More use cases
Johannes Ernst
jernst+openid.net at netmesh.us
Tue Oct 10 05:39:04 UTC 2006
On Oct 9, 2006, at 14:37, Dick Hardt wrote:
>
> On 28-Sep-06, at 9:53 AM, Johannes Ernst wrote:
>
>> I was asked to forward the following use cases/requirements with
>> me playing the anonymizer service, presumably for political
>> reasons ;-) These are paraphrased ...
>>
>> 1) An Attribute Provider (AP) makes an assertion about some user
>> to an Attribute Receiver (AR). (typically an IdP and a RP). The
>> assertion is conveyed with the user in the loop. However, the
>> device that the user is using to be in the loop is not trusted.
>> For example, the device may alter information in transit (add,
>> remove, change). Or, it may leak information in transit (e.g. post
>> my identity details to Usenet).
>>
>> Can OpenID be used to address these requirements? If yes: how? If
>> not: could OpenID be modified somehow to address these requirements?
>>
>> [Johannes comment: in the age of compromised PCs everywhere, this
>> is an interesting question. I'm not sure we can answer it. But it
>> sure would be useful if we could say "we can do this".]
>
> OpenID will be able to do this with Attribute Exchange.
How?
>> 2) May a single Persona have multiple attribute exchange services?
>> Are there any constraints on those services? For example, what
>> happens if there are three, and all three return a different date
>> of birth for the same persona? But then, having more than one
>> would be very advantageous if their scope was non-overlapping:
>> say, one has personal identity data, another work identity data etc.
>>
>> [Johannes comment: my suggestion would be to build an
>> "aggregation" service and declare that one instead, where the
>> aggregation service delegates to, and resolves conflicts between
>> the underlying data.]
>
> If the user can get different claims stating they have different
> dates of birth, the "problem" is with the entities making the
> claims, not the protocol.
It would be my hope that we're trying to solve a (business,
personal, ...) problem, and not simply exclude everything outside of
what a protocol can do.
Customer: "where is the engagement ring I ordered?"
Company: "it shows here that it was delivered a week ago".
Customer: "was not."
Company: "was, too."
Customer: "did you give it to my neighbors?"
Company: "no, it was delivered on the door step of 123 Main street at
11:23am."
Customer: "what do you mean 123 Main Street, that's the appartment of
my ex!!"
Company: "well, we executed this OpenID query and, yep, if I drill
down into the protocol log, it does say that two IdPs provided
conflicting statements, but we trusted A Corp. more than B Corp. and
that's where we sent it"
Customer: "darn, I must have forgotten to update B Corp's. IdP on
this attribute". ("and simply clicked through when it asked me
whether I wanted to release this claim" -- assuming a DIX-style
browser interaction -- but it's really independent of the mechanism
of data exchange)
We could simply say that as phrased, it's not allowed. The user --
well, really their IdP -- can always offer "data reconciliation
services" through a level of indirection ...
Johannes Ernst
NetMesh Inc.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: lid.gif
Type: image/gif
Size: 973 bytes
Desc: not available
URL: <http://lists.openid.net/pipermail/openid-general/attachments/20061009/7edf21af/attachment-0002.gif>
-------------- next part --------------
http://netmesh.info/jernst
More information about the general
mailing list