There are a number of protocols where there are placeholders or places for user identity to appear. I'm most familiar with how this works in WebDAV though it certainly crops up in other areas. WebDAV then, as an example, has <href/> tags for containing URLs that refer to principals. For example, the holder of a lock could advertise their identity with a URL in such an <href/> tag, but if it were not a URL, we'd have to invent something new.

One of the exciting applications for something like DIX, in WebDAV, is the possibility to share with people across organizations properly. If I wanted to share my OSAF calendar with you, Phillip, but not share it publicly, how could I do that? Right now some WebDAV servers have a solution that would horrify security experts -- they have tickets such that I could ask the server for a ticket granting read access to the calendar, and the bearer of that ticket gets access. Then I send the ticket to you over email, attached to a URL to the calendar, and you use that to see my calendar. Obviously not very secure.

Instead, imagine that I could enter your federated identity URL into my calendar permissions configuration page, and grant read access to that identity. Then when I send you the URL to my calendar, or you browse to it, my server asks "who are you" and you provide the same identity URL. My server checks that with your identity provider and allows read access to the calendar. Much better than a publicly readable calendar, much better than tickets. Reasonably usable. And it might even work without any protocol changes to WebDAV ACL.

I am quite sure there are a lot of ways to simplify user interfaces while also supporting URL format. For example, a very simple Web signup form could look like this:

"If you have an account elsewhere that you can log in here, please enter:
        Username: ___lisa______
        Identity domain: ___osafoundation.org_____"

This might be too simple because it doesn't allow any substructure inside one domain but it's certainly a possibility. The code handling this form would follow whatever rules DIX specifies to put this together into a URL: e.g. lookup osafoundation.org's identity server in DNS and discover that it's "users.osafoundation.org", concatenate the user name as "users.osafoundation.org/lisa", prefix with a scheme to have "dix://users.osafoundation.org/lisa", and now you're ready to go with a URL.

lisa

On Mar 2, 2006, at 10:32 AM, Hallam-Baker, Phillip wrote:


The username passed is the persona-url
Authorization: Digest username="dix:/sxip.com/employees/dick",

Sure we could do that.

But why are folk so intent on using a URL when it is guaranteed to
result in a shitty user experience?

What additional information is there in the URL you give that could not
be returned as an attribute?


I agree that the canonical form of the identifier should be
dix:{something that includes dick, sxip.com} but why are you so intent
on exposing that to the user?

We didn't even use fully qualified URIs in the HTTP protocol until v1.1.
We don't expose URIs to the user in SMTP, NNTP or FTP.

URIs are a machine interface. They are NOT a USER interface.


        realm="[EMAIL PROTECTED]",
        nonce="dcd98b7102dd2f0e8b11d0f600bfb0c093",
        uri="/dir/index.html",
        qop=auth,
        nc=00000001,
        cnonce="0a4f113b",
        response="6629fae49393a05397450978507c4ef1"

The relying party locates a homesite-url for the persona-url
using the persona document.  (What if there is more than one
homesite?)

The relying party makes a call to the homesite-url with a
"dix:/message-type" of "dix:/verify-digest-request".  It also
passes parameters for realm, nonce, ha2, qop, nc, cnonce and response.

The homesite responds with a dix:/true or dix:/false as
outlined in section 5.10.3.4. of dmd0

I agree that using a separate result code from the HTTP result code may
well be a good thing. We have had some issues with registry services
going offline and the host server reporting '200 success' for all
queries as a result.

_______________________________________________
dix mailing list
[email protected]
https://www1.ietf.org/mailman/listinfo/dix


_______________________________________________
dix mailing list
[email protected]
https://www1.ietf.org/mailman/listinfo/dix

Reply via email to