http://www.gluecon.com/2010/Glue2010_Agenda.htm
If anyone has specific ideas or messages to get across, I'm open to
them!
Chris
--
You received this message because you are subscribed to the xAuth group.
To post, send email to xa...@googlegroups.com
To unsubscribe from this group, send email to
xauth+un...@googlegroups.com
For more options, visit this group at
http://groups.google.com/group/xauth?hl=en
Chris,
I think you highlight one of the bigger reasons for not having a wildcard search value because you as a retriever have to decide which xauth providers you trust. Normally you do this through agreements in the real world and then integrate.
With that in mind, having no wildcards in the retrieve call makes it harder for retrievers to shoot themselves in the foot.
I do think the JRD use case needs a bit more iteration to deal with the scenario you just outlined. While there is opportunity for extremely open discovery here, you'd need a mechanism to decide who you can trust as a provider.
-Jian
,
On May 27, 2010 7:58 AM, "Chris Messina" <mes...@google.com> wrote:
Though at the same time, nothing about XAuth today forces providers to authenticate users before extending your XAuth profile.And though this may stray off topic — you could imagine visiting Random Site X which silently extends your XAuth profile w/o your consent or knowledge, right? I mean, it seems like that wouldn't create a tremendous amount of value for them, but of course they could do it with the way the model works today, right? And that might result in a bunch of none-useful entries in your XAuth profile, right?And worse, if the common model is what Joseph's described, then requestors might receive a list of bogus JRD endpoints (some of which the user may not have set). While I can of course monitor my XAuth settings and block rogue additions, in reality, the goal here was to minimize management of one's preferred services. Is this simply a known issue or a design feature?
Chris
On Thu, May 27, 2010 at 8:36 AM, Jian Shen <jian...@gmail.com> wrote:
>
--
> I think the point I was making was that if you never sign into any services, then your identity ...
> You received this message because you are subscribed to the xAuth group.
> To post, send email to ...
Follow me on Buzz: http://buzz.google.com/chrismessina
--...or Twitter: http://twitter.com/chrismessi...
You received this message because you are subscribed to the xAuth group.
To post, send email to xaut...
A goal of "a way for a page to determine if a user is currently logged
into site X in this browser" is different than something like "a way
for a page to determine the set of services a user 'uses'" which is
different from "a way for a page to determine the set of endpoints for
specific protocol Z that have been identified for this user in this
browser", and a bunch more. It might be easier to talk about jrd,
webfinger/lrdd, public vs private, retrieve(reltype), retrieve(*), etc
if we had a crisper formulation of the target use-cases.
Sensible?
W
Chris, that was great. It did pause to make me think -- when you said "100% front end technology" -- I'm not sure that's 100% accurate. So tell me where I'm wrong here. When you retrieve the token from XAuth, doesn't that essentially have a stored list of all the OPs?
Also, it occurred to me we could build something into XAuth that could potentially solve some of the nascar problem even more. If there were a variable built in which specified *which* service a user preferred as an OP, the XAuth service could feed that information back to the receiving service (as well as the other providers). This could eliminate nascar altogether in some scenarios. One OpenID Connect button to rule them all, essentially.
While this could pose a risk in that some abusing OPs could/would want to be listed as user's without the user specifying such, I'm sure there's a way to make it so only the user can specify that. Something to think about. I'm such a proponent of making federated or single sign on services as utterly simple as possible, and such a preferred state would deliver.