[OpenID] Combining Google & Yahoo user experience research

Nate Klingenstein ndk at internet2.edu
Tue Oct 14 11:51:59 UTC 2008


Chris,

> It's unclear what you're proposing or suggesting...! Still, I have  
> some feedback...

I was emphasizing why the proposed best practices wouldn't work for  
us.  My own position is there are lots of mechanisms, none of which  
is inherently globally superior to the others, or the inevitable one  
way.  It depends on application design and integration, security  
requirements, and user base, among others.

> Nothing about including email identifiers as valid OpenID  
> identifiers requires you that you use email as your primary  
> identifier. It simply enables the use of email addresses for  
> signing in to services. So many sites (in the wild) now immediately  
> ask you for your email address after you sign up with OpenID that  
> it seems counter-productive NOT to support email addresses...  
> especially since they often require you to confirm your email  
> address via token (which, if it were part of the OpenID spec, could  
> be done entirely within the browser).

> It's also conceivable that someone could delegate an email address  
> to a third-party OpenID provider, rather than their email  
> provider... so if were to use chris at example.com as my email  
> address, example.com would be able to redirect (302) to my actual  
> OpenID URL: realopenid.com/chris.

Email is certainly the primary identifier by which users know  
themselves today, which made us strongly consider the kind of  
discovery you mention.  There are at least 3 reasons we reluctantly  
turned it down from major consideration.

We don't want to be the only provider of identity data a user might  
have.  If they're trained to always enter their email address on all  
federated sites, and that email address always comes to us, then we  
have to be.  We'd rather supply the data we're authoritative for, and  
let other sites handle the data they want to.

We also then must rely on the identification and general data  
stewardship of the email provider (e.g. they do the redirect right  
every time, and don't track personal usage patterns, etc.).  With  
current business models, and the preponderance of email providers out  
there that students like to pick from, it'd be a leap of faith at  
this point.

And, again, immediately asking for email can give away a user's  
identity immediately, which for us (FERPA) is just not acceptable.

That said, I've long seen the "tacking on" of additional data by a  
provider to another IdP's assertion a key future use case that would  
be a quantum step forward for federated identity.  I know people will  
work hard on it when the time comes, so I want protocols that will  
support it without too much modification.

> I think you bring up some useful experiences in the wild, and I'm  
> just trying to focus your feedback... can you be specific about  
> what of the research is good and useful and what of it would not  
> work given your restrictions?


As one example, applications that have login systems already often  
just want to graft a link to the federated SSO system right next to  
existing login boxes.  We've pushed back at this half-measure, and  
now we have solid data that it was the right choice to do so.  The  
link is often not noticed, or the user enters their campus ID/ 
password directly into the text boxes.  For these systems, presenting  
instead a list of acceptable IdP's and nothing else has been pretty  
successful.

Many applications that have a preponderance of access from one IdP  
will have a button, or a default page.  Placing the logo of the  
primary IdP -- usually a university -- along with a "Not from Podunk  
University?  Select your school from this list." option has been  
successful.  Thanks to college sports, many students would sooner die  
than use a login page or button branded by a rival. ;D

These aren't good interfaces, but more importantly, they're not  
dangerous interfaces.  We can afford a little more frustration from  
users because the trusted identity data we're able to deliver has  
high value to applications.  We'd still like to improve the situation  
with better alternatives, and give deployers a more comprehensive  
guide as to which to pick in any given situation.

Hope this clarifies things,
Nate.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openid.net/pipermail/openid-general/attachments/20081014/7472e633/attachment-0002.htm>


More information about the general mailing list