Building identity on top of OAuth 2.0?

John Kemp john at jkemp.net
Thu May 20 13:32:02 UTC 2010


Hi Ben,

On May 20, 2010, at 5:51 AM, Ben Laurie wrote:

> 
> 
> On 19 May 2010 15:46, Chris Messina <chris.messina at gmail.com> wrote:
> Can you please expand on and be more specific about what you mean by this:
> 
> " If, OTOH, you are interested in actually protecting peoples' identities, then OAuth 2.0 doesn't seem like a great starting point."
> 
> What would be a better starting point?
> 
> Something that has appropriate security properties.
>  
> And what does it mean to "protect peoples' identities" in your thinking?
> 
> That's a big question which I will not attempt to fully address in an email, but one obvious requirement is that no-one but the owner of the identity should be able to assert it.

Who is the "owner" of my identity? What _is_ my identity?

> This is already relaxed by federation since the IdP has to assert the identity,

The IdP (in most federated systems I've ever seen) is making an assertion that:

i) It has verified, in some way, the identity of someone.
ii) That this same "someone" has an account with the IdP
and optionally, iii) That this same "someone" has recently supplied a shared secret indicating that he or she is "logged in" to his or her account at the IdP.

None of those things is an assertion about "identity", per se. 

> not the owner (unless the owner is the IdP, of course, my preferred solution if federation is insisted on),

The IdP owns the account, certainly.

> but relaxing it further by introducing protocols that do not strongly bind the assertion to the IdP is not a good idea.

I certainly agree with that.

Cheers,

- johnk

>  
> 
> Thanks,
> 
> Chris 
> 
> Sent from my iPhone 2G
> 
> On May 19, 2010, at 2:25 AM, Ben Laurie <benl at google.com> wrote:
> 
>> 
>> 
>> On 16 May 2010 00:57, David Recordon <recordond at gmail.com> wrote:
>> The past few months I've had a bunch of one on one conversations with a lot of different people – including many of folks on this list – about ways to build a future version of OpenID on top of OAuth 2.0. Back in March when I wrote a draft of OAuth 2.0 I mentioned it as one of my future goals as well (http://daveman692.livejournal.com/349384.html).
>> 
>> Basically moving us to where there's a true technology stack of TCP/IP -> HTTP -> SSL -> OAuth 2.0 -> OpenID -> (all sorts of awesome APIs). Not just modernizing the technology, but also focusing on solving a few of the key "product" issues we hear time and time again.
>> 
>> I took the past few days to write down a lot of these ideas and glue them together. Talked with Chris Messina who thought it was an interesting idea and decided to dub it "OpenID Connect" (see http://factoryjoe.com/blog/2010/01/04/openid-connect/). And thanks to Eran Hammer-Lahav and Joseph Smarr for some help writing bits of it!
>> 
>> So, a modest proposal that I hope gets the conversation going again. http://openidconnect.com/
>> 
>> If the goal is to get something as weak as possible without it instantly collapsing around your ears, then this sounds like a great plan.
>> 
>> If, OTOH, you are interested in actually protecting peoples' identities, then OAuth 2.0 doesn't seem like a great starting point.
>>  
>> 
>> --David
>> 
>> _______________________________________________
>> specs mailing list
>> specs at lists.openid.net
>> http://lists.openid.net/mailman/listinfo/openid-specs
>> 
>> 
>> _______________________________________________
>> specs mailing list
>> specs at lists.openid.net
>> http://lists.openid.net/mailman/listinfo/openid-specs
> 
> _______________________________________________
> specs mailing list
> specs at lists.openid.net
> http://lists.openid.net/mailman/listinfo/openid-specs



More information about the specs mailing list