[OpenID] Community Reputation Services
Eddy Nigg (StartCom Ltd.)
eddy_nigg at startcom.org
Tue May 20 23:41:18 UTC 2008
Nate, I think this to be very interesting, but no replies have come
forward so far. Does any of the spec editors consider something like this?
Regards
Signer: Eddy Nigg, StartCom Ltd. <http://www.startcom.org>
Jabber: startcom at startcom.org <xmpp:startcom at startcom.org>
Blog: Join the Revolution! <http://blog.startcom.org>
Phone: +1.213.341.0390
Nate Klingenstein:
> OpenID generals,
>
> The use case: we have a group of trusted IdP's (or OP's) and a set of
> trusted SP's (RP's) in a single common "federation", InCommon. We
> have a lightweight legal framework, a set of guidelines regarding how
> to behave, what attributes to use, and so forth. It works pretty
> well, and we like it. We also have smaller sub-communities with
> different trust and special attributes. An example is UCTrust, a sub-
> group formed by the University of California system. They want to
> leverage InCommon's breadth and infrastructure, but add special rules
> just for them. Several European countries have similar scenarios.
>
> I know there's a general dislike of whitelists and blacklists, but
> they're unfortunate realities of our requirements. We've come up
> with a clever way to handle this scenario in SAML 2.0, but I want a
> way to do the same thing in OpenID so it can be another protocol with
> scalable trust for our communities.
>
> I'm not deeply familiar with OpenID/XRDS, and I found no specs at
> http://wiki.openid.net/Potential_Future_Projects. I'd like to, from
> the RP's perspective:
>
> 1) Perform standard OpenID authentication and validate the claimed
> identifier. OP might suggest a community broker.
> 2) Make a query of a community broker already trusted by the RP,
> maybe the recommended one. Supply in the query string the claimed ID
> and the endpoint URL.
> 3) Receive back:
> a) Blacklisted by me
> b) I don't know this guy
> c) Checked by me...
> optional) And part of community A
> optional) And part of community B& X
>
> However, we need community A, B, or X to be responsible for that
> claim, not the reputation broker. UCTrust states the members of
> UCTrust, not InCommon. We could just store signed blobs, but I don't
> like persistent blobs. I'd prefer to represent communities as URL's,
> e.g. http://www.ucop.edu/uctrust/members. That makes step 4:
>
> 4) Recursively chase community URL's received to get "Vetted by me".
>
> From the OP's perspective, the openid.return_to in a request could
> be validated in the same manner.
>
> Is there a standard way to do this? I prefer it to the distributed
> white/blacklists that were proposed earlier, and we have experience
> there too. If not, I'll take the above suggestion to the specs list
> and get it bashed.
>
> Thanks for your ideas and time,
> Nate.
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openid.net/pipermail/openid-general/attachments/20080521/549153db/attachment-0002.htm>
More information about the general
mailing list