"Editors" Conference Call

Dick Hardt dick at sxip.com
Wed Nov 1 19:53:48 UTC 2006


On 1-Nov-06, at 11:33 AM, John Kemp wrote:

> Hi Dick,

Hi John!

>
> It would be nice to see a clear definition of an OP in order to
> determine the exact differences between such an entity and an IdP,  
> but,
> in the absence of such, some questions:
>
> Dick Hardt wrote:
>> Thanks David! ;-)
>>
>> Patrick, as you point out, Identity Provider is a well understood
>> term in SAML and WS-*. Here is the definition from SAML 2.0 [1]
>>
>> Identity Provider: A kind of service provider that creates,
>> maintains, and manages
>> identity information for principals and provides principal
>> authentication to other service providers within a federation, such
>> as with web browser profiles.
>>
>> Per the definition, Identity Provider implies a federation or trust
>> relationship between the IdP and RP.
>
> And I guess there is no similar concept in OpenID? Like perhaps an RP
> adds a particular (I hate to use the word) "trusted" IdP to a  
> whitelist
> of IdPs from whom it accepts assertions? Or vice-versa?

Is it technically possible?  Yes. Just like it is technically  
possible for SAML to be user-centric. :-)

>
> Admittedly, such "federations" might not be as linked to static  
> business
> agreements perhaps as in a typical SAML deployment, but it seems they
> would be necessary unless you base "trust" on public key-based
> mechanisms, or decide that you'll accept assertions from
> "no-password.com" (to quote from a discussion on security at openid.net)
> and anyone else.

I have not had a chance to wade into that discussion.

> I suspect the latter case will be unlikely, if OpenID
> is to be successful.

And I do not. And that is the big driver why it should be OP instead  
of IdP.


>
>> Additionally, IdPs often provide
>> other assertions about the user.
>
> This is sometimes called "attribute exchange". In OpenID, is it  
> then not
> possible for an OP to exchange attributes related to a particular  
> OpenID
> with an RP? There seems to be an "attribute exchange" specification
> (http://openid.net/specs/openid-attribute-exchange-1_0-02.html)  
> where it
> says (for example, in section 2) "Fetch retrieves attribute  
> information
> from an Identity Provider, while store saves or updates attribute
> information on the Identity Provider.".

When I talk about assertions, I mean third party claims, not self  
asserted data.
The OP is not verifying the accuracy of any of the attributes in  
attribute exchange.

>
>>
>> In OpenID Authentication, there is no trust relationship requirement
>> between the IdP and RP., and the only thing the IdP asserts is a
>> binding between the user and an identifier (OpenID URL or i-name).
>
> And on what basis does the OP "assert" this binding to an RP? Doesn't
> the OP typically "authenticate" that binding, or does it simply  
> take the
> users identifier on blind faith, and assert away?

The OP authenticates the user (how the OP authenticates the user is  
out of scope of the spec).


>
>>
>> As people familiar with SAML / WS-* review the OpenID Authentication
>> specification, there has been some confusion on exactly what the IdP
>> does in OpenID. To make it clear that an IdP in OpenID is not the
>> same as typical deployments in SAML, we decided to call it the OpenID
>> Provider, which is more precise, and reduces ambiguity.
>
> I guess until we see this precise definition, we won't be able to see
> the precise differences.

How about:

	An OpenID Provider acts on behalf of the user in responding to  
OpenID Authentication requests from a Relying Party.

What more do we need in the spec then that?


>
> From what I can tell so far, it seems to me that the differences  
> between
> an OP and an IdP are not significant.

See above wrt. "trust".

-- Dick




More information about the specs mailing list