On 05/25/2010 06:09 PM, Allen Tom wrote:

This implies that both the OP and RP are both investing in Oauth
infrastructure, which they'd continue to be able to use in Connect. The only
real tricky issue is migration. The OpenID 2.0 identifier still needs to be
passed from the OP to the RP in Connect.  A potential solution would be to
pass the legacy OpenID 2.0 identifier(s) as an additional attribute in the
User Info JSON object.  This shouldn't be too big of a deal.


OAuth 2.0 is conceptually compatible with 1.0a but changes the wire protocol and introduces some new capabilities. I can imagine a relatively straightforward approach for migrating existing OAuth 1.0a infrastructure to a dual-stack 1.0a/2.0 implementation and then eventually a 2.0-only implementation.

OpenID Connect changes are a lot more pronounced:
* The thing I want the user to enter is no longer an OpenID identifier but rather a provider domain. * The thing that comes back is no longer a URL for a human-readable page but rather the URL for a machine-readable resource that may or may not link to a human-readable page. * None of the identifier data I already have for users will be valid in Connect, so I must implement yet another "migrate your account" flow in addition to the flow I already had to allow a user to attach an OpenID identifier to a username/password-based account.

If the resulting spec has an upgrade path built into it then I'm slightly less concerned, but it still feels a little weird to call it "OpenID/OAuth Hybrid" when the result is not conceptually compatible with OpenID and requires pretty significant changes to deployed infrastructure.

_______________________________________________
specs mailing list
[email protected]
http://lists.openid.net/mailman/listinfo/openid-specs

Reply via email to