I would be happier with a “password” claim that made it clear that the password was being passed in a specific way (even in the clear), than the current definition, if that’s what’s really going on here. Not stating the representation of the credential means that cards utilizing this claim can not be used in an interoperable fashion.
Also, are these claim definitions hypothetical, or are they being proposed because of an actual deployment? If no deployment is being considered, we should not be taking these up on a hypothetical basis. If a deployment is imminent, please change the description to fully describe the data formats being used. (Put another way, the rationale given below is hypothetical – not driven by a specific deployment need.)
BTW, as a matter of working group protocol, I think we’re supposed to have a claim discussion period before the formal claim request.
-- Mike
If it’s username and password, the then claim names should specifically be “username” and “password”.
If it’s a non-auditing card where applies-to information is sent to the Identity Provider, then it’s entirely reasonable for the Identity Provider to consult a database of RP-specific usernames and passwords and supply the values that apply to that RP. The IdP effectively then because (part of) a password manager. (This is impossible for a non-auditing card, however you wouldn’t use a non-auditing card to hold site-specific information such as usernames and passwords in the first place.)
Hence, these can definitely be used at more than one site, and the claim definition should be written so as to accommodate that use case.
My misunderstanding about the discussion period. Maybe we should use “CLAIM-DISCUSSION” rather than “CLAIM-REQUEST” to make this more obvious?
Cheers,
--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Google Groups "ICF-WG-Schemas" group.
To post to this group, send email to icf-wg-...@googlegroups.com
To unsubscribe from this group, send email to icf-wg-schema...@googlegroups.com
For more options, visit this group at http://groups.google.com/group/icf-wg-schemas?hl=en
-~----------~----~----~----~------~----~------~--~---
I understand the business need for this in some circumstances, and would support this formulation. Thanks Ian.
--~--~---------~--~----~------------~-------~--~----~
The STS doesn't store anything, anywhere. It is a transparent proxy. The username and password come in, the username and password come out.This is absolutely limited to one STS/RP.The only reason i proposed the claims to the ICF is so that we can use well-known URIs for these claims, because I figured this is going to be a pretty popular use case... how else are we supposed to enable legacy app signon with information cards?