

On Wed, Jul 8, 2009 at 11:= 05 AM, Eric Sachs <esachs at google.com> wrote:
Below are drafts o= f two blog posts we will make in the upcoming weeks about the fact that we = are now operating an OpenID IDP for the million+ schools/enterprise/ISPs th= at are outsourcing their email to Google Apps. =A0We would appreciate this = not being circulated beyond the board until it is public. =A0This new suppo= rt required that we work with the community to define some extensions to th= e OpenID discovery process. =A0While those discussions have been going on i= n the community the last few months, those extensions are not yet formalize= d and probably won't be until they are proven in production environment= s. =A0There is the potential for some community members (or press) to assum= e (or at least imply in articles) some evil intent by Google to co-opt Open= ID with these extensions. =A0It would be nice to have a blog post on the fo= rmal OpenID blog that was supportive of our approach, so I wanted to see if= the board members are comfortable with that.

On a somewhat related point, I also expect this will fu= rther increase the pressure on us as a community to find more scalable UI o= ptions since the Nascar style approach obviously cannot include buttons for= these million new IDPs. =A0We have also just posted a set of summary UI gu= idelines that we will be referencing from our API documentation at=A0http://sites.google.com/site/oauthgoog/UXFedLogin/summary. =A0Th= e goal was to keep it to one-page which forced us to cut additional backgro= und information, but if you think we cut something critical, let me know.

Enterprise blog: Google Apps= + OpenID =3D identity hub for all your SaaS

We are happy to announce that the=A0Google OpenID Fed= erated Login API=A0has been extended to Google Apps accounts used by bu= sinesses, schools, and other organizations. The service is important not on= ly to the individuals in those organizations, who can interact with a varie= ty of consumer websites with a single credential <add link to Google code post>, but al= so to the organizations themselves, who are increasingly reliant on multipl= e Software as a Service (SaaS) solutions from different vendors.


For these organizations, Google Apps can no= w become an identity and data hub for multiple SaaS providers. When integra= ted with partner solutions such as XXX from=A0XXX, the Google Open ID Feder= ated Login API enables a single Google Apps login to provide secure access = to services like Salesforce.com, SuccessFactors, and WebEX, as well as B2B = partners, internal applications, and of course consumer web sites. See=A0XX= X's post <add link= > to learn more about their implementation and view the demo and = case study <add links<= /span>>.


Another early adopter is=A0XXX, a SaaS proj= ect management vendor who uses the new service to make it easier for any or= ganization using Google Apps to sign up for and deploy=A0XXX=A0o their user= s:


<= div style=3D"margin-top:0px;margin-bottom:0px;text-align:center">< INSER= T SCREEN SHOTS>


Activating the OpenID Federated Login service for your domain is simple and= secure. To achieve that, we introduced a new experimental=A0discove= ry protocol=A0addressing some of the challenges with the=A0current version (2.0) of OpenID= :

=A0

  • Reducing the hassle of hosting discovery documents on the domain web-site -= the discovery protocol offer a solution that allows a hosted domain to bec= ome an OpenID Provider without hosting any documents at all. Optionally, a = domain may choose to host one simple file to support a more complete discov= ery flow.

  • Being an OpenID Identity Provider requires stro= ng security protection again attacks that could modify web pages on the sit= e. To avoid that requirement for businesses and organizations, we introduce= d digital signatures on the discovery documents and a verification flow to = support that.

You can find more details in our=A0API=A0and=A0Discovery=A0documentation, or join the discus= sions in the=A0Google Federated Login API Gro= up, where you can ask any question and get answers from with other Iden= tity Providers, Relying Parties and Google engineers.


The OpenID Federated Login Service is av= ailable for all Google Apps editions. However, it is disabled by default fo= r the Premier and Education and editions =A0, and it requires the Domain Ad= min to manually enable it from the Control Panel. So Admins -=A0go tur= n this today for your users. At Google.com - we already enabled it for = our employees...=A0


Google Code blog: Over a million new O= penID Identity Providers !

We are happy to announce that the=A0Google Op= enID Federated Login API=A0 has been extended to Google Apps accounts u= sed by businesses, schools, and other organizations. =A0Individuals in thes= e organizations can now sign in to 3rd party websites using their Google Ap= ps account, without giving away their credentials. In addition to the value= for the end-users, the new service also benefits the organizations themsel= ves, who are increasingly reliant on multiple Software as a Service (SaaS) = solutions from different vendors. For example, XXX=A0is an= early adopter, allowing any organization running Google Apps to more quick= ly sign up for and adopt their service:

<< INSERT SCREEN SHOTS>


See our post on the Google Enterprise Blog <<= span style=3D"background-color:rgb(255, 255, 0)">add link> to lea= rn more about the opportunities for the organizations.=A0


Supporting the API for Google Apps accounts is exciting news for the=A0OpenID community, as it adds numerous= new trustworthy Identity Provider (IDP) domains and increases the OpenID e= nd user base by millions. In order to allow web-sites to easily become Rely= ing Parties for these many new IDPs and users, we defined a new=A0= discovery protocol. The protocol allows Relying Parties to identify tha= t a given domain is hosted on Google Apps and securely access its OpenID Pr= ovider End Point. The current proposal is an interim solution, and we are p= articipating in several standardization organizations, such as=A0OASIS=A0= and the=A0OpenID Foundation, to generate a next-generation standard. Since the current protocol prop= osal is not supported by the standard OpenID libraries, we provided an impl= ementation of the Relying Party pieces at the Open Source project -=A0step2.googlecode.com. Goo= gle is also offering a set of resource addressing the issues of designing a= scalable Federated Login User Interface. You are welcome to visit the=A0User Experience summary for Federated Login=A0Go= ogle Sites page, where you can find links do demos, mocks and usabilty rese= arch data.=A0


Prefer an out= -of-the-box solution? We have been working with=A0JanRain, a provider of OpenID solutions, which already support the= new API as part of their=A0RPX product. A= s demonstrated by=A0UserVoice= =A0using=A0JanRain's RPX, a user simply types in her Google Apps = hosted domain name in the OpenID login box and everything else is being tak= en care of:


<Add UserVoice (or other proposed RPX website) screenshots>

=A0


You can find more details in our=A0API=A0and=A0Discovery=A0documentation, or join the discussions in the= =A0Google Federated Login API Group, wher= e you can ask any question and get answers from with other Identity Provide= rs, Relying Parties and Google engineers.=A0=A0

The OpenID Federated Login Service is available for all Google Apps = editions. However, it is disabled by default for the Premier =A0and Educati= on editions, and it requires the Domain Admin to manually enable it from th= e Control Panel. So Admins -=A0go turn this today for your users. = At Google.com - we already enabled it for our employees...=A0



_______________________________________________
board mailing list
board at openid.net
http= ://openid.net/mailman/listinfo/board


--001636458338543cb9046fc6013b-- From david at sixapart.com Wed Jul 29 10:22:54 2009 From: david at sixapart.com (David Recordon) Date: Wed, 29 Jul 2009 10:22:54 -0700 Subject: [OpenID board] Perception of the Foundation (Was: Fwd: [OpenID] Google's proprietary discovery extension?) References: <24713025.post@talk.nabble.com> Message-ID: Forwarding these three posts from the General list. Not because I agree with all of the sentiments expressed, but because it shows how we as a board and organization are clearly not being transparent enough in the activities that are actually being taken on. Two ideas I think that we should seriously consider are: 1) making use of a project management tool like Basecamp (http://www.basecamphq.com/ ) so that at least the entire board and Don know the status of each project that is underway 2) having Don write a monthly blog post about OpenID's achievements the past month and what the Foundation has accomplished Thoughts? --David Begin forwarded message: > From: Santosh Rajan > Date: July 28, 2009 11:11:03 PM PDT > To: general at openid.net > Subject: Re: [OpenID] Google's proprietary discovery extension? > > > Hehe! Shade for once I am going to agree with you. > Why do we have a chairman? Isnt he supposed to be leading the flock > and > showing the way? > And what about the rest of the board. This is the "coldest" board I > have > ever seen. > I think Eran Hammer should have been the chairman of the board! I > wonder why > he disappeared from here 2 yrs back. (I have seen some posts from > him from > 2007). > > > SitG Admin wrote: >> >>> There is no sign of the "STD mechanism" coming soon. >> >> Perhaps it will arrive after Chris Messina's "Policy Expression >> Extension" passes ;) >> >>> Apathy on the part of the OpenID Foundation. >> >> Inaction, or so it may appear; timely, though? >> >>> Half the Identity folk have moved on to Kantara Initiative. >>> The Other half to the Open Web foundation. >>> XRI TC has tied itself in knots. >>> And the hilarious part is that there are folk involved in all >>> these three >>> foundations! >> >> Sounds like good separation of duties to me. If the rest of us can >> still interop (and work is still being done that *needs* to be done >> before we can move forward), it doesn't really matter where most of >> the various communities is doing that work. >> >>> No idea were the rest of us should bail out to!? >> >> If the development of OpenID were to halt now, I think it would be >> Federated implementations that found themselves hardest hit; small, >> independent operators such as myself (working with libraries already >> distributed "in the wild") might not even notice. >> >> -Shade >> _______________________________________________ >> general mailing list >> general at openid.net >> http://openid.net/mailman/listinfo/general >> >> > > > ----- > > Santosh Rajan > http://santrajan.blogspot.com http://santrajan.blogspot.com > -- > View this message in context: http://www.nabble.com/Re%3A-Google%27s-proprietary-discovery-extension--tp24414092p24713025.html > Sent from the OpenID - General mailing list archive at Nabble.com. > > _______________________________________________ > general mailing list > general at openid.net > http://openid.net/mailman/listinfo/general From santrajan at gmail.com Wed Jul 29 10:46:28 2009 From: santrajan at gmail.com (Santosh Rajan) Date: Wed, 29 Jul 2009 23:16:28 +0530 Subject: [OpenID board] Perception of the Foundation (Was: Fwd: [OpenID] Google's proprietary discovery extension?) In-Reply-To: References: <24713025.post@talk.nabble.com> Message-ID: --001636456f9a434e2b046fdbc4cd Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit Hey David, this is good, also you need to 1) show a roadmap 2) there must be some visible leadership. I mean look at Eran Hammer Lahav at Open Web, and XRI TC, he is very visible. Other wise the impression you are giving is that nothing is going on here. On Wed, Jul 29, 2009 at 10:52 PM, David Recordon wrote: > Forwarding these three posts from the General list. Not because I agree > with all of the sentiments expressed, but because it shows how we as a board > and organization are clearly not being transparent enough in the activities > that are actually being taken on. > > Two ideas I think that we should seriously consider are: > 1) making use of a project management tool like Basecamp ( > http://www.basecamphq.com/) so that at least the entire board and Don know > the status of each project that is underway > 2) having Don write a monthly blog post about OpenID's achievements the > past month and what the Foundation has accomplished > > Thoughts? > > --David > > Begin forwarded message: > > From: Santosh Rajan >> Date: July 28, 2009 11:11:03 PM PDT >> To: general at openid.net >> Subject: Re: [OpenID] Google's proprietary discovery extension? >> >> >> Hehe! Shade for once I am going to agree with you. >> Why do we have a chairman? Isnt he supposed to be leading the flock and >> showing the way? >> And what about the rest of the board. This is the "coldest" board I have >> ever seen. >> I think Eran Hammer should have been the chairman of the board! I wonder >> why >> he disappeared from here 2 yrs back. (I have seen some posts from him from >> 2007). >> >> >> SitG Admin wrote: >> >>> >>> There is no sign of the "STD mechanism" coming soon. >>>> >>> >>> Perhaps it will arrive after Chris Messina's "Policy Expression >>> Extension" passes ;) >>> >>> Apathy on the part of the OpenID Foundation. >>>> >>> >>> Inaction, or so it may appear; timely, though? >>> >>> Half the Identity folk have moved on to Kantara Initiative. >>>> The Other half to the Open Web foundation. >>>> XRI TC has tied itself in knots. >>>> And the hilarious part is that there are folk involved in all these >>>> three >>>> foundations! >>>> >>> >>> Sounds like good separation of duties to me. If the rest of us can >>> still interop (and work is still being done that *needs* to be done >>> before we can move forward), it doesn't really matter where most of >>> the various communities is doing that work. >>> >>> No idea were the rest of us should bail out to!? >>>> >>> >>> If the development of OpenID were to halt now, I think it would be >>> Federated implementations that found themselves hardest hit; small, >>> independent operators such as myself (working with libraries already >>> distributed "in the wild") might not even notice. >>> >>> -Shade >>> _______________________________________________ >>> general mailing list >>> general at openid.net >>> http://openid.net/mailman/listinfo/general >>> >>> >>> >> >> ----- >> >> Santosh Rajan >> http://santrajan.blogspot.com http://santrajan.blogspot.com >> -- >> View this message in context: >> http://www.nabble.com/Re%3A-Google%27s-proprietary-discovery-extension--tp24414092p24713025.html >> Sent from the OpenID - General mailing list archive at Nabble.com. >> >> _______________________________________________ >> general mailing list >> general at openid.net >> http://openid.net/mailman/listinfo/general >> > > _______________________________________________ > board mailing list > board at openid.net > http://openid.net/mailman/listinfo/board > --001636456f9a434e2b046fdbc4cd Content-Type: text/html; charset=ISO-8859-1 Content-Transfer-Encoding: quoted-printable Hey David, this is good, also you need to=A0
1) show a roadmap
2) there must be some visible leadership. I mean look at Eran Hammer Laha= v at Open Web, and XRI TC, he is very visible.=A0
Other wise the = impression you are giving is that nothing is going on here.


On Wed, Jul 29, 2009 at 10:52 PM, D= avid Recordon <d= avid at sixapart.com> wrote:
Forwarding these three posts from the General list. =A0Not because I agree = with all of the sentiments expressed, but because it shows how we as a boar= d and organization are clearly not being transparent enough in the activiti= es that are actually being taken on.

Two ideas I think that we should seriously consider are:
1) making use of a project management tool like Basecamp (http://www.basecamphq.com/) so = that at least the entire board and Don know the status of each project that= is underway
2) having Don write a monthly blog post about OpenID's achievements the= past month and what the Foundation has accomplished

Thoughts?

--David

Begin forwarded message:

From: Santosh Rajan <santrajan at gmail.com>
Date: July 28, 2009 11:11:03 PM PDT
To: general at openid.= net
Subject: Re: [OpenID] Google's proprietary discovery extension?


Hehe! Shade for once I am going to agree with you.
Why do we have a chairman? Isnt he supposed to be leading the flock and
showing the way?
And what about the rest of the board. This is the "coldest" board= I have
ever seen.
I think Eran Hammer should have been the chairman of the board! I wonder wh= y
he disappeared from here 2 yrs back. (I have seen some posts from him from<= br> 2007).


SitG Admin wrote:

There is no sign of the "STD mechanism" coming soon.

Perhaps it will arrive after Chris Messina's "Policy Expression Extension" passes ;)

Apathy on the part of the OpenID Foundation.

Inaction, or so it may appear; timely, though?

Half the Identity folk have moved on to Kantara Initiative.
The Other half to the Open Web foundation.
XRI TC has tied itself in knots.
And the hilarious part is that there are folk involved in all these three foundations!

Sounds like good separation of duties to me. If the rest of us can
still interop (and work is still being done that *needs* to be done
before we can move forward), it doesn't really matter where most of
the various communities is doing that work.

No idea were the rest of us should bail out to!?

If the development of OpenID were to halt now, I think it would be
Federated implementations that found themselves hardest hit; small,
independent operators such as myself (working with libraries already
distributed "in the wild") might not even notice.

-Shade
_______________________________________________
general mailing list
general at openid.net<= /a>
ht= tp://openid.net/mailman/listinfo/general




-----

Santosh Rajan
http://santraja= n.blogspot.com http://santrajan.blogspot.com
--
View this message in context: http://www.nabble.com/Re%3A-Google%27s-proprietary-discovery-extensi= on--tp24414092p24713025.html
Sent from the OpenID - General mailing list archive at Nabble.com.

_______________________________________________
general mailing list
general at openid.net<= /a>
ht= tp://openid.net/mailman/listinfo/general

_______________________________________________
board mailing list
board at openid.net<= br> http= ://openid.net/mailman/listinfo/board

--001636456f9a434e2b046fdbc4cd-- From sakimura at gmail.com Wed Jul 29 13:33:23 2009 From: sakimura at gmail.com (Nat) Date: Thu, 30 Jul 2009 05:33:23 +0900 Subject: [OpenID board] Perception of the Foundation (Was: Fwd: [OpenID] Google's proprietary discovery extension?) In-Reply-To: References: <24713025.post@talk.nabble.com> Message-ID: Hi Inline below: =nat at Tokyo via iPhone On 2009/07/30, at 2:22, David Recordon wrote: > Forwarding these three posts from the General list. Not because I > agree with all of the sentiments expressed, but because it shows how > we as a board and organization are clearly not being transparent > enough in the activities that are actually being taken on. > > Two ideas I think that we should seriously consider are: > 1) making use of a project management tool like Basecamp (http://www.basecamphq.com/ > ) so that at least the entire board and Don know the status of each > project that is underway I strongly agree to this. > 2) having Don write a monthly blog post about OpenID's achievements > the past month and what the Foundation has accomplished +1 > > Thoughts? > > --David > > Begin forwarded message: > >> From: Santosh Rajan >> Date: July 28, 2009 11:11:03 PM PDT >> To: general at openid.net >> Subject: Re: [OpenID] Google's proprietary discovery extension? >> >> >> Hehe! Shade for once I am going to agree with you. >> Why do we have a chairman? Isnt he supposed to be leading the flock >> and >> showing the way? >> And what about the rest of the board. This is the "coldest" board I >> have >> ever seen. >> I think Eran Hammer should have been the chairman of the board! I >> wonder why >> he disappeared from here 2 yrs back. (I have seen some posts from >> him from >> 2007). >> >> >> SitG Admin wrote: >>> >>>> There is no sign of the "STD mechanism" coming soon. >>> >>> Perhaps it will arrive after Chris Messina's "Policy Expression >>> Extension" passes ;) >>> >>>> Apathy on the part of the OpenID Foundation. >>> >>> Inaction, or so it may appear; timely, though? >>> >>>> Half the Identity folk have moved on to Kantara Initiative. >>>> The Other half to the Open Web foundation. >>>> XRI TC has tied itself in knots. >>>> And the hilarious part is that there are folk involved in all >>>> these three >>>> foundations! >>> >>> Sounds like good separation of duties to me. If the rest of us can >>> still interop (and work is still being done that *needs* to be done >>> before we can move forward), it doesn't really matter where most of >>> the various communities is doing that work. >>> >>>> No idea were the rest of us should bail out to!? >>> >>> If the development of OpenID were to halt now, I think it would be >>> Federated implementations that found themselves hardest hit; small, >>> independent operators such as myself (working with libraries already >>> distributed "in the wild") might not even notice. >>> >>> -Shade >>> _______________________________________________ >>> general mailing list >>> general at openid.net >>> http://openid.net/mailman/listinfo/general >>> >>> >> >> >> ----- >> >> Santosh Rajan >> http://santrajan.blogspot.com http://santrajan.blogspot.com >> -- >> View this message in context: http://www.nabble.com/Re%3A-Google%27s-proprietary-discovery-extension--tp24414092p24713025.html >> Sent from the OpenID - General mailing list archive at Nabble.com. >> >> _______________________________________________ >> general mailing list >> general at openid.net >> http://openid.net/mailman/listinfo/general > > _______________________________________________ > board mailing list > board at openid.net > http://openid.net/mailman/listinfo/board From atom at yahoo-inc.com Wed Jul 29 15:47:45 2009 From: atom at yahoo-inc.com (Allen Tom) Date: Wed, 29 Jul 2009 15:47:45 -0700 Subject: [OpenID board] Perception of the Foundation (Was: Fwd: [OpenID] Google's proprietary discovery extension?) In-Reply-To: References: <24713025.post@talk.nabble.com> Message-ID: <4A70D191.7040100@yahoo-inc.com> Hi all, Yahoo is very heavily invested in OpenID and we have a bunch of engineers and designers currently working on enhancements to our OpenID service. Earlier this year, we worked with the community to write the OpenID UI and OAuth/Hybrid Extensions, and the Yahoo OP will be implementing both of these extensions in the very near future. In addition to protocol enhancements, we have a crack team of UI/Product designers and researchers who are actively experimenting with ways to improve the overall usability of our OpenID service. We'll be deploying many significant upgrades to the Yahoo OpenID Provider's user interface later this year. The new OpenID UI, along with support for the UI and Hybrid Extensions, and our soon to be released support for Open Social's REST based APIs (including Portable Contacts) will be a huge upgrade to our existing Open Stack offering. We've also been working behind the scenes to line up several new and exciting Relying Parties to accept OpenID. Every potential Relying Party that I've been working with wants to accept not just Yahoo OpenID, but also OpenIDs from other Providers, which is making a really strong case for interoperability and open standards. Yahoo along with other OPs and Relying Parties are committing plenty of resources for OpenID and are actively working towards the goal of having OpenID reach widespread usage and adoption. Many of these efforts are behind the scenes, and aren't really visible on the public mailing lists, so perhaps the OpenID Foundation can take the lead in publicizing the activities that its membership is actively working on. Allen Nat wrote: > Hi > > Inline below: > > =nat at Tokyo via iPhone > > On 2009/07/30, at 2:22, David Recordon wrote: > >> Forwarding these three posts from the General list. Not because I >> agree with all of the sentiments expressed, but because it shows how >> we as a board and organization are clearly not being transparent >> enough in the activities that are actually being taken on. >> >> Two ideas I think that we should seriously consider are: >> 1) making use of a project management tool like Basecamp >> (http://www.basecamphq.com/) so that at least the entire board and >> Don know the status of each project that is underway > > I strongly agree to this. > >> 2) having Don write a monthly blog post about OpenID's achievements >> the past month and what the Foundation has accomplished > > +1 > >> >> Thoughts? >> >> --David >> >> Begin forwarded message: >> >>> From: Santosh Rajan >>> Date: July 28, 2009 11:11:03 PM PDT >>> To: general at openid.net >>> Subject: Re: [OpenID] Google's proprietary discovery extension? >>> >>> >>> Hehe! Shade for once I am going to agree with you. >>> Why do we have a chairman? Isnt he supposed to be leading the flock and >>> showing the way? >>> And what about the rest of the board. This is the "coldest" board I >>> have >>> ever seen. >>> I think Eran Hammer should have been the chairman of the board! I >>> wonder why >>> he disappeared from here 2 yrs back. (I have seen some posts from >>> him from >>> 2007). >>> >>> >>> SitG Admin wrote: >>>> >>>>> There is no sign of the "STD mechanism" coming soon. >>>> >>>> Perhaps it will arrive after Chris Messina's "Policy Expression >>>> Extension" passes ;) >>>> >>>>> Apathy on the part of the OpenID Foundation. >>>> >>>> Inaction, or so it may appear; timely, though? >>>> >>>>> Half the Identity folk have moved on to Kantara Initiative. >>>>> The Other half to the Open Web foundation. >>>>> XRI TC has tied itself in knots. >>>>> And the hilarious part is that there are folk involved in all >>>>> these three >>>>> foundations! >>>> >>>> Sounds like good separation of duties to me. If the rest of us can >>>> still interop (and work is still being done that *needs* to be done >>>> before we can move forward), it doesn't really matter where most of >>>> the various communities is doing that work. >>>> >>>>> No idea were the rest of us should bail out to!? >>>> >>>> If the development of OpenID were to halt now, I think it would be >>>> Federated implementations that found themselves hardest hit; small, >>>> independent operators such as myself (working with libraries already >>>> distributed "in the wild") might not even notice. >>>> >>>> -Shade >>>> _______________________________________________ >>>> general mailing list >>>> general at openid.net >>>> http://openid.net/mailman/listinfo/general >>>> >>>> >>> >>> >>> ----- >>> >>> Santosh Rajan >>> http://santrajan.blogspot.com http://santrajan.blogspot.com >>> -- >>> View this message in context: >>> http://www.nabble.com/Re%3A-Google%27s-proprietary-discovery-extension--tp24414092p24713025.html >>> >>> Sent from the OpenID - General mailing list archive at Nabble.com. >>> >>> _______________________________________________ >>> general mailing list >>> general at openid.net >>> http://openid.net/mailman/listinfo/general >> >> _______________________________________________ >> board mailing list >> board at openid.net >> http://openid.net/mailman/listinfo/board > _______________________________________________ > board mailing list > board at openid.net > http://openid.net/mailman/listinfo/board From santrajan at gmail.com Wed Jul 29 17:30:28 2009 From: santrajan at gmail.com (Santosh Rajan) Date: Wed, 29 Jul 2009 17:30:28 -0700 (PDT) Subject: [OpenID board] Perception of the Foundation (Was: Fwd: [OpenID] Google's proprietary discovery extension?) In-Reply-To: <4A70D191.7040100@yahoo-inc.com> References: <4A70D191.7040100@yahoo-inc.com> Message-ID: <24730408.post@talk.nabble.com> Allen I think you missed a major point here. It is nice to know about Yahoo's work. Other coorporates have also done a lot of work, like Google, Facebook etc. But what about the independent community members? Nothing!! Or atleast I haven't seen any work coming from then. I think in Open Communities the most important contributions must come from the independant members and not the coorporate members. Independent members are not "boxed in" by coorporate objectives. Corporate members are focussed by their companies. Independent individuals need community leadership, otherwise they will end up running around like headless chicken. Which is more or less what is happenning now. Allen Tom-2 wrote: > > Hi all, > > Yahoo is very heavily invested in OpenID and we have a bunch of > engineers and designers currently working on enhancements to our OpenID > service. Earlier this year, we worked with the community to write the > OpenID UI and OAuth/Hybrid Extensions, and the Yahoo OP will be > implementing both of these extensions in the very near future. > > In addition to protocol enhancements, we have a crack team of UI/Product > designers and researchers who are actively experimenting with ways to > improve the overall usability of our OpenID service. We'll be deploying > many significant upgrades to the Yahoo OpenID Provider's user interface > later this year. The new OpenID UI, along with support for the UI and > Hybrid Extensions, and our soon to be released support for Open Social's > REST based APIs (including Portable Contacts) will be a huge upgrade to > our existing Open Stack offering. > > We've also been working behind the scenes to line up several new and > exciting Relying Parties to accept OpenID. Every potential Relying Party > that I've been working with wants to accept not just Yahoo OpenID, but > also OpenIDs from other Providers, which is making a really strong case > for interoperability and open standards. > > Yahoo along with other OPs and Relying Parties are committing plenty of > resources for OpenID and are actively working towards the goal of > having OpenID reach widespread usage and adoption. Many of these > efforts are behind the scenes, and aren't really visible on the public > mailing lists, so perhaps the OpenID Foundation can take the lead in > publicizing the activities that its membership is actively working on. > > Allen > > > Nat wrote: >> Hi >> >> Inline below: >> >> =nat at Tokyo via iPhone >> >> On 2009/07/30, at 2:22, David Recordon wrote: >> >>> Forwarding these three posts from the General list. Not because I >>> agree with all of the sentiments expressed, but because it shows how >>> we as a board and organization are clearly not being transparent >>> enough in the activities that are actually being taken on. >>> >>> Two ideas I think that we should seriously consider are: >>> 1) making use of a project management tool like Basecamp >>> (http://www.basecamphq.com/) so that at least the entire board and >>> Don know the status of each project that is underway >> >> I strongly agree to this. >> >>> 2) having Don write a monthly blog post about OpenID's achievements >>> the past month and what the Foundation has accomplished >> >> +1 >> >>> >>> Thoughts? >>> >>> --David >>> >>> Begin forwarded message: >>> >>>> From: Santosh Rajan >>>> Date: July 28, 2009 11:11:03 PM PDT >>>> To: general at openid.net >>>> Subject: Re: [OpenID] Google's proprietary discovery extension? >>>> >>>> >>>> Hehe! Shade for once I am going to agree with you. >>>> Why do we have a chairman? Isnt he supposed to be leading the flock and >>>> showing the way? >>>> And what about the rest of the board. This is the "coldest" board I >>>> have >>>> ever seen. >>>> I think Eran Hammer should have been the chairman of the board! I >>>> wonder why >>>> he disappeared from here 2 yrs back. (I have seen some posts from >>>> him from >>>> 2007). >>>> >>>> >>>> SitG Admin wrote: >>>>> >>>>>> There is no sign of the "STD mechanism" coming soon. >>>>> >>>>> Perhaps it will arrive after Chris Messina's "Policy Expression >>>>> Extension" passes ;) >>>>> >>>>>> Apathy on the part of the OpenID Foundation. >>>>> >>>>> Inaction, or so it may appear; timely, though? >>>>> >>>>>> Half the Identity folk have moved on to Kantara Initiative. >>>>>> The Other half to the Open Web foundation. >>>>>> XRI TC has tied itself in knots. >>>>>> And the hilarious part is that there are folk involved in all >>>>>> these three >>>>>> foundations! >>>>> >>>>> Sounds like good separation of duties to me. If the rest of us can >>>>> still interop (and work is still being done that *needs* to be done >>>>> before we can move forward), it doesn't really matter where most of >>>>> the various communities is doing that work. >>>>> >>>>>> No idea were the rest of us should bail out to!? >>>>> >>>>> If the development of OpenID were to halt now, I think it would be >>>>> Federated implementations that found themselves hardest hit; small, >>>>> independent operators such as myself (working with libraries already >>>>> distributed "in the wild") might not even notice. >>>>> >>>>> -Shade >>>>> _______________________________________________ >>>>> general mailing list >>>>> general at openid.net >>>>> http://openid.net/mailman/listinfo/general >>>>> >>>>> >>>> >>>> >>>> ----- >>>> >>>> Santosh Rajan >>>> http://santrajan.blogspot.com http://santrajan.blogspot.com >>>> -- >>>> View this message in context: >>>> http://www.nabble.com/Re%3A-Google%27s-proprietary-discovery-extension--tp24414092p24713025.html >>>> >>>> Sent from the OpenID - General mailing list archive at Nabble.com. >>>> >>>> _______________________________________________ >>>> general mailing list >>>> general at openid.net >>>> http://openid.net/mailman/listinfo/general >>> >>> _______________________________________________ >>> board mailing list >>> board at openid.net >>> http://openid.net/mailman/listinfo/board >> _______________________________________________ >> board mailing list >> board at openid.net >> http://openid.net/mailman/listinfo/board > > > _______________________________________________ > board mailing list > board at openid.net > http://openid.net/mailman/listinfo/board > > ----- Santosh Rajan http://santrajan.blogspot.com http://santrajan.blogspot.com -- View this message in context: http://www.nabble.com/Perception-of-the-Foundation-%28Was%3A-Fwd%3A--OpenID--Google%27s-proprietary-discovery-extension-%29-tp24724040p24730408.html Sent from the OpenID - Foundation Board mailing list archive at Nabble.com. From chris.messina at gmail.com Wed Jul 29 20:13:18 2009 From: chris.messina at gmail.com (Chris Messina) Date: Wed, 29 Jul 2009 20:13:18 -0700 Subject: [OpenID board] Perception of the Foundation (Was: Fwd: [OpenID] Google's proprietary discovery extension?) In-Reply-To: <24730408.post@talk.nabble.com> References: <4A70D191.7040100@yahoo-inc.com> <24730408.post@talk.nabble.com> Message-ID: <1bc4603e0907292013v38d5ac54qaaeaec0b41a3828f@mail.gmail.com> --0016e64692566ff6ca046fe3af23 Content-Type: text/plain; charset=windows-1252 Content-Transfer-Encoding: quoted-printable Santosh, I'm not sure what you're proposing. If there is a leadership vacuum in the community, complaining about it doesn't seem like an effective way to address it. That said, I certainly think that the Foundation via the board has not been terribly effective in its communications and outreach since the elections. That said, much has been happening, albeit in many different places so keeping track of everything is very challenging =97 even for those directly working on these things. A couple weeks back I sent Don a list of interview-style questions that I had hoped would have made it to the blog by now, but alas I've not heard back from him yet. Don has pointed out that he is more of an infrastructure kind of guy =97 who likes to operate behind the scenes, and so combining th= at style of leadership with an otherwise quiet board can of course lead to questions of progress. I also noticed that the board's meeting minutes have not been published to the wiki recently, so I'll go an make sure that they are copied from this list to the wiki, so at least you can trace the conversations that have gon= e on over the last several months. I would be interested in hearing solid proposals for rallying the community =97 and coordinating efforts if the board is unable or unavailable to do so= . I have ideas myself, but not the time or ability to implement them at the moment. Chris On Wed, Jul 29, 2009 at 5:30 PM, Santosh Rajan wrote: > > Allen I think you missed a major point here. > It is nice to know about Yahoo's work. Other coorporates have also done a > lot of work, like Google, Facebook etc. > > But what about the independent community members? Nothing!! Or atleast I > haven't seen any work coming from then. > > I think in Open Communities the most important contributions must come fr= om > the independant members and not the coorporate members. Independent membe= rs > are not "boxed in" by coorporate objectives. > > Corporate members are focussed by their companies. Independent individual= s > need community leadership, otherwise they will end up running around like > headless chicken. Which is more or less what is happenning now. > > > > Allen Tom-2 wrote: > > > > Hi all, > > > > Yahoo is very heavily invested in OpenID and we have a bunch of > > engineers and designers currently working on enhancements to our OpenID > > service. Earlier this year, we worked with the community to write the > > OpenID UI and OAuth/Hybrid Extensions, and the Yahoo OP will be > > implementing both of these extensions in the very near future. > > > > In addition to protocol enhancements, we have a crack team of UI/Produc= t > > designers and researchers who are actively experimenting with ways to > > improve the overall usability of our OpenID service. We'll be deploying > > many significant upgrades to the Yahoo OpenID Provider's user interface > > later this year. The new OpenID UI, along with support for the UI and > > Hybrid Extensions, and our soon to be released support for Open Social'= s > > REST based APIs (including Portable Contacts) will be a huge upgrade to > > our existing Open Stack offering. > > > > We've also been working behind the scenes to line up several new and > > exciting Relying Parties to accept OpenID. Every potential Relying Part= y > > that I've been working with wants to accept not just Yahoo OpenID, but > > also OpenIDs from other Providers, which is making a really strong case > > for interoperability and open standards. > > > > Yahoo along with other OPs and Relying Parties are committing plenty of > > resources for OpenID and are actively working towards the goal of > > having OpenID reach widespread usage and adoption. Many of these > > efforts are behind the scenes, and aren't really visible on the public > > mailing lists, so perhaps the OpenID Foundation can take the lead in > > publicizing the activities that its membership is actively working on. > > > > Allen > > > > > > Nat wrote: > >> Hi > >> > >> Inline below: > >> > >> =3Dnat at Tokyo via iPhone > >> > >> On 2009/07/30, at 2:22, David Recordon wrote: > >> > >>> Forwarding these three posts from the General list. Not because I > >>> agree with all of the sentiments expressed, but because it shows how > >>> we as a board and organization are clearly not being transparent > >>> enough in the activities that are actually being taken on. > >>> > >>> Two ideas I think that we should seriously consider are: > >>> 1) making use of a project management tool like Basecamp > >>> (http://www.basecamphq.com/) so that at least the entire board and > >>> Don know the status of each project that is underway > >> > >> I strongly agree to this. > >> > >>> 2) having Don write a monthly blog post about OpenID's achievements > >>> the past month and what the Foundation has accomplished > >> > >> +1 > >> > >>> > >>> Thoughts? > >>> > >>> --David > >>> > >>> Begin forwarded message: > >>> > >>>> From: Santosh Rajan > >>>> Date: July 28, 2009 11:11:03 PM PDT > >>>> To: general at openid.net > >>>> Subject: Re: [OpenID] Google's proprietary discovery extension? > >>>> > >>>> > >>>> Hehe! Shade for once I am going to agree with you. > >>>> Why do we have a chairman? Isnt he supposed to be leading the flock > and > >>>> showing the way? > >>>> And what about the rest of the board. This is the "coldest" board I > >>>> have > >>>> ever seen. > >>>> I think Eran Hammer should have been the chairman of the board! I > >>>> wonder why > >>>> he disappeared from here 2 yrs back. (I have seen some posts from > >>>> him from > >>>> 2007). > >>>> > >>>> > >>>> SitG Admin wrote: > >>>>> > >>>>>> There is no sign of the "STD mechanism" coming soon. > >>>>> > >>>>> Perhaps it will arrive after Chris Messina's "Policy Expression > >>>>> Extension" passes ;) > >>>>> > >>>>>> Apathy on the part of the OpenID Foundation. > >>>>> > >>>>> Inaction, or so it may appear; timely, though? > >>>>> > >>>>>> Half the Identity folk have moved on to Kantara Initiative. > >>>>>> The Other half to the Open Web foundation. > >>>>>> XRI TC has tied itself in knots. > >>>>>> And the hilarious part is that there are folk involved in all > >>>>>> these three > >>>>>> foundations! > >>>>> > >>>>> Sounds like good separation of duties to me. If the rest of us can > >>>>> still interop (and work is still being done that *needs* to be done > >>>>> before we can move forward), it doesn't really matter where most of > >>>>> the various communities is doing that work. > >>>>> > >>>>>> No idea were the rest of us should bail out to!? > >>>>> > >>>>> If the development of OpenID were to halt now, I think it would be > >>>>> Federated implementations that found themselves hardest hit; small, > >>>>> independent operators such as myself (working with libraries alread= y > >>>>> distributed "in the wild") might not even notice. > >>>>> > >>>>> -Shade > >>>>> _______________________________________________ > >>>>> general mailing list > >>>>> general at openid.net > >>>>> http://openid.net/mailman/listinfo/general > >>>>> > >>>>> > >>>> > >>>> > >>>> ----- > >>>> > >>>> Santosh Rajan > >>>> http://santrajan.blogspot.com http://santrajan.blogspot.com > >>>> -- > >>>> View this message in context: > >>>> > http://www.nabble.com/Re%3A-Google%27s-proprietary-discovery-extension--t= p24414092p24713025.html > >>>> > >>>> Sent from the OpenID - General mailing list archive at Nabble.com. > >>>> > >>>> _______________________________________________ > >>>> general mailing list > >>>> general at openid.net > >>>> http://openid.net/mailman/listinfo/general > >>> > >>> _______________________________________________ > >>> board mailing list > >>> board at openid.net > >>> http://openid.net/mailman/listinfo/board > >> _______________________________________________ > >> board mailing list > >> board at openid.net > >> http://openid.net/mailman/listinfo/board > > > > > > _______________________________________________ > > board mailing list > > board at openid.net > > http://openid.net/mailman/listinfo/board > > > > > > > ----- > > Santosh Rajan > http://santrajan.blogspot.com http://santrajan.blogspot.com > -- > View this message in context: > http://www.nabble.com/Perception-of-the-Foundation-%28Was%3A-Fwd%3A--Open= ID--Google%27s-proprietary-discovery-extension-%29-tp24724040p24730408.html > Sent from the OpenID - Foundation Board mailing list archive at Nabble.co= m. > > _______________________________________________ > board mailing list > board at openid.net > http://openid.net/mailman/listinfo/board > --=20 Chris Messina Open Web Advocate Personal site: http://factoryjoe.com Twitter: http://twitter.com/chrismessina Diso Project: http://diso-project.org OpenID Foundation: http://openid.net This email is: [ ] bloggable [X] ask first [ ] private --0016e64692566ff6ca046fe3af23 Content-Type: text/html; charset=windows-1252 Content-Transfer-Encoding: quoted-printable Santosh, I'm not sure what you're proposing.

If = there is a leadership vacuum in the community, complaining about it doesn&#= 39;t seem like an effective way to address it.

That said, I certainly think that the Foundation via the board has not been= terribly effective in its communications and outreach since the elections.= That said, much has been happening, albeit in many different places so kee= ping track of everything is very challenging =97 even for those directly wo= rking on these things.

A couple weeks back I sent Don a list of interview-styl= e questions that I had hoped would have made it to the blog by now, but ala= s I've not heard back from him yet. Don has pointed out that he is more= of an infrastructure kind of guy =97 who likes to operate behind the scene= s, and so combining that style of leadership with an otherwise quiet board = can of course lead to questions of progress.

I also noticed that the board's meeting minutes hav= e not been published to the wiki recently, so I'll go an make sure that= they are copied from this list to the wiki, so at least you can trace the = conversations that have gone on over the last several months.

I would be interested in hearing solid proposals for ra= llying the community =97 and coordinating efforts if the board is unable or= unavailable to do so. I have ideas myself, but not the time or ability to = implement them at the moment.

Chris

On Wed, Jul 29,= 2009 at 5:30 PM, Santosh Rajan <santrajan at gmail.com> wrote:

Allen I think you missed a major point here.
It is nice to know about Yahoo's work. Other coorporates have also done= a
lot of work, like Google, Facebook etc.

But what about the independent community members? Nothing!! Or atleast I haven't seen any work coming from then.

I think in Open Communities the most important contributions must come from=
the independant members and not the coorporate members. Independent members=
are not "boxed in" by coorporate objectives.

Corporate members are focussed by their companies. Independent individuals<= br> need community leadership, otherwise they will end up running around like headless chicken. Which is more or less what is happenning now.



Allen Tom-2 wrote:
>
> Hi all,
>
> Yahoo is very heavily invested in OpenID and we have a bunch of
> engineers and designers currently working on enhancements to our OpenI= D
> service. =A0Earlier this year, we worked with the community to write t= he
> OpenID UI and OAuth/Hybrid Extensions, and the Yahoo OP will be
> implementing both of these extensions in the very near future.
>
> In addition to protocol enhancements, we have a crack team of UI/Produ= ct
> designers and researchers who are actively experimenting with ways to<= br> > improve the overall usability of our OpenID service. We'll be depl= oying
> many significant upgrades to the Yahoo OpenID Provider's user inte= rface
> later this year. The new OpenID UI, along with support for the UI and<= br> > Hybrid Extensions, and our soon to be released support for Open Social= 's
> REST based APIs (including Portable Contacts) will be a huge upgrade t= o
> our existing Open Stack offering.
>
> We've also been working behind the scenes to line up several new a= nd
> exciting Relying Parties to accept OpenID. Every potential Relying Par= ty
> that I've been working with wants to accept not just Yahoo OpenID,= but
> also OpenIDs from other Providers, which is making a really strong cas= e
> for interoperability and open standards.
>
> Yahoo along with other OPs and Relying Parties are committing plenty o= f
> resources for OpenID =A0and are actively working towards the goal of > having OpenID reach widespread usage and adoption. =A0Many of these > efforts are behind the scenes, and aren't really visible on the pu= blic
> mailing lists, so perhaps the OpenID Foundation can take the lead in > publicizing the activities that its membership is actively working on.=
>
> Allen
>
>
> Nat wrote:
>> Hi
>>
>> Inline below:
>>
>> =3Dnat at Tokyo via iPhone
>>
>> On 2009/07/30, at 2:22, David Recordon <david at sixapart.com> wrote:
>>
>>> Forwarding these three posts from the General list. =A0Not bec= ause I
>>> agree with all of the sentiments expressed, but because it sho= ws how
>>> we as a board and organization are clearly not being transpare= nt
>>> enough in the activities that are actually being taken on.
>>>
>>> Two ideas I think that we should seriously consider are:
>>> 1) making use of a project management tool like Basecamp
>>> (http= ://www.basecamphq.com/) so that at least the entire board and
>>> Don know the status of each project that is underway
>>
>> I strongly agree to this.
>>
>>> 2) having Don write a monthly blog post about OpenID's ach= ievements
>>> the past month and what the Foundation has accomplished
>>
>> +1
>>
>>>
>>> Thoughts?
>>>
>>> --David
>>>
>>> Begin forwarded message:
>>>
>>>> From: Santosh Rajan <santrajan at gmail.com>
>>>> Date: July 28, 2009 11:11:03 PM PDT
>>>> To: general at openid.n= et
>>>> Subject: Re: [OpenID] Google's proprietary discovery e= xtension?
>>>>
>>>>
>>>> Hehe! Shade for once I am going to agree with you.
>>>> Why do we have a chairman? Isnt he supposed to be leading = the flock and
>>>> showing the way?
>>>> And what about the rest of the board. This is the "co= ldest" board I
>>>> have
>>>> ever seen.
>>>> I think Eran Hammer should have been the chairman of the b= oard! I
>>>> wonder why
>>>> he disappeared from here 2 yrs back. (I have seen some pos= ts from
>>>> him from
>>>> 2007).
>>>>
>>>>
>>>> SitG Admin wrote:
>>>>>
>>>>>> There is no sign of the "STD mechanism" = coming soon.
>>>>>
>>>>> Perhaps it will arrive after Chris Messina's "= ;Policy Expression
>>>>> Extension" passes ;)
>>>>>
>>>>>> Apathy on the part of the OpenID Foundation.
>>>>>
>>>>> Inaction, or so it may appear; timely, though?
>>>>>
>>>>>> Half the Identity folk have moved on to Kantara In= itiative.
>>>>>> The Other half to the Open Web foundation.
>>>>>> XRI TC has tied itself in knots.
>>>>>> And the hilarious part is that there are folk invo= lved in all
>>>>>> these three
>>>>>> foundations!
>>>>>
>>>>> Sounds like good separation of duties to me. If the re= st of us can
>>>>> still interop (and work is still being done that *need= s* to be done
>>>>> before we can move forward), it doesn't really mat= ter where most of
>>>>> the various communities is doing that work.
>>>>>
>>>>>> No idea were the rest of us should bail out to!? >>>>>
>>>>> If the development of OpenID were to halt now, I think= it would be
>>>>> Federated implementations that found themselves hardes= t hit; small,
>>>>> independent operators such as myself (working with lib= raries already
>>>>> distributed "in the wild") might not even no= tice.
>>>>>
>>>>> -Shade
>>>>> _______________________________________________
>>>>> general mailing list
>>>>> general at openid.n= et
>>>>> http://openid.net/mailman/listinfo/general
>>>>>
>>>>>
>>>>
>>>>
>>>> -----
>>>>
>>>> Santosh Rajan
>>>> http://santrajan.blogspot.com http://santrajan.blogspot.com
>>>> --
>>>> View this message in context:
>>>> http:/= /www.nabble.com/Re%3A-Google%27s-proprietary-discovery-extension--tp2441409= 2p24713025.html
>>>>
>>>> Sent from the OpenID - General mailing list archive at Nab= ble.com.
>>>>
>>>> _______________________________________________
>>>> general mailing list
>>>> general at openid.net
>>>>
http://openid.net/mailman/listinfo/general
>>>
>>> _______________________________________________
>>> board mailing list
>>> board at openid.net
>>> http://openid.net/mailman/listinfo/board
>> _______________________________________________
>> board mailing list
>> board at openid.net
>> http://openid.net/mailman/listinfo/board
>
>
> _______________________________________________
> board mailing list
> board at openid.net
> http://openid.net/mailman/listinfo/board
>
>


-----

Santosh Rajan
http://santraja= n.blogspot.com http://santrajan.blogspot.com
--
View this message in context: http= ://www.nabble.com/Perception-of-the-Foundation-%28Was%3A-Fwd%3A--OpenID--Go= ogle%27s-proprietary-discovery-extension-%29-tp24724040p24730408.html Sent from the OpenID - Foundation Board mailing list archive at Nabble.com.=

_______________________________________________
board mailing list
board at openid.net
http= ://openid.net/mailman/listinfo/board



--
Chris Messi= na
Open Web Advocate

Personal site: http://factoryjoe.com
Twitter: http://twitter.com/chrismessina

Diso Project: http://diso-project.o= rg
OpenID Foundation: http://openid.ne= t

This email is: =A0 [ ] bloggable =A0 =A0[X] ask first =A0 [ ] = private
--0016e64692566ff6ca046fe3af23-- From santrajan at gmail.com Wed Jul 29 20:44:44 2009 From: santrajan at gmail.com (Santosh Rajan) Date: Wed, 29 Jul 2009 20:44:44 -0700 (PDT) Subject: [OpenID board] Perception of the Foundation (Was: Fwd: [OpenID] Google's proprietary discovery extension?) In-Reply-To: <1bc4603e0907292013v38d5ac54qaaeaec0b41a3828f@mail.gmail.com> References: <4A70D191.7040100@yahoo-inc.com> <24730408.post@talk.nabble.com> <1bc4603e0907292013v38d5ac54qaaeaec0b41a3828f@mail.gmail.com> Message-ID: <24731706.post@talk.nabble.com> First of all I am not proposing anything, nor am i complaining about anything. I am just bringing to your notice what I think is a very serious problem with the OpenID board. And yes let us face it. There definitely is a serious leadership vacuum here. I am sure every one is aware of it but nobody speaks about it. As you said Don is an infrastructure guy, but why bring Don into this at all. I dont think he was hired for a leadership role at all. The leader has to be the chairman of the board. The chairman must be a technical wiz plus someone who can lead from the front, and should be rallying the community. I cant see someone who is good at both here, technology and rallying the flock. Actually I dont mind one of the corporate members being chairman of the board provided he has a written mandate from his company to work as he wishes independently on a board like this. Something like the mandate given to Eran from Yahoo. Chris Messina wrote: > > Santosh, I'm not sure what you're proposing. > If there is a leadership vacuum in the community, complaining about it > doesn't seem like an effective way to address it. > > That said, I certainly think that the Foundation via the board has not > been > terribly effective in its communications and outreach since the elections. > That said, much has been happening, albeit in many different places so > keeping track of everything is very challenging ? even for those directly > working on these things. > > A couple weeks back I sent Don a list of interview-style questions that I > had hoped would have made it to the blog by now, but alas I've not heard > back from him yet. Don has pointed out that he is more of an > infrastructure > kind of guy ? who likes to operate behind the scenes, and so combining > that > style of leadership with an otherwise quiet board can of course lead to > questions of progress. > > I also noticed that the board's meeting minutes have not been published to > the wiki recently, so I'll go an make sure that they are copied from this > list to the wiki, so at least you can trace the conversations that have > gone > on over the last several months. > > I would be interested in hearing solid proposals for rallying the > community > ? and coordinating efforts if the board is unable or unavailable to do so. > I > have ideas myself, but not the time or ability to implement them at the > moment. > > Chris > > On Wed, Jul 29, 2009 at 5:30 PM, Santosh Rajan > wrote: > >> >> Allen I think you missed a major point here. >> It is nice to know about Yahoo's work. Other coorporates have also done a >> lot of work, like Google, Facebook etc. >> >> But what about the independent community members? Nothing!! Or atleast I >> haven't seen any work coming from then. >> >> I think in Open Communities the most important contributions must come >> from >> the independant members and not the coorporate members. Independent >> members >> are not "boxed in" by coorporate objectives. >> >> Corporate members are focussed by their companies. Independent >> individuals >> need community leadership, otherwise they will end up running around like >> headless chicken. Which is more or less what is happenning now. >> >> >> >> Allen Tom-2 wrote: >> > >> > Hi all, >> > >> > Yahoo is very heavily invested in OpenID and we have a bunch of >> > engineers and designers currently working on enhancements to our OpenID >> > service. Earlier this year, we worked with the community to write the >> > OpenID UI and OAuth/Hybrid Extensions, and the Yahoo OP will be >> > implementing both of these extensions in the very near future. >> > >> > In addition to protocol enhancements, we have a crack team of >> UI/Product >> > designers and researchers who are actively experimenting with ways to >> > improve the overall usability of our OpenID service. We'll be deploying >> > many significant upgrades to the Yahoo OpenID Provider's user interface >> > later this year. The new OpenID UI, along with support for the UI and >> > Hybrid Extensions, and our soon to be released support for Open >> Social's >> > REST based APIs (including Portable Contacts) will be a huge upgrade to >> > our existing Open Stack offering. >> > >> > We've also been working behind the scenes to line up several new and >> > exciting Relying Parties to accept OpenID. Every potential Relying >> Party >> > that I've been working with wants to accept not just Yahoo OpenID, but >> > also OpenIDs from other Providers, which is making a really strong case >> > for interoperability and open standards. >> > >> > Yahoo along with other OPs and Relying Parties are committing plenty of >> > resources for OpenID and are actively working towards the goal of >> > having OpenID reach widespread usage and adoption. Many of these >> > efforts are behind the scenes, and aren't really visible on the public >> > mailing lists, so perhaps the OpenID Foundation can take the lead in >> > publicizing the activities that its membership is actively working on. >> > >> > Allen >> > >> > >> > Nat wrote: >> >> Hi >> >> >> >> Inline below: >> >> >> >> =nat at Tokyo via iPhone >> >> >> >> On 2009/07/30, at 2:22, David Recordon wrote: >> >> >> >>> Forwarding these three posts from the General list. Not because I >> >>> agree with all of the sentiments expressed, but because it shows how >> >>> we as a board and organization are clearly not being transparent >> >>> enough in the activities that are actually being taken on. >> >>> >> >>> Two ideas I think that we should seriously consider are: >> >>> 1) making use of a project management tool like Basecamp >> >>> (http://www.basecamphq.com/) so that at least the entire board and >> >>> Don know the status of each project that is underway >> >> >> >> I strongly agree to this. >> >> >> >>> 2) having Don write a monthly blog post about OpenID's achievements >> >>> the past month and what the Foundation has accomplished >> >> >> >> +1 >> >> >> >>> >> >>> Thoughts? >> >>> >> >>> --David >> >>> >> >>> Begin forwarded message: >> >>> >> >>>> From: Santosh Rajan >> >>>> Date: July 28, 2009 11:11:03 PM PDT >> >>>> To: general at openid.net >> >>>> Subject: Re: [OpenID] Google's proprietary discovery extension? >> >>>> >> >>>> >> >>>> Hehe! Shade for once I am going to agree with you. >> >>>> Why do we have a chairman? Isnt he supposed to be leading the flock >> and >> >>>> showing the way? >> >>>> And what about the rest of the board. This is the "coldest" board I >> >>>> have >> >>>> ever seen. >> >>>> I think Eran Hammer should have been the chairman of the board! I >> >>>> wonder why >> >>>> he disappeared from here 2 yrs back. (I have seen some posts from >> >>>> him from >> >>>> 2007). >> >>>> >> >>>> >> >>>> SitG Admin wrote: >> >>>>> >> >>>>>> There is no sign of the "STD mechanism" coming soon. >> >>>>> >> >>>>> Perhaps it will arrive after Chris Messina's "Policy Expression >> >>>>> Extension" passes ;) >> >>>>> >> >>>>>> Apathy on the part of the OpenID Foundation. >> >>>>> >> >>>>> Inaction, or so it may appear; timely, though? >> >>>>> >> >>>>>> Half the Identity folk have moved on to Kantara Initiative. >> >>>>>> The Other half to the Open Web foundation. >> >>>>>> XRI TC has tied itself in knots. >> >>>>>> And the hilarious part is that there are folk involved in all >> >>>>>> these three >> >>>>>> foundations! >> >>>>> >> >>>>> Sounds like good separation of duties to me. If the rest of us can >> >>>>> still interop (and work is still being done that *needs* to be done >> >>>>> before we can move forward), it doesn't really matter where most of >> >>>>> the various communities is doing that work. >> >>>>> >> >>>>>> No idea were the rest of us should bail out to!? >> >>>>> >> >>>>> If the development of OpenID were to halt now, I think it would be >> >>>>> Federated implementations that found themselves hardest hit; small, >> >>>>> independent operators such as myself (working with libraries >> already >> >>>>> distributed "in the wild") might not even notice. >> >>>>> >> >>>>> -Shade >> >>>>> _______________________________________________ >> >>>>> general mailing list >> >>>>> general at openid.net >> >>>>> http://openid.net/mailman/listinfo/general >> >>>>> >> >>>>> >> >>>> >> >>>> >> >>>> ----- >> >>>> >> >>>> Santosh Rajan >> >>>> http://santrajan.blogspot.com http://santrajan.blogspot.com >> >>>> -- >> >>>> View this message in context: >> >>>> >> http://www.nabble.com/Re%3A-Google%27s-proprietary-discovery-extension--tp24414092p24713025.html >> >>>> >> >>>> Sent from the OpenID - General mailing list archive at Nabble.com. >> >>>> >> >>>> _______________________________________________ >> >>>> general mailing list >> >>>> general at openid.net >> >>>> http://openid.net/mailman/listinfo/general >> >>> >> >>> _______________________________________________ >> >>> board mailing list >> >>> board at openid.net >> >>> http://openid.net/mailman/listinfo/board >> >> _______________________________________________ >> >> board mailing list >> >> board at openid.net >> >> http://openid.net/mailman/listinfo/board >> > >> > >> > _______________________________________________ >> > board mailing list >> > board at openid.net >> > http://openid.net/mailman/listinfo/board >> > >> > >> >> >> ----- >> >> Santosh Rajan >> http://santrajan.blogspot.com http://santrajan.blogspot.com >> -- >> View this message in context: >> http://www.nabble.com/Perception-of-the-Foundation-%28Was%3A-Fwd%3A--OpenID--Google%27s-proprietary-discovery-extension-%29-tp24724040p24730408.html >> Sent from the OpenID - Foundation Board mailing list archive at >> Nabble.com. >> >> _______________________________________________ >> board mailing list >> board at openid.net >> http://openid.net/mailman/listinfo/board >> > > > > -- > Chris Messina > Open Web Advocate > > Personal site: http://factoryjoe.com > Twitter: http://twitter.com/chrismessina > > Diso Project: http://diso-project.org > OpenID Foundation: http://openid.net > > This email is: [ ] bloggable [X] ask first [ ] private > > _______________________________________________ > board mailing list > board at openid.net > http://openid.net/mailman/listinfo/board > > ----- Santosh Rajan http://santrajan.blogspot.com http://santrajan.blogspot.com -- View this message in context: http://www.nabble.com/Perception-of-the-Foundation-%28Was%3A-Fwd%3A--OpenID--Google%27s-proprietary-discovery-extension-%29-tp24724040p24731706.html Sent from the OpenID - Foundation Board mailing list archive at Nabble.com. From mitrautama_design at yahoo.com Wed Jul 29 20:48:24 2009 From: mitrautama_design at yahoo.com (D.Setiawan) Date: Thu, 30 Jul 2009 11:48:24 +0800 (SGT) Subject: [OpenID board] Bls: Perception of the Foundation (Was: Fwd: [OpenID] Google's proprietary discovery extension?) In-Reply-To: <1bc4603e0907292013v38d5ac54qaaeaec0b41a3828f@mail.gmail.com> References: <4A70D191.7040100@yahoo-inc.com> <24730408.post@talk.nabble.com> <1bc4603e0907292013v38d5ac54qaaeaec0b41a3828f@mail.gmail.com> Message-ID: <56048.38102.qm@web76202.mail.sg1.yahoo.com> --0-274231782-1248925704=:38102 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable =0A=0A=0A>=0A>Dari: Chris Messina =0A>Kepada: boar= d at openid.net=0A>Terkirim: Kamis, 30 Juli, 2009 10:13:18=0A>Judul: Re: [Open= ID board] Perception of the Foundation (Was: Fwd: [OpenID] Google's proprie= tary discovery extension?)=0A>=0A>Santosh, I'm not sure what you're proposi= ng.=0A>=0A>=0A>If there is a leadership vacuum in the community, complainin= g about it doesn't seem like an effective way to address it.=0A>=0A>=0A>>Th= at said, I certainly think that the Foundation via the board has not been t= erribly effective in its communications and outreach since the elections. T= hat said, much has been happening, albeit in many different places so keepi= ng track of everything is very challenging =E2=80=94 even for those directl= y working on these things.=0A>=0A>=0A>A couple weeks back I sent Don a list= of interview-style questions that I had hoped would have made it to the bl= og by now, but alas I've not heard back from him yet. Don has pointed out t= hat he is more of an infrastructure kind of guy =E2=80=94 who likes to oper= ate behind the scenes, and so combining that style of leadership with an ot= herwise quiet board can of course lead to questions of progress.=0A>=0A>=0A= >I also noticed that the board's meeting minutes have not been published to= the wiki recently, so I'll go an make sure that they are copied from this = list to the wiki, so at least you can trace the conversations that have gon= e on over the last several months.=0A>=0A>=0A>I would be interested in hear= ing solid proposals for rallying the community =E2=80=94 and coordinating e= fforts if the board is unable or unavailable to do so. I have ideas myself,= but not the time or ability to implement them at the moment.=0A>=0A>=0A>Ch= ris=0A>=0A>=0A>On Wed, Jul 29, 2009 at 5:30 PM, Santosh Rajan wrote:=0A>=0A>=0A>>>>Allen I think you missed a major point here.= =0A>>>>It is nice to know about Yahoo's work. Other coorporates have also d= one a=0A>>>>lot of work, like Google, Facebook etc.=0A>>=0A>>>>But what abo= ut the independent community members? Nothing!! Or atleast I=0A>>>>haven't = seen any work coming from then.=0A>>=0A>>>>I think in Open Communities the = most important contributions must come from=0A>>>>the independant members a= nd not the coorporate members. Independent members=0A>>>>are not "boxed in"= by coorporate objectives.=0A>>=0A>>>>Corporate members are focussed by the= ir companies. Independent individuals=0A>>>>need community leadership, othe= rwise they will end up running around like=0A>>>>headless chicken. Which is= more or less what is happenning now.=0A>>=0A>>=0A>>=0A>>=0A>>>>Allen Tom-2= wrote:=0A>>>>>=0A>>>>> Hi all,=0A>>>>>=0A>>>>> Yahoo is very heavily inves= ted in OpenID and we have a bunch of=0A>>>>> engineers and designers curren= tly working on enhancements to our OpenID=0A>>>>> service. Earlier this ye= ar, we worked with the community to write the=0A>>>>> OpenID UI and OAuth/H= ybrid Extensions, and the Yahoo OP will be=0A>>>>> implementing both of the= se extensions in the very near future.=0A>>>>>=0A>>>>> In addition to proto= col enhancements, we have a crack team of UI/Product=0A>>>>> designers and = researchers who are actively experimenting with ways to=0A>>>>> improve the= overall usability of our OpenID service. We'll be deploying=0A>>>>> many s= ignificant upgrades to the Yahoo OpenID Provider's user interface=0A>>>>> l= ater this year. The new OpenID UI, along with support for the UI and=0A>>>>= > Hybrid Extensions, and our soon to be released support for Open Social's= =0A>>>>> REST based APIs (including Portable Contacts) will be a huge upgra= de to=0A>>>>> our existing Open Stack offering.=0A>>>>>=0A>>>>> We've also = been working behind the scenes to line up several new and=0A>>>>> exciting = Relying Parties to accept OpenID. Every potential Relying Party=0A>>>>> tha= t I've been working with wants to accept not just Yahoo OpenID, but=0A>>>>>= also OpenIDs from other Providers, which is making a really strong case=0A= >>>>> for interoperability and open standards.=0A>>>>>=0A>>>>> Yahoo along = with other OPs and Relying Parties are committing plenty of=0A>>>>> resourc= es for OpenID and are actively working towards the goal of=0A>>>>> having = OpenID reach widespread usage and adoption. Many of these=0A>>>>> efforts = are behind the scenes, and aren't really visible on the public=0A>>>>> mail= ing lists, so perhaps the OpenID Foundation can take the lead in=0A>>>>> pu= blicizing the activities that its membership is actively working on.=0A>>>>= >=0A>>>>> Allen=0A>>>>>=0A>>>>>=0A>>>>> Nat wrote:=0A>>>>>> Hi=0A>>>>>>=0A>= >>>>> Inline below:=0A>>>>>>=0A>>>>>> =3Dnat at Tokyo via iPhone=0A>>>>>>=0A>>= >>>> On 2009/07/30, at 2:22, David Recordon wrote:=0A>= >>>>>=0A>>>>>>> Forwarding these three posts from the General list. Not be= cause I=0A>>>>>>> agree with all of the sentiments expressed, but because i= t shows how=0A>>>>>>> we as a board and organization are clearly not being = transparent=0A>>>>>>> enough in the activities that are actually being take= n on.=0A>>>>>>>=0A>>>>>>> Two ideas I think that we should seriously consid= er are:=0A>>>>>>> 1) making use of a project management tool like Basecamp= =0A>>>>>>> (http://www.basecamphq.com/) so that at least the entire board a= nd=0A>>>>>>> Don know the status of each project that is underway=0A>>>>>>= =0A>>>>>> I strongly agree to this.=0A>>>>>>=0A>>>>>>> 2) having Don write = a monthly blog post about OpenID's achievements=0A>>>>>>> the past month an= d what the Foundation has accomplished=0A>>>>>>=0A>>>>>> +1=0A>>>>>>=0A>>>>= >>>=0A>>>>>>> Thoughts?=0A>>>>>>>=0A>>>>>>> --David=0A>>>>>>>=0A>>>>>>> Beg= in forwarded message:=0A>>>>>>>=0A>>>>>>>> From: Santosh Rajan =0A>>>>>>>> Date: July 28, 2009 11:11:03 PM PDT=0A>>>>>>>> To: gen= eral at openid.net=0A>>>>>>>> Subject: Re: [OpenID] Google's proprietary disco= very extension?=0A>>>>>>>>=0A>>>>>>>>=0A>>>>>>>> Hehe! Shade for once I am = going to agree with you.=0A>>>>>>>> Why do we have a chairman? Isnt he supp= osed to be leading the flock and=0A>>>>>>>> showing the way?=0A>>>>>>>> And= what about the rest of the board. This is the "coldest" board I=0A>>>>>>>>= have=0A>>>>>>>> ever seen.=0A>>>>>>>> I think Eran Hammer should have been= the chairman of the board! I=0A>>>>>>>> wonder why=0A>>>>>>>> he disappear= ed from here 2 yrs back. (I have seen some posts from=0A>>>>>>>> him from= =0A>>>>>>>> 2007).=0A>>>>>>>>=0A>>>>>>>>=0A>>>>>>>> SitG Admin wrote:=0A>>>= >>>>>>=0A>>>>>>>>>> There is no sign of the "STD mechanism" coming soon.=0A= >>>>>>>>>=0A>>>>>>>>> Perhaps it will arrive after Chris Messina's "Policy = Expression=0A>>>>>>>>> Extension" passes ;)=0A>>>>>>>>>=0A>>>>>>>>>> Apathy= on the part of the OpenID Foundation.=0A>>>>>>>>>=0A>>>>>>>>> Inaction, or= so it may appear; timely, though?=0A>>>>>>>>>=0A>>>>>>>>>> Half the Identi= ty folk have moved on to Kantara Initiative.=0A>>>>>>>>>> The Other half to= the Open Web foundation.=0A>>>>>>>>>> XRI TC has tied itself in knots.=0A>= >>>>>>>>> And the hilarious part is that there are folk involved in all=0A>= >>>>>>>>> these three=0A>>>>>>>>>> foundations!=0A>>>>>>>>>=0A>>>>>>>>> Sou= nds like good separation of duties to me. If the rest of us can=0A>>>>>>>>>= still interop (and work is still being done that *needs* to be done=0A>>>>= >>>>> before we can move forward), it doesn't really matter where most of= =0A>>>>>>>>> the various communities is doing that work.=0A>>>>>>>>>=0A>>>>= >>>>>> No idea were the rest of us should bail out to!?=0A>>>>>>>>>=0A>>>>>= >>>> If the development of OpenID were to halt now, I think it would be=0A>= >>>>>>>> Federated implementations that found themselves hardest hit; small= ,=0A>>>>>>>>> independent operators such as myself (working with libraries = already=0A>>>>>>>>> distributed "in the wild") might not even notice.=0A>>>= >>>>>>=0A>>>>>>>>> -Shade=0A>>>>>>>>> _____________________________________= __________=0A>>>>>>>>> general mailing list=0A>>>>>>>>> general at openid.net= =0A>>>>>>>>> http://openid.net/mailman/listinfo/general=0A>>>>>>>>>=0A>>>>>= >>>>=0A>>>>>>>>=0A>>>>>>>>=0A>>>>>>>> -----=0A>>>>>>>>=0A>>>>>>>> Santosh R= ajan=0A>>>>>>>> http://santrajan.blogspot.com http://santrajan.blogspot.com= =0A>>>>>>>> --=0A>>>>>>>> View this message in context:=0A>>>>>>>> http://w= ww.nabble.com/Re%3A-Google%27s-proprietary-discovery-extension--tp24414092p= 24713025.html=0A>>>>=0A>>>>>>=0A>>>>>>>> Sent from the OpenID - General mai= ling list archive at Nabble.com.=0A>>>>>>>>=0A>>>>>>>> ____________________= ___________________________=0A>>>>>>>> general mailing list=0A>>>>>>>> gene= ral at openid.net=0A>>>>>>>> http://openid.net/mailman/listinfo/general=0A>>>>= >>>=0A>>>>>>> _______________________________________________=0A>>>>>>> boa= rd mailing list=0A>>>>>>> board at openid.net=0A>>>>>>> http://openid.net/mail= man/listinfo/board=0A>>>>>> _______________________________________________= =0A>>>>>> board mailing list=0A>>>>>> board at openid.net=0A>>>>>> http://open= id.net/mailman/listinfo/board=0A>>>>>=0A>>>>>=0A>>>>> _____________________= __________________________=0A>>>>> board mailing list=0A>>>>> board at openid.= net=0A>>>>> http://openid.net/mailman/listinfo/board=0A>>>>>=0A>>>>>=0A>>= =0A>>=0A>>>>-----=0A>>=0A>>>>Santosh Rajan=0A>>http://santrajan.blogspot.co= m http://santrajan.blogspot.com=0A>>>>--=0A>>View this message in context: = http://www.nabble.com/Perception-of-the-Foundation-%28Was%3A-Fwd%3A--OpenID= --Google%27s-proprietary-discovery-extension-%29-tp24724040p24730408.html= =0A>>>>=0A>>Sent from the OpenID - Foundation Board mailing list archive at= Nabble.com.=0A>>=0A>>=0A>>>>______________________________________________= _=0A>>>>board mailing list=0A>>board at openid.net=0A>>http://openid.net/mailm= an/listinfo/board=0A>>=0A>=0A>=0A>-- =0A>Chris Messina=0A>Open Web Advocate= =0A>=0A>Personal site: http://factoryjoe.com=0A>Twitter: http://twitter.com= /chrismessina=0A>=0A>Diso Project: http://diso-project.org=0A>OpenID Founda= tion: http://openid.net=0A>=0A>This email is: [ ] bloggable [X] ask fi= rst [ ] private=0A>=0A=0A=0A "Coba Yahoo! Mail baru yang LEBIH = CEPAT. Rasakan bedanya sekarang! =0Ahttp://id.mail.yahoo.com" --0-274231782-1248925704=:38102 Content-Type: text/html; charset=utf-8 Content-Transfer-Encoding: quoted-printable


Dari: Chr= is Messina <chris.messina at gmail.com>
Kepada: board at openid.net
Terkirim: Kamis, 30 Juli, 2009 10:13:18
Judul: Re: [OpenID board] Perception= of the Foundation (Was: Fwd: [OpenID] Google's proprietary discovery exten= sion?)

Santosh, I'm not sure what you're proposing.

<= /div>
If there is a leadership vacuum in the community, complaining about it doesn'= t seem like an effective way to address it.

=0ATha= t said, I certainly think that the Foundation via the board has not been te= rribly effective in its communications and outreach since the elections. Th= at said, much has been happening, albeit in many different places so keepin= g track of everything is very challenging =E2=80=94 even for those directly= working on these things.
=0A

A couple weeks back I= sent Don a list of interview-style questions that I had hoped would have m= ade it to the blog by now, but alas I've not heard back from him yet. Don h= as pointed out that he is more of an infrastructure kind of guy =E2=80=94 w= ho likes to operate behind the scenes, and so combining that style of leade= rship with an otherwise quiet board can of course lead to questions of prog= ress.
=0A

I also noticed that the board's meeting m= inutes have not been published to the wiki recently, so I'll go an make sur= e that they are copied from this list to the wiki, so at least you can trac= e the conversations that have gone on over the last several months.
= =0A

I would be interested in hearing solid proposals for= rallying the community =E2=80=94 and coordinating efforts if the board is = unable or unavailable to do so. I have ideas myself, but not the time or ab= ility to implement them at the moment.
=0A

Chris
On Wed, Jul 29, 2009 at 5:30 PM, Santosh Ra= jan <santrajan at g= mail.com> wrote:
=0A
=0AAllen I think you missed a major point here.=0AIt is nice to know about Yahoo's work. Other coorporates have also don= e a
=0Alot of work, like Google, Facebook etc.
=0A
=0ABut what abo= ut the independent community members? Nothing!! Or atleast I
=0Ahaven't = seen any work coming from then.
=0A
=0AI think in Open Communities th= e most important contributions must come from
=0Athe independant members= and not the coorporate members. Independent members
=0Aare not "boxed i= n" by coorporate objectives.
=0A
=0ACorporate members are focussed by= their companies. Independent individuals
=0Aneed community leadership, = otherwise they will end up running around like
=0Aheadless chicken. Whic= h is more or less what is happenning now.
=0A

=0A
=0A
=0AAllen Tom-2 wrote:
=0A>
=0A> Hi al= l,
=0A>
=0A> Yahoo is very heavily invested in OpenID and we ha= ve a bunch of
=0A> engineers and designers currently working on enhan= cements to our OpenID
=0A> service.  Earlier this year, we worke= d with the community to write the
=0A> OpenID UI and OAuth/Hybrid Ext= ensions, and the Yahoo OP will be
=0A> implementing both of these ext= ensions in the very near future.
=0A>
=0A> In addition to proto= col enhancements, we have a crack team of UI/Product
=0A> designers a= nd researchers who are actively experimenting with ways to
=0A> impro= ve the overall usability of our OpenID service. We'll be deploying
=0A&g= t; many significant upgrades to the Yahoo OpenID Provider's user interface<= br>=0A> later this year. The new OpenID UI, along with support for the U= I and
=0A> Hybrid Extensions, and our soon to be released support for= Open Social's
=0A> REST based APIs (including Portable Contacts) wil= l be a huge upgrade to
=0A> our existing Open Stack offering.
=0A&= gt;
=0A> We've also been working behind the scenes to line up several= new and
=0A> exciting Relying Parties to accept OpenID. Every potent= ial Relying Party
=0A> that I've been working with wants to accept no= t just Yahoo OpenID, but
=0A> also OpenIDs from other Providers, whic= h is making a really strong case
=0A> for interoperability and open s= tandards.
=0A>
=0A> Yahoo along with other OPs and Relying Part= ies are committing plenty of
=0A> resources for OpenID  and are = actively working towards the goal of
=0A> having OpenID reach widespr= ead usage and adoption.  Many of these
=0A> efforts are behind t= he scenes, and aren't really visible on the public
=0A> mailing lists= , so perhaps the OpenID Foundation can take the lead in
=0A> publiciz= ing the activities that its membership is actively working on.
=0A>=0A> Allen
=0A>
=0A>
=0A> Nat wrote:
=0A>> = Hi
=0A>>
=0A>> Inline below:
=0A>>
=0A>>= ; =3Dnat at Tokyo via iPhone
=0A>>
=0A>> On 2009/07/30, at 2= :22, David Recordon <david at sixapart.= com> wrote:
=0A>>
=0A>>> Forwarding these three= posts from the General list.  Not because I
=0A>>> agree = with all of the sentiments expressed, but because it shows how
=0A>&g= t;> we as a board and organization are clearly not being transparent
= =0A>>> enough in the activities that are actually being taken on.<= br>=0A>>>
=0A>>> Two ideas I think that we should seri= ously consider are:
=0A>>> 1) making use of a project managemen= t tool like Basecamp
=0A>>> (http://www.basecamphq.com/) so = that at least the entire board and
=0A>>> Don know the status o= f each project that is underway
=0A>>
=0A>> I strongly ag= ree to this.
=0A>>
=0A>>> 2) having Don write a monthl= y blog post about OpenID's achievements
=0A>>> the past month a= nd what the Foundation has accomplished
=0A>>
=0A>> +1=0A>>
=0A>>>
=0A>>> Thoughts?
=0A>>= >
=0A>>> --David
=0A>>>
=0A>>> Begin= forwarded message:
=0A>>>
=0A>>>> From: Santosh= Rajan <santrajan at gmail.com>= ;
=0A>>>> Date: July 28, 2009 11:11:03 PM PDT
=0A>>= >> To: general at openid.net
= =0A>>>> Subject: Re: [OpenID] Google's proprietary discovery ex= tension?
=0A>>>>
=0A>>>>
=0A>>>&g= t; Hehe! Shade for once I am going to agree with you.
=0A>>>>= ; Why do we have a chairman? Isnt he supposed to be leading the flock and=0A>>>> showing the way?
=0A>>>> And what abou= t the rest of the board. This is the "coldest" board I
=0A>>>&g= t; have
=0A>>>> ever seen.
=0A>>>> I think Er= an Hammer should have been the chairman of the board! I
=0A>>>&= gt; wonder why
=0A>>>> he disappeared from here 2 yrs back. = (I have seen some posts from
=0A>>>> him from
=0A>>= >> 2007).
=0A>>>>
=0A>>>>
=0A>>= ;>> SitG Admin wrote:
=0A>>>>>
=0A>>>&g= t;>> There is no sign of the "STD mechanism" coming soon.
=0A>&= gt;>>>
=0A>>>>> Perhaps it will arrive after Chr= is Messina's "Policy Expression
=0A>>>>> Extension" passe= s ;)
=0A>>>>>
=0A>>>>>> Apathy on th= e part of the OpenID Foundation.
=0A>>>>>
=0A>>&= gt;>> Inaction, or so it may appear; timely, though?
=0A>>&g= t;>>
=0A>>>>>> Half the Identity folk have moved= on to Kantara Initiative.
=0A>>>>>> The Other half to= the Open Web foundation.
=0A>>>>>> XRI TC has tied it= self in knots.
=0A>>>>>> And the hilarious part is tha= t there are folk involved in all
=0A>>>>>> these three=
=0A>>>>>> foundations!
=0A>>>>>
= =0A>>>>> Sounds like good separation of duties to me. If the= rest of us can
=0A>>>>> still interop (and work is still= being done that *needs* to be done
=0A>>>>> before we ca= n move forward), it doesn't really matter where most of
=0A>>>&= gt;> the various communities is doing that work.
=0A>>>>&= gt;
=0A>>>>>> No idea were the rest of us should bail = out to!?
=0A>>>>>
=0A>>>>> If the devel= opment of OpenID were to halt now, I think it would be
=0A>>>&g= t;> Federated implementations that found themselves hardest hit; small,<= br>=0A>>>>> independent operators such as myself (working wi= th libraries already
=0A>>>>> distributed "in the wild") = might not even notice.
=0A>>>>>
=0A>>>>>= ; -Shade
=0A>>>>> _______________________________________= ________
=0A>>>>> general mailing list
=0A>>>= >> general at openid.net
= =0A>>>>> http://openid.net/mailman/listinfo/g= eneral
=0A>>>>>
=0A>>>>>
=0A>= >>>
=0A>>>>
=0A>>>> -----
=0A>= >>>
=0A>>>> Santosh Rajan
=0A>>>> = http://santrajan.blogspot.com http://santrajan.blogspot.com
= =0A>>>> --
=0A>>>> View this message in context:=
=0A>>>> http://www.nabble.com/Re%3A-Google%27s-proprietary-discov= ery-extension--tp24414092p24713025.html
=0A=0A>>>>
= =0A>>>> Sent from the OpenID - General mailing list archive at = Nabble.com.
=0A>>>>
=0A>>>> _________________= ______________________________
=0A>>>> general mailing list<= br>=0A>>>> general at openid.n= et
=0A>>>> http://openid.net/mailman/list= info/general
=0A>>>
=0A>>> ____________________= ___________________________
=0A>>> board mailing list
=0A>= ;>> board at openid.net
=0A>&g= t;> http://openid.net/mailman/listinfo/board
=0A>= > _______________________________________________
=0A>> board m= ailing list
=0A>> board at openid.net=
=0A>> http://openid.net/mailman/listinfo/board
=0A>
=0A>
=0A> _______________________________________= ________
=0A> board mailing list
=0A>
board at openid.net
=0A> http://openid.net/mailm= an/listinfo/board
=0A>
=0A>
=0A
=0A
=0A-----
= =0A
=0ASantosh Rajan
=0Ahttp://santrajan.blogspot.com http://= santrajan.blogspot.com
=0A--
=0A
View this message in = context: http://www.nabble.co= m/Perception-of-the-Foundation-%28Was%3A-Fwd%3A--OpenID--Google%27s-proprie= tary-discovery-extension-%29-tp24724040p24730408.html
=0A=0ASent fro= m the OpenID - Foundation Board mailing list archive at Nabble.com.
=0A<= div>

=0A___________________________________= ____________
=0Aboard mailing list
=0Aboard at openid.net
=0Ahttp://openid.net/mailman/listinfo= /board
=0A



-= -
Chris Messina
Open Web Advocate

Personal site: http://factoryjoe.= com
Twitter: http://twitter.com/chrismessina
=0A
Diso = Project: http://diso-project.org
OpenID Foundation: http://openid.net

T= his email is:   [ ] bloggable    [X] ask first   [ ] pr= ivate
=0A=0A=0A
=0A
Lebih aman saat online.
Upgrade ke Internet Explorer 8 baru dan lebih cepat yang dioptim= alkan untuk Yahoo! agar Anda merasa lebih aman. Gratis. Dapatkan IE8 di sini! --0-274231782-1248925704=:38102-- From jernst at netmesh.us Wed Jul 29 22:28:57 2009 From: jernst at netmesh.us (Johannes Ernst) Date: Wed, 29 Jul 2009 22:28:57 -0700 Subject: [OpenID board] Perception of the Foundation (Was: Fwd: [OpenID] Google's proprietary discovery extension?) In-Reply-To: <24731706.post@talk.nabble.com> References: <4A70D191.7040100@yahoo-inc.com> <24730408.post@talk.nabble.com> <1bc4603e0907292013v38d5ac54qaaeaec0b41a3828f@mail.gmail.com> <24731706.post@talk.nabble.com> Message-ID: <01EB9C31-548C-4B84-AAB1-EEF05C30A750@netmesh.us> I have to agree with Santosh here. The really scary part is that the "serious leadership vacuum" seems to have migrated from the old board and old ED to the new board and new ED. I'm really perplexed how that might even be possible given how many people (including myself) were exchanged in the process. On Jul 29, 2009, at 20:44, Santosh Rajan wrote: > > > First of all I am not proposing anything, nor am i complaining about > anything. I am just bringing to your notice what I think is a very > serious > problem with the OpenID board. > And yes let us face it. There definitely is a serious leadership > vacuum > here. I am sure every one is aware of it but nobody speaks about it. > > As you said Don is an infrastructure guy, but why bring Don into > this at > all. I dont think he was hired for a leadership role at all. The > leader has > to be the chairman of the board. The chairman must be a technical > wiz plus > someone who can lead from the front, and should be rallying the > community. > > I cant see someone who is good at both here, technology and rallying > the > flock. > Actually I dont mind one of the corporate members being chairman of > the > board provided he has a written mandate from his company to work as he > wishes independently on a board like this. Something like the > mandate given > to Eran from Yahoo. > > > Chris Messina wrote: >> >> Santosh, I'm not sure what you're proposing. >> If there is a leadership vacuum in the community, complaining about >> it >> doesn't seem like an effective way to address it. >> >> That said, I certainly think that the Foundation via the board has >> not >> been >> terribly effective in its communications and outreach since the >> elections. >> That said, much has been happening, albeit in many different places >> so >> keeping track of everything is very challenging ? even for those >> directly >> working on these things. >> >> A couple weeks back I sent Don a list of interview-style questions >> that I >> had hoped would have made it to the blog by now, but alas I've not >> heard >> back from him yet. Don has pointed out that he is more of an >> infrastructure >> kind of guy ? who likes to operate behind the scenes, and so >> combining >> that >> style of leadership with an otherwise quiet board can of course >> lead to >> questions of progress. >> >> I also noticed that the board's meeting minutes have not been >> published to >> the wiki recently, so I'll go an make sure that they are copied >> from this >> list to the wiki, so at least you can trace the conversations that >> have >> gone >> on over the last several months. >> >> I would be interested in hearing solid proposals for rallying the >> community >> ? and coordinating efforts if the board is unable or unavailable to >> do so. >> I >> have ideas myself, but not the time or ability to implement them at >> the >> moment. >> >> Chris >> >> On Wed, Jul 29, 2009 at 5:30 PM, Santosh Rajan >> wrote: >> >>> >>> Allen I think you missed a major point here. >>> It is nice to know about Yahoo's work. Other coorporates have also >>> done a >>> lot of work, like Google, Facebook etc. >>> >>> But what about the independent community members? Nothing!! Or >>> atleast I >>> haven't seen any work coming from then. >>> >>> I think in Open Communities the most important contributions must >>> come >>> from >>> the independant members and not the coorporate members. Independent >>> members >>> are not "boxed in" by coorporate objectives. >>> >>> Corporate members are focussed by their companies. Independent >>> individuals >>> need community leadership, otherwise they will end up running >>> around like >>> headless chicken. Which is more or less what is happenning now. >>> >>> >>> >>> Allen Tom-2 wrote: >>>> >>>> Hi all, >>>> >>>> Yahoo is very heavily invested in OpenID and we have a bunch of >>>> engineers and designers currently working on enhancements to our >>>> OpenID >>>> service. Earlier this year, we worked with the community to >>>> write the >>>> OpenID UI and OAuth/Hybrid Extensions, and the Yahoo OP will be >>>> implementing both of these extensions in the very near future. >>>> >>>> In addition to protocol enhancements, we have a crack team of >>> UI/Product >>>> designers and researchers who are actively experimenting with >>>> ways to >>>> improve the overall usability of our OpenID service. We'll be >>>> deploying >>>> many significant upgrades to the Yahoo OpenID Provider's user >>>> interface >>>> later this year. The new OpenID UI, along with support for the UI >>>> and >>>> Hybrid Extensions, and our soon to be released support for Open >>> Social's >>>> REST based APIs (including Portable Contacts) will be a huge >>>> upgrade to >>>> our existing Open Stack offering. >>>> >>>> We've also been working behind the scenes to line up several new >>>> and >>>> exciting Relying Parties to accept OpenID. Every potential Relying >>> Party >>>> that I've been working with wants to accept not just Yahoo >>>> OpenID, but >>>> also OpenIDs from other Providers, which is making a really >>>> strong case >>>> for interoperability and open standards. >>>> >>>> Yahoo along with other OPs and Relying Parties are committing >>>> plenty of >>>> resources for OpenID and are actively working towards the goal of >>>> having OpenID reach widespread usage and adoption. Many of these >>>> efforts are behind the scenes, and aren't really visible on the >>>> public >>>> mailing lists, so perhaps the OpenID Foundation can take the lead >>>> in >>>> publicizing the activities that its membership is actively >>>> working on. >>>> >>>> Allen >>>> >>>> >>>> Nat wrote: >>>>> Hi >>>>> >>>>> Inline below: >>>>> >>>>> =nat at Tokyo via iPhone >>>>> >>>>> On 2009/07/30, at 2:22, David Recordon wrote: >>>>> >>>>>> Forwarding these three posts from the General list. Not >>>>>> because I >>>>>> agree with all of the sentiments expressed, but because it >>>>>> shows how >>>>>> we as a board and organization are clearly not being transparent >>>>>> enough in the activities that are actually being taken on. >>>>>> >>>>>> Two ideas I think that we should seriously consider are: >>>>>> 1) making use of a project management tool like Basecamp >>>>>> (http://www.basecamphq.com/) so that at least the entire board >>>>>> and >>>>>> Don know the status of each project that is underway >>>>> >>>>> I strongly agree to this. >>>>> >>>>>> 2) having Don write a monthly blog post about OpenID's >>>>>> achievements >>>>>> the past month and what the Foundation has accomplished >>>>> >>>>> +1 >>>>> >>>>>> >>>>>> Thoughts? >>>>>> >>>>>> --David >>>>>> >>>>>> Begin forwarded message: >>>>>> >>>>>>> From: Santosh Rajan >>>>>>> Date: July 28, 2009 11:11:03 PM PDT >>>>>>> To: general at openid.net >>>>>>> Subject: Re: [OpenID] Google's proprietary discovery extension? >>>>>>> >>>>>>> >>>>>>> Hehe! Shade for once I am going to agree with you. >>>>>>> Why do we have a chairman? Isnt he supposed to be leading the >>>>>>> flock >>> and >>>>>>> showing the way? >>>>>>> And what about the rest of the board. This is the "coldest" >>>>>>> board I >>>>>>> have >>>>>>> ever seen. >>>>>>> I think Eran Hammer should have been the chairman of the >>>>>>> board! I >>>>>>> wonder why >>>>>>> he disappeared from here 2 yrs back. (I have seen some posts >>>>>>> from >>>>>>> him from >>>>>>> 2007). >>>>>>> >>>>>>> >>>>>>> SitG Admin wrote: >>>>>>>> >>>>>>>>> There is no sign of the "STD mechanism" coming soon. >>>>>>>> >>>>>>>> Perhaps it will arrive after Chris Messina's "Policy Expression >>>>>>>> Extension" passes ;) >>>>>>>> >>>>>>>>> Apathy on the part of the OpenID Foundation. >>>>>>>> >>>>>>>> Inaction, or so it may appear; timely, though? >>>>>>>> >>>>>>>>> Half the Identity folk have moved on to Kantara Initiative. >>>>>>>>> The Other half to the Open Web foundation. >>>>>>>>> XRI TC has tied itself in knots. >>>>>>>>> And the hilarious part is that there are folk involved in all >>>>>>>>> these three >>>>>>>>> foundations! >>>>>>>> >>>>>>>> Sounds like good separation of duties to me. If the rest of >>>>>>>> us can >>>>>>>> still interop (and work is still being done that *needs* to >>>>>>>> be done >>>>>>>> before we can move forward), it doesn't really matter where >>>>>>>> most of >>>>>>>> the various communities is doing that work. >>>>>>>> >>>>>>>>> No idea were the rest of us should bail out to!? >>>>>>>> >>>>>>>> If the development of OpenID were to halt now, I think it >>>>>>>> would be >>>>>>>> Federated implementations that found themselves hardest hit; >>>>>>>> small, >>>>>>>> independent operators such as myself (working with libraries >>> already >>>>>>>> distributed "in the wild") might not even notice. >>>>>>>> >>>>>>>> -Shade >>>>>>>> _______________________________________________ >>>>>>>> general mailing list >>>>>>>> general at openid.net >>>>>>>> http://openid.net/mailman/listinfo/general >>>>>>>> >>>>>>>> >>>>>>> >>>>>>> >>>>>>> ----- >>>>>>> >>>>>>> Santosh Rajan >>>>>>> http://santrajan.blogspot.com http://santrajan.blogspot.com >>>>>>> -- >>>>>>> View this message in context: >>>>>>> >>> http://www.nabble.com/Re%3A-Google%27s-proprietary-discovery-extension--tp24414092p24713025.html >>>>>>> >>>>>>> Sent from the OpenID - General mailing list archive at >>>>>>> Nabble.com. >>>>>>> >>>>>>> _______________________________________________ >>>>>>> general mailing list >>>>>>> general at openid.net >>>>>>> http://openid.net/mailman/listinfo/general >>>>>> >>>>>> _______________________________________________ >>>>>> board mailing list >>>>>> board at openid.net >>>>>> http://openid.net/mailman/listinfo/board >>>>> _______________________________________________ >>>>> board mailing list >>>>> board at openid.net >>>>> http://openid.net/mailman/listinfo/board >>>> >>>> >>>> _______________________________________________ >>>> board mailing list >>>> board at openid.net >>>> http://openid.net/mailman/listinfo/board >>>> >>>> >>> >>> >>> ----- >>> >>> Santosh Rajan >>> http://santrajan.blogspot.com http://santrajan.blogspot.com >>> -- >>> View this message in context: >>> http://www.nabble.com/Perception-of-the-Foundation-%28Was%3A-Fwd%3A--OpenID--Google%27s-proprietary-discovery-extension-%29-tp24724040p24730408.html >>> Sent from the OpenID - Foundation Board mailing list archive at >>> Nabble.com. >>> >>> _______________________________________________ >>> board mailing list >>> board at openid.net >>> http://openid.net/mailman/listinfo/board >>> >> >> >> >> -- >> Chris Messina >> Open Web Advocate >> >> Personal site: http://factoryjoe.com >> Twitter: http://twitter.com/chrismessina >> >> Diso Project: http://diso-project.org >> OpenID Foundation: http://openid.net >> >> This email is: [ ] bloggable [X] ask first [ ] private >> >> _______________________________________________ >> board mailing list >> board at openid.net >> http://openid.net/mailman/listinfo/board >> >> > > > ----- > > Santosh Rajan > http://santrajan.blogspot.com http://santrajan.blogspot.com > -- > View this message in context: http://www.nabble.com/Perception-of-the-Foundation-%28Was%3A-Fwd%3A--OpenID--Google%27s-proprietary-discovery-extension-%29-tp24724040p24731706.html > Sent from the OpenID - Foundation Board mailing list archive at > Nabble.com. > > _______________________________________________ > board mailing list > board at openid.net > http://openid.net/mailman/listinfo/board From chris.messina at gmail.com Sun Jul 5 18:31:19 2009 From: chris.messina at gmail.com (Chris Messina) Date: Sun, 5 Jul 2009 11:31:19 -0700 Subject: [OpenID board] 7 Lessons from Mozilla Message-ID: <1bc4603e0907051131x7c049e45w1180fc2dc8f1f7be@mail.gmail.com> Thought this presentation was interesting, especially from a communications/marketing perspective ? on making messages reusable and global: http://john.jubjubs.net/2009/01/27/lessons-from-mozilla-talk-at-heise/ Chris -- Chris Messina Open Web Advocate Personal site: http://factoryjoe.com Twitter: http://twitter.com/chrismessina Diso Project: http://diso-project.org OpenID Foundation: http://openid.net This email is: [X] bloggable [ ] ask first [ ] private -------------- next part -------------- An HTML attachment was scrubbed... URL: From postmaster at boxbe.com Sun Jul 5 19:01:11 2009 From: postmaster at boxbe.com (postmaster at boxbe.com) Date: Sun, 5 Jul 2009 12:01:11 -0700 (PDT) Subject: [OpenID board] board Digest, Vol 31, Issue 1 (Action Required) Message-ID: <855904398.51915.1246820471407.JavaMail.prod@app005.boxbe.com> Dear sender, This message serves as notification that you will not receive any more courtesy notices from our members for two days. Messages you have sent will remain in a lower priority queue for our member to review at their leisure. Future messages will be more likely to be viewed if you are on our member's priority Guest List. Thank you, sajjad.a.soomro at gmail.com About Boxbe This courtesy notice is part of a free service to make email more reliable and useful. Boxbe (http://www.boxbe.com) uses your existing social network and that of your friends to keep your inbox clean and make sure you receive email from people who matter to you. Boxbe: Say Goodbye to Email Overload Visit http://www.boxbe.com/how-it-works?tc=198571011_1310433938 -------------- next part -------------- An HTML attachment was scrubbed... URL: -------------- next part -------------- An embedded message was scrubbed... From: board-request at openid.net Subject: board Digest, Vol 31, Issue 1 Date: Sun, 05 Jul 2009 12:00:23 -0700 Size: 2376 URL: From esachs at google.com Wed Jul 8 18:05:24 2009 From: esachs at google.com (Eric Sachs) Date: Wed, 8 Jul 2009 11:05:24 -0700 Subject: [OpenID board] upcoming Google announcement regarding OpenID Message-ID: Below are drafts of two blog posts we will make in the upcoming weeks about the fact that we are now operating an OpenID IDP for the million+ schools/enterprise/ISPs that are outsourcing their email to Google Apps. We would appreciate this not being circulated beyond the board until it is public. This new support required that we work with the community to define some extensions to the OpenID discovery process. While those discussions have been going on in the community the last few months, those extensions are not yet formalized and probably won't be until they are proven in production environments. There is the potential for some community members (or press) to assume (or at least imply in articles) some evil intent by Google to co-opt OpenID with these extensions. It would be nice to have a blog post on the formal OpenID blog that was supportive of our approach, so I wanted to see if the board members are comfortable with that. On a somewhat related point, I also expect this will further increase the pressure on us as a community to find more scalable UI options since the Nascar style approach obviously cannot include buttons for these million new IDPs. We have also just posted a set of summary UI guidelines that we will be referencing from our API documentation at http://sites.google.com/site/oauthgoog/UXFedLogin/summary. The goal was to keep it to one-page which forced us to cut additional background information, but if you think we cut something critical, let me know. Enterprise blog: Google Apps + OpenID = identity hub for all your SaaS We are happy to announce that the Google OpenID Federated Login API has been extended to Google Apps accounts used by businesses, schools, and other organizations. The service is important not only to the individuals in those organizations, who can interact with a variety of consumer websites with a single credential , but also to the organizations themselves, who are increasingly reliant on multiple Software as a Service (SaaS) solutions from different vendors. For these organizations, Google Apps can now become an identity and data hub for multiple SaaS providers. When integrated with partner solutions such as XXX from XXX, the Google Open ID Federated Login API enables a single Google Apps login to provide secure access to services like Salesforce.com, SuccessFactors, and WebEX, as well as B2B partners, internal applications, and of course consumer web sites. See XXX's post to learn more about their implementation and view the demo and case study . Another early adopter is XXX, a SaaS project management vendor who uses the new service to make it easier for any organization using Google Apps to sign up for and deploy XXX o their users: < INSERT SCREEN SHOTS> Activating the OpenID Federated Login service for your domain is simple and secure. To achieve that, we introduced a new experimental discovery protocol addressing some of the challenges with the current version (2.0) of OpenID : - Reducing the hassle of hosting discovery documents on the domain web-site - the discovery protocol offer a solution that allows a hosted domain to become an OpenID Provider without hosting any documents at all. Optionally, a domain may choose to host one simple file to support a more complete discovery flow. - Being an OpenID Identity Provider requires strong security protection again attacks that could modify web pages on the site. To avoid that requirement for businesses and organizations, we introduced digital signatures on the discovery documents and a verification flow to support that. You can find more details in our API and Discovery documentation, or join the discussions in the Google Federated Login API Group, where you can ask any question and get answers from with other Identity Providers, Relying Parties and Google engineers. *The OpenID Federated Login Service is available for all Google Apps editions. However, it is disabled by default for the Premier and Education and editions , and it requires the Domain Admin to manually enable it from the Control Panel. So Admins - go turn this today for your users. At Google.com - we already enabled it for our employees... * Google Code blog: Over a million new OpenID Identity Providers !We are happy to announce that the Google OpenID Federated Login API has been extended to Google Apps accounts used by businesses, schools, and other organizations. Individuals in these organizations can now sign in to 3rd party websites using their Google Apps account, without giving away their credentials. In addition to the value for the end-users, the new service also benefits the organizations themselves, who are increasingly reliant on multiple Software as a Service (SaaS) solutions from different vendors. For example, XXX is an early adopter, allowing any organization running Google Apps to more quickly sign up for and adopt their service: << INSERT SCREEN SHOTS> See our post on the Google Enterprise Blog to learn more about the opportunities for the organizations. Supporting the API for Google Apps accounts is exciting news for the OpenID community , as it adds numerous new trustworthy Identity Provider (IDP) domains and increases the OpenID end user base by millions. In order to allow web-sites to easily become Relying Parties for these many new IDPs and users, we defined a new discovery protocol. The protocol allows Relying Parties to identify that a given domain is hosted on Google Apps and securely access its OpenID Provider End Point. The current proposal is an interim solution, and we are participating in several standardization organizations, such as OASIS and the OpenID Foundation , to generate a next-generation standard. Since the current protocol proposal is not supported by the standard OpenID libraries, we provided an implementation of the Relying Party pieces at the Open Source project - step2.googlecode.com. Google is also offering a set of resource addressing the issues of designing a scalable Federated Login User Interface. You are welcome to visit the User Experience summary for Federated Login Google Sites page, where you can find links do demos, mocks and usabilty research data. Prefer an out-of-the-box solution? We have been working with JanRain, a provider of OpenID solutions, which already support the new API as part of their RPX product . As demonstrated by UserVoice using JanRain's RPX , a user simply types in her Google Apps hosted domain name in the OpenID login box and everything else is being taken care of: You can find more details in our API and Discovery documentation, or join the discussions in the Google Federated Login API Group, where you can ask any question and get answers from with other Identity Providers, Relying Parties and Google engineers. *The OpenID Federated Login Service is available for all Google Apps editions. However, it is disabled by default for the Premier and Education editions, and it requires the Domain Admin to manually enable it from the Control Panel. So Admins - go turn this today for your users. At Google.com - we already enabled it for our employees... * -------------- next part -------------- An HTML attachment was scrubbed... URL: From will at willnorris.com Thu Jul 9 19:02:00 2009 From: will at willnorris.com (Will Norris) Date: Thu, 9 Jul 2009 12:02:00 -0700 Subject: [OpenID board] upcoming Google announcement regarding OpenID In-Reply-To: References: Message-ID: So it sounds like this was actually intended to go to the board- private list, but since it is public I'm going to throw in my two cents. I talked with Eric about this briefly at the last IIW in March, and I'm happy to see that some of my previous concerns have been addressed. Without seeing the actual discovery protocol document, I can't be sure what is being proposed, but based on previous conversations and what is mentioned in Eric's post here, I have a pretty good idea. The way I understand it, the idea is that a relying party would attempt normal OpenID discover on the claimed identifier provided by the user. If that was successful, then OpenID authentication continues as normal... nothing unusual here. But if the relying party is unable to discover an OpenID provider through normal discovery means, they make an API call to Google asking if Google hosts OpenID services for that domain. (As best as I can tell, the path of the claimed ID is ignored, and the domain must match exactly. If Google hosts services for "example.com", then "https://example.com:8443/foo" would match, but "www.example.com" would not. I'm sure the expectation is that users will simply enter "example.com") Having spent two years at USC helping to build both the policy and technical side of their identity management infrastructure, I do have very strong reservations about Google's actual product. But the more concerning matter is that the OpenID Foundation is being asked to endorse one specific vendor as THE fallback for OpenID discovery. Now in practice, I'm not sure that there is anyone else offering a service like Google has. I know JanRain has OPX, but I would imagine it uses traditional OpenID discovery... I'm not sure. I understand that the existing discovery methods are a bit lacking. My primary focus for the past four weeks or so has been getting XRD to a Committee Draft which people can start implementing. Google has been very active in that effort, and Eric mentioned that in his post. But endorsing a vendor-specific fallback in the meantime is absolutely not something the foundation should be doing. While it is not set in stone that the next version of OpenID Discovery is going to use XRD, that seems to be the general consensus. Publicizing this Google- specific discovery method, only to turn around in a couple of months and start promoting XRD, is going to create a lot of confusion with implementors. -will On Jul 8, 2009, at 11:05 AM, Eric Sachs wrote: > Below are drafts of two blog posts we will make in the upcoming > weeks about > the fact that we are now operating an OpenID IDP for the million+ > schools/enterprise/ISPs that are outsourcing their email to Google > Apps. We > would appreciate this not being circulated beyond the board until it > is > public. This new support required that we work with the community > to define > some extensions to the OpenID discovery process. While those > discussions > have been going on in the community the last few months, those > extensions > are not yet formalized and probably won't be until they are proven in > production environments. There is the potential for some community > members > (or press) to assume (or at least imply in articles) some evil > intent by > Google to co-opt OpenID with these extensions. It would be nice to > have a > blog post on the formal OpenID blog that was supportive of our > approach, so > I wanted to see if the board members are comfortable with that. > > On a somewhat related point, I also expect this will further > increase the > pressure on us as a community to find more scalable UI options since > the > Nascar style approach obviously cannot include buttons for these > million new > IDPs. We have also just posted a set of summary UI guidelines that > we will > be referencing from our API documentation at > http://sites.google.com/site/oauthgoog/UXFedLogin/summary. The goal > was to > keep it to one-page which forced us to cut additional background > information, but if you think we cut something critical, let me know. > > Enterprise blog: Google Apps + OpenID = identity hub for all your SaaS > > We are happy to announce that the Google OpenID Federated Login > API > > has > been extended to Google Apps accounts used by businesses, schools, > and other > organizations. The service is important not only to the individuals > in those > organizations, who can interact with a variety of consumer websites > with a > single credential , but also to the > organizations themselves, who are increasingly reliant on multiple > Software > as a Service (SaaS) solutions from different vendors. > > > For these organizations, Google Apps can now become an identity and > data hub > for multiple SaaS providers. When integrated with partner solutions > such as > XXX from XXX, the Google Open ID Federated Login API enables a > single Google > Apps login to provide secure access to services like Salesforce.com, > SuccessFactors, and WebEX, as well as B2B partners, internal > applications, > and of course consumer web sites. See XXX's post to learn > more > about their implementation and view the demo and case study links>. > > > Another early adopter is XXX, a SaaS project management vendor who > uses the > new service to make it easier for any organization using Google Apps > to sign > up for and deploy XXX o their users: > > < INSERT SCREEN SHOTS> > > > Activating the OpenID Federated Login service for your domain is > simple and > secure. To achieve that, we introduced a new experimental discovery > protocol > > addressing > some of the challenges with the current version (2.0) of > OpenID > : > > > > - Reducing the hassle of hosting discovery documents on the domain > web-site - the discovery protocol offer a solution that allows a > hosted > domain to become an OpenID Provider without hosting any documents > at all. > Optionally, a domain may choose to host one simple file to support > a more > complete discovery flow. > > > > - Being an OpenID Identity Provider requires strong security > protection > again attacks that could modify web pages on the site. To avoid that > requirement for businesses and organizations, we introduced digital > signatures on the discovery documents and a verification flow to > support > that. > > > You can find more details in our > API > > and Discovery > > documentation, > or join the discussions in the Google Federated Login API > Group >, > where you can ask any question and get answers from with other > Identity > Providers, Relying Parties and Google engineers. > > > *The OpenID Federated Login Service is available for all Google Apps > editions. However, it is disabled by default for the Premier and > Education > and editions , and it requires the Domain Admin to manually enable > it from > the Control Panel. So Admins - go turn this today for your > users >. > At Google.com - we already enabled it for our employees... * > > > Google Code blog: Over a million new OpenID Identity Providers !We > are happy > to announce that the Google OpenID Federated Login > API > > has been extended to Google Apps accounts used by businesses, > schools, and > other organizations. Individuals in these organizations can now > sign in to > 3rd party websites using their Google Apps account, without giving > away > their credentials. In addition to the value for the end-users, the new > service also benefits the organizations themselves, who are > increasingly > reliant on multiple Software as a Service (SaaS) solutions from > different > vendors. For example, XXX is an early adopter, allowing any > organization > running Google Apps to more quickly sign up for and adopt their > service: > > << INSERT SCREEN SHOTS> > > > See our post on the Google Enterprise Blog to learn more > about > the opportunities for the organizations. > > > Supporting the API for Google Apps accounts is exciting news for the > OpenID > community , as it adds numerous new > trustworthy > Identity Provider (IDP) domains and increases the OpenID end user > base by > millions. In order to allow web-sites to easily become Relying > Parties for > these many new IDPs and users, we defined a new discovery > protocol >. > The protocol allows Relying Parties to identify that a given domain is > hosted on Google Apps and securely access its OpenID Provider End > Point. The > current proposal is an interim solution, and we are participating in > several > standardization organizations, such as OASIS > and > the OpenID Foundation , to generate a > next-generation standard. Since the current protocol proposal is not > supported by the standard OpenID libraries, we provided an > implementation of > the Relying Party pieces at the Open Source project - > step2.googlecode.com. > Google is also offering a set of resource addressing the issues of > designing > a scalable Federated Login User Interface. You are welcome to visit > the User > Experience summary for Federated > Login > Google > Sites page, where you can find links do demos, mocks and usabilty > research > data. > > Prefer an out-of-the-box solution? We have been working with > JanRain, > a provider of OpenID solutions, which already support the new API as > part of > their RPX product . As demonstrated by > UserVoice > using JanRain's RPX , a user simply types in her > Google > Apps hosted domain name in the OpenID login box and everything else > is being > taken care of: > > > > > > > You can find more details in our > API > > and Discovery > > documentation, > or join the discussions in the Google Federated Login API > Group >, > where you can ask any question and get answers from with other > Identity > Providers, Relying Parties and Google engineers. > > *The OpenID Federated Login Service is available for all Google Apps > editions. However, it is disabled by default for the Premier and > Education > editions, and it requires the Domain Admin to manually enable it > from the > Control Panel. So Admins - go turn this today for your > users >. > At Google.com - we already enabled it for our employees... * > _______________________________________________ > board mailing list > board at openid.net > http://openid.net/mailman/listinfo/board From esachs at google.com Thu Jul 9 20:16:46 2009 From: esachs at google.com (Eric Sachs) Date: Thu, 9 Jul 2009 13:16:46 -0700 Subject: [OpenID board] upcoming Google announcement regarding OpenID In-Reply-To: References: Message-ID: >> So it sounds like this was actually intended to go to the board-private list, but since it is public I'm going to throw in my two cents. Feel free to discuss it on the main mailing list. The discovery discussions are not meant to be private. I recently posted a pointer in such a thread that says For nitty gritty details, see http://sites.google.com/site/oauthgoog/fedlogininterp/openiddiscovery >> But if the relying party is unable to discover an OpenID provider through normal discovery means, they make an API call to Google asking if Google hosts OpenID services for that domain The doc above has more details, including defining a way for a domain who outsources their IDP (or RP in the case of someone like Janrain) to publish a single simple file pointing to that SaaS provider. An RP could also choose to pole the SaaS providers directly, but that is a policy/UI decision for them, and by definition that type of one-off doesn't seem like it could, or needs to be, standardized. >> But the more concerning matter is that the OpenID Foundation is being asked to endorse one specific vendor as THE fallback for OpenID discovery. Sorry if it sounded like that is what we I was suggesting. I was suggesting the OIDF could be supportive of the "approach" we are taking of working with the community these last 6-9 months to establish standards for these types of use cases. Even our documentation specifies that the current implementation is just a proof-of-concept for how to do discovery when a SaaS provider is involved, and describes a method that does NOT require "one specific vendor as the fallback for OpenID discovery" though I agree some RPs may choose to do one-off polling of a few SaaS providers. On Thu, Jul 9, 2009 at 12:02 PM, Will Norris wrote: > So it sounds like this was actually intended to go to the board-private > list, but since it is public I'm going to throw in my two cents. I talked > with Eric about this briefly at the last IIW in March, and I'm happy to see > that some of my previous concerns have been addressed. Without seeing the > actual discovery protocol document, I can't be sure what is being proposed, > but based on previous conversations and what is mentioned in Eric's post > here, I have a pretty good idea. > > The way I understand it, the idea is that a relying party would attempt > normal OpenID discover on the claimed identifier provided by the user. If > that was successful, then OpenID authentication continues as normal... > nothing unusual here. But if the relying party is unable to discover an > OpenID provider through normal discovery means, they make an API call to > Google asking if Google hosts OpenID services for that domain. (As best as > I can tell, the path of the claimed ID is ignored, and the domain must match > exactly. If Google hosts services for "example.com", then " > https://example.com:8443/foo" would match, but "www.example.com" would > not. I'm sure the expectation is that users will simply enter " > example.com") > > Having spent two years at USC helping to build both the policy and > technical side of their identity management infrastructure, I do have very > strong reservations about Google's actual product. But the more concerning > matter is that the OpenID Foundation is being asked to endorse one specific > vendor as THE fallback for OpenID discovery. Now in practice, I'm not sure > that there is anyone else offering a service like Google has. I know > JanRain has OPX, but I would imagine it uses traditional OpenID discovery... > I'm not sure. > > I understand that the existing discovery methods are a bit lacking. My > primary focus for the past four weeks or so has been getting XRD to a > Committee Draft which people can start implementing. Google has been very > active in that effort, and Eric mentioned that in his post. But endorsing a > vendor-specific fallback in the meantime is absolutely not something the > foundation should be doing. While it is not set in stone that the next > version of OpenID Discovery is going to use XRD, that seems to be the > general consensus. Publicizing this Google-specific discovery method, only > to turn around in a couple of months and start promoting XRD, is going to > create a lot of confusion with implementors. > > -will > > On Jul 8, 2009, at 11:05 AM, Eric Sachs wrote: > > Below are drafts of two blog posts we will make in the upcoming weeks >> about >> the fact that we are now operating an OpenID IDP for the million+ >> schools/enterprise/ISPs that are outsourcing their email to Google Apps. >> We >> would appreciate this not being circulated beyond the board until it is >> public. This new support required that we work with the community to >> define >> some extensions to the OpenID discovery process. While those discussions >> have been going on in the community the last few months, those extensions >> are not yet formalized and probably won't be until they are proven in >> production environments. There is the potential for some community >> members >> (or press) to assume (or at least imply in articles) some evil intent by >> Google to co-opt OpenID with these extensions. It would be nice to have a >> blog post on the formal OpenID blog that was supportive of our approach, >> so >> I wanted to see if the board members are comfortable with that. >> >> On a somewhat related point, I also expect this will further increase the >> pressure on us as a community to find more scalable UI options since the >> Nascar style approach obviously cannot include buttons for these million >> new >> IDPs. We have also just posted a set of summary UI guidelines that we >> will >> be referencing from our API documentation at >> http://sites.google.com/site/oauthgoog/UXFedLogin/summary. The goal was >> to >> keep it to one-page which forced us to cut additional background >> information, but if you think we cut something critical, let me know. >> >> Enterprise blog: Google Apps + OpenID = identity hub for all your SaaS >> >> We are happy to announce that the Google OpenID Federated Login >> API< >> http://code.google.com/apis/apps/sso/openid_reference_implementation.html >> > >> has >> been extended to Google Apps accounts used by businesses, schools, and >> other >> organizations. The service is important not only to the individuals in >> those >> organizations, who can interact with a variety of consumer websites with a >> single credential , but also to the >> organizations themselves, who are increasingly reliant on multiple >> Software >> as a Service (SaaS) solutions from different vendors. >> >> >> For these organizations, Google Apps can now become an identity and data >> hub >> for multiple SaaS providers. When integrated with partner solutions such >> as >> XXX from XXX, the Google Open ID Federated Login API enables a single >> Google >> Apps login to provide secure access to services like Salesforce.com, >> SuccessFactors, and WebEX, as well as B2B partners, internal applications, >> and of course consumer web sites. See XXX's post to learn more >> about their implementation and view the demo and case study . >> >> >> Another early adopter is XXX, a SaaS project management vendor who uses >> the >> new service to make it easier for any organization using Google Apps to >> sign >> up for and deploy XXX o their users: >> >> < INSERT SCREEN SHOTS> >> >> >> Activating the OpenID Federated Login service for your domain is simple >> and >> secure. To achieve that, we introduced a new experimental discovery >> protocol< >> http://groups.google.com/group/google-federated-login-api/web/openid-discovery-for-hosted-domains >> > >> addressing >> some of the challenges with the current version (2.0) of >> OpenID >> : >> >> >> >> - Reducing the hassle of hosting discovery documents on the domain >> web-site - the discovery protocol offer a solution that allows a hosted >> domain to become an OpenID Provider without hosting any documents at all. >> Optionally, a domain may choose to host one simple file to support a more >> complete discovery flow. >> >> >> >> - Being an OpenID Identity Provider requires strong security protection >> again attacks that could modify web pages on the site. To avoid that >> requirement for businesses and organizations, we introduced digital >> signatures on the discovery documents and a verification flow to support >> that. >> >> >> You can find more details in our >> API< >> http://code.google.com/apis/apps/sso/openid_reference_implementation.html >> > >> and Discovery< >> http://groups.google.com/group/google-federated-login-api/web/openid-discovery-for-hosted-domains >> > >> documentation, >> or join the discussions in the Google Federated Login API >> Group< >> http://groups.google.com/group/google-federated-login-api/web/oauth-support-in-googles-federated-login-api >> >, >> where you can ask any question and get answers from with other Identity >> Providers, Relying Parties and Google engineers. >> >> >> *The OpenID Federated Login Service is available for all Google Apps >> editions. However, it is disabled by default for the Premier and Education >> and editions , and it requires the Domain Admin to manually enable it >> from >> the Control Panel. So Admins - go turn this today for your >> users< >> http://code.google.com/apis/apps/sso/openid_reference_implementation.html#cpanel >> >. >> At Google.com - we already enabled it for our employees... * >> >> >> Google Code blog: Over a million new OpenID Identity Providers !We are >> happy >> to announce that the Google OpenID Federated Login >> API< >> http://code.google.com/apis/apps/sso/openid_reference_implementation.html >> > >> has been extended to Google Apps accounts used by businesses, schools, and >> other organizations. Individuals in these organizations can now sign in >> to >> 3rd party websites using their Google Apps account, without giving away >> their credentials. In addition to the value for the end-users, the new >> service also benefits the organizations themselves, who are increasingly >> reliant on multiple Software as a Service (SaaS) solutions from different >> vendors. For example, XXX is an early adopter, allowing any organization >> running Google Apps to more quickly sign up for and adopt their service: >> >> << INSERT SCREEN SHOTS> >> >> >> See our post on the Google Enterprise Blog to learn more about >> the opportunities for the organizations. >> >> >> Supporting the API for Google Apps accounts is exciting news for the >> OpenID >> community , as it adds numerous new trustworthy >> Identity Provider (IDP) domains and increases the OpenID end user base by >> millions. In order to allow web-sites to easily become Relying Parties for >> these many new IDPs and users, we defined a new discovery >> protocol< >> http://groups.google.com/group/google-federated-login-api/web/openid-discovery-for-hosted-domains >> >. >> The protocol allows Relying Parties to identify that a given domain is >> hosted on Google Apps and securely access its OpenID Provider End Point. >> The >> current proposal is an interim solution, and we are participating in >> several >> standardization organizations, such as OASIS >> and >> the OpenID Foundation , to generate a >> next-generation standard. Since the current protocol proposal is not >> supported by the standard OpenID libraries, we provided an implementation >> of >> the Relying Party pieces at the Open Source project - >> step2.googlecode.com. >> Google is also offering a set of resource addressing the issues of >> designing >> a scalable Federated Login User Interface. You are welcome to visit the >> User >> Experience summary for Federated >> Login >> Google >> Sites page, where you can find links do demos, mocks and usabilty research >> data. >> >> Prefer an out-of-the-box solution? We have been working with >> JanRain, >> a provider of OpenID solutions, which already support the new API as part >> of >> their RPX product . As demonstrated by >> UserVoice >> using JanRain's RPX , a user simply types in her >> Google >> Apps hosted domain name in the OpenID login box and everything else is >> being >> taken care of: >> >> >> >> >> >> >> You can find more details in our >> API< >> http://code.google.com/apis/apps/sso/openid_reference_implementation.html >> > >> and Discovery< >> http://groups.google.com/group/google-federated-login-api/web/openid-discovery-for-hosted-domains >> > >> documentation, >> or join the discussions in the Google Federated Login API >> Group< >> http://groups.google.com/group/google-federated-login-api/web/oauth-support-in-googles-federated-login-api >> >, >> where you can ask any question and get answers from with other Identity >> Providers, Relying Parties and Google engineers. >> >> *The OpenID Federated Login Service is available for all Google Apps >> editions. However, it is disabled by default for the Premier and >> Education >> editions, and it requires the Domain Admin to manually enable it from the >> Control Panel. So Admins - go turn this today for your >> users< >> http://code.google.com/apis/apps/sso/openid_reference_implementation.html#cpanel >> >. >> At Google.com - we already enabled it for our employees... * >> _______________________________________________ >> board mailing list >> board at openid.net >> http://openid.net/mailman/listinfo/board >> > > _______________________________________________ > board mailing list > board at openid.net > http://openid.net/mailman/listinfo/board > -------------- next part -------------- An HTML attachment was scrubbed... URL: From will at willnorris.com Thu Jul 9 23:21:19 2009 From: will at willnorris.com (Will Norris) Date: Thu, 9 Jul 2009 16:21:19 -0700 Subject: [OpenID board] upcoming Google announcement regarding OpenID In-Reply-To: References: Message-ID: On Jul 9, 2009, at 1:16 PM, Eric Sachs wrote: >> So it sounds like this was actually intended to go to the board- >> private >> list, but since it is public I'm going to throw in my two cents. >> > > Feel free to discuss it on the main mailing list. The discovery > discussions > are not meant to be private. > > I recently posted a pointer in such a thread that says > > For nitty gritty details, see > http://sites.google.com/site/oauthgoog/fedlogininterp/openiddiscovery okay, that is helpful. The only thing linked to in your post was a document on a google group that I couldn't access. This looks very familiar, because we talked about this in depth on various XRI TC calls. >> But if the relying party is unable to discover an OpenID provider >> through >> normal discovery means, they make an API call to Google asking if >> Google >> hosts OpenID services for that domain >> > > The doc above has more details, including defining a way for a > domain who > outsources their IDP (or RP in the case of someone like Janrain) to > publish > a single simple file pointing to that SaaS provider. An RP could also > choose to pole the SaaS providers directly, but that is a policy/UI > decision > for them, and by definition that type of one-off doesn't seem like > it could, > or needs to be, standardized. The document you mention all but actually recommends that approach: > There are two locations where the host-meta document might be found: > > (1) http://example.com/host-meta > (2) https://www.google.com/accounts/o8/host-meta?hd=example.com > > Google's endpoint will return a 400 on endpoint (2) if the domain > provided has not outsourced OpenID IdP funcionality to Google. So > one possible strategy for an RP could be to first try endpoint (2), > and if that returns a 400, try endpoint (1), and if that doesn't > yield anything, give up. Other strategies (fetching both endpoints > in parallel, for example), are possible. The idea of trying endpoint #2 first, and then failing back to #1 should NEVER be proposed or encouraged. Quite the opposite, it should be strongly discouraged. It's language like this that make this feel like a vendor-specific approach that the OpenID Foundation should have nothing to do with. RPs should be instructed to ALWAYS attempt #1 first, otherwise the domain owner is no longer in control. >> But the more concerning matter is that the OpenID Foundation is being >> asked to endorse one specific vendor as THE fallback for OpenID >> discovery. >> > > Sorry if it sounded like that is what we I was suggesting. I was > suggesting > the OIDF could be supportive of the "approach" we are taking of > working with > the community these last 6-9 months to establish standards for these > types > of use cases. Even our documentation specifies that the current > implementation is just a proof-of-concept for how to do discovery > when a > SaaS provider is involved, and describes a method that does NOT > require "one > specific vendor as the fallback for OpenID discovery" though I agree > some > RPs may choose to do one-off polling of a few SaaS providers. The other thing that concerns me is how close we are to having a committee draft of XRD. Admittedly, no we're not there yet. And part of that delay has been because we're making sure that we have a solution that all involved parties can live with, including Google. But I get a bit frustrated when Google claims to be supporting the new standard (and I'll be the first to say how valuable their input has been), but appears to be putting all their resources behind an incompatible approach to the same problem... one that I'm afraid will only lead to great confusion[0] if it gets any kind of widespread adoption. If Google wants to throw it out there as a possible stop- gap solution their customers can use until the next version of OpenID Discovery is written, that is fine. But I just don't believe it's the kind of approach the foundation should be endorsing when we're so close with XRD. -will From mart at degeneration.co.uk Thu Jul 9 23:38:40 2009 From: mart at degeneration.co.uk (Martin Atkins) Date: Thu, 09 Jul 2009 16:38:40 -0700 Subject: [OpenID board] upcoming Google announcement regarding OpenID In-Reply-To: References: Message-ID: <4A567F80.30504@degeneration.co.uk> Will Norris wrote: > > > The document you mention all but actually recommends that approach: > >> There are two locations where the host-meta document might be found: >> >> (1) http://example.com/host-meta >> (2) https://www.google.com/accounts/o8/host-meta?hd=example.com >> >> Google's endpoint will return a 400 on endpoint (2) if the domain >> provided has not outsourced OpenID IdP funcionality to Google. So one >> possible strategy for an RP could be to first try endpoint (2), and if >> that returns a 400, try endpoint (1), and if that doesn't yield >> anything, give up. Other strategies (fetching both endpoints in >> parallel, for example), are possible. > > > The idea of trying endpoint #2 first, and then failing back to #1 should > NEVER be proposed or encouraged. Quite the opposite, it should be > strongly discouraged. It's language like this that make this feel like > a vendor-specific approach that the OpenID Foundation should have > nothing to do with. RPs should be instructed to ALWAYS attempt #1 > first, otherwise the domain owner is no longer in control. > This is also a pretty good argument for why "magic" paths under a domain are bad, and is a good example of the issue I brought up months ago with relying on HTTP for discovery: a domain's website is very often hosted by a completely different organisation than the one that hosts everything else. I even used Google Apps as an example in my original blog post about this back in October: http://www.apparently.me.uk/19059.html From esachs at google.com Fri Jul 10 00:10:26 2009 From: esachs at google.com (Eric Sachs) Date: Thu, 9 Jul 2009 17:10:26 -0700 Subject: [OpenID board] upcoming Google announcement regarding OpenID In-Reply-To: References: Message-ID: >> The idea of trying endpoint #2 first, and then failing back to #1 should NEVER be proposed or encouraged.In a publicly documented standard, I agree with you. However, whitelists are common in actual practice. We see them today in the consumer space, though the eventual goal is to minimize that approach. In the case of Google Apps, most of the interest in this feature has come from SaaS vendors who are developing products that ONLY work for existing users of Google Apps, and that also require using the hybrid OAuth/OpenID integration with Google to access our APIs. So by definition, the only IDP/OAuth-SP they can "trust" is Google Apps. >> The other thing that concerns me is how close we are to having a committee draft of XRD. We haven't formally announced it yet :-) We keep delaying internally, but at some point we'll have to launch it and I would be surprised if we can hold off for longer then a few weeks given how many months we have already delayed. But when the drafts get finalized, we're hoping to support it within a small number of days and remove documentation for the proof-of-concept approach. The partners we have already worked with have read the warnings in our documentation that we will be switching the discovery mechanism once the standards gets solidified, so they are prepared to have to make that change on their side. On Thu, Jul 9, 2009 at 4:21 PM, Will Norris wrote: > > On Jul 9, 2009, at 1:16 PM, Eric Sachs wrote: > > So it sounds like this was actually intended to go to the board-private >>> list, but since it is public I'm going to throw in my two cents. >>> >>> >> Feel free to discuss it on the main mailing list. The discovery >> discussions >> are not meant to be private. >> >> I recently posted a pointer in such a thread that says >> >> For nitty gritty details, see >> http://sites.google.com/site/oauthgoog/fedlogininterp/openiddiscovery >> > > okay, that is helpful. The only thing linked to in your post was a > document on a google group that I couldn't access. This looks very > familiar, because we talked about this in depth on various XRI TC calls. > > > But if the relying party is unable to discover an OpenID provider through >>> normal discovery means, they make an API call to Google asking if Google >>> hosts OpenID services for that domain >>> >>> >> The doc above has more details, including defining a way for a domain who >> outsources their IDP (or RP in the case of someone like Janrain) to >> publish >> a single simple file pointing to that SaaS provider. An RP could also >> choose to pole the SaaS providers directly, but that is a policy/UI >> decision >> for them, and by definition that type of one-off doesn't seem like it >> could, >> or needs to be, standardized. >> > > > The document you mention all but actually recommends that approach: > > There are two locations where the host-meta document might be found: >> >> (1) http://example.com/host-meta >> (2) https://www.google.com/accounts/o8/host-meta?hd=example.com >> >> Google's endpoint will return a 400 on endpoint (2) if the domain provided >> has not outsourced OpenID IdP funcionality to Google. So one possible >> strategy for an RP could be to first try endpoint (2), and if that returns a >> 400, try endpoint (1), and if that doesn't yield anything, give up. Other >> strategies (fetching both endpoints in parallel, for example), are possible. >> > > > The idea of trying endpoint #2 first, and then failing back to #1 should > NEVER be proposed or encouraged. Quite the opposite, it should be strongly > discouraged. It's language like this that make this feel like a > vendor-specific approach that the OpenID Foundation should have nothing to > do with. RPs should be instructed to ALWAYS attempt #1 first, otherwise the > domain owner is no longer in control. > > > But the more concerning matter is that the OpenID Foundation is being >>> asked to endorse one specific vendor as THE fallback for OpenID >>> discovery. >>> >>> >> Sorry if it sounded like that is what we I was suggesting. I was >> suggesting >> the OIDF could be supportive of the "approach" we are taking of working >> with >> the community these last 6-9 months to establish standards for these types >> of use cases. Even our documentation specifies that the current >> implementation is just a proof-of-concept for how to do discovery when a >> SaaS provider is involved, and describes a method that does NOT require >> "one >> specific vendor as the fallback for OpenID discovery" though I agree some >> RPs may choose to do one-off polling of a few SaaS providers. >> > > The other thing that concerns me is how close we are to having a committee > draft of XRD. Admittedly, no we're not there yet. And part of that delay > has been because we're making sure that we have a solution that all involved > parties can live with, including Google. But I get a bit frustrated when > Google claims to be supporting the new standard (and I'll be the first to > say how valuable their input has been), but appears to be putting all their > resources behind an incompatible approach to the same problem... one that > I'm afraid will only lead to great confusion[0] if it gets any kind of > widespread adoption. If Google wants to throw it out there as a possible > stop-gap solution their customers can use until the next version of OpenID > Discovery is written, that is fine. But I just don't believe it's the kind > of approach the foundation should be endorsing when we're so close with XRD. > > -will > > > _______________________________________________ > board mailing list > board at openid.net > http://openid.net/mailman/listinfo/board > -------------- next part -------------- An HTML attachment was scrubbed... URL: From esachs at google.com Wed Jul 8 18:47:00 2009 From: esachs at google.com (Eric Sachs) Date: Wed, 8 Jul 2009 11:47:00 -0700 Subject: [OpenID board] upcoming Google announcement regarding OpenID In-Reply-To: References: Message-ID: Yes, I now realize I mistakenly posted this to the public instead or private board mailing list :-) Not a particularly big deal since we have been discussing this planned launch in the discovery community. Feel free to respond on either the public or private mailing list. On Wed, Jul 8, 2009 at 11:05 AM, Eric Sachs wrote: > Below are drafts of two blog posts we will make in the upcoming weeks about > the fact that we are now operating an OpenID IDP for the million+ > schools/enterprise/ISPs that are outsourcing their email to Google Apps. We > would appreciate this not being circulated beyond the board until it is > public. This new support required that we work with the community to define > some extensions to the OpenID discovery process. While those discussions > have been going on in the community the last few months, those extensions > are not yet formalized and probably won't be until they are proven in > production environments. There is the potential for some community members > (or press) to assume (or at least imply in articles) some evil intent by > Google to co-opt OpenID with these extensions. It would be nice to have a > blog post on the formal OpenID blog that was supportive of our approach, so > I wanted to see if the board members are comfortable with that. > > On a somewhat related point, I also expect this will further increase the > pressure on us as a community to find more scalable UI options since the > Nascar style approach obviously cannot include buttons for these million new > IDPs. We have also just posted a set of summary UI guidelines that we will > be referencing from our API documentation at > http://sites.google.com/site/oauthgoog/UXFedLogin/summary. The goal was > to keep it to one-page which forced us to cut additional background > information, but if you think we cut something critical, let me know. > > Enterprise blog: Google Apps + OpenID = identity hub for all your SaaS > > We are happy to announce that the Google OpenID Federated Login API has > been extended to Google Apps accounts used by businesses, schools, and other > organizations. The service is important not only to the individuals in those > organizations, who can interact with a variety of consumer websites with a > single credential , but also to the > organizations themselves, who are increasingly reliant on multiple Software > as a Service (SaaS) solutions from different vendors. > > > For these organizations, Google Apps can now become an identity and data > hub for multiple SaaS providers. When integrated with partner solutions such > as XXX from XXX, the Google Open ID Federated Login API enables a single > Google Apps login to provide secure access to services like Salesforce.com, > SuccessFactors, and WebEX, as well as B2B partners, internal applications, > and of course consumer web sites. See XXX's post to learn more > about their implementation and view the demo and case study . > > > Another early adopter is XXX, a SaaS project management vendor who uses the > new service to make it easier for any organization using Google Apps to sign > up for and deploy XXX o their users: > > < INSERT SCREEN SHOTS> > > > Activating the OpenID Federated Login service for your domain is simple and > secure. To achieve that, we introduced a new experimental discovery > protocol addressing > some of the challenges with the current version (2.0) of OpenID > : > > > > - Reducing the hassle of hosting discovery documents on the domain > web-site - the discovery protocol offer a solution that allows a hosted > domain to become an OpenID Provider without hosting any documents at all. > Optionally, a domain may choose to host one simple file to support a more > complete discovery flow. > > > > - Being an OpenID Identity Provider requires strong security protection > again attacks that could modify web pages on the site. To avoid that > requirement for businesses and organizations, we introduced digital > signatures on the discovery documents and a verification flow to support > that. > > > You can find more details in our API > and Discovery documentation, > or join the discussions in the Google Federated Login API Group, > where you can ask any question and get answers from with other Identity > Providers, Relying Parties and Google engineers. > > > *The OpenID Federated Login Service is available for all Google Apps > editions. However, it is disabled by default for the Premier and Education > and editions , and it requires the Domain Admin to manually enable it from > the Control Panel. So Admins - go turn this today for your users. > At Google.com - we already enabled it for our employees... * > > > Google Code blog: Over a million new OpenID Identity Providers !We are > happy to announce that the Google OpenID Federated Login API > has been extended to Google Apps accounts used by businesses, schools, and > other organizations. Individuals in these organizations can now sign in to > 3rd party websites using their Google Apps account, without giving away > their credentials. In addition to the value for the end-users, the new > service also benefits the organizations themselves, who are increasingly > reliant on multiple Software as a Service (SaaS) solutions from different > vendors. For example, XXX is an early adopter, allowing any organization > running Google Apps to more quickly sign up for and adopt their service: > > << INSERT SCREEN SHOTS> > > > See our post on the Google Enterprise Blog to learn more about > the opportunities for the organizations. > > > Supporting the API for Google Apps accounts is exciting news for the OpenID > community , as it adds numerous new trustworthy > Identity Provider (IDP) domains and increases the OpenID end user base by > millions. In order to allow web-sites to easily become Relying Parties for > these many new IDPs and users, we defined a new discovery protocol. > The protocol allows Relying Parties to identify that a given domain is > hosted on Google Apps and securely access its OpenID Provider End Point. The > current proposal is an interim solution, and we are participating in several > standardization organizations, such as OASIS and > the OpenID Foundation , to generate a > next-generation standard. Since the current protocol proposal is not > supported by the standard OpenID libraries, we provided an implementation of > the Relying Party pieces at the Open Source project - step2.googlecode.com. > Google is also offering a set of resource addressing the issues of designing > a scalable Federated Login User Interface. You are welcome to visit the User > Experience summary for Federated Login Google > Sites page, where you can find links do demos, mocks and usabilty research > data. > > Prefer an out-of-the-box solution? We have been working with JanRain, > a provider of OpenID solutions, which already support the new API as part of > their RPX product . As demonstrated by UserVoice > using JanRain's RPX , a user simply types in her > Google Apps hosted domain name in the OpenID login box and everything else > is being taken care of: > > > > > > > You can find more details in our API > and Discovery documentation, > or join the discussions in the Google Federated Login API Group, > where you can ask any question and get answers from with other Identity > Providers, Relying Parties and Google engineers. > > *The OpenID Federated Login Service is available for all Google Apps > editions. However, it is disabled by default for the Premier and Education > editions, and it requires the Domain Admin to manually enable it from the > Control Panel. So Admins - go turn this today for your users. > At Google.com - we already enabled it for our employees... * > -------------- next part -------------- An HTML attachment was scrubbed... URL: From santrajan at gmail.com Fri Jul 10 03:44:19 2009 From: santrajan at gmail.com (Santosh Rajan) Date: Thu, 9 Jul 2009 20:44:19 -0700 (PDT) Subject: [OpenID board] upcoming Google announcement regarding OpenID In-Reply-To: References: Message-ID: <24421338.post@talk.nabble.com> Will Norris wrote: > > > > > The other thing that concerns me is how close we are to having a > committee draft of XRD. Admittedly, no we're not there yet. And part > of that delay has been because we're making sure that we have a > solution that all involved parties can live with, including Google. > But I get a bit frustrated when Google claims to be supporting the new > standard (and I'll be the first to say how valuable their input has > been), but appears to be putting all their resources behind an > incompatible approach to the same problem... one that I'm afraid will > only lead to great confusion[0] if it gets any kind of widespread > adoption. If Google wants to throw it out there as a possible stop- > gap solution their customers can use until the next version of OpenID > Discovery is written, that is fine. But I just don't believe it's the > kind of approach the foundation should be endorsing when we're so > close with XRD. > > > Are you kidding? XRI TC hasnt even figured how to sign an XRD document. XML DSig has been around for 11 years and it cant reliably sign an XML document? Why don't XRI TC come out with a simple XRD draft as soon as possible and relieve everyone from all this pain. IS the XRI TC waiting for the cows to come home? ----- Santosh Rajan http://santrajan.blogspot.com http://santrajan.blogspot.com -- View this message in context: http://www.nabble.com/upcoming-Google-announcement-regarding-OpenID-tp24396556p24421338.html Sent from the OpenID - Foundation Board mailing list archive at Nabble.com. From will at willnorris.com Fri Jul 10 16:28:46 2009 From: will at willnorris.com (Will Norris) Date: Fri, 10 Jul 2009 09:28:46 -0700 Subject: [OpenID board] upcoming Google announcement regarding OpenID In-Reply-To: <24421338.post@talk.nabble.com> References: <24421338.post@talk.nabble.com> Message-ID: <593F6E9C-E46B-4938-813C-7DC42CFCD2ED@willnorris.com> On Jul 9, 2009, at 8:44 PM, Santosh Rajan wrote: > Are you kidding? XRI TC hasnt even figured how to sign an XRD > document. XML > DSig has been around for 11 years and it cant reliably sign an XML > document? > Why don't XRI TC come out with a simple XRD draft as soon as > possible and > relieve everyone from all this pain. IS the XRI TC waiting for the > cows to > come home? You're welcome to track the progress of XRD in the OASIS svn repository[0]. There is only a docbook version there, we don't have the HTML versions in subversion... unfortunately the OASIS document repository requires authentication. [0]: http://tools.oasis-open.org/version-control/svn/xri/xrd/1.0/trunk/ While this is not really the best place to talk about XRD specifics, I'll address your point about signatures to say that XRD is in fact using XML DSig for signing. More accurately, we're using a constrained profile of DSig using Exclusive Canonicalization that should be much easier to implement than full inclusive c14n. This is the same approach taken in SAML 2.0. One of my personal qualms with Google's recommended discovery extension is that it significantly differs from XRD in this (they are using their own signing method instead of traditional DSig) and other ways , while being strikingly similar in others. I believe this will lead to unnecessary confusion. To be clear, my opposition to a foundation endorsement of this is not based on the merits of the proposed protocol (aside from some specific language I've already pointed out)... the XRI TC is the correct place to debate that. Rather, my opposition is based on my belief that widespread adoption of the proposed protocol will confuse, and possibly fragment, the community if XRD does end up being the solution for OpenID discovery in the not-too-distant future. On Jul 9, 2009, at 5:10 PM, Eric Sachs wrote: > We haven't formally announced it yet :-) We keep delaying > internally, but > at some point we'll have to launch it and I would be surprised if we > can > hold off for longer then a few weeks given how many months we have > already > delayed. But when the drafts get finalized, we're hoping to support > it > within a small number of days and remove documentation for the > proof-of-concept approach. The partners we have already worked with > have > read the warnings in our documentation that we will be switching the > discovery mechanism once the standards gets solidified, so they are > prepared > to have to make that change on their side. This sounds great, it's good to know that you plan on migrating to XRD in a timely fashion when it is ready. I don't mean to discount the contributions Google has made to the community both in helping to develop and implement these standards. And if you need to go forward with a temporary solution in the meantime in order to satisfy existing customers, that's perfectly fine. I understand that Google is free to move forward with whatever is necessary for your business, I'm not suggesting otherwise. But if the work is being done with specific partners, I'm not sure why that necessitates a public announcement including endorsement from the foundation. Is it not sufficient to point implementors to the Google document on an individual basis, which is what I would assume you've been doing thus far? You're absolutely right that a public announcement would likely lead at least some in the community and the press to interpret this move as Google trying to co-opt OpenID. But I'm not sure that the foundation publicly supporting the move is the right solution to that problem. I think my particular horse is pretty well dead enough already, so I'll shut up for now. I've said my piece... it is of course the board's decision to make. -will From santrajan at gmail.com Fri Jul 10 16:46:18 2009 From: santrajan at gmail.com (Santosh Rajan) Date: Fri, 10 Jul 2009 09:46:18 -0700 (PDT) Subject: [OpenID board] upcoming Google announcement regarding OpenID In-Reply-To: <593F6E9C-E46B-4938-813C-7DC42CFCD2ED@willnorris.com> References: <24421338.post@talk.nabble.com> <593F6E9C-E46B-4938-813C-7DC42CFCD2ED@willnorris.com> Message-ID: <24431020.post@talk.nabble.com> I think you are not seeing the real issue here. This is not about Google. This is about a Company (it could have been anyone), who has a problem to solve. It so happens we are already working on a solution. It is just that we can't come up with a solution as fast as they would like it. So why don't we at least give the Company credit for consulting with us, and why don't we try to come up with a good, usefull solution for them? Will Norris wrote: > > > On Jul 9, 2009, at 8:44 PM, Santosh Rajan wrote: > >> Are you kidding? XRI TC hasnt even figured how to sign an XRD >> document. XML >> DSig has been around for 11 years and it cant reliably sign an XML >> document? >> Why don't XRI TC come out with a simple XRD draft as soon as >> possible and >> relieve everyone from all this pain. IS the XRI TC waiting for the >> cows to >> come home? > > > You're welcome to track the progress of XRD in the OASIS svn > repository[0]. There is only a docbook version there, we don't have > the HTML versions in subversion... unfortunately the OASIS document > repository requires authentication. > > [0]: http://tools.oasis-open.org/version-control/svn/xri/xrd/1.0/trunk/ > > While this is not really the best place to talk about XRD specifics, > I'll address your point about signatures to say that XRD is in fact > using XML DSig for signing. More accurately, we're using a > constrained profile of DSig using Exclusive Canonicalization that > should be much easier to implement than full inclusive c14n. This is > the same approach taken in SAML 2.0. > > One of my personal qualms with Google's recommended discovery > extension is that it significantly differs from XRD in this (they are > using their own signing method instead of traditional DSig) and other > ways , while being strikingly similar in others. I believe this will > lead to unnecessary confusion. To be clear, my opposition to a > foundation endorsement of this is not based on the merits of the > proposed protocol (aside from some specific language I've already > pointed out)... the XRI TC is the correct place to debate that. > Rather, my opposition is based on my belief that widespread adoption > of the proposed protocol will confuse, and possibly fragment, the > community if XRD does end up being the solution for OpenID discovery > in the not-too-distant future. > > > On Jul 9, 2009, at 5:10 PM, Eric Sachs wrote: > >> We haven't formally announced it yet :-) We keep delaying >> internally, but >> at some point we'll have to launch it and I would be surprised if we >> can >> hold off for longer then a few weeks given how many months we have >> already >> delayed. But when the drafts get finalized, we're hoping to support >> it >> within a small number of days and remove documentation for the >> proof-of-concept approach. The partners we have already worked with >> have >> read the warnings in our documentation that we will be switching the >> discovery mechanism once the standards gets solidified, so they are >> prepared >> to have to make that change on their side. > > This sounds great, it's good to know that you plan on migrating to XRD > in a timely fashion when it is ready. I don't mean to discount the > contributions Google has made to the community both in helping to > develop and implement these standards. And if you need to go forward > with a temporary solution in the meantime in order to satisfy existing > customers, that's perfectly fine. I understand that Google is free to > move forward with whatever is necessary for your business, I'm not > suggesting otherwise. But if the work is being done with specific > partners, I'm not sure why that necessitates a public announcement > including endorsement from the foundation. Is it not sufficient to > point implementors to the Google document on an individual basis, > which is what I would assume you've been doing thus far? You're > absolutely right that a public announcement would likely lead at least > some in the community and the press to interpret this move as Google > trying to co-opt OpenID. But I'm not sure that the foundation > publicly supporting the move is the right solution to that problem. > > I think my particular horse is pretty well dead enough already, so > I'll shut up for now. I've said my piece... it is of course the > board's decision to make. > > -will > _______________________________________________ > board mailing list > board at openid.net > http://openid.net/mailman/listinfo/board > > ----- Santosh Rajan http://santrajan.blogspot.com http://santrajan.blogspot.com -- View this message in context: http://www.nabble.com/upcoming-Google-announcement-regarding-OpenID-tp24396556p24431020.html Sent from the OpenID - Foundation Board mailing list archive at Nabble.com. From esachs at google.com Fri Jul 10 17:43:36 2009 From: esachs at google.com (Eric Sachs) Date: Fri, 10 Jul 2009 10:43:36 -0700 Subject: [OpenID board] upcoming Google announcement regarding OpenID In-Reply-To: <24431020.post@talk.nabble.com> References: <24421338.post@talk.nabble.com> <593F6E9C-E46B-4938-813C-7DC42CFCD2ED@willnorris.com> <24431020.post@talk.nabble.com> Message-ID: At Google we had some discussion of moving up the data of our formal announcement, but we are going to try to continue to delay the posts until we at least finish some minor functional work we are doing in the Google Apps admin panel. It would certainly be great if the discovery standards discussions evolved between now and then. In the meantime, though, the functionality does work for free Google Apps domains, so feel free to use it for "proof-of-concept" testing if that helps the discovery standards discussions. On Fri, Jul 10, 2009 at 9:46 AM, Santosh Rajan wrote: > > I think you are not seeing the real issue here. This is not about Google. > This is about a Company (it could have been anyone), who has a problem to > solve. It so happens we are already working on a solution. It is just that > we can't come up with a solution as fast as they would like it. > > So why don't we at least give the Company credit for consulting with us, > and > why don't we try to come up with a good, usefull solution for them? > > > Will Norris wrote: > > > > > > On Jul 9, 2009, at 8:44 PM, Santosh Rajan wrote: > > > >> Are you kidding? XRI TC hasnt even figured how to sign an XRD > >> document. XML > >> DSig has been around for 11 years and it cant reliably sign an XML > >> document? > >> Why don't XRI TC come out with a simple XRD draft as soon as > >> possible and > >> relieve everyone from all this pain. IS the XRI TC waiting for the > >> cows to > >> come home? > > > > > > You're welcome to track the progress of XRD in the OASIS svn > > repository[0]. There is only a docbook version there, we don't have > > the HTML versions in subversion... unfortunately the OASIS document > > repository requires authentication. > > > > [0]: http://tools.oasis-open.org/version-control/svn/xri/xrd/1.0/trunk/ > > > > While this is not really the best place to talk about XRD specifics, > > I'll address your point about signatures to say that XRD is in fact > > using XML DSig for signing. More accurately, we're using a > > constrained profile of DSig using Exclusive Canonicalization that > > should be much easier to implement than full inclusive c14n. This is > > the same approach taken in SAML 2.0. > > > > One of my personal qualms with Google's recommended discovery > > extension is that it significantly differs from XRD in this (they are > > using their own signing method instead of traditional DSig) and other > > ways , while being strikingly similar in others. I believe this will > > lead to unnecessary confusion. To be clear, my opposition to a > > foundation endorsement of this is not based on the merits of the > > proposed protocol (aside from some specific language I've already > > pointed out)... the XRI TC is the correct place to debate that. > > Rather, my opposition is based on my belief that widespread adoption > > of the proposed protocol will confuse, and possibly fragment, the > > community if XRD does end up being the solution for OpenID discovery > > in the not-too-distant future. > > > > > > On Jul 9, 2009, at 5:10 PM, Eric Sachs wrote: > > > >> We haven't formally announced it yet :-) We keep delaying > >> internally, but > >> at some point we'll have to launch it and I would be surprised if we > >> can > >> hold off for longer then a few weeks given how many months we have > >> already > >> delayed. But when the drafts get finalized, we're hoping to support > >> it > >> within a small number of days and remove documentation for the > >> proof-of-concept approach. The partners we have already worked with > >> have > >> read the warnings in our documentation that we will be switching the > >> discovery mechanism once the standards gets solidified, so they are > >> prepared > >> to have to make that change on their side. > > > > This sounds great, it's good to know that you plan on migrating to XRD > > in a timely fashion when it is ready. I don't mean to discount the > > contributions Google has made to the community both in helping to > > develop and implement these standards. And if you need to go forward > > with a temporary solution in the meantime in order to satisfy existing > > customers, that's perfectly fine. I understand that Google is free to > > move forward with whatever is necessary for your business, I'm not > > suggesting otherwise. But if the work is being done with specific > > partners, I'm not sure why that necessitates a public announcement > > including endorsement from the foundation. Is it not sufficient to > > point implementors to the Google document on an individual basis, > > which is what I would assume you've been doing thus far? You're > > absolutely right that a public announcement would likely lead at least > > some in the community and the press to interpret this move as Google > > trying to co-opt OpenID. But I'm not sure that the foundation > > publicly supporting the move is the right solution to that problem. > > > > I think my particular horse is pretty well dead enough already, so > > I'll shut up for now. I've said my piece... it is of course the > > board's decision to make. > > > > -will > > _______________________________________________ > > board mailing list > > board at openid.net > > http://openid.net/mailman/listinfo/board > > > > > > > ----- > > Santosh Rajan > http://santrajan.blogspot.com http://santrajan.blogspot.com > -- > View this message in context: > http://www.nabble.com/upcoming-Google-announcement-regarding-OpenID-tp24396556p24431020.html > Sent from the OpenID - Foundation Board mailing list archive at Nabble.com. > > _______________________________________________ > board mailing list > board at openid.net > http://openid.net/mailman/listinfo/board > -------------- next part -------------- An HTML attachment was scrubbed... URL: From esachs at google.com Tue Jul 28 15:28:04 2009 From: esachs at google.com (Eric Sachs) Date: Tue, 28 Jul 2009 08:28:04 -0700 Subject: [OpenID board] upcoming Google announcement regarding OpenID In-Reply-To: References: Message-ID: The Google announcement of this new OpenID service has now been formally posted at http://googlecode.blogspot.com/2009/07/google-apps-openid-identity-hub-for.html On Wed, Jul 8, 2009 at 11:47 AM, Eric Sachs wrote: > Yes, I now realize I mistakenly posted this to the public instead or > private board mailing list :-) Not a particularly big deal since we have > been discussing this planned launch in the discovery community. > Feel free to respond on either the public or private mailing list. > > On Wed, Jul 8, 2009 at 11:05 AM, Eric Sachs wrote: > >> Below are drafts of two blog posts we will make in the upcoming weeks >> about the fact that we are now operating an OpenID IDP for the million+ >> schools/enterprise/ISPs that are outsourcing their email to Google Apps. We >> would appreciate this not being circulated beyond the board until it is >> public. This new support required that we work with the community to define >> some extensions to the OpenID discovery process. While those discussions >> have been going on in the community the last few months, those extensions >> are not yet formalized and probably won't be until they are proven in >> production environments. There is the potential for some community members >> (or press) to assume (or at least imply in articles) some evil intent by >> Google to co-opt OpenID with these extensions. It would be nice to have a >> blog post on the formal OpenID blog that was supportive of our approach, so >> I wanted to see if the board members are comfortable with that. >> >> On a somewhat related point, I also expect this will further increase the >> pressure on us as a community to find more scalable UI options since the >> Nascar style approach obviously cannot include buttons for these million new >> IDPs. We have also just posted a set of summary UI guidelines that we will >> be referencing from our API documentation at >> http://sites.google.com/site/oauthgoog/UXFedLogin/summary. The goal was >> to keep it to one-page which forced us to cut additional background >> information, but if you think we cut something critical, let me know. >> >> Enterprise blog: Google Apps + OpenID = identity hub for all your SaaS >> >> We are happy to announce that the Google OpenID Federated Login API has >> been extended to Google Apps accounts used by businesses, schools, and other >> organizations. The service is important not only to the individuals in those >> organizations, who can interact with a variety of consumer websites with a >> single credential , but also to the >> organizations themselves, who are increasingly reliant on multiple Software >> as a Service (SaaS) solutions from different vendors. >> >> >> For these organizations, Google Apps can now become an identity and data >> hub for multiple SaaS providers. When integrated with partner solutions such >> as XXX from XXX, the Google Open ID Federated Login API enables a single >> Google Apps login to provide secure access to services like Salesforce.com, >> SuccessFactors, and WebEX, as well as B2B partners, internal applications, >> and of course consumer web sites. See XXX's post to learn more >> about their implementation and view the demo and case study . >> >> >> Another early adopter is XXX, a SaaS project management vendor who uses >> the new service to make it easier for any organization using Google Apps to >> sign up for and deploy XXX o their users: >> >> < INSERT SCREEN SHOTS> >> >> >> Activating the OpenID Federated Login service for your domain is simple >> and secure. To achieve that, we introduced a new experimental discovery >> protocol addressing >> some of the challenges with the current version (2.0) of OpenID >> : >> >> >> >> - Reducing the hassle of hosting discovery documents on the domain >> web-site - the discovery protocol offer a solution that allows a hosted >> domain to become an OpenID Provider without hosting any documents at all. >> Optionally, a domain may choose to host one simple file to support a more >> complete discovery flow. >> >> >> >> - Being an OpenID Identity Provider requires strong security >> protection again attacks that could modify web pages on the site. To avoid >> that requirement for businesses and organizations, we introduced digital >> signatures on the discovery documents and a verification flow to support >> that. >> >> >> You can find more details in our API >> and Discovery documentation, >> or join the discussions in the Google Federated Login API Group, >> where you can ask any question and get answers from with other Identity >> Providers, Relying Parties and Google engineers. >> >> >> *The OpenID Federated Login Service is available for all Google Apps >> editions. However, it is disabled by default for the Premier and Education >> and editions , and it requires the Domain Admin to manually enable it from >> the Control Panel. So Admins - go turn this today for your users. >> At Google.com - we already enabled it for our employees... * >> >> >> Google Code blog: Over a million new OpenID Identity Providers !We are >> happy to announce that the Google OpenID Federated Login API >> has been extended to Google Apps accounts used by businesses, schools, and >> other organizations. Individuals in these organizations can now sign in to >> 3rd party websites using their Google Apps account, without giving away >> their credentials. In addition to the value for the end-users, the new >> service also benefits the organizations themselves, who are increasingly >> reliant on multiple Software as a Service (SaaS) solutions from different >> vendors. For example, XXX is an early adopter, allowing any organization >> running Google Apps to more quickly sign up for and adopt their service: >> >> << INSERT SCREEN SHOTS> >> >> >> See our post on the Google Enterprise Blog to learn more about >> the opportunities for the organizations. >> >> >> Supporting the API for Google Apps accounts is exciting news for the OpenID >> community , as it adds numerous new trustworthy >> Identity Provider (IDP) domains and increases the OpenID end user base by >> millions. In order to allow web-sites to easily become Relying Parties for >> these many new IDPs and users, we defined a new discovery protocol. >> The protocol allows Relying Parties to identify that a given domain is >> hosted on Google Apps and securely access its OpenID Provider End Point. The >> current proposal is an interim solution, and we are participating in several >> standardization organizations, such as OASIS and >> the OpenID Foundation , to generate a >> next-generation standard. Since the current protocol proposal is not >> supported by the standard OpenID libraries, we provided an implementation of >> the Relying Party pieces at the Open Source project - >> step2.googlecode.com . Google is also >> offering a set of resource addressing the issues of designing a scalable >> Federated Login User Interface. You are welcome to visit the User >> Experience summary for Federated Login Google >> Sites page, where you can find links do demos, mocks and usabilty research >> data. >> >> Prefer an out-of-the-box solution? We have been working with JanRain, >> a provider of OpenID solutions, which already support the new API as part of >> their RPX product . As demonstrated by UserVoice >> using JanRain's RPX , a user simply types in her >> Google Apps hosted domain name in the OpenID login box and everything else >> is being taken care of: >> >> >> >> >> >> >> You can find more details in our API >> and Discovery documentation, >> or join the discussions in the Google Federated Login API Group, >> where you can ask any question and get answers from with other Identity >> Providers, Relying Parties and Google engineers. >> >> *The OpenID Federated Login Service is available for all Google Apps >> editions. However, it is disabled by default for the Premier and Education >> editions, and it requires the Domain Admin to manually enable it from the >> Control Panel. So Admins - go turn this today for your users. >> At Google.com - we already enabled it for our employees... * >> > > -------------- next part -------------- An HTML attachment was scrubbed... URL: From santrajan at gmail.com Tue Jul 28 15:48:43 2009 From: santrajan at gmail.com (Santosh Rajan) Date: Tue, 28 Jul 2009 21:18:43 +0530 Subject: [OpenID board] upcoming Google announcement regarding OpenID In-Reply-To: References: Message-ID: Hehe! First time Google is formally using the word "OpenID" for their Federated Login!This is also the first positive development for OpenID (technically) I am seeing in months. Gr8 work! On Tue, Jul 28, 2009 at 8:58 PM, Eric Sachs wrote: > The Google announcement of this new OpenID service has now been formally > posted at > > http://googlecode.blogspot.com/2009/07/google-apps-openid-identity-hub-for.html > > On Wed, Jul 8, 2009 at 11:47 AM, Eric Sachs wrote: > >> Yes, I now realize I mistakenly posted this to the public instead or >> private board mailing list :-) Not a particularly big deal since we have >> been discussing this planned launch in the discovery community. >> Feel free to respond on either the public or private mailing list. >> >> On Wed, Jul 8, 2009 at 11:05 AM, Eric Sachs wrote: >> >>> Below are drafts of two blog posts we will make in the upcoming weeks >>> about the fact that we are now operating an OpenID IDP for the million+ >>> schools/enterprise/ISPs that are outsourcing their email to Google Apps. We >>> would appreciate this not being circulated beyond the board until it is >>> public. This new support required that we work with the community to define >>> some extensions to the OpenID discovery process. While those discussions >>> have been going on in the community the last few months, those extensions >>> are not yet formalized and probably won't be until they are proven in >>> production environments. There is the potential for some community members >>> (or press) to assume (or at least imply in articles) some evil intent by >>> Google to co-opt OpenID with these extensions. It would be nice to have a >>> blog post on the formal OpenID blog that was supportive of our approach, so >>> I wanted to see if the board members are comfortable with that. >>> >>> On a somewhat related point, I also expect this will further increase the >>> pressure on us as a community to find more scalable UI options since the >>> Nascar style approach obviously cannot include buttons for these million new >>> IDPs. We have also just posted a set of summary UI guidelines that we will >>> be referencing from our API documentation at >>> http://sites.google.com/site/oauthgoog/UXFedLogin/summary. The goal was >>> to keep it to one-page which forced us to cut additional background >>> information, but if you think we cut something critical, let me know. >>> >>> Enterprise blog: Google Apps + OpenID = identity hub for all your SaaS >>> >>> We are happy to announce that the Google OpenID Federated Login API has >>> been extended to Google Apps accounts used by businesses, schools, and other >>> organizations. The service is important not only to the individuals in those >>> organizations, who can interact with a variety of consumer websites with a >>> single credential , but also to the >>> organizations themselves, who are increasingly reliant on multiple Software >>> as a Service (SaaS) solutions from different vendors. >>> >>> >>> For these organizations, Google Apps can now become an identity and data >>> hub for multiple SaaS providers. When integrated with partner solutions such >>> as XXX from XXX, the Google Open ID Federated Login API enables a single >>> Google Apps login to provide secure access to services like Salesforce.com, >>> SuccessFactors, and WebEX, as well as B2B partners, internal applications, >>> and of course consumer web sites. See XXX's post to learn >>> more about their implementation and view the demo and case study >> links>. >>> >>> >>> Another early adopter is XXX, a SaaS project management vendor who uses >>> the new service to make it easier for any organization using Google Apps to >>> sign up for and deploy XXX o their users: >>> >>> < INSERT SCREEN SHOTS> >>> >>> >>> Activating the OpenID Federated Login service for your domain is simple >>> and secure. To achieve that, we introduced a new experimental discovery >>> protocol addressing >>> some of the challenges with the current version (2.0) of OpenID >>> : >>> >>> >>> >>> - Reducing the hassle of hosting discovery documents on the domain >>> web-site - the discovery protocol offer a solution that allows a hosted >>> domain to become an OpenID Provider without hosting any documents at all. >>> Optionally, a domain may choose to host one simple file to support a more >>> complete discovery flow. >>> >>> >>> >>> - Being an OpenID Identity Provider requires strong security >>> protection again attacks that could modify web pages on the site. To avoid >>> that requirement for businesses and organizations, we introduced digital >>> signatures on the discovery documents and a verification flow to support >>> that. >>> >>> >>> You can find more details in our API >>> and Discovery documentation, >>> or join the discussions in the Google Federated Login API Group, >>> where you can ask any question and get answers from with other Identity >>> Providers, Relying Parties and Google engineers. >>> >>> >>> *The OpenID Federated Login Service is available for all Google Apps >>> editions. However, it is disabled by default for the Premier and Education >>> and editions , and it requires the Domain Admin to manually enable it from >>> the Control Panel. So Admins - go turn this today for your users. >>> At Google.com - we already enabled it for our employees... * >>> >>> >>> Google Code blog: Over a million new OpenID Identity Providers !We are >>> happy to announce that the Google OpenID Federated Login API >>> has been extended to Google Apps accounts used by businesses, schools, and >>> other organizations. Individuals in these organizations can now sign in to >>> 3rd party websites using their Google Apps account, without giving away >>> their credentials. In addition to the value for the end-users, the new >>> service also benefits the organizations themselves, who are increasingly >>> reliant on multiple Software as a Service (SaaS) solutions from different >>> vendors. For example, XXX is an early adopter, allowing any organization >>> running Google Apps to more quickly sign up for and adopt their service: >>> >>> << INSERT SCREEN SHOTS> >>> >>> >>> See our post on the Google Enterprise Blog to learn more >>> about the opportunities for the organizations. >>> >>> >>> Supporting the API for Google Apps accounts is exciting news for the OpenID >>> community , as it adds numerous new trustworthy >>> Identity Provider (IDP) domains and increases the OpenID end user base by >>> millions. In order to allow web-sites to easily become Relying Parties for >>> these many new IDPs and users, we defined a new discovery protocol. >>> The protocol allows Relying Parties to identify that a given domain is >>> hosted on Google Apps and securely access its OpenID Provider End Point. The >>> current proposal is an interim solution, and we are participating in several >>> standardization organizations, such as OASIS and >>> the OpenID Foundation , to generate a >>> next-generation standard. Since the current protocol proposal is not >>> supported by the standard OpenID libraries, we provided an implementation of >>> the Relying Party pieces at the Open Source project - >>> step2.googlecode.com . Google is also >>> offering a set of resource addressing the issues of designing a scalable >>> Federated Login User Interface. You are welcome to visit the User >>> Experience summary for Federated Login Google >>> Sites page, where you can find links do demos, mocks and usabilty research >>> data. >>> >>> Prefer an out-of-the-box solution? We have been working with JanRain, >>> a provider of OpenID solutions, which already support the new API as part of >>> their RPX product . As demonstrated by UserVoice >>> using JanRain's RPX , a user simply types in her >>> Google Apps hosted domain name in the OpenID login box and everything else >>> is being taken care of: >>> >>> >>> >>> >>> >>> >>> You can find more details in our API >>> and Discovery documentation, >>> or join the discussions in the Google Federated Login API Group, >>> where you can ask any question and get answers from with other Identity >>> Providers, Relying Parties and Google engineers. >>> >>> *The OpenID Federated Login Service is available for all Google Apps >>> editions. However, it is disabled by default for the Premier and Education >>> editions, and it requires the Domain Admin to manually enable it from the >>> Control Panel. So Admins - go turn this today for your users. >>> At Google.com - we already enabled it for our employees... * >>> >> >> > > _______________________________________________ > board mailing list > board at openid.net > http://openid.net/mailman/listinfo/board > > -------------- next part -------------- An HTML attachment was scrubbed... URL: From david at sixapart.com Wed Jul 29 17:22:54 2009 From: david at sixapart.com (David Recordon) Date: Wed, 29 Jul 2009 10:22:54 -0700 Subject: [OpenID board] Perception of the Foundation (Was: Fwd: [OpenID] Google's proprietary discovery extension?) References: <24713025.post@talk.nabble.com> Message-ID: Forwarding these three posts from the General list. Not because I agree with all of the sentiments expressed, but because it shows how we as a board and organization are clearly not being transparent enough in the activities that are actually being taken on. Two ideas I think that we should seriously consider are: 1) making use of a project management tool like Basecamp (http://www.basecamphq.com/ ) so that at least the entire board and Don know the status of each project that is underway 2) having Don write a monthly blog post about OpenID's achievements the past month and what the Foundation has accomplished Thoughts? --David Begin forwarded message: > From: Santosh Rajan > Date: July 28, 2009 11:11:03 PM PDT > To: general at openid.net > Subject: Re: [OpenID] Google's proprietary discovery extension? > > > Hehe! Shade for once I am going to agree with you. > Why do we have a chairman? Isnt he supposed to be leading the flock > and > showing the way? > And what about the rest of the board. This is the "coldest" board I > have > ever seen. > I think Eran Hammer should have been the chairman of the board! I > wonder why > he disappeared from here 2 yrs back. (I have seen some posts from > him from > 2007). > > > SitG Admin wrote: >> >>> There is no sign of the "STD mechanism" coming soon. >> >> Perhaps it will arrive after Chris Messina's "Policy Expression >> Extension" passes ;) >> >>> Apathy on the part of the OpenID Foundation. >> >> Inaction, or so it may appear; timely, though? >> >>> Half the Identity folk have moved on to Kantara Initiative. >>> The Other half to the Open Web foundation. >>> XRI TC has tied itself in knots. >>> And the hilarious part is that there are folk involved in all >>> these three >>> foundations! >> >> Sounds like good separation of duties to me. If the rest of us can >> still interop (and work is still being done that *needs* to be done >> before we can move forward), it doesn't really matter where most of >> the various communities is doing that work. >> >>> No idea were the rest of us should bail out to!? >> >> If the development of OpenID were to halt now, I think it would be >> Federated implementations that found themselves hardest hit; small, >> independent operators such as myself (working with libraries already >> distributed "in the wild") might not even notice. >> >> -Shade >> _______________________________________________ >> general mailing list >> general at openid.net >> http://openid.net/mailman/listinfo/general >> >> > > > ----- > > Santosh Rajan > http://santrajan.blogspot.com http://santrajan.blogspot.com > -- > View this message in context: http://www.nabble.com/Re%3A-Google%27s-proprietary-discovery-extension--tp24414092p24713025.html > Sent from the OpenID - General mailing list archive at Nabble.com. > > _______________________________________________ > general mailing list > general at openid.net > http://openid.net/mailman/listinfo/general From santrajan at gmail.com Wed Jul 29 17:46:28 2009 From: santrajan at gmail.com (Santosh Rajan) Date: Wed, 29 Jul 2009 23:16:28 +0530 Subject: [OpenID board] Perception of the Foundation (Was: Fwd: [OpenID] Google's proprietary discovery extension?) In-Reply-To: References: <24713025.post@talk.nabble.com> Message-ID: Hey David, this is good, also you need to 1) show a roadmap 2) there must be some visible leadership. I mean look at Eran Hammer Lahav at Open Web, and XRI TC, he is very visible. Other wise the impression you are giving is that nothing is going on here. On Wed, Jul 29, 2009 at 10:52 PM, David Recordon wrote: > Forwarding these three posts from the General list. Not because I agree > with all of the sentiments expressed, but because it shows how we as a board > and organization are clearly not being transparent enough in the activities > that are actually being taken on. > > Two ideas I think that we should seriously consider are: > 1) making use of a project management tool like Basecamp ( > http://www.basecamphq.com/) so that at least the entire board and Don know > the status of each project that is underway > 2) having Don write a monthly blog post about OpenID's achievements the > past month and what the Foundation has accomplished > > Thoughts? > > --David > > Begin forwarded message: > > From: Santosh Rajan >> Date: July 28, 2009 11:11:03 PM PDT >> To: general at openid.net >> Subject: Re: [OpenID] Google's proprietary discovery extension? >> >> >> Hehe! Shade for once I am going to agree with you. >> Why do we have a chairman? Isnt he supposed to be leading the flock and >> showing the way? >> And what about the rest of the board. This is the "coldest" board I have >> ever seen. >> I think Eran Hammer should have been the chairman of the board! I wonder >> why >> he disappeared from here 2 yrs back. (I have seen some posts from him from >> 2007). >> >> >> SitG Admin wrote: >> >>> >>> There is no sign of the "STD mechanism" coming soon. >>>> >>> >>> Perhaps it will arrive after Chris Messina's "Policy Expression >>> Extension" passes ;) >>> >>> Apathy on the part of the OpenID Foundation. >>>> >>> >>> Inaction, or so it may appear; timely, though? >>> >>> Half the Identity folk have moved on to Kantara Initiative. >>>> The Other half to the Open Web foundation. >>>> XRI TC has tied itself in knots. >>>> And the hilarious part is that there are folk involved in all these >>>> three >>>> foundations! >>>> >>> >>> Sounds like good separation of duties to me. If the rest of us can >>> still interop (and work is still being done that *needs* to be done >>> before we can move forward), it doesn't really matter where most of >>> the various communities is doing that work. >>> >>> No idea were the rest of us should bail out to!? >>>> >>> >>> If the development of OpenID were to halt now, I think it would be >>> Federated implementations that found themselves hardest hit; small, >>> independent operators such as myself (working with libraries already >>> distributed "in the wild") might not even notice. >>> >>> -Shade >>> _______________________________________________ >>> general mailing list >>> general at openid.net >>> http://openid.net/mailman/listinfo/general >>> >>> >>> >> >> ----- >> >> Santosh Rajan >> http://santrajan.blogspot.com http://santrajan.blogspot.com >> -- >> View this message in context: >> http://www.nabble.com/Re%3A-Google%27s-proprietary-discovery-extension--tp24414092p24713025.html >> Sent from the OpenID - General mailing list archive at Nabble.com. >> >> _______________________________________________ >> general mailing list >> general at openid.net >> http://openid.net/mailman/listinfo/general >> > > _______________________________________________ > board mailing list > board at openid.net > http://openid.net/mailman/listinfo/board > -------------- next part -------------- An HTML attachment was scrubbed... URL: From sakimura at gmail.com Wed Jul 29 20:33:23 2009 From: sakimura at gmail.com (Nat) Date: Thu, 30 Jul 2009 05:33:23 +0900 Subject: [OpenID board] Perception of the Foundation (Was: Fwd: [OpenID] Google's proprietary discovery extension?) In-Reply-To: References: <24713025.post@talk.nabble.com> Message-ID: Hi Inline below: =nat at Tokyo via iPhone On 2009/07/30, at 2:22, David Recordon wrote: > Forwarding these three posts from the General list. Not because I > agree with all of the sentiments expressed, but because it shows how > we as a board and organization are clearly not being transparent > enough in the activities that are actually being taken on. > > Two ideas I think that we should seriously consider are: > 1) making use of a project management tool like Basecamp (http://www.basecamphq.com/ > ) so that at least the entire board and Don know the status of each > project that is underway I strongly agree to this. > 2) having Don write a monthly blog post about OpenID's achievements > the past month and what the Foundation has accomplished +1 > > Thoughts? > > --David > > Begin forwarded message: > >> From: Santosh Rajan >> Date: July 28, 2009 11:11:03 PM PDT >> To: general at openid.net >> Subject: Re: [OpenID] Google's proprietary discovery extension? >> >> >> Hehe! Shade for once I am going to agree with you. >> Why do we have a chairman? Isnt he supposed to be leading the flock >> and >> showing the way? >> And what about the rest of the board. This is the "coldest" board I >> have >> ever seen. >> I think Eran Hammer should have been the chairman of the board! I >> wonder why >> he disappeared from here 2 yrs back. (I have seen some posts from >> him from >> 2007). >> >> >> SitG Admin wrote: >>> >>>> There is no sign of the "STD mechanism" coming soon. >>> >>> Perhaps it will arrive after Chris Messina's "Policy Expression >>> Extension" passes ;) >>> >>>> Apathy on the part of the OpenID Foundation. >>> >>> Inaction, or so it may appear; timely, though? >>> >>>> Half the Identity folk have moved on to Kantara Initiative. >>>> The Other half to the Open Web foundation. >>>> XRI TC has tied itself in knots. >>>> And the hilarious part is that there are folk involved in all >>>> these three >>>> foundations! >>> >>> Sounds like good separation of duties to me. If the rest of us can >>> still interop (and work is still being done that *needs* to be done >>> before we can move forward), it doesn't really matter where most of >>> the various communities is doing that work. >>> >>>> No idea were the rest of us should bail out to!? >>> >>> If the development of OpenID were to halt now, I think it would be >>> Federated implementations that found themselves hardest hit; small, >>> independent operators such as myself (working with libraries already >>> distributed "in the wild") might not even notice. >>> >>> -Shade >>> _______________________________________________ >>> general mailing list >>> general at openid.net >>> http://openid.net/mailman/listinfo/general >>> >>> >> >> >> ----- >> >> Santosh Rajan >> http://santrajan.blogspot.com http://santrajan.blogspot.com >> -- >> View this message in context: http://www.nabble.com/Re%3A-Google%27s-proprietary-discovery-extension--tp24414092p24713025.html >> Sent from the OpenID - General mailing list archive at Nabble.com. >> >> _______________________________________________ >> general mailing list >> general at openid.net >> http://openid.net/mailman/listinfo/general > > _______________________________________________ > board mailing list > board at openid.net > http://openid.net/mailman/listinfo/board From atom at yahoo-inc.com Wed Jul 29 22:47:45 2009 From: atom at yahoo-inc.com (Allen Tom) Date: Wed, 29 Jul 2009 15:47:45 -0700 Subject: [OpenID board] Perception of the Foundation (Was: Fwd: [OpenID] Google's proprietary discovery extension?) In-Reply-To: References: <24713025.post@talk.nabble.com> Message-ID: <4A70D191.7040100@yahoo-inc.com> Hi all, Yahoo is very heavily invested in OpenID and we have a bunch of engineers and designers currently working on enhancements to our OpenID service. Earlier this year, we worked with the community to write the OpenID UI and OAuth/Hybrid Extensions, and the Yahoo OP will be implementing both of these extensions in the very near future. In addition to protocol enhancements, we have a crack team of UI/Product designers and researchers who are actively experimenting with ways to improve the overall usability of our OpenID service. We'll be deploying many significant upgrades to the Yahoo OpenID Provider's user interface later this year. The new OpenID UI, along with support for the UI and Hybrid Extensions, and our soon to be released support for Open Social's REST based APIs (including Portable Contacts) will be a huge upgrade to our existing Open Stack offering. We've also been working behind the scenes to line up several new and exciting Relying Parties to accept OpenID. Every potential Relying Party that I've been working with wants to accept not just Yahoo OpenID, but also OpenIDs from other Providers, which is making a really strong case for interoperability and open standards. Yahoo along with other OPs and Relying Parties are committing plenty of resources for OpenID and are actively working towards the goal of having OpenID reach widespread usage and adoption. Many of these efforts are behind the scenes, and aren't really visible on the public mailing lists, so perhaps the OpenID Foundation can take the lead in publicizing the activities that its membership is actively working on. Allen Nat wrote: > Hi > > Inline below: > > =nat at Tokyo via iPhone > > On 2009/07/30, at 2:22, David Recordon wrote: > >> Forwarding these three posts from the General list. Not because I >> agree with all of the sentiments expressed, but because it shows how >> we as a board and organization are clearly not being transparent >> enough in the activities that are actually being taken on. >> >> Two ideas I think that we should seriously consider are: >> 1) making use of a project management tool like Basecamp >> (http://www.basecamphq.com/) so that at least the entire board and >> Don know the status of each project that is underway > > I strongly agree to this. > >> 2) having Don write a monthly blog post about OpenID's achievements >> the past month and what the Foundation has accomplished > > +1 > >> >> Thoughts? >> >> --David >> >> Begin forwarded message: >> >>> From: Santosh Rajan >>> Date: July 28, 2009 11:11:03 PM PDT >>> To: general at openid.net >>> Subject: Re: [OpenID] Google's proprietary discovery extension? >>> >>> >>> Hehe! Shade for once I am going to agree with you. >>> Why do we have a chairman? Isnt he supposed to be leading the flock and >>> showing the way? >>> And what about the rest of the board. This is the "coldest" board I >>> have >>> ever seen. >>> I think Eran Hammer should have been the chairman of the board! I >>> wonder why >>> he disappeared from here 2 yrs back. (I have seen some posts from >>> him from >>> 2007). >>> >>> >>> SitG Admin wrote: >>>> >>>>> There is no sign of the "STD mechanism" coming soon. >>>> >>>> Perhaps it will arrive after Chris Messina's "Policy Expression >>>> Extension" passes ;) >>>> >>>>> Apathy on the part of the OpenID Foundation. >>>> >>>> Inaction, or so it may appear; timely, though? >>>> >>>>> Half the Identity folk have moved on to Kantara Initiative. >>>>> The Other half to the Open Web foundation. >>>>> XRI TC has tied itself in knots. >>>>> And the hilarious part is that there are folk involved in all >>>>> these three >>>>> foundations! >>>> >>>> Sounds like good separation of duties to me. If the rest of us can >>>> still interop (and work is still being done that *needs* to be done >>>> before we can move forward), it doesn't really matter where most of >>>> the various communities is doing that work. >>>> >>>>> No idea were the rest of us should bail out to!? >>>> >>>> If the development of OpenID were to halt now, I think it would be >>>> Federated implementations that found themselves hardest hit; small, >>>> independent operators such as myself (working with libraries already >>>> distributed "in the wild") might not even notice. >>>> >>>> -Shade >>>> _______________________________________________ >>>> general mailing list >>>> general at openid.net >>>> http://openid.net/mailman/listinfo/general >>>> >>>> >>> >>> >>> ----- >>> >>> Santosh Rajan >>> http://santrajan.blogspot.com http://santrajan.blogspot.com >>> -- >>> View this message in context: >>> http://www.nabble.com/Re%3A-Google%27s-proprietary-discovery-extension--tp24414092p24713025.html >>> >>> Sent from the OpenID - General mailing list archive at Nabble.com. >>> >>> _______________________________________________ >>> general mailing list >>> general at openid.net >>> http://openid.net/mailman/listinfo/general >> >> _______________________________________________ >> board mailing list >> board at openid.net >> http://openid.net/mailman/listinfo/board > _______________________________________________ > board mailing list > board at openid.net > http://openid.net/mailman/listinfo/board From santrajan at gmail.com Thu Jul 30 00:30:28 2009 From: santrajan at gmail.com (Santosh Rajan) Date: Wed, 29 Jul 2009 17:30:28 -0700 (PDT) Subject: [OpenID board] Perception of the Foundation (Was: Fwd: [OpenID] Google's proprietary discovery extension?) In-Reply-To: <4A70D191.7040100@yahoo-inc.com> References: <4A70D191.7040100@yahoo-inc.com> Message-ID: <24730408.post@talk.nabble.com> Allen I think you missed a major point here. It is nice to know about Yahoo's work. Other coorporates have also done a lot of work, like Google, Facebook etc. But what about the independent community members? Nothing!! Or atleast I haven't seen any work coming from then. I think in Open Communities the most important contributions must come from the independant members and not the coorporate members. Independent members are not "boxed in" by coorporate objectives. Corporate members are focussed by their companies. Independent individuals need community leadership, otherwise they will end up running around like headless chicken. Which is more or less what is happenning now. Allen Tom-2 wrote: > > Hi all, > > Yahoo is very heavily invested in OpenID and we have a bunch of > engineers and designers currently working on enhancements to our OpenID > service. Earlier this year, we worked with the community to write the > OpenID UI and OAuth/Hybrid Extensions, and the Yahoo OP will be > implementing both of these extensions in the very near future. > > In addition to protocol enhancements, we have a crack team of UI/Product > designers and researchers who are actively experimenting with ways to > improve the overall usability of our OpenID service. We'll be deploying > many significant upgrades to the Yahoo OpenID Provider's user interface > later this year. The new OpenID UI, along with support for the UI and > Hybrid Extensions, and our soon to be released support for Open Social's > REST based APIs (including Portable Contacts) will be a huge upgrade to > our existing Open Stack offering. > > We've also been working behind the scenes to line up several new and > exciting Relying Parties to accept OpenID. Every potential Relying Party > that I've been working with wants to accept not just Yahoo OpenID, but > also OpenIDs from other Providers, which is making a really strong case > for interoperability and open standards. > > Yahoo along with other OPs and Relying Parties are committing plenty of > resources for OpenID and are actively working towards the goal of > having OpenID reach widespread usage and adoption. Many of these > efforts are behind the scenes, and aren't really visible on the public > mailing lists, so perhaps the OpenID Foundation can take the lead in > publicizing the activities that its membership is actively working on. > > Allen > > > Nat wrote: >> Hi >> >> Inline below: >> >> =nat at Tokyo via iPhone >> >> On 2009/07/30, at 2:22, David Recordon wrote: >> >>> Forwarding these three posts from the General list. Not because I >>> agree with all of the sentiments expressed, but because it shows how >>> we as a board and organization are clearly not being transparent >>> enough in the activities that are actually being taken on. >>> >>> Two ideas I think that we should seriously consider are: >>> 1) making use of a project management tool like Basecamp >>> (http://www.basecamphq.com/) so that at least the entire board and >>> Don know the status of each project that is underway >> >> I strongly agree to this. >> >>> 2) having Don write a monthly blog post about OpenID's achievements >>> the past month and what the Foundation has accomplished >> >> +1 >> >>> >>> Thoughts? >>> >>> --David >>> >>> Begin forwarded message: >>> >>>> From: Santosh Rajan >>>> Date: July 28, 2009 11:11:03 PM PDT >>>> To: general at openid.net >>>> Subject: Re: [OpenID] Google's proprietary discovery extension? >>>> >>>> >>>> Hehe! Shade for once I am going to agree with you. >>>> Why do we have a chairman? Isnt he supposed to be leading the flock and >>>> showing the way? >>>> And what about the rest of the board. This is the "coldest" board I >>>> have >>>> ever seen. >>>> I think Eran Hammer should have been the chairman of the board! I >>>> wonder why >>>> he disappeared from here 2 yrs back. (I have seen some posts from >>>> him from >>>> 2007). >>>> >>>> >>>> SitG Admin wrote: >>>>> >>>>>> There is no sign of the "STD mechanism" coming soon. >>>>> >>>>> Perhaps it will arrive after Chris Messina's "Policy Expression >>>>> Extension" passes ;) >>>>> >>>>>> Apathy on the part of the OpenID Foundation. >>>>> >>>>> Inaction, or so it may appear; timely, though? >>>>> >>>>>> Half the Identity folk have moved on to Kantara Initiative. >>>>>> The Other half to the Open Web foundation. >>>>>> XRI TC has tied itself in knots. >>>>>> And the hilarious part is that there are folk involved in all >>>>>> these three >>>>>> foundations! >>>>> >>>>> Sounds like good separation of duties to me. If the rest of us can >>>>> still interop (and work is still being done that *needs* to be done >>>>> before we can move forward), it doesn't really matter where most of >>>>> the various communities is doing that work. >>>>> >>>>>> No idea were the rest of us should bail out to!? >>>>> >>>>> If the development of OpenID were to halt now, I think it would be >>>>> Federated implementations that found themselves hardest hit; small, >>>>> independent operators such as myself (working with libraries already >>>>> distributed "in the wild") might not even notice. >>>>> >>>>> -Shade >>>>> _______________________________________________ >>>>> general mailing list >>>>> general at openid.net >>>>> http://openid.net/mailman/listinfo/general >>>>> >>>>> >>>> >>>> >>>> ----- >>>> >>>> Santosh Rajan >>>> http://santrajan.blogspot.com http://santrajan.blogspot.com >>>> -- >>>> View this message in context: >>>> http://www.nabble.com/Re%3A-Google%27s-proprietary-discovery-extension--tp24414092p24713025.html >>>> >>>> Sent from the OpenID - General mailing list archive at Nabble.com. >>>> >>>> _______________________________________________ >>>> general mailing list >>>> general at openid.net >>>> http://openid.net/mailman/listinfo/general >>> >>> _______________________________________________ >>> board mailing list >>> board at openid.net >>> http://openid.net/mailman/listinfo/board >> _______________________________________________ >> board mailing list >> board at openid.net >> http://openid.net/mailman/listinfo/board > > > _______________________________________________ > board mailing list > board at openid.net > http://openid.net/mailman/listinfo/board > > ----- Santosh Rajan http://santrajan.blogspot.com http://santrajan.blogspot.com -- View this message in context: http://www.nabble.com/Perception-of-the-Foundation-%28Was%3A-Fwd%3A--OpenID--Google%27s-proprietary-discovery-extension-%29-tp24724040p24730408.html Sent from the OpenID - Foundation Board mailing list archive at Nabble.com. From chris.messina at gmail.com Thu Jul 30 03:13:18 2009 From: chris.messina at gmail.com (Chris Messina) Date: Wed, 29 Jul 2009 20:13:18 -0700 Subject: [OpenID board] Perception of the Foundation (Was: Fwd: [OpenID] Google's proprietary discovery extension?) In-Reply-To: <24730408.post@talk.nabble.com> References: <4A70D191.7040100@yahoo-inc.com> <24730408.post@talk.nabble.com> Message-ID: <1bc4603e0907292013v38d5ac54qaaeaec0b41a3828f@mail.gmail.com> Santosh, I'm not sure what you're proposing. If there is a leadership vacuum in the community, complaining about it doesn't seem like an effective way to address it. That said, I certainly think that the Foundation via the board has not been terribly effective in its communications and outreach since the elections. That said, much has been happening, albeit in many different places so keeping track of everything is very challenging ? even for those directly working on these things. A couple weeks back I sent Don a list of interview-style questions that I had hoped would have made it to the blog by now, but alas I've not heard back from him yet. Don has pointed out that he is more of an infrastructure kind of guy ? who likes to operate behind the scenes, and so combining that style of leadership with an otherwise quiet board can of course lead to questions of progress. I also noticed that the board's meeting minutes have not been published to the wiki recently, so I'll go an make sure that they are copied from this list to the wiki, so at least you can trace the conversations that have gone on over the last several months. I would be interested in hearing solid proposals for rallying the community ? and coordinating efforts if the board is unable or unavailable to do so. I have ideas myself, but not the time or ability to implement them at the moment. Chris On Wed, Jul 29, 2009 at 5:30 PM, Santosh Rajan wrote: > > Allen I think you missed a major point here. > It is nice to know about Yahoo's work. Other coorporates have also done a > lot of work, like Google, Facebook etc. > > But what about the independent community members? Nothing!! Or atleast I > haven't seen any work coming from then. > > I think in Open Communities the most important contributions must come from > the independant members and not the coorporate members. Independent members > are not "boxed in" by coorporate objectives. > > Corporate members are focussed by their companies. Independent individuals > need community leadership, otherwise they will end up running around like > headless chicken. Which is more or less what is happenning now. > > > > Allen Tom-2 wrote: > > > > Hi all, > > > > Yahoo is very heavily invested in OpenID and we have a bunch of > > engineers and designers currently working on enhancements to our OpenID > > service. Earlier this year, we worked with the community to write the > > OpenID UI and OAuth/Hybrid Extensions, and the Yahoo OP will be > > implementing both of these extensions in the very near future. > > > > In addition to protocol enhancements, we have a crack team of UI/Product > > designers and researchers who are actively experimenting with ways to > > improve the overall usability of our OpenID service. We'll be deploying > > many significant upgrades to the Yahoo OpenID Provider's user interface > > later this year. The new OpenID UI, along with support for the UI and > > Hybrid Extensions, and our soon to be released support for Open Social's > > REST based APIs (including Portable Contacts) will be a huge upgrade to > > our existing Open Stack offering. > > > > We've also been working behind the scenes to line up several new and > > exciting Relying Parties to accept OpenID. Every potential Relying Party > > that I've been working with wants to accept not just Yahoo OpenID, but > > also OpenIDs from other Providers, which is making a really strong case > > for interoperability and open standards. > > > > Yahoo along with other OPs and Relying Parties are committing plenty of > > resources for OpenID and are actively working towards the goal of > > having OpenID reach widespread usage and adoption. Many of these > > efforts are behind the scenes, and aren't really visible on the public > > mailing lists, so perhaps the OpenID Foundation can take the lead in > > publicizing the activities that its membership is actively working on. > > > > Allen > > > > > > Nat wrote: > >> Hi > >> > >> Inline below: > >> > >> =nat at Tokyo via iPhone > >> > >> On 2009/07/30, at 2:22, David Recordon wrote: > >> > >>> Forwarding these three posts from the General list. Not because I > >>> agree with all of the sentiments expressed, but because it shows how > >>> we as a board and organization are clearly not being transparent > >>> enough in the activities that are actually being taken on. > >>> > >>> Two ideas I think that we should seriously consider are: > >>> 1) making use of a project management tool like Basecamp > >>> (http://www.basecamphq.com/) so that at least the entire board and > >>> Don know the status of each project that is underway > >> > >> I strongly agree to this. > >> > >>> 2) having Don write a monthly blog post about OpenID's achievements > >>> the past month and what the Foundation has accomplished > >> > >> +1 > >> > >>> > >>> Thoughts? > >>> > >>> --David > >>> > >>> Begin forwarded message: > >>> > >>>> From: Santosh Rajan > >>>> Date: July 28, 2009 11:11:03 PM PDT > >>>> To: general at openid.net > >>>> Subject: Re: [OpenID] Google's proprietary discovery extension? > >>>> > >>>> > >>>> Hehe! Shade for once I am going to agree with you. > >>>> Why do we have a chairman? Isnt he supposed to be leading the flock > and > >>>> showing the way? > >>>> And what about the rest of the board. This is the "coldest" board I > >>>> have > >>>> ever seen. > >>>> I think Eran Hammer should have been the chairman of the board! I > >>>> wonder why > >>>> he disappeared from here 2 yrs back. (I have seen some posts from > >>>> him from > >>>> 2007). > >>>> > >>>> > >>>> SitG Admin wrote: > >>>>> > >>>>>> There is no sign of the "STD mechanism" coming soon. > >>>>> > >>>>> Perhaps it will arrive after Chris Messina's "Policy Expression > >>>>> Extension" passes ;) > >>>>> > >>>>>> Apathy on the part of the OpenID Foundation. > >>>>> > >>>>> Inaction, or so it may appear; timely, though? > >>>>> > >>>>>> Half the Identity folk have moved on to Kantara Initiative. > >>>>>> The Other half to the Open Web foundation. > >>>>>> XRI TC has tied itself in knots. > >>>>>> And the hilarious part is that there are folk involved in all > >>>>>> these three > >>>>>> foundations! > >>>>> > >>>>> Sounds like good separation of duties to me. If the rest of us can > >>>>> still interop (and work is still being done that *needs* to be done > >>>>> before we can move forward), it doesn't really matter where most of > >>>>> the various communities is doing that work. > >>>>> > >>>>>> No idea were the rest of us should bail out to!? > >>>>> > >>>>> If the development of OpenID were to halt now, I think it would be > >>>>> Federated implementations that found themselves hardest hit; small, > >>>>> independent operators such as myself (working with libraries already > >>>>> distributed "in the wild") might not even notice. > >>>>> > >>>>> -Shade > >>>>> _______________________________________________ > >>>>> general mailing list > >>>>> general at openid.net > >>>>> http://openid.net/mailman/listinfo/general > >>>>> > >>>>> > >>>> > >>>> > >>>> ----- > >>>> > >>>> Santosh Rajan > >>>> http://santrajan.blogspot.com http://santrajan.blogspot.com > >>>> -- > >>>> View this message in context: > >>>> > http://www.nabble.com/Re%3A-Google%27s-proprietary-discovery-extension--tp24414092p24713025.html > >>>> > >>>> Sent from the OpenID - General mailing list archive at Nabble.com. > >>>> > >>>> _______________________________________________ > >>>> general mailing list > >>>> general at openid.net > >>>> http://openid.net/mailman/listinfo/general > >>> > >>> _______________________________________________ > >>> board mailing list > >>> board at openid.net > >>> http://openid.net/mailman/listinfo/board > >> _______________________________________________ > >> board mailing list > >> board at openid.net > >> http://openid.net/mailman/listinfo/board > > > > > > _______________________________________________ > > board mailing list > > board at openid.net > > http://openid.net/mailman/listinfo/board > > > > > > > ----- > > Santosh Rajan > http://santrajan.blogspot.com http://santrajan.blogspot.com > -- > View this message in context: > http://www.nabble.com/Perception-of-the-Foundation-%28Was%3A-Fwd%3A--OpenID--Google%27s-proprietary-discovery-extension-%29-tp24724040p24730408.html > Sent from the OpenID - Foundation Board mailing list archive at Nabble.com. > > _______________________________________________ > board mailing list > board at openid.net > http://openid.net/mailman/listinfo/board > -- Chris Messina Open Web Advocate Personal site: http://factoryjoe.com Twitter: http://twitter.com/chrismessina Diso Project: http://diso-project.org OpenID Foundation: http://openid.net This email is: [ ] bloggable [X] ask first [ ] private -------------- next part -------------- An HTML attachment was scrubbed... URL: From santrajan at gmail.com Thu Jul 30 03:44:44 2009 From: santrajan at gmail.com (Santosh Rajan) Date: Wed, 29 Jul 2009 20:44:44 -0700 (PDT) Subject: [OpenID board] Perception of the Foundation (Was: Fwd: [OpenID] Google's proprietary discovery extension?) In-Reply-To: <1bc4603e0907292013v38d5ac54qaaeaec0b41a3828f@mail.gmail.com> References: <4A70D191.7040100@yahoo-inc.com> <24730408.post@talk.nabble.com> <1bc4603e0907292013v38d5ac54qaaeaec0b41a3828f@mail.gmail.com> Message-ID: <24731706.post@talk.nabble.com> First of all I am not proposing anything, nor am i complaining about anything. I am just bringing to your notice what I think is a very serious problem with the OpenID board. And yes let us face it. There definitely is a serious leadership vacuum here. I am sure every one is aware of it but nobody speaks about it. As you said Don is an infrastructure guy, but why bring Don into this at all. I dont think he was hired for a leadership role at all. The leader has to be the chairman of the board. The chairman must be a technical wiz plus someone who can lead from the front, and should be rallying the community. I cant see someone who is good at both here, technology and rallying the flock. Actually I dont mind one of the corporate members being chairman of the board provided he has a written mandate from his company to work as he wishes independently on a board like this. Something like the mandate given to Eran from Yahoo. Chris Messina wrote: > > Santosh, I'm not sure what you're proposing. > If there is a leadership vacuum in the community, complaining about it > doesn't seem like an effective way to address it. > > That said, I certainly think that the Foundation via the board has not > been > terribly effective in its communications and outreach since the elections. > That said, much has been happening, albeit in many different places so > keeping track of everything is very challenging ? even for those directly > working on these things. > > A couple weeks back I sent Don a list of interview-style questions that I > had hoped would have made it to the blog by now, but alas I've not heard > back from him yet. Don has pointed out that he is more of an > infrastructure > kind of guy ? who likes to operate behind the scenes, and so combining > that > style of leadership with an otherwise quiet board can of course lead to > questions of progress. > > I also noticed that the board's meeting minutes have not been published to > the wiki recently, so I'll go an make sure that they are copied from this > list to the wiki, so at least you can trace the conversations that have > gone > on over the last several months. > > I would be interested in hearing solid proposals for rallying the > community > ? and coordinating efforts if the board is unable or unavailable to do so. > I > have ideas myself, but not the time or ability to implement them at the > moment. > > Chris > > On Wed, Jul 29, 2009 at 5:30 PM, Santosh Rajan > wrote: > >> >> Allen I think you missed a major point here. >> It is nice to know about Yahoo's work. Other coorporates have also done a >> lot of work, like Google, Facebook etc. >> >> But what about the independent community members? Nothing!! Or atleast I >> haven't seen any work coming from then. >> >> I think in Open Communities the most important contributions must come >> from >> the independant members and not the coorporate members. Independent >> members >> are not "boxed in" by coorporate objectives. >> >> Corporate members are focussed by their companies. Independent >> individuals >> need community leadership, otherwise they will end up running around like >> headless chicken. Which is more or less what is happenning now. >> >> >> >> Allen Tom-2 wrote: >> > >> > Hi all, >> > >> > Yahoo is very heavily invested in OpenID and we have a bunch of >> > engineers and designers currently working on enhancements to our OpenID >> > service. Earlier this year, we worked with the community to write the >> > OpenID UI and OAuth/Hybrid Extensions, and the Yahoo OP will be >> > implementing both of these extensions in the very near future. >> > >> > In addition to protocol enhancements, we have a crack team of >> UI/Product >> > designers and researchers who are actively experimenting with ways to >> > improve the overall usability of our OpenID service. We'll be deploying >> > many significant upgrades to the Yahoo OpenID Provider's user interface >> > later this year. The new OpenID UI, along with support for the UI and >> > Hybrid Extensions, and our soon to be released support for Open >> Social's >> > REST based APIs (including Portable Contacts) will be a huge upgrade to >> > our existing Open Stack offering. >> > >> > We've also been working behind the scenes to line up several new and >> > exciting Relying Parties to accept OpenID. Every potential Relying >> Party >> > that I've been working with wants to accept not just Yahoo OpenID, but >> > also OpenIDs from other Providers, which is making a really strong case >> > for interoperability and open standards. >> > >> > Yahoo along with other OPs and Relying Parties are committing plenty of >> > resources for OpenID and are actively working towards the goal of >> > having OpenID reach widespread usage and adoption. Many of these >> > efforts are behind the scenes, and aren't really visible on the public >> > mailing lists, so perhaps the OpenID Foundation can take the lead in >> > publicizing the activities that its membership is actively working on. >> > >> > Allen >> > >> > >> > Nat wrote: >> >> Hi >> >> >> >> Inline below: >> >> >> >> =nat at Tokyo via iPhone >> >> >> >> On 2009/07/30, at 2:22, David Recordon wrote: >> >> >> >>> Forwarding these three posts from the General list. Not because I >> >>> agree with all of the sentiments expressed, but because it shows how >> >>> we as a board and organization are clearly not being transparent >> >>> enough in the activities that are actually being taken on. >> >>> >> >>> Two ideas I think that we should seriously consider are: >> >>> 1) making use of a project management tool like Basecamp >> >>> (http://www.basecamphq.com/) so that at least the entire board and >> >>> Don know the status of each project that is underway >> >> >> >> I strongly agree to this. >> >> >> >>> 2) having Don write a monthly blog post about OpenID's achievements >> >>> the past month and what the Foundation has accomplished >> >> >> >> +1 >> >> >> >>> >> >>> Thoughts? >> >>> >> >>> --David >> >>> >> >>> Begin forwarded message: >> >>> >> >>>> From: Santosh Rajan >> >>>> Date: July 28, 2009 11:11:03 PM PDT >> >>>> To: general at openid.net >> >>>> Subject: Re: [OpenID] Google's proprietary discovery extension? >> >>>> >> >>>> >> >>>> Hehe! Shade for once I am going to agree with you. >> >>>> Why do we have a chairman? Isnt he supposed to be leading the flock >> and >> >>>> showing the way? >> >>>> And what about the rest of the board. This is the "coldest" board I >> >>>> have >> >>>> ever seen. >> >>>> I think Eran Hammer should have been the chairman of the board! I >> >>>> wonder why >> >>>> he disappeared from here 2 yrs back. (I have seen some posts from >> >>>> him from >> >>>> 2007). >> >>>> >> >>>> >> >>>> SitG Admin wrote: >> >>>>> >> >>>>>> There is no sign of the "STD mechanism" coming soon. >> >>>>> >> >>>>> Perhaps it will arrive after Chris Messina's "Policy Expression >> >>>>> Extension" passes ;) >> >>>>> >> >>>>>> Apathy on the part of the OpenID Foundation. >> >>>>> >> >>>>> Inaction, or so it may appear; timely, though? >> >>>>> >> >>>>>> Half the Identity folk have moved on to Kantara Initiative. >> >>>>>> The Other half to the Open Web foundation. >> >>>>>> XRI TC has tied itself in knots. >> >>>>>> And the hilarious part is that there are folk involved in all >> >>>>>> these three >> >>>>>> foundations! >> >>>>> >> >>>>> Sounds like good separation of duties to me. If the rest of us can >> >>>>> still interop (and work is still being done that *needs* to be done >> >>>>> before we can move forward), it doesn't really matter where most of >> >>>>> the various communities is doing that work. >> >>>>> >> >>>>>> No idea were the rest of us should bail out to!? >> >>>>> >> >>>>> If the development of OpenID were to halt now, I think it would be >> >>>>> Federated implementations that found themselves hardest hit; small, >> >>>>> independent operators such as myself (working with libraries >> already >> >>>>> distributed "in the wild") might not even notice. >> >>>>> >> >>>>> -Shade >> >>>>> _______________________________________________ >> >>>>> general mailing list >> >>>>> general at openid.net >> >>>>> http://openid.net/mailman/listinfo/general >> >>>>> >> >>>>> >> >>>> >> >>>> >> >>>> ----- >> >>>> >> >>>> Santosh Rajan >> >>>> http://santrajan.blogspot.com http://santrajan.blogspot.com >> >>>> -- >> >>>> View this message in context: >> >>>> >> http://www.nabble.com/Re%3A-Google%27s-proprietary-discovery-extension--tp24414092p24713025.html >> >>>> >> >>>> Sent from the OpenID - General mailing list archive at Nabble.com. >> >>>> >> >>>> _______________________________________________ >> >>>> general mailing list >> >>>> general at openid.net >> >>>> http://openid.net/mailman/listinfo/general >> >>> >> >>> _______________________________________________ >> >>> board mailing list >> >>> board at openid.net >> >>> http://openid.net/mailman/listinfo/board >> >> _______________________________________________ >> >> board mailing list >> >> board at openid.net >> >> http://openid.net/mailman/listinfo/board >> > >> > >> > _______________________________________________ >> > board mailing list >> > board at openid.net >> > http://openid.net/mailman/listinfo/board >> > >> > >> >> >> ----- >> >> Santosh Rajan >> http://santrajan.blogspot.com http://santrajan.blogspot.com >> -- >> View this message in context: >> http://www.nabble.com/Perception-of-the-Foundation-%28Was%3A-Fwd%3A--OpenID--Google%27s-proprietary-discovery-extension-%29-tp24724040p24730408.html >> Sent from the OpenID - Foundation Board mailing list archive at >> Nabble.com. >> >> _______________________________________________ >> board mailing list >> board at openid.net >> http://openid.net/mailman/listinfo/board >> > > > > -- > Chris Messina > Open Web Advocate > > Personal site: http://factoryjoe.com > Twitter: http://twitter.com/chrismessina > > Diso Project: http://diso-project.org > OpenID Foundation: http://openid.net > > This email is: [ ] bloggable [X] ask first [ ] private > > _______________________________________________ > board mailing list > board at openid.net > http://openid.net/mailman/listinfo/board > > ----- Santosh Rajan http://santrajan.blogspot.com http://santrajan.blogspot.com -- View this message in context: http://www.nabble.com/Perception-of-the-Foundation-%28Was%3A-Fwd%3A--OpenID--Google%27s-proprietary-discovery-extension-%29-tp24724040p24731706.html Sent from the OpenID - Foundation Board mailing list archive at Nabble.com. From mitrautama_design at yahoo.com Thu Jul 30 03:48:24 2009 From: mitrautama_design at yahoo.com (D.Setiawan) Date: Thu, 30 Jul 2009 11:48:24 +0800 (SGT) Subject: [OpenID board] Bls: Perception of the Foundation (Was: Fwd: [OpenID] Google's proprietary discovery extension?) In-Reply-To: <1bc4603e0907292013v38d5ac54qaaeaec0b41a3828f@mail.gmail.com> References: <4A70D191.7040100@yahoo-inc.com> <24730408.post@talk.nabble.com> <1bc4603e0907292013v38d5ac54qaaeaec0b41a3828f@mail.gmail.com> Message-ID: <56048.38102.qm@web76202.mail.sg1.yahoo.com> > >Dari: Chris Messina >Kepada: board at openid.net >Terkirim: Kamis, 30 Juli, 2009 10:13:18 >Judul: Re: [OpenID board] Perception of the Foundation (Was: Fwd: [OpenID] Google's proprietary discovery extension?) > >Santosh, I'm not sure what you're proposing. > > >If there is a leadership vacuum in the community, complaining about it doesn't seem like an effective way to address it. > > >>That said, I certainly think that the Foundation via the board has not been terribly effective in its communications and outreach since the elections. That said, much has been happening, albeit in many different places so keeping track of everything is very challenging ? even for those directly working on these things. > > >A couple weeks back I sent Don a list of interview-style questions that I had hoped would have made it to the blog by now, but alas I've not heard back from him yet. Don has pointed out that he is more of an infrastructure kind of guy ? who likes to operate behind the scenes, and so combining that style of leadership with an otherwise quiet board can of course lead to questions of progress. > > >I also noticed that the board's meeting minutes have not been published to the wiki recently, so I'll go an make sure that they are copied from this list to the wiki, so at least you can trace the conversations that have gone on over the last several months. > > >I would be interested in hearing solid proposals for rallying the community ? and coordinating efforts if the board is unable or unavailable to do so. I have ideas myself, but not the time or ability to implement them at the moment. > > >Chris > > >On Wed, Jul 29, 2009 at 5:30 PM, Santosh Rajan wrote: > > >>>>Allen I think you missed a major point here. >>>>It is nice to know about Yahoo's work. Other coorporates have also done a >>>>lot of work, like Google, Facebook etc. >> >>>>But what about the independent community members? Nothing!! Or atleast I >>>>haven't seen any work coming from then. >> >>>>I think in Open Communities the most important contributions must come from >>>>the independant members and not the coorporate members. Independent members >>>>are not "boxed in" by coorporate objectives. >> >>>>Corporate members are focussed by their companies. Independent individuals >>>>need community leadership, otherwise they will end up running around like >>>>headless chicken. Which is more or less what is happenning now. >> >> >> >> >>>>Allen Tom-2 wrote: >>>>> >>>>> Hi all, >>>>> >>>>> Yahoo is very heavily invested in OpenID and we have a bunch of >>>>> engineers and designers currently working on enhancements to our OpenID >>>>> service. Earlier this year, we worked with the community to write the >>>>> OpenID UI and OAuth/Hybrid Extensions, and the Yahoo OP will be >>>>> implementing both of these extensions in the very near future. >>>>> >>>>> In addition to protocol enhancements, we have a crack team of UI/Product >>>>> designers and researchers who are actively experimenting with ways to >>>>> improve the overall usability of our OpenID service. We'll be deploying >>>>> many significant upgrades to the Yahoo OpenID Provider's user interface >>>>> later this year. The new OpenID UI, along with support for the UI and >>>>> Hybrid Extensions, and our soon to be released support for Open Social's >>>>> REST based APIs (including Portable Contacts) will be a huge upgrade to >>>>> our existing Open Stack offering. >>>>> >>>>> We've also been working behind the scenes to line up several new and >>>>> exciting Relying Parties to accept OpenID. Every potential Relying Party >>>>> that I've been working with wants to accept not just Yahoo OpenID, but >>>>> also OpenIDs from other Providers, which is making a really strong case >>>>> for interoperability and open standards. >>>>> >>>>> Yahoo along with other OPs and Relying Parties are committing plenty of >>>>> resources for OpenID and are actively working towards the goal of >>>>> having OpenID reach widespread usage and adoption. Many of these >>>>> efforts are behind the scenes, and aren't really visible on the public >>>>> mailing lists, so perhaps the OpenID Foundation can take the lead in >>>>> publicizing the activities that its membership is actively working on. >>>>> >>>>> Allen >>>>> >>>>> >>>>> Nat wrote: >>>>>> Hi >>>>>> >>>>>> Inline below: >>>>>> >>>>>> =nat at Tokyo via iPhone >>>>>> >>>>>> On 2009/07/30, at 2:22, David Recordon wrote: >>>>>> >>>>>>> Forwarding these three posts from the General list. Not because I >>>>>>> agree with all of the sentiments expressed, but because it shows how >>>>>>> we as a board and organization are clearly not being transparent >>>>>>> enough in the activities that are actually being taken on. >>>>>>> >>>>>>> Two ideas I think that we should seriously consider are: >>>>>>> 1) making use of a project management tool like Basecamp >>>>>>> (http://www.basecamphq.com/) so that at least the entire board and >>>>>>> Don know the status of each project that is underway >>>>>> >>>>>> I strongly agree to this. >>>>>> >>>>>>> 2) having Don write a monthly blog post about OpenID's achievements >>>>>>> the past month and what the Foundation has accomplished >>>>>> >>>>>> +1 >>>>>> >>>>>>> >>>>>>> Thoughts? >>>>>>> >>>>>>> --David >>>>>>> >>>>>>> Begin forwarded message: >>>>>>> >>>>>>>> From: Santosh Rajan >>>>>>>> Date: July 28, 2009 11:11:03 PM PDT >>>>>>>> To: general at openid.net >>>>>>>> Subject: Re: [OpenID] Google's proprietary discovery extension? >>>>>>>> >>>>>>>> >>>>>>>> Hehe! Shade for once I am going to agree with you. >>>>>>>> Why do we have a chairman? Isnt he supposed to be leading the flock and >>>>>>>> showing the way? >>>>>>>> And what about the rest of the board. This is the "coldest" board I >>>>>>>> have >>>>>>>> ever seen. >>>>>>>> I think Eran Hammer should have been the chairman of the board! I >>>>>>>> wonder why >>>>>>>> he disappeared from here 2 yrs back. (I have seen some posts from >>>>>>>> him from >>>>>>>> 2007). >>>>>>>> >>>>>>>> >>>>>>>> SitG Admin wrote: >>>>>>>>> >>>>>>>>>> There is no sign of the "STD mechanism" coming soon. >>>>>>>>> >>>>>>>>> Perhaps it will arrive after Chris Messina's "Policy Expression >>>>>>>>> Extension" passes ;) >>>>>>>>> >>>>>>>>>> Apathy on the part of the OpenID Foundation. >>>>>>>>> >>>>>>>>> Inaction, or so it may appear; timely, though? >>>>>>>>> >>>>>>>>>> Half the Identity folk have moved on to Kantara Initiative. >>>>>>>>>> The Other half to the Open Web foundation. >>>>>>>>>> XRI TC has tied itself in knots. >>>>>>>>>> And the hilarious part is that there are folk involved in all >>>>>>>>>> these three >>>>>>>>>> foundations! >>>>>>>>> >>>>>>>>> Sounds like good separation of duties to me. If the rest of us can >>>>>>>>> still interop (and work is still being done that *needs* to be done >>>>>>>>> before we can move forward), it doesn't really matter where most of >>>>>>>>> the various communities is doing that work. >>>>>>>>> >>>>>>>>>> No idea were the rest of us should bail out to!? >>>>>>>>> >>>>>>>>> If the development of OpenID were to halt now, I think it would be >>>>>>>>> Federated implementations that found themselves hardest hit; small, >>>>>>>>> independent operators such as myself (working with libraries already >>>>>>>>> distributed "in the wild") might not even notice. >>>>>>>>> >>>>>>>>> -Shade >>>>>>>>> _______________________________________________ >>>>>>>>> general mailing list >>>>>>>>> general at openid.net >>>>>>>>> http://openid.net/mailman/listinfo/general >>>>>>>>> >>>>>>>>> >>>>>>>> >>>>>>>> >>>>>>>> ----- >>>>>>>> >>>>>>>> Santosh Rajan >>>>>>>> http://santrajan.blogspot.com http://santrajan.blogspot.com >>>>>>>> -- >>>>>>>> View this message in context: >>>>>>>> http://www.nabble.com/Re%3A-Google%27s-proprietary-discovery-extension--tp24414092p24713025.html >>>> >>>>>> >>>>>>>> Sent from the OpenID - General mailing list archive at Nabble.com. >>>>>>>> >>>>>>>> _______________________________________________ >>>>>>>> general mailing list >>>>>>>> general at openid.net >>>>>>>> http://openid.net/mailman/listinfo/general >>>>>>> >>>>>>> _______________________________________________ >>>>>>> board mailing list >>>>>>> board at openid.net >>>>>>> http://openid.net/mailman/listinfo/board >>>>>> _______________________________________________ >>>>>> board mailing list >>>>>> board at openid.net >>>>>> http://openid.net/mailman/listinfo/board >>>>> >>>>> >>>>> _______________________________________________ >>>>> board mailing list >>>>> board at openid.net >>>>> http://openid.net/mailman/listinfo/board >>>>> >>>>> >> >> >>>>----- >> >>>>Santosh Rajan >>http://santrajan.blogspot.com http://santrajan.blogspot.com >>>>-- >>View this message in context: http://www.nabble.com/Perception-of-the-Foundation-%28Was%3A-Fwd%3A--OpenID--Google%27s-proprietary-discovery-extension-%29-tp24724040p24730408.html >>>> >>Sent from the OpenID - Foundation Board mailing list archive at Nabble.com. >> >> >>>>_______________________________________________ >>>>board mailing list >>board at openid.net >>http://openid.net/mailman/listinfo/board >> > > >-- >Chris Messina >Open Web Advocate > >Personal site: http://factoryjoe.com >Twitter: http://twitter.com/chrismessina > >Diso Project: http://diso-project.org >OpenID Foundation: http://openid.net > >This email is: [ ] bloggable [X] ask first [ ] private > "Coba Yahoo! Mail baru yang LEBIH CEPAT. Rasakan bedanya sekarang! http://id.mail.yahoo.com" -------------- next part -------------- An HTML attachment was scrubbed... URL: From jernst at netmesh.us Thu Jul 30 05:28:57 2009 From: jernst at netmesh.us (Johannes Ernst) Date: Wed, 29 Jul 2009 22:28:57 -0700 Subject: [OpenID board] Perception of the Foundation (Was: Fwd: [OpenID] Google's proprietary discovery extension?) In-Reply-To: <24731706.post@talk.nabble.com> References: <4A70D191.7040100@yahoo-inc.com> <24730408.post@talk.nabble.com> <1bc4603e0907292013v38d5ac54qaaeaec0b41a3828f@mail.gmail.com> <24731706.post@talk.nabble.com> Message-ID: <01EB9C31-548C-4B84-AAB1-EEF05C30A750@netmesh.us> I have to agree with Santosh here. The really scary part is that the "serious leadership vacuum" seems to have migrated from the old board and old ED to the new board and new ED. I'm really perplexed how that might even be possible given how many people (including myself) were exchanged in the process. On Jul 29, 2009, at 20:44, Santosh Rajan wrote: > > > First of all I am not proposing anything, nor am i complaining about > anything. I am just bringing to your notice what I think is a very > serious > problem with the OpenID board. > And yes let us face it. There definitely is a serious leadership > vacuum > here. I am sure every one is aware of it but nobody speaks about it. > > As you said Don is an infrastructure guy, but why bring Don into > this at > all. I dont think he was hired for a leadership role at all. The > leader has > to be the chairman of the board. The chairman must be a technical > wiz plus > someone who can lead from the front, and should be rallying the > community. > > I cant see someone who is good at both here, technology and rallying > the > flock. > Actually I dont mind one of the corporate members being chairman of > the > board provided he has a written mandate from his company to work as he > wishes independently on a board like this. Something like the > mandate given > to Eran from Yahoo. > > > Chris Messina wrote: >> >> Santosh, I'm not sure what you're proposing. >> If there is a leadership vacuum in the community, complaining about >> it >> doesn't seem like an effective way to address it. >> >> That said, I certainly think that the Foundation via the board has >> not >> been >> terribly effective in its communications and outreach since the >> elections. >> That said, much has been happening, albeit in many different places >> so >> keeping track of everything is very challenging ? even for those >> directly >> working on these things. >> >> A couple weeks back I sent Don a list of interview-style questions >> that I >> had hoped would have made it to the blog by now, but alas I've not >> heard >> back from him yet. Don has pointed out that he is more of an >> infrastructure >> kind of guy ? who likes to operate behind the scenes, and so >> combining >> that >> style of leadership with an otherwise quiet board can of course >> lead to >> questions of progress. >> >> I also noticed that the board's meeting minutes have not been >> published to >> the wiki recently, so I'll go an make sure that they are copied >> from this >> list to the wiki, so at least you can trace the conversations that >> have >> gone >> on over the last several months. >> >> I would be interested in hearing solid proposals for rallying the >> community >> ? and coordinating efforts if the board is unable or unavailable to >> do so. >> I >> have ideas myself, but not the time or ability to implement them at >> the >> moment. >> >> Chris >> >> On Wed, Jul 29, 2009 at 5:30 PM, Santosh Rajan >> wrote: >> >>> >>> Allen I think you missed a major point here. >>> It is nice to know about Yahoo's work. Other coorporates have also >>> done a >>> lot of work, like Google, Facebook etc. >>> >>> But what about the independent community members? Nothing!! Or >>> atleast I >>> haven't seen any work coming from then. >>> >>> I think in Open Communities the most important contributions must >>> come >>> from >>> the independant members and not the coorporate members. Independent >>> members >>> are not "boxed in" by coorporate objectives. >>> >>> Corporate members are focussed by their companies. Independent >>> individuals >>> need community leadership, otherwise they will end up running >>> around like >>> headless chicken. Which is more or less what is happenning now. >>> >>> >>> >>> Allen Tom-2 wrote: >>>> >>>> Hi all, >>>> >>>> Yahoo is very heavily invested in OpenID and we have a bunch of >>>> engineers and designers currently working on enhancements to our >>>> OpenID >>>> service. Earlier this year, we worked with the community to >>>> write the >>>> OpenID UI and OAuth/Hybrid Extensions, and the Yahoo OP will be >>>> implementing both of these extensions in the very near future. >>>> >>>> In addition to protocol enhancements, we have a crack team of >>> UI/Product >>>> designers and researchers who are actively experimenting with >>>> ways to >>>> improve the overall usability of our OpenID service. We'll be >>>> deploying >>>> many significant upgrades to the Yahoo OpenID Provider's user >>>> interface >>>> later this year. The new OpenID UI, along with support for the UI >>>> and >>>> Hybrid Extensions, and our soon to be released support for Open >>> Social's >>>> REST based APIs (including Portable Contacts) will be a huge >>>> upgrade to >>>> our existing Open Stack offering. >>>> >>>> We've also been working behind the scenes to line up several new >>>> and >>>> exciting Relying Parties to accept OpenID. Every potential Relying >>> Party >>>> that I've been working with wants to accept not just Yahoo >>>> OpenID, but >>>> also OpenIDs from other Providers, which is making a really >>>> strong case >>>> for interoperability and open standards. >>>> >>>> Yahoo along with other OPs and Relying Parties are committing >>>> plenty of >>>> resources for OpenID and are actively working towards the goal of >>>> having OpenID reach widespread usage and adoption. Many of these >>>> efforts are behind the scenes, and aren't really visible on the >>>> public >>>> mailing lists, so perhaps the OpenID Foundation can take the lead >>>> in >>>> publicizing the activities that its membership is actively >>>> working on. >>>> >>>> Allen >>>> >>>> >>>> Nat wrote: >>>>> Hi >>>>> >>>>> Inline below: >>>>> >>>>> =nat at Tokyo via iPhone >>>>> >>>>> On 2009/07/30, at 2:22, David Recordon wrote: >>>>> >>>>>> Forwarding these three posts from the General list. Not >>>>>> because I >>>>>> agree with all of the sentiments expressed, but because it >>>>>> shows how >>>>>> we as a board and organization are clearly not being transparent >>>>>> enough in the activities that are actually being taken on. >>>>>> >>>>>> Two ideas I think that we should seriously consider are: >>>>>> 1) making use of a project management tool like Basecamp >>>>>> (http://www.basecamphq.com/) so that at least the entire board >>>>>> and >>>>>> Don know the status of each project that is underway >>>>> >>>>> I strongly agree to this. >>>>> >>>>>> 2) having Don write a monthly blog post about OpenID's >>>>>> achievements >>>>>> the past month and what the Foundation has accomplished >>>>> >>>>> +1 >>>>> >>>>>> >>>>>> Thoughts? >>>>>> >>>>>> --David >>>>>> >>>>>> Begin forwarded message: >>>>>> >>>>>>> From: Santosh Rajan >>>>>>> Date: July 28, 2009 11:11:03 PM PDT >>>>>>> To: general at openid.net >>>>>>> Subject: Re: [OpenID] Google's proprietary discovery extension? >>>>>>> >>>>>>> >>>>>>> Hehe! Shade for once I am going to agree with you. >>>>>>> Why do we have a chairman? Isnt he supposed to be leading the >>>>>>> flock >>> and >>>>>>> showing the way? >>>>>>> And what about the rest of the board. This is the "coldest" >>>>>>> board I >>>>>>> have >>>>>>> ever seen. >>>>>>> I think Eran Hammer should have been the chairman of the >>>>>>> board! I >>>>>>> wonder why >>>>>>> he disappeared from here 2 yrs back. (I have seen some posts >>>>>>> from >>>>>>> him from >>>>>>> 2007). >>>>>>> >>>>>>> >>>>>>> SitG Admin wrote: >>>>>>>> >>>>>>>>> There is no sign of the "STD mechanism" coming soon. >>>>>>>> >>>>>>>> Perhaps it will arrive after Chris Messina's "Policy Expression >>>>>>>> Extension" passes ;) >>>>>>>> >>>>>>>>> Apathy on the part of the OpenID Foundation. >>>>>>>> >>>>>>>> Inaction, or so it may appear; timely, though? >>>>>>>> >>>>>>>>> Half the Identity folk have moved on to Kantara Initiative. >>>>>>>>> The Other half to the Open Web foundation. >>>>>>>>> XRI TC has tied itself in knots. >>>>>>>>> And the hilarious part is that there are folk involved in all >>>>>>>>> these three >>>>>>>>> foundations! >>>>>>>> >>>>>>>> Sounds like good separation of duties to me. If the rest of >>>>>>>> us can >>>>>>>> still interop (and work is still being done that *needs* to >>>>>>>> be done >>>>>>>> before we can move forward), it doesn't really matter where >>>>>>>> most of >>>>>>>> the various communities is doing that work. >>>>>>>> >>>>>>>>> No idea were the rest of us should bail out to!? >>>>>>>> >>>>>>>> If the development of OpenID were to halt now, I think it >>>>>>>> would be >>>>>>>> Federated implementations that found themselves hardest hit; >>>>>>>> small, >>>>>>>> independent operators such as myself (working with libraries >>> already >>>>>>>> distributed "in the wild") might not even notice. >>>>>>>> >>>>>>>> -Shade >>>>>>>> _______________________________________________ >>>>>>>> general mailing list >>>>>>>> general at openid.net >>>>>>>> http://openid.net/mailman/listinfo/general >>>>>>>> >>>>>>>> >>>>>>> >>>>>>> >>>>>>> ----- >>>>>>> >>>>>>> Santosh Rajan >>>>>>> http://santrajan.blogspot.com http://santrajan.blogspot.com >>>>>>> -- >>>>>>> View this message in context: >>>>>>> >>> http://www.nabble.com/Re%3A-Google%27s-proprietary-discovery-extension--tp24414092p24713025.html >>>>>>> >>>>>>> Sent from the OpenID - General mailing list archive at >>>>>>> Nabble.com. >>>>>>> >>>>>>> _______________________________________________ >>>>>>> general mailing list >>>>>>> general at openid.net >>>>>>> http://openid.net/mailman/listinfo/general >>>>>> >>>>>> _______________________________________________ >>>>>> board mailing list >>>>>> board at openid.net >>>>>> http://openid.net/mailman/listinfo/board >>>>> _______________________________________________ >>>>> board mailing list >>>>> board at openid.net >>>>> http://openid.net/mailman/listinfo/board >>>> >>>> >>>> _______________________________________________ >>>> board mailing list >>>> board at openid.net >>>> http://openid.net/mailman/listinfo/board >>>> >>>> >>> >>> >>> ----- >>> >>> Santosh Rajan >>> http://santrajan.blogspot.com http://santrajan.blogspot.com >>> -- >>> View this message in context: >>> http://www.nabble.com/Perception-of-the-Foundation-%28Was%3A-Fwd%3A--OpenID--Google%27s-proprietary-discovery-extension-%29-tp24724040p24730408.html >>> Sent from the OpenID - Foundation Board mailing list archive at >>> Nabble.com. >>> >>> _______________________________________________ >>> board mailing list >>> board at openid.net >>> http://openid.net/mailman/listinfo/board >>> >> >> >> >> -- >> Chris Messina >> Open Web Advocate >> >> Personal site: http://factoryjoe.com >> Twitter: http://twitter.com/chrismessina >> >> Diso Project: http://diso-project.org >> OpenID Foundation: http://openid.net >> >> This email is: [ ] bloggable [X] ask first [ ] private >> >> _______________________________________________ >> board mailing list >> board at openid.net >> http://openid.net/mailman/listinfo/board >> >> > > > ----- > > Santosh Rajan > http://santrajan.blogspot.com http://santrajan.blogspot.com > -- > View this message in context: http://www.nabble.com/Perception-of-the-Foundation-%28Was%3A-Fwd%3A--OpenID--Google%27s-proprietary-discovery-extension-%29-tp24724040p24731706.html > Sent from the OpenID - Foundation Board mailing list archive at > Nabble.com. > > _______________________________________________ > board mailing list > board at openid.net > http://openid.net/mailman/listinfo/board