[OpenID] 7 suggested OpenID sessions at IIW next week

Eric Sachs esachs at google.com
Mon May 18 18:20:19 UTC 2009


A few folks asked me for a printable list of the potential OpenID sessions
to have on hand when the scheduling process starts at IIW.  I have posted
that here and I'll bring a few printouts with me:

http://sites.google.com/site/oauthgoog/Home/iiwopenid


p.s. George, you might see if you can combine sessions with Luke Shepard
because he wanted to talk about Facebook's experience becoming a 2.0 RP,
both from a security perspective, though also in terms of usability (and he
is hoping to do a quick demo).

On Fri, May 15, 2009 at 9:13 AM, George Fletcher <gffletch at aol.com> wrote:

> I've been planning on doing a session around "Issues of becoming an 2.0
> RP". Don't know if others are interested in sharing their experiences. It's
> lead me to believe that we need some changes in spec language and
> capabilities to make it a little easier (even with all the open source
> libraries:) If this was covered at the last IIW (which I missed) let me
> know.
>
> Thanks,
> George
>
> Eric Sachs wrote:
>
>> All of the "volunteers" I suggested for the 7 OpenID sessions have agreed
>> to lead them, and looks like Allen can lead and 8th.  Most of the
>> "volunteers" will only be at IIW on Tuesday and Wednesday, so I suggest we
>> try to schedule the majority of the sessions on those two days.
>>
>> On Tue, May 12, 2009 at 4:27 PM, Allen Tom <atom at yahoo-inc.com <mailto:
>> atom at yahoo-inc.com>> wrote:
>>
>>    I'd like to give a Usability session where the OpenID UI Work
>>    Group can present the OpenID UI Extension, as well as an official
>>    kickoff for the OpenID UI Committee. I'll be able to contribute
>>    the results of a (very modest) study that Yahoo did recently on
>>    the effectiveness of a Popup UI, and we'll have some wireframes
>>    documenting RP and OP best practices.
>>
>>    Allen
>>
>>    Eric Sachs wrote:
>>
>>>    At the last IIW confernece, the OpenID community came up with a
>>>    suggested list of sessions ahead of time.  While we changed it a
>>>    bit during the IIW event, it still helped us coordinate an OpenID
>>>    "track" that led to a lot of important discussions.  In the hope
>>>    of doing something similar, I thought I would throw out an
>>>    initial list of 7 potential sessions (and potential leaders)
>>>    based on some of the discussions on the list.  I would love to
>>>    get feedback on whether people think these are the right
>>>    sessions, or have other ideas.  And for the "leaders" that I
>>>    volunteered, I'd like to see if they would really be willing to
>>>    lead some of these topics.
>>>
>>>    Title: Evolution of Discovery & OpenID
>>>    Leaders: "Dirk Balfanz" <balfanz at google.com
>>>    <mailto:balfanz at google.com>>, "Eran Hammer-Lahav"
>>>    <blade at yahoo-inc.com <mailto:blade at yahoo-inc.com>>
>>>    Topic: Have Eran give an update on the evolution of discovery
>>>    standards.  Then have Dirk Balfanz give a specific example of how
>>>    Google is using those standards to help RPs support scenarios
>>>    where an enterprise has outsourced their IDP to a
>>>    service-provider such as Google Apps.  Also discuss the reverse
>>>    where a website has outsourced their RP to a service-provider
>>>    such as Janrain's RPX.
>>>
>>>    Title: Best practices for very-secure RP/IDP interaction
>>>    Leader: "John Bradley" <jbradley at mac.com <mailto:jbradley at mac.com>>,
>>>    Topic: Describe some of the current suggested best practices for
>>>    increasing the security of RP/IDP interaction, and then try to
>>>    create a community document of best practices.  Look at NIST &
>>>    PCI compliance as example targets.
>>>
>>>    Title: How RPs can handle phishing of a user's IDP account
>>>    Leader: "Breno de Medeiros" <breno at google.com
>>>    <mailto:breno at google.com>>, "Luke Shepard" <lshepard at facebook.com
>>>    <mailto:lshepard at facebook.com>>
>>>    Topic: Many websites that are not RPs have mechanisms to detect
>>>    that a user might have been phished, and if so they try to help
>>>    the actual user recover their account just as by requiring that
>>>    the password on the account be changed.  Once a website becomes
>>>    an RP, its recovery mechanisms have to change.  Breno/Dirk will
>>>    discuss how to address this need using some OpenID extensions
>>>    that can allow the RP to detect things such as the last time the
>>>    user changed their password, or entered it on the computer, as
>>>    well as more advanced methods to enable the RP to redirect the
>>>    user to the IDP to automatically route the user into the change
>>>    password flow (or re-enter password, or require the user to
>>>    manually re-approve the identity assertion)
>>>
>>>    Title: Best practices for using CAPTCHAs, such as to meet
>>>    NIST/PCI type compliance
>>>    Leader: "Eric Sachs" <sachse at google.com <mailto:sachse at google.com>>
>>>    Topic: Some RPs require that IDPs comply with guidelines such as
>>>    NIST/PCI, and in particular the sections about reducing hackers
>>>    ability to do online attacks to guess a user's password.  Many
>>>    major consumer oriented websites protect against those types of
>>>    attacks using CAPTCHAs as well as temporary time-out mechanisms.
>>>  Eric will describe some of the current suggested best practices
>>>    for preventing these attacks, and then try to create a community
>>>    document of best practices.
>>>
>>>    Title: RPs who DONT want any PII (personally identifiable
>>>    information)
>>>    Leader: "John Bradley" <jbradley at mac.com
>>>    <mailto:jbradley at mac.com>>, "Dirk Balfanz" <balfanz at google.com
>>>    <mailto:balfanz at google.com>>
>>>    Topic: Some websites are especially privacy sensistive and would
>>>    like to avoid collecting any PII from user's, including global
>>>    IDs such as Email address, blog URLs, or OpenID URLs that are
>>>    sent to multiple RPs.  John will lead a discussion about
>>>    potential best practices for how an RP/IDP can interact without
>>>    exchanging PII, and then try to create a community document of
>>>    best practices.  Dirk will then lead a discussion about how an RP
>>>    can indicate what type of URL (or URLs) it wants such as these
>>>    non-PII URLs, or a blog/profile URL, or a global URL which won't
>>>    necessarily have any interesting information about the user.
>>>
>>>    Title: Invisible detection by RP of user's login state at IDPs
>>>    Leader: "Luke Shepard" <lshepard at facebook.com
>>>    <mailto:lshepard at facebook.com>>, "Brian Eaton" <beaton at google.com
>>>    <mailto:beaton at google.com>>,
>>>    Topic: The OpenID community still does not have a solid best
>>>    practice for how RPs can determine a user's IDP without the
>>>    usability problems of lots of buttons or a raw URL entry box.
>>>  Another possible option is for the RP to try to invisibly detect
>>>    whether the user is logged into an IDP, and then promote that IDP
>>>    option to the user.  Luke will discuss his ideas on how an RP
>>>    might do this with an IDP today.  Brian will discuss how we might
>>>    build upon that model to let the RP check the login state at a
>>>    few shared-domains that could return a list of IDPs where the
>>>    user is logged in.  For example, Google hosts many
>>>    enterprise/school's E-mail, and could potentially provide a way
>>>    for an RP to get a list of which such domain(s) a user is
>>>    currently logged into.
>>>
>>>    Title: Bronze/Silver certifications for OpenID IDPs
>>>    Leader: "John Bradley" <jbradley at mac.com <mailto:jbradley at mac.com>>
>>>    Topic: Some identity communities such as InCommon have defined
>>>    some optional mechanisms for IDPs to show they meet specific
>>>    requirements, especially around security.  For example, InCommon
>>>    has their Bronze/Silver certification as described at
>>>    http://www.incommonfederation.org/assurance.  How might we
>>>    package some of the OpenID communitie's best practices into some
>>>    levels like this, and if we did so, what form might certification
>>>    take against those levels?
>>>
>>>
>>>
>>>
>>>  ------------------------------------------------------------------------
>>>    _______________________________________________
>>>    general mailing list
>>>    general at openid.net <mailto:general at openid.net>
>>>    http://openid.net/mailman/listinfo/general
>>>
>>>
>>
>>
>> ------------------------------------------------------------------------
>>
>> _______________________________________________
>> general mailing list
>> general at openid.net
>> http://openid.net/mailman/listinfo/general
>>
>>
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openid.net/pipermail/openid-general/attachments/20090518/1764ddc9/attachment.htm>


More information about the general mailing list