[OpenID] Using HTTPS Openid Providers
Martin Atkins
mart at degeneration.co.uk
Sat Jun 16 17:16:03 UTC 2007
Peter Williams wrote:
>
> The design rationale in the conversation implied that one MUST show a
> _visible_ message to alert a person, when a given OP provider has not
> been authorized to present claims to a given OP Consumer. To present a
> visible message would assume we are in a browser/HTML context. That
> (pure HTML) context assumption got me thinking about where I can and
> cannot apply OpenID in my own little world; how a design would have to
> workaround limits of today's (mainstream) OpenID capabilities.
>
> If I attempt a recap, we had said that all OP servers creating claims
> MUST be assumed usable at all OP claims Consumers. Then we said, if
> that's not true in a given OP Consumer's security policy case... then
> the protocol MUST convey the Consumer's [HTML] message explaining why.
> This all implied a full [HTML] browser communication context - with
> language/character encoding/etc support.
>
"The protocol" (OpenID Auth) isn't really involved in this situation,
because it is the RP generating the error. One would assume that in the
example from my original message the RP wouldn't even initiate OpenID
authentication, it'd just produce the error message for the user
immediately.
In a web context, this error message would likely be presented as part
of an HTML page. However, the RP could return the error message by any
other means appropriate to the situation.
To be clear, I was not suggesting that anything like this be part of the
protocol. I was merely saying that in a situation where an RP is
discriminating for some reason against a particular class of OP they are
likely to return a specific error message to the end-user rather than
the generic "discovery failed" error message you'd be likely to get if
the discovery failed at a lower layer -- for example, if the underlying
HTTP client library doesn't support SSL.
More information about the general
mailing list