[OpenID] query regarding OP migration
Nate Klingenstein
ndk at internet2.edu
Sat May 31 10:48:21 UTC 2008
Babu,
> Babu> The problem with today's reality is that my "digital
> identity" is lost if the OP shuts down his services or I would like
> to migrate.
That's true, but some important identity information is difficult to
separate from the OP. For example, our universities often maintain
whether someone is a student. Students get access to services that
they university has licensed.
Imagine one of our students wants to export their identity. Now
their new OP has to convince RP's that they are a
student at example.edu. Remember that student at example.edu gets you
access to expensive, licensed stuff. That makes it difficult and
costly for the RP to trust any OP in the world to state
student at example.edu. Do we give the OP a signed blob saying
"userid at outsourced.org, expiration, student at example.edu, quoth me"?
I don't want to deal with attribute revocation...
I agree that, for many use cases, data portability is important and
good. However, if I wanted to introduce it to our real deployments
of federated identity, I'd have to solve these difficult problems.
We're probably talking about pretty different use cases, so you might
not face the same problems.
Attribute aggregation and identifier portability are a more likely
outcome for us, but they have their own challenges. There's a lot of
thinking to be done here.
> But in the case of DNS, the registered domain name remains forever.
Try out "whois", or check in with me on May 4, 2011. :D
> Babu> Even with today's OP-specific-digital-identities, we have
> phishing issue. What does an user do if he is phished. After this
> if the attacker changes the password, does the user not loose all
> the webiste accounts at which this OP-specific-digital-identity was
> used ?
Let me explain a little more. Universities, being big, juicy
targets, are often targeted by spear phishing. An attacker poses as
the university to try to steal user credentials. Some hundreds of
students and staff are usually fooled. When they realize what
they've done -- or, more often, after we realize what they've done
and lock the account -- they call the help desk.
We go through re-credentialing, which requires you supply various
personal information or identity cards to prove you're you. Then, we
change the user's password, force them to apologize and memorize what
the real authentication page looks like, and clean up any messes
created.
Now, suppose in a world of identity portability that the attacker had
migrated the user's account to a namespace and server they control.
What does the help desk do now?
I don't have good answers, but I appreciate the dialogue and any
suggestions you might have,
Nate.
More information about the general
mailing list