[OpenID] openid and xpointer

Johnny Bufu johnny at sxip.com
Mon Feb 4 15:30:14 PST 2008


On 4-Feb-08, at 3:17 PM, Peter Williams wrote:

> I've hopefully reformated, to stop windows rewriting my url:
>
>> http: //example.com/?redirect=http://
>> www. example.org/file.xml#xpointer(id('calendar'))
>
> You say: Although they are defined as "Identifiers" (which are in  
> turn URIs),  the delegate / local_id can be any string the OP can  
> use to identify the user; that's because discovery is never  
> performed on a delegate identifier.
>
> So, if the OP's local process of user authentication were to  
> leverage/interpret information in that delegate string, it is  
> entirely entitled to do so. For example, if the op recognized that  
> the value is a uri-bound saml request, the op might redirect/bridge  
> to that saml website in order to complete the op's locally-defined  
> auth process, before sending the value to the RP (as in openid 1)?

Yes, I don't see why this couldn't work.


> Must the op send on the value from the xrd file as given, or can it  
> modify the value? In openid1 of course the sent value must be that  
> discovered by the rp, so it can match up the response with the  
> openid entered by the user.

The OP is free to respond with assertions containing different  
identifier(s) (openid.claimed_id and openid.identity), as long as the  
assertions pass the verification tests that the RP will perform.

One of this tests is comparing the delegate from the assertion  
(openid.identity) to the delegate obtained from discovery on  
openid.claimed_id.


> The key word in the above is match. Ascii matching is only one rule.

UTF-8 is specified when converting strings to/from bytes, so the  
match should be a UTF-8 string match.


> There are lots of other equivalence relations an rp might use,  
> given trust in a particular asserting op. Presumably, an rp might  
> signal support for extensions, allowing the op to use other than  
> the obvious matching rule. This would seem to get us close to  
> cardspace semantics, allowing the asserted token to signal its  
> authorization policy context (the matching/evidence validation model)


Johnny



More information about the general mailing list