Users on Public Computers
Johannes Ernst
jernst+openid.net at netmesh.us
Tue Nov 7 02:04:44 UTC 2006
I continue to believe that we need single-sign-out functionality, in
particular once OpenID moves up the stack for higher-value transactions.
Some people have made the case that that is undesirable and/or
impossible; I beg to differ.
Having automatic authentication against the IdP is quite similar to
not having a password on the identity at all, in that it reduces the
confidence that we know the real-world identity of the entity/user at
the other end. In my view, there's nothing wrong with that, but we do
need to be able to convey that to relying parties in a way that
cannot be easily attacked.
On Nov 6, 2006, at 16:41, Joshua Viney wrote:
> One question re: User Experience and single-sign-on comes to mind:
>
> How do we treat users who are accessing their IdP and Relying
> Parties via public computers?
>
> Use Case:
> Good User at public library wants to leave a comment on Blog X
> Blog X requires the person to authenticate via OpenID
> Good User enters their OpenID and successfully authenticates via
> email and password (or whatever) (and authorizes the RP ('realm' in
> 2.0) if necessary) at their IdP
> Good User is redirected to Blog X signed in
> Good User leaves comment
> Good User signs out of Blog X (if sign out is even an option)
> Good User then leaves the public library and goes shopping
> Evil User jumps on computer and proceeds to leave comments at any
> number of OpenID enabled blogs using Good User's OpenID (he saw it
> while looking over Good User's shoulder, or he checks any sites
> that Good User did NOT sign out of that might display his OpenID)
> Evil User, uses Good User's signed in IdP session to sign into any
> number of sites, etc
>
> Outcome: Good User's reputation is ruined and his/her OpenID is
> banned from a whole list of Relying Parties. Good User then blames
> their IdP, the Relying Parties and OpenID as a technology and tells
> everyone he/she knows not to use it blogs about it and initiates a
> press release.
>
> It may be easy to pass this off as an implementation specific issue
> or as "user error", but this use case is somewhat likely for 2
> reasons:
>
> 1. A user's OpenID URI is not necessarily a private thing
> (obscurity is not security anyway)
> 2. Users will be at least 1 site removed from their IdP while
> accessing a Relying Party, and no one is use to signing out twice
> 3. It is very very likely that IdP's will use some type of
> "remember me" functionality
>
> One solution to consider would be a global sign-out feature on
> relying party sites that signs users out of their IdP as well.
> Another solution would be to make very specific recommendations
> about messaging users who may be using public computers.
>
>
>
> Josh Viney
> http://www.eastmedia.com -- EastMedia
> http://identity.eastmedia.com -- OpenID, Identity 2.0
>
>
>
>
> _______________________________________________
> user-experience mailing list
> user-experience at openid.net
> http://openid.net/mailman/listinfo/user-experience
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openid.net/pipermail/openid-user-experience/attachments/20061106/590ebad1/attachment-0002.htm>
More information about the user-experience
mailing list