[OpenID] Google Removes Relying Party Pre-Registration

David Recordon drecordon at sixapart.com
Thu Oct 30 20:20:26 UTC 2008


 From http://google-code-updates.blogspot.com/2008/10/moving-another-step-closer-to-single.html

Moving another step closer to single-sign on
Thursday, October 30, 2008
By Eric Sachs, Google Security Team
Yesterday we announced one step we took to help increase adoption of  
single-sign on across websites on the Internet. For more details, you  
can watch today's episode of thesocialweb.tv which covers the launch.  
While we announced that we would initially provide limited access to  
our OpenID IDP to make sure it was working properly, we were delighted  
to see that the number of sites that registered to receive access was  
significantly more than we had expected. So instead of having our  
engineers spend time manually maintaining that list of registered  
sites, we are now taking another step further and removing that  
restriction so any site can use the API.

That registration requirement also led to some confusion because users  
wanted to be able to use existing websites that accept OpenID 2.0  
compliant logins by simply entering "gmail.com" (or in some cases  
their full E-mail address) into the login boxes on those websites.  
Normally what would happen after a user typed gmail.com is that the  
relying party website would look for a special type of file (XRDS) on  
the gmail.com servers that would check if Gmail run an OpenID identity  
provider. For yesterday's launch, we specifically chose not to publish  
that special XRDS file on gmail.com because if we had published the  
file, users would have received an error at Google if the website they  
were trying to log into had not registered with us. Now that we have  
removed the registration requirement, we will work on pushing that  
XRDS file as quickly as possible. Once the XRDS file is live, end- 
users should be able to use the service by typing gmail.com in the  
OpenID field of any login box that supports OpenID 2.0, similar to how  
Yahoo users can type yahoo.com or their Yahoo E-mail address. (In the  
meantime, if you feel really geeky, you can type "https://www.google.com/accounts/o8/id 
" into an OpenID 2.0 compliant login box and see the directed identity  
workflow in action.)

However, as we we noted in the Designing a Login User Interface  
section of our documentation, we do not place any requirements on the  
design of a federated login box on a relying party website. There are  
many approaches used by websites today, and the community is still  
experimenting with new approaches.

One other question that a lot of people asked yesterday is when a  
large provider like Google will become a relying party. There is one  
big problem that stands in the way of doing that, but fortunately it  
is more of a technology problem than a usability issue. That problem  
is that rich-client apps (desktop apps and mobile apps) are hard-coded  
to ask a user for their username and password. As an example, all  
Google rich-client apps would break if we supported federated login  
for our consumer users, and in fact they do break for the large number  
of our enterprise E-mail outsourcing customers who run their own  
identity provider, and for which Google is a relying party today. This  
problem with rich-client apps also affects other sites like Plaxo who  
are already relying parties.

Google is committed to working on this problem. If community members  
also want to help in this area, please take a look at our research on  
combining rich-client apps with federated login which was discussed at  
the recent UX summit and discussed further in a blog post here. A key  
thing to notice is that this research is about another open source  
technology called OAuth, and is agnostic to the particular federated  
login technology used, i.e. SAML or OpenID. It is also agnostic to the  
type of strong authentication method (if any) that is used to  
authenticate the user.

To further increase the adoption of federated login, we need standard  
open-source components on as many platforms as possible to enable  
those rich-client apps to support OAuth. That includes a lot more  
platforms then just Windows and Mac. The harder part is mobile devices  
(Blackberry, Symbian, Windows Mobile, iPhone, and yes even Android),  
and other Internet connected devices like Tivos, Apple TVs,  
Playstations, etc. that have rich-client apps that ask users for their  
passwords to access services like Youtube, Google photos, etc. If the  
community works together to build these components, they will be  
useful not only to Google, but also to any other relying parties that  
have rich-client apps or that expose APIs, and it will also help  
enterprise SaaS vendors like Salesforce.

If you want to help further these efforts, join the OpenID and OAuth  
mailing lists and tell people which platform you are targeting in case  
others want to help. For example, Mike Malone from Pownce did some  
work a few months ago to use OAuth on an iPhone and described how he  
got it working. And just yesterday another member of the open source  
community, Sean Sullivan, built a working OAuth enabled rich-client  
app for Android and posted the open source code.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openid.net/pipermail/openid-general/attachments/20081030/2d0447e0/attachment-0002.htm>


More information about the general mailing list