Ian,
This is true where the RP is a site with a cert that is triggering an auditing-mode/audience restricted card.
The cert from the RP is passed in the message and the token is encrypted with the RP's PK from the cert.
In this senario the password manager would need to pretend to be the RP and place the post URI for the loggin form in the <wsp:AppliesTo:wsa:EndpointRefrence:Address>
If we are messing with the selector probably the correct element to use is actually
<wsp:AppliesTo:wsa:EndpointRefrence:wsid:Identity:Upn> or
<wsp:AppliesTo:wsa:EndpointRefrence:wsid:Identity:Spn>
See sec 12.2 of the IMI spec.
If you are doing this outside of the selector without selector complicity, you need to fake being a relying party without a certificate to avoid the token being encrypted.
See Sec 8 if the IMI spec.
The wsp:AppliesTo is still sent an the token is not encrypted.
I remain unconvinced that allowing a non-ssl endpoint of request unencrypted tokens with passwords as a good idea.
I am interested in finding out how in the spoofing the client theory of password managers we can prevent other apps on the computer or infract other remote non-ssl RPs from requesting the unencrypted token?
That is why I am leaning towards treating the password manager as the RP that way we stand some chance of only handing back these tokens to the appropriate RP ie the users password manager.
I have a feeling that changes to how the selector interacts with the world will be required to allow safe interactions with local applications.
Things like how is a local app supposed to express its WS-SecurityPolicy to the selector is this at localhost via ssl?
The existing interaction and selector API at least in the higgins case is intended for a RP -> browser -> Selector -> IP/STS interaction.
Perhaps one way to deal with local apps is to define a way for them to publish an RP/STS locally on the same host as the selector. Assuming that we could answer the SSL issues with some sort of cert that works in that env perhaps self signed.
That would give us a much richer tool set to work with that trying to fit entirely inside what we think of as the normal browser interaction.
What has been proposed to this point are largely hacks to add on functionality that is desired by people in the community.
I cant stop the hacks, people have product to deliver. However we do need something that is properly designed, but that will not happen over night. Lets just not break things too badly in the interim.
Regards
John Bradley