RE: IDMML (was RE: Using email address as OpenID identifier)

2008-04-02 Thread Drummond Reed
> >> George Fletcher wrote:
> >>
> >> I think relying party sites that support OpenID could do more to make
> it
> >> clear on their home pages that they support OpenID (as often it's
> hidden
> >> behind another click). This could be as simple as some  tags that
> >> advertise support for OpenID. Maybe a  to the XRDS doc describing
> >> the services of the site. Then the identity agent can discover the
> >> relying party OpenID return_to endpoint and log the user in directly.
> >> Can be used to solve a phishing problem and makes the experience easy
> >> for the user.
> >>
> >> Some related thoughts 
> >>http://practicalid.blogspot.com/2007/06/clients-to-rescue.html
> >>
> >> http://practicalid.blogspot.com/2007/06/passive-identity-meta-system-
> >> markup.html
> >>
> > Drummond wrote:
> > George, I read your two posts with great interest...and then noticed
> that
> > they were last summer!
> >
> > You are a man ahead of your time.
> >
> > Where has discussion of your "IDMML" gone since your posts?
> >
> George wrote:
> Unfortunately, not as far as I'd like :(  I've not been able to get back
> to the ideas and take them farther. With the other things that have
> happened in the last 6 months there are needed revisions. Maybe this
> could be a discussion at IIW (if there is enough interest)?
> 
> At the time there was less consensus around XRDS as a service
> "description/meta-data" markup. With that changing, the time is better
> to move this forward. I suspect there are significant synergies with
> what Peter hinted at in the work with XRDS, IDP Discovery, and SAML. It
> would be great if identity agents could be the glue that binds the
> different identity systems together for the user (until we on the
> technology side get closer to real convergence:).

George, I agree that several things have evolved which could make an IDMML
practical now. Seems like a very good topic for IIW. I just put it on the
list of proposed sessions:

http://iiw.idcommons.net/index.php/Proposed_Topics_2008a 

=Drummond 

___
specs mailing list
specs@openid.net
http://openid.net/mailman/listinfo/specs


RE: IDMML (was RE: Using email address as OpenID identifier)

2008-04-02 Thread Drummond Reed
Chris, I remember that well, and I agree that it makes a lot of sense. I
think when this is combined with George's concept of the other ways in which
a local identity agent can assist the use, then IDMML really starts to gain
some legs.

See also my reply to George.

=Drummond 

> -Original Message-
> From: Chris Drake [mailto:[EMAIL PROTECTED]
> Sent: Wednesday, April 02, 2008 1:30 PM
> To: Drummond Reed
> Cc: 'George Fletcher'; 'Dick Hardt'; specs@openid.net
> Subject: Re: IDMML (was RE: Using email address as OpenID identifier)
> 
> Hi Drummond,
> 
> I pushed hard for RP identification for 2 or 3 months back around
> October 2006.  If anyone wants to go back through the archives,
> there's a pile of other important reasons to have some way that an IdP
> and/or browser agent can identify an OpenID-enabled site.  The antique
> thread below lists a few.  My proposal too was a  tag.
> 
> Kind Regards,
> Chris Drake
> 
> 
> Tuesday, November 7, 2006, 12:51:15 I, you wrote:
> 
> CD> Hi Johannes,
> 
> CD> I proposed a solution to the "single sign out" problem a month or two
> CD> ago.
> 
> CD> In fact - a whole range of solutions have been proposed, and relative
> CD> merits of all discussed already - does anyone have the free time to go
> CD> back over the postings, extract all the knowledge & contributions, and
> CD> document them all?
> 
> CD> To summarize my proposal - I was seeking a standardized OpenID RP
> CD> endpoint interface into which I (as an IdP) or a software agent (eg: a
> CD> browser plugin) could "post" user information - be this a login
> CD> request, email change request, log-out request, account signup,
> CD> account cancelation, or whatever.  My preferred implementation was a
> CD>  tag placed on (and thus identifying) a login page, and within
> CD> the link tag, the endpoint of the RP for accepting IdP(OP/agent)
> CD> input.
> 
> CD> Kind Regards,
> CD> Chris Drake
> 
> 
> CD> Tuesday, November 7, 2006, 1:04:44 PM, you wrote:
> 
> JE>> I continue to believe that we need single-sign-out
> JE>> functionality, in particular once OpenID moves up the stack for
> JE>> higher-value transactions.
> 
> 
> JE>> Some people have made the case that that is undesirable
> JE>> and/or impossible; I beg to differ.
> 
> 
> JE>> Having automatic authentication against the IdP is quite
> JE>> similar to not having a password on the identity at all, in that
> JE>> it reduces the confidence that we know the real-world identity of
> JE>> the entity/user at the other end. In my view, there's nothing
> JE>> wrong with that, but we do need to be able to convey that to
> JE>> relying parties in a way that cannot be easily attacked.
> 
> 
> 
> 
> 
> JE>> On Nov 6, 2006, at 16:41, Joshua Viney wrote:
> 
> JE>> One question re: User Experience and single-sign-on comes to mind:
> 
> 
> JE>> How do we treat users who are accessing their IdP and
> JE>> Relying Parties via public computers?
> 
> 
> JE>> Use Case:
> JE>> Good User at public library wants to leave a comment on Blog X
> JE>> Blog X requires the person to authenticate via OpenID
> JE>> Good User enters their OpenID and successfully authenticates
> JE>> via email and password (or whatever) (and authorizes the RP
> JE>> ('realm' in 2.0) if necessary) at their IdP
> JE>> Good User is redirected to Blog X signed in
> JE>> Good User leaves comment
> JE>> Good User signs out of Blog X (if sign out is even an option)
> JE>> Good User then leaves the public library and goes shopping
> JE>> Evil User jumps on computer and proceeds to leave comments at
> JE>> any number of OpenID enabled blogs using Good User's OpenID (he
> JE>> saw it while looking over Good User's shoulder, or he checks any
> JE>> sites that Good User did NOT sign out of that might display his
> JE>> OpenID)
> JE>> Evil User, uses Good User's signed in IdP session to sign into any
> number of sites, etc
> 
> 
> JE>> Outcome: Good User's reputation is ruined and his/her OpenID
> JE>> is banned from a whole list of Relying Parties. Good User then
> JE>> blames their IdP, the Relying Parties and OpenID as a technology
> JE>> and tells everyone he/she knows not to use it blogs about it and
> JE>> initiates a press release.
> 
> 
> JE>> It may be easy to pass this off as an implementation specific
> JE>> issue or as "

Re: IDMML (was RE: Using email address as OpenID identifier)

2008-04-02 Thread Chris Drake
Hi Drummond,

I pushed hard for RP identification for 2 or 3 months back around
October 2006.  If anyone wants to go back through the archives,
there's a pile of other important reasons to have some way that an IdP
and/or browser agent can identify an OpenID-enabled site.  The antique
thread below lists a few.  My proposal too was a  tag.

Kind Regards,
Chris Drake


Tuesday, November 7, 2006, 12:51:15 I, you wrote:

CD> Hi Johannes,

CD> I proposed a solution to the "single sign out" problem a month or two
CD> ago.

CD> In fact - a whole range of solutions have been proposed, and relative
CD> merits of all discussed already - does anyone have the free time to go
CD> back over the postings, extract all the knowledge & contributions, and
CD> document them all?

CD> To summarize my proposal - I was seeking a standardized OpenID RP
CD> endpoint interface into which I (as an IdP) or a software agent (eg: a
CD> browser plugin) could "post" user information - be this a login
CD> request, email change request, log-out request, account signup,
CD> account cancelation, or whatever.  My preferred implementation was a
CD>  tag placed on (and thus identifying) a login page, and within
CD> the link tag, the endpoint of the RP for accepting IdP(OP/agent)
CD> input.

CD> Kind Regards,
CD> Chris Drake


CD> Tuesday, November 7, 2006, 1:04:44 PM, you wrote:

JE>> I continue to believe that we need single-sign-out
JE>> functionality, in particular once OpenID moves up the stack for
JE>> higher-value transactions.


JE>> Some people have made the case that that is undesirable
JE>> and/or impossible; I beg to differ.


JE>> Having automatic authentication against the IdP is quite
JE>> similar to not having a password on the identity at all, in that
JE>> it reduces the confidence that we know the real-world identity of
JE>> the entity/user at the other end. In my view, there's nothing
JE>> wrong with that, but we do need to be able to convey that to
JE>> relying parties in a way that cannot be easily attacked.





JE>> On Nov 6, 2006, at 16:41, Joshua Viney wrote:

JE>> One question re: User Experience and single-sign-on comes to mind:


JE>> How do we treat users who are accessing their IdP and
JE>> Relying Parties via public computers?


JE>> Use Case:
JE>> Good User at public library wants to leave a comment on Blog X
JE>> Blog X requires the person to authenticate via OpenID
JE>> Good User enters their OpenID and successfully authenticates
JE>> via email and password (or whatever) (and authorizes the RP
JE>> ('realm' in 2.0) if necessary) at their IdP
JE>> Good User is redirected to Blog X signed in
JE>> Good User leaves comment
JE>> Good User signs out of Blog X (if sign out is even an option)
JE>> Good User then leaves the public library and goes shopping
JE>> Evil User jumps on computer and proceeds to leave comments at
JE>> any number of OpenID enabled blogs using Good User's OpenID (he
JE>> saw it while looking over Good User's shoulder, or he checks any
JE>> sites that Good User did NOT sign out of that might display his
JE>> OpenID)
JE>> Evil User, uses Good User's signed in IdP session to sign into any number 
of sites, etc


JE>> Outcome: Good User's reputation is ruined and his/her OpenID
JE>> is banned from a whole list of Relying Parties. Good User then
JE>> blames their IdP, the Relying Parties and OpenID as a technology
JE>> and tells everyone he/she knows not to use it blogs about it and
JE>> initiates a press release.


JE>> It may be easy to pass this off as an implementation specific
JE>> issue or as "user error", but this use case is somewhat likely for
JE>> 2 reasons:


JE>> 1. A user's OpenID URI is not necessarily a private thing
JE>> (obscurity is not security anyway)
JE>> 2. Users will be at least 1 site removed from their IdP while
JE>> accessing a Relying Party, and no one is use to signing out twice
JE>> 3. It is very very likely that IdP's will use some type of "remember me" 
functionality


JE>> One solution to consider would be a global sign-out feature
JE>> on relying party sites that signs users out of their IdP as well.
JE>> Another solution would be to make very specific recommendations
JE>> about messaging users who may be using public computers.






JE>> Josh Viney
JE>> http://www.eastmedia.com -- EastMedia
JE>> http://identity.eastmedia.com -- OpenID, Identity 2.0








JE>> ___
JE>> user-experience mailing list
JE>> [EMAIL PROTECTED]
JE>> http://openid.net/mailman/listinfo/user-experience










Kind Regards,
Chris Drake,
=1id.com


Thursday, April 3, 2008, 4:38:13 AM, you wrote:

>> > Dick Hardt wrote:
>> >
>> > :-) ... that label would be more accurate. There is lots of work to be
>> > done to make OpenID simpler for users. I think that what will be easy
>> > for users is something provided by the browser that lets the user
>> > click to initiate a login or registration. No typing is better then
>> > any typing! Back when we started

Re: IDMML (was RE: Using email address as OpenID identifier)

2008-04-02 Thread George Fletcher


Drummond Reed wrote:
>>> Dick Hardt wrote:
>>>
>>> :-) ... that label would be more accurate. There is lots of work to be
>>> done to make OpenID simpler for users. I think that what will be easy
>>> for users is something provided by the browser that lets the user
>>> click to initiate a login or registration. No typing is better then
>>> any typing! Back when we started working on the protocols we could not
>>> expect this kind of functionality to be in the browsers. Now that
>>> awareness is higher, having it built into the browser is feasible. I
>>> of course am biased given the work we have done with Sxipper
>>> http://sxipper.com :)
>>>   
>> For the majority of users, this is probably the most likely path of
>> introduction to OpenID. Note that it's not just about allowing the user
>> to do something with one click, but also about being proactive and
>> informing the user that they can login to a site with an identity they
>> already have. This can be as simple as telling the browser "identity
>> agent" (e.g. sxipper) which email addresses the user has and letting the
>> identity agent figure out which OpenID's the user has that they don't
>> even know about.
>>
>> George Fletcher wrote:
>>
>> I think relying party sites that support OpenID could do more to make it
>> clear on their home pages that they support OpenID (as often it's hidden
>> behind another click). This could be as simple as some  tags that
>> advertise support for OpenID. Maybe a  to the XRDS doc describing
>> the services of the site. Then the identity agent can discover the
>> relying party OpenID return_to endpoint and log the user in directly.
>> Can be used to solve a phishing problem and makes the experience easy
>> for the user.
>>
>> Some related thoughts 
>>http://practicalid.blogspot.com/2007/06/clients-to-rescue.html
>>
>> http://practicalid.blogspot.com/2007/06/passive-identity-meta-system-
>> markup.html
>> 
>
> George, I read your two posts with great interest...and then noticed that
> they were last summer!
>
> You are a man ahead of your time.
>
> Where has discussion of your "IDMML" gone since your posts?
>
> =Drummond
Unfortunately, not as far as I'd like :(  I've not been able to get back 
to the ideas and take them farther. With the other things that have 
happened in the last 6 months there are needed revisions. Maybe this 
could be a discussion at IIW (if there is enough interest)?

At the time there was less consensus around XRDS as a service 
"description/meta-data" markup. With that changing, the time is better 
to move this forward. I suspect there are significant synergies with 
what Peter hinted at in the work with XRDS, IDP Discovery, and SAML. It 
would be great if identity agents could be the glue that binds the 
different identity systems together for the user (until we on the 
technology side get closer to real convergence:).

Thanks,
George
___
specs mailing list
specs@openid.net
http://openid.net/mailman/listinfo/specs


IDMML (was RE: Using email address as OpenID identifier)

2008-04-02 Thread Drummond Reed
> > Dick Hardt wrote:
> >
> > :-) ... that label would be more accurate. There is lots of work to be
> > done to make OpenID simpler for users. I think that what will be easy
> > for users is something provided by the browser that lets the user
> > click to initiate a login or registration. No typing is better then
> > any typing! Back when we started working on the protocols we could not
> > expect this kind of functionality to be in the browsers. Now that
> > awareness is higher, having it built into the browser is feasible. I
> > of course am biased given the work we have done with Sxipper
> > http://sxipper.com :)
> For the majority of users, this is probably the most likely path of
> introduction to OpenID. Note that it's not just about allowing the user
> to do something with one click, but also about being proactive and
> informing the user that they can login to a site with an identity they
> already have. This can be as simple as telling the browser "identity
> agent" (e.g. sxipper) which email addresses the user has and letting the
> identity agent figure out which OpenID's the user has that they don't
> even know about.
> 
> George Fletcher wrote:
>
> I think relying party sites that support OpenID could do more to make it
> clear on their home pages that they support OpenID (as often it's hidden
> behind another click). This could be as simple as some  tags that
> advertise support for OpenID. Maybe a  to the XRDS doc describing
> the services of the site. Then the identity agent can discover the
> relying party OpenID return_to endpoint and log the user in directly.
> Can be used to solve a phishing problem and makes the experience easy
> for the user.
> 
> Some related thoughts 
>http://practicalid.blogspot.com/2007/06/clients-to-rescue.html
> 
> http://practicalid.blogspot.com/2007/06/passive-identity-meta-system-
> markup.html

George, I read your two posts with great interest...and then noticed that
they were last summer!

You are a man ahead of your time.

Where has discussion of your "IDMML" gone since your posts?

=Drummond 

___
specs mailing list
specs@openid.net
http://openid.net/mailman/listinfo/specs