Sorry for the confusion. The conversation thread out discussing why the GSA didn't certify openID for LoA 2.

Certainly in other trust frameworks there can be other rules.

My point was that we need some other trust framework if you want to achieve other goals.

Also things in the GSA profiles about signing messages with certificates that chin to the US Federal trust bridge probably make no sense outside of the GSA use case.

I agree that we need trust profiles. I am just cautious about people thinking that the GSA ones are appropriate outside of there context.

People inside and outside government place almost magic significance in the LoA numbers.

They specify some things and not others it is dangerous to read too much into them.

John B.


On 19-Aug-09, at 12:44 PM, Nat Sakimura wrote:

John,

I am not only talking about US LoAs.
NIST SP800-63 LoAs are good for their purpose, but we need to retool or create something new for other purposes.

The previous mail was referring to the necessity of some kind of trust on the attributes for a wider adoption of OpenID and it has nothing to do with SP800-63 LoAs.

For "the ability to contact customers when needed", something like verified email or even better, permission to resolve/discover the then current email address would be good. Of course, then it is up to the RP to believe it or not. If there is some kind of assurance program going on for this service, then it would help ease "RP's trust" problem.

=nat


On Fri, Aug 14, 2009 at 10:27 AM, John Bradley <[email protected] > wrote:
Nat,

The LoA 2 profile doesn't say anything about the validity or vetting of the attributes.

It only applies to identity.   It is strange and perhaps broken.

There are some GSA sponsored workshops in DC Sep 28-29 to discuss some of those issues.

Many people assume that Identity proofing has something to do with attributes.

Other profiles can deal with it some other way, but the GSA profile places no requirement on the IdP to verify an email.

Your argument is about verified email may relate to some other profile not GSA LoA 2.

Many people including government ones make the mistake of reading more into the LoA than is defined in SP800-63.

John B.

On 13-Aug-09, at 3:17 PM, Nat Sakimura wrote:

I think we need to clarify what makes it easier for RP adoption.

For that, we need to categorize the RPs and find out their pain points. Assurance or "Trust" is often one of the pain point in addition to UI. For example, what we have been hearing in Japan is that if the RP solely relies on OpenID, they fear that they loose the way to get in touch of the users when they need to, such as recalling their product. So, they tend to put their own flow for address validation etc., which clutters UI, which is a recipe for failure. Higher assurance for the contact address in this case will streamline the UI and improve the success rate, thereby assisting the RP adoption.

Also, I would like to point out that spec being a little more complex does not mean that it is going to be hard for deployers to deploy. Most of the complexity will be taken care of by the libraries, and often, more functionality on the spec and library side would make the life easier for the deployers.

=nat



--
Nat Sakimura (=nat)
http://www.sakimura.org/en/

_______________________________________________
specs mailing list
[email protected]
http://lists.openid.net/mailman/listinfo/openid-specs

Reply via email to