yes. Ill get back to it tomorrow, once the monday rush is over.

was the part of the site that does that protocol engine for openid the bit in java, .net or php?

I have the decoding library in all three platforms. I can simply send a php package, for example, or a jar... or a .dll

--------------------------------------------------
From: "David Corcoran" <[EMAIL PROTECTED]>
Sent: Monday, February 18, 2008 1:19 PM
To: <[EMAIL PROTECTED]>; "MUSCLE" <[email protected]>
Subject: Re: [Muscle] OpenID for PC/SC Lite / MuscleCard

Hi Peter,

Did you get my last mail ? I think we would be interested in doing this - I would like to learn more.

Thanks,
Dave


----------------------------------------------------------
TrustBearer Labs
 3201 Stellhorn Road 260-399-1648
 Fort Wayne, IN 46815

     TrustBearer Enabled OpenID at
        https://openid.trustbearer.com
----------------------------------------------------------



On Feb 17, 2008, at 2:40 AM, Peter Williams wrote:


what language/platform did you write it in? Hopefully, its Java, .NET or PHP.

If I paid your firm $1000 a month for 3 months, would you run an experimental, live OP service for us - with low volume usage?

I'd need a couple of changes, if the answer is yes: having received the request and before presenting the user with the per-RP page on whether or not to release certain personal data items, Id need the site to engage in an additional round of browser redirects/postbacks - use the SAML2 protocol to ping our attribute store rather than use your own. The redirect request is little more than a 302 URL including the openid of the user. The redirect response is just a POSTED AES-protected token in an IETF-disclosed format - one that requires adding and using its decoding/decrypting library to your site (obviously I give you this!). Rather than have you use a native SAML2 open source library, Id want this token used as it remotely binds to a SAML2 server whose endpoints are certified to ensure the OP has a complete set of *advanced* SAML2 "name management/ provisioning" features that I really need for the experiment - which the open source "websso-centric" tookits rarely implement.

Within openid Im promoting the idea of openid as a pure protocol gateway, rather than a complete solution. One of the protocol's shortfalls, compared to SAML design, is it lacks a bridging/proxying/ cascading model and associated technical security controls. By having openid front the saml2 websso model (exploiting SAML2's formal proxying controls) I'm essentially lobbying for the addition of these features to openid 3 - by showcasing the benefits. At each proxy, different authentication management policies can be imposed, creating a composition of authentication acts (viewing the proxy chain as a chain of authentication steps). At your site, you'd get to impose optionally the trustbearer scheme, based on testing for a CAC or PIV card, based on the result of negotiating with our upstream proxy.

In time terms, this will take about 1 to 2 day's programming, 1 days testing. Then we see where it goes. If your openid2 portocol support is pretty complete and highly interoperable, perhaps we just license your server after the trial is over! (We have a large community of muscle cards users, having made our own USB token that was a variant of the CAC)

Peter.




> Date: Fri, 15 Feb 2008 14:51:22 -0500
> From: [EMAIL PROTECTED]
> To: [email protected]
> Subject: Re: [Muscle] OpenID for PC/SC Lite / MuscleCard
>
> Peter Williams wrote:
> > is it openid1 or openid2?
> >
> > if its openid2, what is the "pape" value that a relying party can
> > request, to ensure that it's a "trustbearer" authentication
between
> > user/device and the OP?
> >
> > is trustbearer mechanism of user auth actually a. SSL client
cert auth,
> > using a cert on the device? b. 7816 authentication? c. ICC
proprietary
> > authentication (e.g. GlobalPlatform), or something else?
> >
> OpenID 1 and 2 capable
>
> We respond that its level 4 due to the hardware token involved +
policies demarking
> phishing protection, multi-factor & multi-factor physical.
>
> User auth is being performed using challenge-response based on the
certificate from the
> token. Pre-registration is necessary since effectively, only the
public key is used for
> our setup.
>
> --
> Thomas Harning @ TrustBearer Labs (http://www.trustbearer.com)
> Secure OpenID: https://openid.trustbearer.com/harningt
> 3201 Stellhorn Road 260-399-1656
> Fort Wayne, IN 46815
> _______________________________________________
> Muscle mailing list
> [email protected]
> http://lists.drizzle.com/mailman/listinfo/muscle


Shed those extra pounds with MSN and The Biggest Loser! Learn more._______________________________________________
Muscle mailing list
[email protected]
http://lists.drizzle.com/mailman/listinfo/muscle

_______________________________________________
Muscle mailing list
[email protected]
http://lists.drizzle.com/mailman/listinfo/muscle

_______________________________________________
Muscle mailing list
[email protected]
http://lists.drizzle.com/mailman/listinfo/muscle

Reply via email to