Re: [OpenID] OpenID Assertion Quality Extension - Draft

2006-12-08 Thread Daniel E. Renfer
This information is usually listed on the registartion page anyway. 8-16 characters. Letters and numbers only. No spaces. Case sensitive. - password change screen from Comcast.net Must be at least 6 characters long. - registration page from digg.com Choose a secure password, which: is at least

RE: Re: [OpenID] OpenID Assertion Quality Extension - Draft

2006-12-03 Thread Recordon, David
] OpenID Assertion Quality Extension - Draft Daniel, It's not a bad idea, but it doesn't actually drive any more knowledge about the security of the authentication. There are so many factors when calculating the entropy and overall security of a password that I don't think it should be included

Re: [OpenID] OpenID Assertion Quality Extension - Draft

2006-12-02 Thread Daniel E. Renfer
It might be useful to some RP's to know of any complexity schemes put on users' passwords. How about: password.min_length=8 password.max_length=16 the number of characters that the password is between. password.max_length would probably be more useful as I don't see many RP's complaining if the

Re: [OpenID] OpenID Assertion Quality Extension - Draft

2006-12-01 Thread Paul Madsen
Hi Avery, some minor tweaks/comments 1) the line 'the first method that the RP would like the OP to perform' could be interpreted as constraining the O/IDP to performing whatever authentication mechanism is listed as the first in a temporal sequence, i.e. must do X then Y This could be

Re: [OpenID] OpenID Assertion Quality Extension - Draft

2006-12-01 Thread Paul Madsen
Avery, below Avery Glasser wrote: Paul, My feedback to your feedback... Hi Avery, some minor tweaks/comments 1) the line 'the first method that the RP would like the OP to perform' could be interpreted as constraining the O/IDP to performing whatever authentication mechanism is

Re: [OpenID] OpenID Assertion Quality Extension - Draft

2006-11-30 Thread Paul Madsen
Hi George, for your use case below, why would not the RP just ask for the user to be up-authenticated at the desired higher level when necessary? Are you asking whether the RP should be allowed to ask the user to re-present their URI in order for this to happen? And thereby effectively

Re: [OpenID] OpenID Assertion Quality Extension - Draft

2006-11-30 Thread George Fletcher
Paul Madsen wrote: Hi George, for your use case below, why would not the RP just ask for the user to be up-authenticated at the desired higher level when necessary? So in the draft... how does the RP ask for the user to be "up-authenticated"? The authentication request parameters do not

RE: [OpenID] OpenID Assertion Quality Extension - Draft

2006-11-30 Thread Drummond Reed
, November 30, 2006 2:22 PM To: George Fletcher Cc: specs@openid.net; [EMAIL PROTECTED] Subject: Re: [OpenID] OpenID Assertion Quality Extension - Draft Just to weigh in here... Paul Madsen wrote: Hi George, for your use case below, why would not the RP just ask for the user to be up

Re: [OpenID] OpenID Assertion Quality Extension - Draft

2006-11-30 Thread George Fletcher
+1 Avery Glasser wrote: Actually, this could be pretty simple to implement: Replace openid.aqe.preferred_auth_mode with the following: openid.aqe.auth_factor1 Optional: The method of authentication the RP would like the OP to perform, or in the case of a multi-factor