[OpenID] Community Reputation Services

Nate Klingenstein ndk at internet2.edu
Fri May 23 16:16:37 UTC 2008


Dick,

> The OP is the users agent managing their identity and the  
> architecture is such that the user should be able to choose any OP  
> they want.
> You can trust the identifier from the OP the same as you can trust  
> the user in presenting their username and password.

Are you sure?  As a classical application, I request the username/ 
password directly from the user.  Nobody (should, heh) know the  
password besides me and the application, and it's (usually) protected  
in transit.

Introduce an RP and an OP.  The user visits the RP, and is redirected  
to the OP.  The OP receives the request, e.g. section 9 of the  
specs.  It's followed by a response in section 10.  This response is  
created and signed by the OP.  It could do so on a whim, if it so  
chose.  There isn't even a MUST for proper authentication of the user  
that I can see[1], so hypothetically it could do so without even  
breaking the specs.  Far be it from me to defend passwords or  
distributed identity, but I'm trying to be clear about who has which  
responsibilities and abilities.

[1] "When an authentication request comes from the User-Agent via  
indirect communication, the OP SHOULD determine that an authorized  
end user wishes to complete the authentication."

> Who the RP trusts is independent, and the user acquires claims from  
> parties the RP trusts and presents them to the RP. Note that this  
> lets the user acquire claims from multiple parties and present them  
> to the RP.

Yep, there are lots of use cases for attribute aggregation, and a lot  
of ways to do it.  This is one of them.  I'm pretty sure that's an  
orthogonal issue, though.

Take care,
Nate.



More information about the general mailing list