[OpenID] Too many providers... and here's one reason
Kelly Anderson
kellycoinguy at gmail.com
Tue Sep 16 16:20:04 UTC 2008
Sorry to change the subject a little... I'm new to this list and to
the whole OpenID concept. I am having trouble following the
conversation because of the number of TLAs that are being thrown
about. I'm not asking that anyone change, of course... but is there a
decent glossary of these terms out there for a newbie?
Thanks!
-Kelly
On Tue, Sep 16, 2008 at 10:13 AM, George Fletcher <gffletch at aol.com> wrote:
> Great points about PKI and best practices. +1 for a 'standard way' to do
> it:)
>
> Full XRDS allows for the inclusion of public keys and signing the XRDS
> document... so that would be one path. It could also be that the ORG
> asserting membership would publish it's public key is a well known
> location. In SAML this data is included in the SAML metadata document.
>
> Also, Patrick Harding from Ping Identity has suggested signing the
> document containing the public key and then allowing the RP to use the
> cert chain to determine if the document is valid within it's context or
> not (realizing that in some cases these deployments will be within
> closed circles of trust).
>
> I do think that Shade's comment about revocation of membership is a good
> one. These 3rd-party attested attributes need an expiration time. Also,
> the update mechanism of AX should allow the attesting party to update
> the attribute at the user's preferred OP if the membership changes.
> Though that requires both parties to support the update mechanism.
>
> Thanks,
> George
>
>
> Dick Hardt wrote:
>> One way of getting the public key would be to include it in the
>> assertion and have the cert signed by a higher, trusted party.
>> (typical PKI)
>>
>> Unless you use the existing PKI, I don't know of a best practice for
>> binding domains/URLs to public keys. (there are lots of ways to do it,
>> but what is "best practice"?)
>>
>> Personally, I'd like to see a 'standard way' to do it in OpenID that
>> did NOT use existing PKI. Then we could use PK crypto
>> for verifying OpenID message signatures and move away from managing
>> pair wise keys between RP and OP. Currently this is a pipe dream of
>> course. :-)
>>
>> -- Dick
>>
>> On 16-Sep-08, at 8:22 AM, Andrew Arnott wrote:
>>
>>> I just love a good topic to get the creative juices flowing from so
>>> many brainy people. Thanks all for your ideas.
>>>
>>> Regarding George's OP identity assertion w/ AX membership
>>> attribute... How could Org XYZ sign the attribute so that coming from
>>> some OP it would be a verifiable? Regarding this loose trust
>>> relationship between the OP and Org XYZ, what would that constitute?
>>>
>>> The few RPs that would be interested in my membership can have
>>> specially crafted AX fetch requests, no problem. But these RPs need
>>> to be able to work against whatever OP the authenticating user
>>> happens to choose. If only a few OPs might support these signed AX
>>> attributes that's fine, as long as the user has a choice and there is
>>> no strong affiliation between OP, RP and Org.
>>>
>>> I wonder if Org could assert my membership with a signed, encoded
>>> string, including my claimed id whatever that may be, and I take that
>>> encoded string and AX-store it myself to my arbitrary OP. Then any
>>> AX-fetch (with my permission) would retrieve that and the RP could
>>> check the signature. The only thing remaining in my mind is how the
>>> RP could verify the signature. Can an ordinary public HTTPS server
>>> cert on Org.com be used to verify a signature if it is signed the
>>> right way? Or is there some other way to do that?
>>>
>>> On Tue, Sep 16, 2008 at 6:26 AM, George Fletcher <gffletch at aol.com
>>> <mailto:gffletch at aol.com>> wrote:
>>>
>>> Per Dick's response earlier in the thread, I don't see why using
>>> an OP of my choice with a third party asserted attribute of my
>>> membership in org XYZ isn't sufficient to meet this use case.
>>>
>>> Basically, I'd use my preferred OP and request the organization
>>> to provide a signed attribute of my membership in org XYZ. Then
>>> when I log into the RP (with the OP of my choice), it can request
>>> this attribute and I can choose to provide it (or not) at time of
>>> authentication.
>>>
>>> This should be completely doable with the existing OpenID 2.0 and
>>> Attribute Exchange specs. Is the issue what Peter mentioned that
>>> there aren't many AX supporters right now?
>>>
>>> Of course, there will have to be a "trust relationship" between
>>> org XYZ and my preferred OP, but I don't see that trust as any
>>> deeper than the "trust relationship" between and RP and an OP.
>>>
>>> Thanks,
>>> George
>>>
>>> Andrew Arnott wrote:
>>>
>>> You're affirmative action example is well taken. Obviously
>>> if an OP is the best solution we should go with it. But just
>>> imagine what all these spoons of sugar are going to do to me...
>>>
>>> Suppose I'm a member of 15 organizations (that's
>>> conservative) between my professional, social, personal
>>> lives. Some RP could be interested in providing specialized
>>> services if I am a member of Org XYZ. Another RP may offer
>>> premium services if I am a member of Org ABC.
>>>
>>> Now if every org I am a member of became an OP, then my
>>> identity XRDS file now has at least 15 providers listed.
>>> Powerful, perhaps. Dangerous: yes!!! If OpenID's weakness
>>> already was that if an OP was compromised then all
>>> Identifiers that allow that OP's assertions are now
>>> compromised, then that weakness is proportional to the number
>>> of OPs that are listed in my XRDS file. I for one do NOT
>>> want 15 Providers listed in my XRDS file. There was a time I
>>> thought more was better, and to date I have some 5-6 OPs
>>> listed, but I've considered narrowing that down to just 2-3
>>> to decrease my risk surface area.
>>>
>>> Using OAuth as a post-authentication step of confirming
>>> membership is an interesting idea and should work. In the
>>> end, whether we use OpenID or OAuth, it seems we're mixing
>>> authentication and membership, or authorization and
>>> membership, in order to just get membership. Too bad there's
>>> not just a way to get "membership".
>>>
>>> Yes, InfoCard managed cards solve this problem, although not
>>> as implicitly as I'd like. I'm hoping OpenID can have a
>>> solution of its own.
>>>
>>> On Mon, Sep 15, 2008 at 5:12 PM, Eran Hammer-Lahav
>>> <eran at hueniverse.com <mailto:eran at hueniverse.com>
>>> <mailto:eran at hueniverse.com <mailto:eran at hueniverse.com>>> wrote:
>>>
>>> This is like applying affirmative action to cooking. "This
>>> cake
>>> calls for two spoons of sugar but we don't have enough people
>>> using lard in cakes, so I am going to use it instead..."
>>>
>>> Looks like they want to use OpenID as an assertion
>>> verification
>>> protocol, allowing them to confirm that a given user is in
>>> fact a
>>> member of their organization. If all they want to do is
>>> assert the
>>> claim, they can use both OAuth and OpenID, each with a
>>> different
>>> set of extra features. If they use OpenID, a side-effect
>>> of this
>>> will turn them into an Identity Provider, but if this is
>>> not their
>>> intention, they should not use that identifier internally, but
>>> instead accept OpenID.
>>>
>>> In other words, they should be an OP for assertion
>>> verification,
>>> and RP for site login.
>>>
>>> EHL
>>>
>>>
>>>
>>> On 9/15/08 4:45 PM, "Andrew Arnott"
>>> <andrewarnott at gmail.com <mailto:andrewarnott at gmail.com>
>>> <http://andrewarnott@gmail.com <http://gmail.com>>> wrote:
>>>
>>> I just spoke with an organization that wants to become a
>>> Provider so that other RP web sites can specifically
>>> tell if
>>> the logging in user is a member of this organization by
>>> whether their OpenID Identifier was asserted by that
>>> org's OP.
>>> Ideally, I'd like this org to choose to be an RP
>>> instead of an
>>> OP because there are already too many OPs out there
>>> and not
>>> enough RPs, IMO.
>>> How can an RP accept an OpenID Identifier from
>>> arbitrary OPs,
>>> but at each login determine whether the Identifier
>>> represents
>>> a user who belongs to a particular Organization?
>>> Basically
>>> the Organization needs to send an assertion about the
>>> Identifier's membership, but only be willing to do so
>>> if that
>>> identifier is confirmed as having logged in
>>> successfully to
>>> that RP. This would be easy to do if that Org was an
>>> OP, but
>>> I'm trying to reduce the # of reasons to be an OP.
>>>
>>>
>>> ------------------------------------------------------------------------
>>>
>>> _______________________________________________
>>> general mailing list
>>> general at openid.net <mailto:general at openid.net>
>>> http://openid.net/mailman/listinfo/general
>>>
>>>
>>>
>>>
>>> _______________________________________________
>>> general mailing list
>>> general at openid.net <mailto:general at openid.net>
>>> http://openid.net/mailman/listinfo/general
>>
>> =
>
> _______________________________________________
> general mailing list
> general at openid.net
> http://openid.net/mailman/listinfo/general
>
More information about the general
mailing list