If it is the same RP and the RP authenticates itself, then the old OP can provide the migration information.

To make the new OP capable of making an authoritative assertion is much more tricky but it could be done. One way of doing it is for the old OP to sign the old user identifier / new op identifier pair by its private key and new op including it in the assertion so that the receiving RP can verify that the migration info is authoritative. This would allow the old OP shutting down almost immediately as well.

=nat @ Tokyo via iPhone

On 2010/05/30, at 9:32, John Bradley <[email protected]> wrote:

To do that with openID 2.0 we would need to create a new attribute to communicate the old claimed_id.

There is no reason that would't work.

Two things are required:

1 a old claimed_id attribute. (In connect the profile page could be used for that, but it might be better to be more specific) 2 a discovery document at the old claimed_id that has a service or link pointing to the new claimed_id.

That won't work for some services using PPID like identifiers, however the solution for them is to not change the claimed_id if migrating to Connect.

John B.
On 2010-05-29, at 4:48 AM, Nat Sakimura wrote:

So, who is going to draft the spec?

As I have stated earlier, I would like to generalize it a little bit more than
just openid2/connect.

This would be very useful to solve "the openid2 provider shutting down
problem" as well.

=nat

On Sat, May 29, 2010 at 2:51 PM, David Recordon <[email protected]> wrote:
+1 Allen/John

On Fri, May 28, 2010 at 11:35 AM, Allen Tom <[email protected]> wrote:

Hi Nat -

The high level strawman proposal that John Bradley and I briefly discussed
was:

1) return the user's OpenID 2.0 identifier as an attribute in the Connect
assertion (along with the new Connect ID)

2) Update the OpenID 2.0 discovery document for the identifier to list the to OpenID Connect endpoint as a "connect/openid2" migration service.
Connect
RPs are supposed to perform OpenID 2.0 discovery on the OpenID 2.0
identifier to make sure that the Connect OP is also authorative for the
OpenID 2.0 identifier

Implementing #1 and #2 will allow an existing OpenID 2.0 RP that already
has
OpenID 2.0 users to migrate their existing users to Connect without
requiring users to auth twice during the migration process.

Does anyone see a problem with this approach?

Allen


On 5/27/10 7:06 PM, "Nat Sakimura" <[email protected]> wrote:



My suggestion here is to include both the old and new identifier in a
signed assertion,
with a sunset set for the old identifier. It could be either OpenID
assertion or XRDS.
If it is in the OpenID assertion, it is done.

If it got the old identifier as an attribute of the identity that the
new identifier points to,
RP can then do the Discovery on the old known
identifier and get back the XRDS which includes both the old and new
identifier.

What do you think?

_______________________________________________
general mailing list
[email protected]
http://lists.openid.net/mailman/listinfo/openid-general





--
Nat Sakimura (=nat)
http://www.sakimura.org/en/
http://twitter.com/_nat_en
_______________________________________________
general mailing list
[email protected]
http://lists.openid.net/mailman/listinfo/openid-general

_______________________________________________
specs mailing list
[email protected]
http://lists.openid.net/mailman/listinfo/openid-specs

Reply via email to