[OpenID] OpenID Book draft version available for download
Peter Williams
pwilliams at rapattoni.com
Sun Jul 29 18:01:03 UTC 2007
Hans:
Enjoy:-
http://www.rsa.com/node.aspx?id=1313
The underlying OTAR-style (over the air rekey) "provisioning" protocol
is at
http://www1.ietf.org/mail-archive/web/ietf-announce/current/msg03203.htm
l
Rapattoni's major competitor discusses their variant at
http://www.clareitysecurity.com/solutions-safemls-authenticators.cfm
The OpenID assumption still stands, note. An OTP (from some container or
other) allows the human to complete user auth to a IDP. Once that IDP
supports an OP, OpenID Auth converts strong auth claims into a claimset,
along with registration-type attributes.
The release of attributes of any kind is subject to "policy
decision/enforcement point" behavior, depending on the semantics of the
claim-making protocol. (1) OpenID has policy-decision/enforcement
semantics built in. (2) SAML1.x delegates to an XACML-aware binding.
SAML2 uses comsec controls to apply the writer-to-reader doctrine (i.e
encrypt the attributes on the wire, where key management controls
assures that only intendedRecipients can release the cleartext(s))
OTP values from "connected tokens" require more of token-passing
architectures when... as the underlying strong authentication is
"continuous" - the protocol must emulate "continuous token-making" by
some means
For example, See http://www.ietf.org/rfc/rfc4793.txt
-----Original Message-----
From: hans at granqvist.com [mailto:hans at granqvist.com] On Behalf Of Hans
Granqvist
Sent: Sunday, July 29, 2007 10:23 AM
To: general at openid.net
Cc: Peter Williams
Subject: Re: [OpenID] OpenID Book draft version available for download
Hi Peter
> ...
> Realty is already making advanced used of OTPs generated on smartphone
> applets; removing the notion of carrying around multiple little key
fobs.
Do you have pointers to more info?
Thanks,
Hans
More information about the general
mailing list