[OpenID] Multiple Domains and State
Nate Klingenstein
ndk at internet2.edu
Wed Apr 23 15:19:14 UTC 2008
Trey & Eddy,
We've experimented with this style of authentication chaining(read:
proxying) for quite some time, and there are legitimate use cases for
it when the intercepting party is adding attributes or doing protocol
translation. OP -> RP -> OP -> RP, essentially.
The implementation's really simple and generally doesn't even require
any new code, but there are two real caveats:
1) The user interface issues associated with choosing two different
identifiers can be challenging for users. How do they know which OP
to use when? Do they have to go through two identity selection steps?
2) Preserving trusted attributes/identity information from the
original OP/IdP through to the end consumer is really difficult when
you're dealing with bearer credentials. There are no real controls
on the repackaging of information by the middle box that are easily
enforced, so it has to be a trusted service. If the middle box is
only asserting information and identifiers for which it's
authoritative, this is moot, but it also makes the use case a lot
less interesting.
Take care,
Nate.
On 23 Apr 2008, at 14:27, Eddy Nigg (StartCom Ltd.) wrote:
> I guess not, but I think this is entirely possible: auth.com is an
> OpenID provider to authenticate to other sites, using itself an
> OpenID consumer for authentication :-) Seems to be a quite easy
> implementation IMO.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openid.net/pipermail/openid-general/attachments/20080423/6ba9a354/attachment-0001.htm>
More information about the general
mailing list