Valery, what do you think of this?

------ Forwarded Message
From: <[email protected]>
Reply-To: higgins-dev <[email protected]>
Date: Thu, 30 Apr 2009 11:55:54 -0700
To: higgins-dev <[email protected]>
Subject: AW: [higgins-dev] Re: Re[2]: Password Cards

What do you think about this format below?
If you decode the string
W2h0dHA6Ly93d3cua3VwcGluZ2VyY29sZS5jb20saHR0cHM6Ly93d3cua3VwcGluZ2VyY29sZS5j
b20sbnVsbF0= it yields:
[http://www.kuppingercole.com,https://www.kuppingercole.com,null]
which was generated by
var text = 
"["+login.hostname+","+login.formSubmitURL+","+login.httpRealm+"]"

The card is a managed card with a special issuer:
urn:openinfocard:storage:component
 
-Axel 
 
<RoamingInformationCard
xmlns="http://schemas.xmlsoap.org/ws/2005/05/identity";>
  <InformationCardMetaData xml:lang="en">
    <InformationCardReference>
      
<CardId>urn:openinfocard:W2h0dHA6Ly93d3cua3VwcGluZ2VyY29sZS5jb20saHR0cHM6Ly9
3d3cua3VwcGluZ2VyY29sZS5jb20sbnVsbF0=</CardId>
      <CardVersion>1</CardVersion>
    </InformationCardReference>
    <CardName>https://www.kuppingercole.com</CardName>
    <Issuer>urn:openinfocard:storage:component</Issuer>
    <TimeIssued>2009-04-30T18:48:46.949Z</TimeIssued>
    <SupportedTokenTypeList>
      <TokenType 
xmlns="http://schemas.xmlsoap.org/ws/2005/02/trust";>urn:openinfocard:tokenty
pe:usernamepassword</TokenType>
    </SupportedTokenTypeList>
    <SupportedClaimTypeList>
      <SupportedClaimType
Uri="http://schemas.openinfocard.org/ws/2009/03/identity/claims/username/urn
:openinfocard:W2h0dHA6Ly93d3cua3VwcGluZ2VyY29sZS5jb20saHR0cHM6Ly93d3cua3VwcG
luZ2VyY29sZS5jb20sbnVsbF0=">
        <DisplayTag>username</DisplayTag>
        <Description>username</Description>
      </SupportedClaimType>
      <SupportedClaimType
Uri="http://schemas.openinfocard.org/ws/2009/03/identity/claims/password/urn
:openinfocard:W2h0dHA6Ly93d3cua3VwcGluZ2VyY29sZS5jb20saHR0cHM6Ly93d3cua3VwcG
luZ2VyY29sZS5jb20sbnVsbF0=">
        <DisplayTag>password</DisplayTag>
        <Description>password</Description>
      </SupportedClaimType>
      <SupportedClaimType
Uri="http://schemas.openinfocard.org/ws/2009/03/identity/claims/usernamefiel
d/urn:openinfocard:W2h0dHA6Ly93d3cua3VwcGluZ2VyY29sZS5jb20saHR0cHM6Ly93d3cua
3VwcGluZ2VyY29sZS5jb20sbnVsbF0=">
        <DisplayTag>usernameField</DisplayTag>
        <Description>usernameField</Description>
      </SupportedClaimType>
      <SupportedClaimType
Uri="http://schemas.openinfocard.org/ws/2009/03/identity/claims/passwordfiel
d/urn:openinfocard:W2h0dHA6Ly93d3cua3VwcGluZ2VyY29sZS5jb20saHR0cHM6Ly93d3cua
3VwcGluZ2VyY29sZS5jb20sbnVsbF0=">
        <DisplayTag>passwordField</DisplayTag>
        <Description>passwordField</Description>
      </SupportedClaimType>
    </SupportedClaimTypeList>
    <IsSelfIssued>false</IsSelfIssued>
    <HashSalt>fL59RqJZ5ZgVBPEjGx2N2mjaUqs=</HashSalt>
    <TimeLastUpdated>2009-04-30T18:48:46.949Z</TimeLastUpdated>
    <IssuerId/>
    <IssuerName>MeMyselfAndI</IssuerName>
    <BackgroundColor>16777215</BackgroundColor>
  </InformationCardMetaData>
  <InformationCardPrivateData>
    
<MasterKey>X9hOswYlTQK5jdM4GJpEg8a43aQF3XVv5XTVCHA/jvCrJzMQawXbqswrBdEQPbZDn
BlGyOjh7xgVHdv8Gqw5CQ==</MasterKey>
    <ClaimValueList>
      <ClaimValue 
Uri="http://schemas.openinfocard.org/ws/2009/03/identity/claims/password/urn
:openinfocard:W2h0dHA6Ly93d3cua3VwcGluZ2VyY29sZS5jb20saHR0cHM6Ly93d3cua3VwcG
luZ2VyY29sZS5jb20sbnVsbF0=">
        <Value>YXNkZg==</Value>
      </ClaimValue>
      <ClaimValue 
Uri="http://schemas.openinfocard.org/ws/2009/03/identity/claims/username/urn
:openinfocard:W2h0dHA6Ly93d3cua3VwcGluZ2VyY29sZS5jb20saHR0cHM6Ly93d3cua3VwcG
luZ2VyY29sZS5jb20sbnVsbF0=">
        <Value>c2RmYXM=</Value>
      </ClaimValue>
      <ClaimValue 
Uri="http://schemas.openinfocard.org/ws/2009/03/identity/claims/passwordfiel
d/urn:openinfocard:W2h0dHA6Ly93d3cua3VwcGluZ2VyY29sZS5jb20saHR0cHM6Ly93d3cua
3VwcGluZ2VyY29sZS5jb20sbnVsbF0=">
        <Value>cGFzc3dvcmQ=</Value>
      </ClaimValue>
      <ClaimValue 
Uri="http://schemas.openinfocard.org/ws/2009/03/identity/claims/usernamefiel
d/urn:openinfocard:W2h0dHA6Ly93d3cua3VwcGluZ2VyY29sZS5jb20saHR0cHM6Ly93d3cua
3VwcGluZ2VyY29sZS5jb20sbnVsbF0=">
        <Value>dXNlcm5hbWU=</Value>
      </ClaimValue>
    </ClaimValueList>
  </InformationCardPrivateData>
</RoamingInformationCard>

>  
>  
> 
>  Von: [email protected]
> [mailto:[email protected]] Im Auftrag von Paul  Trevithick
> Gesendet: Dienstag, 28. April 2009 17:44
> An:  Valery Kokhan
> Cc: higgins-dev
> Betreff: [higgins-dev] Re:  Re[2]: Password Cards
> 
>  
> Hi Valery.  See ##inline.
> 
> On 4/28/09 11:17 AM, "Valery Kokhan" <[email protected]>  wrote:
> 
>  
>> Hi  Paul,
>> 
>> As far as I remember the main goals of making password cards  fully
>> compatible with generic p-cards were standardization  and
>> interoperability so we could use standard .crds format to store  them
>> and to pass across different selectors.
>> 
>> ## as much as  possible, yes.
>> 
>> I've reviewed once again our design options. I agree  that "Per role"
>> option is the best but if we use proposed set of required  claim types
>> I do not see real way for this option to do both store all  those
>> claims in .crds format and make user name and password claims  be
>> indexed by three other claim types. In order to be able index UN &  PW
>> we need to store some kind of hash table in .crds but how could we  do
>> this?
>> 
>> ## I¹d suggest that in the persistent file format the  value of the username
>> claim, for example, would be an XML-structured value  that encodes the
>> multiple, rp-site-dependent values of username. This is  hinted at here [1]
>> with mentioned of ³arrays² etc.
>> 
>> ## If host_name +  realm_name together can be used to identify the rp site
>> (or app) then we¹d  need to store as the value of the username claim a set of
>> N {username,  host_name, realm_name} triples in the XML. And we¹d do the same
>> thing for  the password claim value ---a set of N {password, host_name,
>> realm_name)  triples.
>> 
>> ## If you design an XML syntax, please add it here [1] and  we can all review
>> it.
>> 
>> ## [1] http://wiki.eclipse.org/Password_Cards#Architecture
>> 
>> If  we a going to move forward with "Per role" design option I'd
>> suggest to  use only two claim types for user name and password claim
>> values while  host name, form submit URL and http realm should be
>> included/encoded in a  query part of URL for both user name and
>> password claim  types.
>> 
>> Thus, for any card for some particular role will contain two  claim
>> types for each particular site log-on:
>> http://schemas.informationcard.net/@ics/username/2009-3?host_name=host_name&u
>> rl=url&realm=realm
>> http://schemas.informationcard.net/@ics/password/2009-3?host_name=host_name&u
>> rl=url&realm=realm
>> 
>> ##  What you propose above as a way to pass the parameters is not
>> unreasonable,  and in fact had been my original thinking based on Axel
>> Nennker¹s original  suggestion to use ³?² parameters from last year. Folks in
>> the IMI TC do NOT  think that this ³?² is a good way forward as opposed to a
>> much more  comprehensive, general purpose solution that (as I understand it)
>> involves  passing full WS-SecurityPolicy expressions in the
>> getDigitalIdentity() API  call, as opposed to the limited subset that the
>> <object> tag currently  supports. However, this is all many moons away from
>> being resolved. Since  you need to do SOMETHING immediately, I¹d go ahead and
>> use the ³?² approach  and let¹s keep an eye on this as things evolve at the
>> ICF and within the  OASIS IMI TC.
>> 
>> Of course if we move forward with this we will need to  be able to
>> manage claim types dynamically but from my point it is the  only way.
>> 
>> --
>> Thanks,
>> 
>> Valery


------ End of Forwarded Message

Attachment: ATT00001.c
Description: Binary data

_______________________________________________
higgins-dev mailing list
[email protected]
https://dev.eclipse.org/mailman/listinfo/higgins-dev

Reply via email to