[OpenID] identify RP when it gets OpenID URL
John Panzer
jpanzer at acm.org
Wed Oct 17 04:35:30 UTC 2007
Wouldn't User-Agent: be equivalent, and have prior art (feed readers
such as Bloglines identify themselves via User-Agent)?
Manger, James H wrote:
>
> It can be useful to know who the Relying Party (RP) is during the
> discovery phase. That is, the RP should state their identify when they
> are looking up a user’s OpenID URL (Claimed Identifier).
>
>
>
> *Use case*: Alice wants to use different OPs for different RPs, while
> keeping the same URL (eg http://alice.example.net/). For instance,
> when logging into a service hosting her backups she wants to use an OP
> that requires a one-time password from a hardware token for each
> access. However, when leaving comments on blogs Alice wants to
> authenticate using an OP that only requires a password and uses a
> persistent cookie so she only has to log in once a day.
>
>
>
> *Problem*: Only one OP can be specified with a <link
> rel="openid2.provider"…/> element or in a Yadis document.
>
> [A Yadis document may be able to list many OPs, but I don’t think
> there is any mechanism for the RP to pick the right one.]
>
>
>
> *Solution*: The RP could include a From HTTP header when performing
> discovery.
>
> Instead of serving a static HTML page (or Yadis document) at
> http://alice.example.net/, the page could be dynamically generated
> based on the value of the From header.
>
>
>
> Suggested text for the authentication spec (draft 12):
>
> Add the following paragraph at the end of section 7.3 Discovery:
>
> “The Relying Party MUST include a From HTTP header field in each HTTP
> request made during discovery. The From field holds an email address
> for the RP (eg From: openid at example.net <mailto:openid at example.net>)
> [RFC2616]. This enables the discovered information to vary based on
> the RP. The From field is not authenticated so it is not appropriate
> to use for access control.”
>
>
>
> *Other solutions*:
>
> The source IP address of the discovery request will often identify the
> RP, but this would be an unreliable mechanism due to proxies,
> clusters, load balancing, and changes at the RP.
>
> Separate user-supplied identifiers could be used, but that
> unnecessarily complicates the system for users.
>
> OPs can offer different authentication mechanisms based on the
> openid.return_to or openid.realm parameter in an authentication
> request. However, the user has less flexibility when they have to
> relying on OPs.
>
>
>
> James Manger
>
> ------------------------------------------------------------------------
>
> _______________________________________________
> specs mailing list
> specs at openid.net
> http://openid.net/mailman/listinfo/specs
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openid.net/pipermail/openid-specs/attachments/20071016/41f30114/attachment-0002.htm>
More information about the specs
mailing list