thinking out loud:
we have a similar situation as you, where we're rolling out remote storage
to all students and staff of all Dutch universities and colleges. So a big
project, and we can't talk to the central IT department of each individual
university; exactly like in your situation. We considered the option of
'spiking' our verifier to pretend that the delegation records exist, even
if it doesn't. If you have access to LDAP or something, then that might
work for you, but it would confuse users, because other verifiers would not
have the same patch, and will reject users that you do not reject. Also,
spiking the verifier sounds like a very dodgy patch to a security system -
unexpected things might go wrong; best not to experiment with its internals.
So our current idea is to just fall back to SMTP for universities who have
not yet done the little job of setting up the delegation. Yes, it's
temporarily centralized then, but it allows us to launch quickly and it's
only as a sort of 'legacy support' for those IT departments who have not
yet delegated to us - which is little work for them - or taken their own
initiative in setting up BrowserId for their user base.
In your case maybe you could fallback to SMTP, but maybe with your own
secondary (so "competing" with
browserid.org), which exists only inside
your intranet. the downside of that is that people have to create an
account on your secondary, even if they already have an account at the 'de
facto' secondary, which is mozilla's
browserid.org. but if having mozilla
in the loop is not an option for you, and you need something you can launch
quickly with, then it might be an option? or would this be a Bad Idea?
also when your system grows, you can still convince the Big IT department
to implement primary IdP support (which, if they take themselves seriously,
they would have to do at some point anyway once BrowserId begins to
snowball), and remove your intranet-internal secondary IdP, so it would
really only be a way to bootstrap browserid inside this intranet.
i hope i didn't say anything here which isn't true - as i said i'm just
thinking out loud here, please correct me :)
cheers!
Michiel
On Tue, Dec 27, 2011 at 6:37 PM, Tim Kuijsten <
t...@slasa.us> wrote:
>
>
> Op 26-12-11 18:31, Ben Adida schreef:
>
> On 12/26/11 4:59 AM, Tim Kuijsten wrote:
>>
>>> I was wondering if it will be possible to run your own Identity provider
>>> for a domain you have not in control.
>>>
>>
>> You'll need at least one static file served at a well-known URL at that
>> domain, or maybe a DNS record (we haven't solidified that part of the
>> protocol yet). But you need *something* for the protocol to know that
>> the domain
bigenterprise.com delegated its authority to someone else.
>>
>
> Understandable, but unfortunately unfeasible for the current job I'm
> working at. Rolling out my own auth system and creating usernames like
>
us...@bigenterprise.com and sending passwords overthere is easier than
> asking the enterprise wide IT-staff to do something (anything) for a small
> subdivision who have build a system by externals. A system that will be
> small in the beginning but we hope it will be used by the whole enterprise
> later on (so as a small party we need as less work done by the
>
bigenterprise.com IT-staff as possible, none actually).
>
> Just to give a description of a potential use case.
>
> Tim
>
>
>
>> -Ben
>> ______________________________**_________________
>> dev-identity mailing list
>>
dev-id...@lists.mozilla.org
>>
https://lists.mozilla.org/**listinfo/dev-identity<
https://lists.mozilla.org/listinfo/dev-identity>
>>
> ______________________________**_________________
> dev-identity mailing list
>
dev-id...@lists.mozilla.org
>
https://lists.mozilla.org/**listinfo/dev-identity<
https://lists.mozilla.org/listinfo/dev-identity>
>