[security] OpenID Security Best Practices Doc
Allen Tom
atom at yahoo-inc.com
Tue Jun 9 05:13:05 UTC 2009
SitG Admin wrote:
> You have to assume that the session *will* be compromised, then, and
> prepare accordingly.
Arguably, the user's session at their OP would be more resistant to
being stolen than the RP's session, so perhaps the RP should frequently
call checkid_immedidate to verify that the user is still signed into
their OP. This would require the attacker to steal the OP's session.
I believe that Facebook Connect takes the very extreme approach with
requring Connect RPs to do the equivalent of checkid_immediate on every
page view. This also has the nice benefit of enforcing single sign out
across all RPs when the user signs out of Facebook. Not sure if this is
the solution that OpenID should go with, however, it's certainly
interesting.
Allen
More information about the security
mailing list