In Yahoo's case, we wanted to be able to have multiple domains share a
central OpenID Provider service. For instance, flickr.com and yahoo.com both
host OpenIDs that all use the Yahoo OP.

I'm not sure what the use case that you're trying to support in your
proposal. Are you suggesting a way for a user to link two OpenIDs from two
different providers?

To maximize the effect on security they (both OpenID's/URI's) would have 2 different providers, yes, but it would also be possible for them both to (as in your case) specify Yahoo's OP as authorized to speak for them. (If you have the same OP speaking for more than one OpenID in the same login, would it then be possible for it to specify multiple ID's it was providing a positive assertion for, in the same round trip?)

The part I'm seeing is a way for users to require that RP's use their combined OpenID (combining multiple URI's across different domains) as more than backups for account recovery; if either Flickr (vouched for by YahooOP) or Gmail (vouched for by GoogleOP) refuses to authenticate the user as owning that end of an account held by multiple OpenID's, the RP should deny access to the user instead of permitting them to claim that Flickr had gone down or Gmail had become evil. (This might be useful only for major hosts, where users can rely on the URI providers *not* going down without a lot of warning.)

It should still be possible for Yahoo/Google to make individual assertions about Flickr/Gmail, but if the RP (or user's option, for OP-originating logins) specified that the account needed another OpenID (and couldn't work by itself), either YahooOP or GoogleOP could respond with the appropriate document *and* both OP's signature of it.

. . . hmm. Once such a document were provided by, say, Google, there would not be any need to ask Yahoo for a copy of the same; Yahoo's digital signature, presumably, would provide adequate assurance (and save it bandwidth). With a small enough text size, it might be possible to standardize the repetitive areas and send the rest over a user's redirect, letting the RP send the seed of a document and requiring only public keys (from Yahoo and Google) if the cache had expired and/or a simple "yes/no" to confirm that the OP was still actively providing such a service.

Best-case scenario, that might also make it possible to minimize direct correlation in the data exchange between RP's and OP's, since (once cached) the document might be entirely recreatable by any party (Yahoo, Google, RP, and only the RP should really *want* it - neither of the OP's need to cache any of the data once they've seen a user log in with the other OP, assuming their private key is secure), and no longer needs to have sensitive components sent with every login. It might even look like a typical login, no hint of MultiAuth involved, and only the RP knows that it is collecting assertions for a set of OpenID's rather than a singular OpenID.

-Shade
_______________________________________________
specs mailing list
[email protected]
http://lists.openid.net/mailman/listinfo/openid-specs

Reply via email to