OpenID feature bugs

Emmanuel MEIER emmanuel.meier at thalesgroup.com
Tue Nov 10 14:21:03 UTC 2009


Hello,

I worked on OpenID within QualiPSo project last year in spring.
But I did not used it as a simple website.
I used it within a servlet as an OpenID consumer... Below my explanations :

Considering OpenID philosophy, an OpenID client/consumer should be able 
to use an existing server avoiding the problem of installing your own.
Actually everyone should be able to authenticate itself using any 
existing OpenID client/consumer against any OpenID server.
But to allow communication between the consumer and the User-Agent, the 
OpenID specification use a negotiated secret.
This shared secret has to be encrypted (Diffie-Hellman-negotiated 
secret). It's only used in the associate mode.
But some OpenID server does not support the same version of the 
encryption algorithm.
It was a major blocking issue as an OpenID client would be unable to 
authenticate against some OpenID server.
Each OpenID server actually provide an openID client (consumer) that 
would accept the communication mode of its server.
For example, a consumer of “joid” (Java Open Id) did not run with 
clamshell (as OpenID provider).

In addition to this, when the user is not already authenticated, the 
response of the OpenID provider is not normalized .
It consist of a HTML page where a XML (machine readable) response would 
be appreciated.
As the user could use any openID server, it is impossible to handle the 
many possibilities.
Furthermore, an automated system using XML communication and OpenID to 
authenticate users transparently
with no user interaction is out of question (technical web service 
providing for example).

As a result, I submit the following request for features:
- standardisation of the version of the encryption algorythm for the 
negotiated secret;
- the possibility to have a normalized XML response for unauthenticated 
users.

Regards,
Emmanuel Meier.


More information about the user-experience mailing list