Valery, what do you think of this? ------ Forwarded Message From: <[email protected]> Reply-To: higgins-dev <[email protected]> Date: Thu, 30 Apr 2009 11:55:54 -0700 To: higgins-dev <[email protected]> Subject: AW: [higgins-dev] Re: Re[2]: Password Cards
What do you think about this format below? If you decode the string W2h0dHA6Ly93d3cua3VwcGluZ2VyY29sZS5jb20saHR0cHM6Ly93d3cua3VwcGluZ2VyY29sZS5j b20sbnVsbF0= it yields: [http://www.kuppingercole.com,https://www.kuppingercole.com,null] which was generated by var text = "["+login.hostname+","+login.formSubmitURL+","+login.httpRealm+"]" The card is a managed card with a special issuer: urn:openinfocard:storage:component -Axel <RoamingInformationCard xmlns="http://schemas.xmlsoap.org/ws/2005/05/identity"> <InformationCardMetaData xml:lang="en"> <InformationCardReference> <CardId>urn:openinfocard:W2h0dHA6Ly93d3cua3VwcGluZ2VyY29sZS5jb20saHR0cHM6Ly9 3d3cua3VwcGluZ2VyY29sZS5jb20sbnVsbF0=</CardId> <CardVersion>1</CardVersion> </InformationCardReference> <CardName>https://www.kuppingercole.com</CardName> <Issuer>urn:openinfocard:storage:component</Issuer> <TimeIssued>2009-04-30T18:48:46.949Z</TimeIssued> <SupportedTokenTypeList> <TokenType xmlns="http://schemas.xmlsoap.org/ws/2005/02/trust">urn:openinfocard:tokenty pe:usernamepassword</TokenType> </SupportedTokenTypeList> <SupportedClaimTypeList> <SupportedClaimType Uri="http://schemas.openinfocard.org/ws/2009/03/identity/claims/username/urn :openinfocard:W2h0dHA6Ly93d3cua3VwcGluZ2VyY29sZS5jb20saHR0cHM6Ly93d3cua3VwcG luZ2VyY29sZS5jb20sbnVsbF0="> <DisplayTag>username</DisplayTag> <Description>username</Description> </SupportedClaimType> <SupportedClaimType Uri="http://schemas.openinfocard.org/ws/2009/03/identity/claims/password/urn :openinfocard:W2h0dHA6Ly93d3cua3VwcGluZ2VyY29sZS5jb20saHR0cHM6Ly93d3cua3VwcG luZ2VyY29sZS5jb20sbnVsbF0="> <DisplayTag>password</DisplayTag> <Description>password</Description> </SupportedClaimType> <SupportedClaimType Uri="http://schemas.openinfocard.org/ws/2009/03/identity/claims/usernamefiel d/urn:openinfocard:W2h0dHA6Ly93d3cua3VwcGluZ2VyY29sZS5jb20saHR0cHM6Ly93d3cua 3VwcGluZ2VyY29sZS5jb20sbnVsbF0="> <DisplayTag>usernameField</DisplayTag> <Description>usernameField</Description> </SupportedClaimType> <SupportedClaimType Uri="http://schemas.openinfocard.org/ws/2009/03/identity/claims/passwordfiel d/urn:openinfocard:W2h0dHA6Ly93d3cua3VwcGluZ2VyY29sZS5jb20saHR0cHM6Ly93d3cua 3VwcGluZ2VyY29sZS5jb20sbnVsbF0="> <DisplayTag>passwordField</DisplayTag> <Description>passwordField</Description> </SupportedClaimType> </SupportedClaimTypeList> <IsSelfIssued>false</IsSelfIssued> <HashSalt>fL59RqJZ5ZgVBPEjGx2N2mjaUqs=</HashSalt> <TimeLastUpdated>2009-04-30T18:48:46.949Z</TimeLastUpdated> <IssuerId/> <IssuerName>MeMyselfAndI</IssuerName> <BackgroundColor>16777215</BackgroundColor> </InformationCardMetaData> <InformationCardPrivateData> <MasterKey>X9hOswYlTQK5jdM4GJpEg8a43aQF3XVv5XTVCHA/jvCrJzMQawXbqswrBdEQPbZDn BlGyOjh7xgVHdv8Gqw5CQ==</MasterKey> <ClaimValueList> <ClaimValue Uri="http://schemas.openinfocard.org/ws/2009/03/identity/claims/password/urn :openinfocard:W2h0dHA6Ly93d3cua3VwcGluZ2VyY29sZS5jb20saHR0cHM6Ly93d3cua3VwcG luZ2VyY29sZS5jb20sbnVsbF0="> <Value>YXNkZg==</Value> </ClaimValue> <ClaimValue Uri="http://schemas.openinfocard.org/ws/2009/03/identity/claims/username/urn :openinfocard:W2h0dHA6Ly93d3cua3VwcGluZ2VyY29sZS5jb20saHR0cHM6Ly93d3cua3VwcG luZ2VyY29sZS5jb20sbnVsbF0="> <Value>c2RmYXM=</Value> </ClaimValue> <ClaimValue Uri="http://schemas.openinfocard.org/ws/2009/03/identity/claims/passwordfiel d/urn:openinfocard:W2h0dHA6Ly93d3cua3VwcGluZ2VyY29sZS5jb20saHR0cHM6Ly93d3cua 3VwcGluZ2VyY29sZS5jb20sbnVsbF0="> <Value>cGFzc3dvcmQ=</Value> </ClaimValue> <ClaimValue Uri="http://schemas.openinfocard.org/ws/2009/03/identity/claims/usernamefiel d/urn:openinfocard:W2h0dHA6Ly93d3cua3VwcGluZ2VyY29sZS5jb20saHR0cHM6Ly93d3cua 3VwcGluZ2VyY29sZS5jb20sbnVsbF0="> <Value>dXNlcm5hbWU=</Value> </ClaimValue> </ClaimValueList> </InformationCardPrivateData> </RoamingInformationCard> > > > > Von: [email protected] > [mailto:[email protected]] Im Auftrag von Paul Trevithick > Gesendet: Dienstag, 28. April 2009 17:44 > An: Valery Kokhan > Cc: higgins-dev > Betreff: [higgins-dev] Re: Re[2]: Password Cards > > > Hi Valery. See ##inline. > > On 4/28/09 11:17 AM, "Valery Kokhan" <[email protected]> wrote: > > >> Hi Paul, >> >> As far as I remember the main goals of making password cards fully >> compatible with generic p-cards were standardization and >> interoperability so we could use standard .crds format to store them >> and to pass across different selectors. >> >> ## as much as possible, yes. >> >> I've reviewed once again our design options. I agree that "Per role" >> option is the best but if we use proposed set of required claim types >> I do not see real way for this option to do both store all those >> claims in .crds format and make user name and password claims be >> indexed by three other claim types. In order to be able index UN & PW >> we need to store some kind of hash table in .crds but how could we do >> this? >> >> ## I¹d suggest that in the persistent file format the value of the username >> claim, for example, would be an XML-structured value that encodes the >> multiple, rp-site-dependent values of username. This is hinted at here [1] >> with mentioned of ³arrays² etc. >> >> ## If host_name + realm_name together can be used to identify the rp site >> (or app) then we¹d need to store as the value of the username claim a set of >> N {username, host_name, realm_name} triples in the XML. And we¹d do the same >> thing for the password claim value ---a set of N {password, host_name, >> realm_name) triples. >> >> ## If you design an XML syntax, please add it here [1] and we can all review >> it. >> >> ## [1] http://wiki.eclipse.org/Password_Cards#Architecture >> >> If we a going to move forward with "Per role" design option I'd >> suggest to use only two claim types for user name and password claim >> values while host name, form submit URL and http realm should be >> included/encoded in a query part of URL for both user name and >> password claim types. >> >> Thus, for any card for some particular role will contain two claim >> types for each particular site log-on: >> http://schemas.informationcard.net/@ics/username/2009-3?host_name=host_name&u >> rl=url&realm=realm >> http://schemas.informationcard.net/@ics/password/2009-3?host_name=host_name&u >> rl=url&realm=realm >> >> ## What you propose above as a way to pass the parameters is not >> unreasonable, and in fact had been my original thinking based on Axel >> Nennker¹s original suggestion to use ³?² parameters from last year. Folks in >> the IMI TC do NOT think that this ³?² is a good way forward as opposed to a >> much more comprehensive, general purpose solution that (as I understand it) >> involves passing full WS-SecurityPolicy expressions in the >> getDigitalIdentity() API call, as opposed to the limited subset that the >> <object> tag currently supports. However, this is all many moons away from >> being resolved. Since you need to do SOMETHING immediately, I¹d go ahead and >> use the ³?² approach and let¹s keep an eye on this as things evolve at the >> ICF and within the OASIS IMI TC. >> >> Of course if we move forward with this we will need to be able to >> manage claim types dynamically but from my point it is the only way. >> >> -- >> Thanks, >> >> Valery ------ End of Forwarded Message
ATT00001.c
Description: Binary data
_______________________________________________ higgins-dev mailing list [email protected] https://dev.eclipse.org/mailman/listinfo/higgins-dev
