[OpenID] Multiple Domains and State
Peter Williams
pwilliams at rapattoni.com
Wed Apr 23 19:52:42 UTC 2008
This is the kerberos model: use one saml idp to issue a token granting the user a pending-capability to use another op's attribute resolution service, which delivers attributes and thus capabilities to levage the attributes in an authorized manner on the particular target sp.
In openid terms: get a positive assertion that the rp ebgine then presents to an ax endpoint at another op, whose response is presented to the backend sp as an authorized attributes.
You see this done in the ssl/pki model too. User presents ssl client cert as positive assertion, which rp proxy (ssl protocol entity in ssl server role) presents to ocsp endpoint, whose signed realtime response has attributes and the authorization assertions that upon the response's sig/pki verification are then given to the https webapp by the ssl layer entity in the stack.
-----Original Message-----
From: Nate Klingenstein <ndk at internet2.edu>
Sent: Wednesday, April 23, 2008 12:05 PM
To: Trey Long <trey at propeller.com>
Cc: general at openid.net <general at openid.net>
Subject: Re: [OpenID] Multiple Domains and State
Trey & Shade,
Here's a picture and writeup courtesy of UAB, NCSA & their early
proxying experiments that might help:
https://spaces.internet2.edu/display/GS/MyVocs
> About #1. If openId's are unique why would the authenticating party
> need to specify which one out of two or more? Assuming they were
> using one openId for my properties we could use that openId-
> provider.com/username as the key to lookup the user on the original
> domain.
In your example, would the RP receive the identifier auth.com/trey,
or openid.com/trey? Who would have issued and confirmed it? How do
you avoid auth.com/trey going to openid.com/ndk or microsoft.com/bgates?
It gets worse when you start dealing with attributes.
> Also, to double check. You are saying that openId supports -- or
> maybe more specifically doesn't prohibit -- chaining authentication
> to an intermediary server?
If you're just using openid.com/trey to authenticate for auth.com/
trey, then you're probably within the specs. If your intention is to
allow auth.com to be authoritative for openid.com/trey through some
other process, you've probably moved outside the specs, as Shade
alludes to.
In particular, you'd have issues with the Return URL. What does
openid.com stick in there that is spec-legal, goes to auth.com, and
will be trusted by related-a.com?
> Lastly, is there anything published online (specs, docs, howtos,
> thoughts or reflections) about what we're trying to do here that
> you know of?
See the document above(as well as the IAMSuite work out of
Australia). The flow diagram is significantly more complicated than
it needs to be because they were trying to integrate with existing
software packages. I can also send you an old paper I wrote on this
off-list if you're interested. There are a few other ways to skin
this cat.
Glad to have your insights on this old problem,
Nate.
More information about the general
mailing list