<dotNetOpenAuth> <openid> <relyingParty> <store type="Fully.Qualified.ClassName, Assembly" /> </relyingParty>
Thanks John and Andrew for some pointers. I've read the ICAM doc and I
think Andrew is right, it may be an overkill for me. Out of curiosity
is it supported in the library?
If not, did John create his own
extenion?
May be for now I just implement the interface and add my own
distributed cache for storing nonces. Andrew, how do you receive the
nonce? Does the interface have some method with a nonce as parameter?
Thanks.
1. What do other methods (besides StoreNonce) do and when do they get
executed in user lifecycle?
2. Andrew, you mentioned a few weeks back about rigging DNOA and using
checkid_immediate with javascript to redirect to my one provider or
checkid_setup? Can you point me in DNOA where I would need to modify
or this?
I'm assuming DNOA creates a cookie for SSO among multiple apps within
a domain so that's fine.
1. Correct me if I'm wrong.
2. Once you're in some web app and need to make multiple web service
calls who also need to be secured, how will it work? Say I need to
asynchronously call 2 distinct web services and each service checks
whether or not the user has rights to call its operation. Can you walk
through that scenario?
1. If you don't set a cookie (of more specifically an authentication ticket)
then nothing will happen. OpenID simply says "this person was authenticated
as this identity as identity provider X". This is the exact same as a custom
database lookup where you need to set the authentication ticket yourself to
say the validation was successful.
2. In the second case you have a local identity prior to calling the
services. This identity *may* have been created via the OpenID method in (1)
above. Calling a remote service is a completely different thing though and
very much platform specific. You *may* use oAuth and request a token (per
the spec here) from the remote server that is locally associated with the
user authenticated in (1) above. This token is the access token for that
user and you should protect use of that based on the authenticated user.
You may also use the trusted server concept to delegate the identity or in
the case of Active Directory you may use Windows impersonation and Kerberos
constrained delegation to make secure service calls - many other ways too.
steven
http://livz.org
--------------------------------------------------
From: "gsogol" <gso...@gmail.com>
Sent: Tuesday, September 29, 2009 6:00 PM
To: "dotnetopenid" <dotnet...@googlegroups.com>
Subject: [dotnetopenid] Re: OpenId Guide
Does anyone have a guide that can explain how OpenId + oAuth
(specifically DotNetOpenAuth project) work together in a non-spec
manner? Which could possibly describe how it solves various security
holes (replay attacks, XSS, CSRF, etc). Would absolutely love to use
instead of WS-Federation Profile but really need more info in order to
start the process.
Any help is really appreciated.