What do you think about this format below? If you decode the string W2h0dHA6Ly93d3cua3VwcGluZ2VyY29sZS5jb20saHR0cHM6Ly93d3cua3VwcGluZ2VyY29s ZS5jb20sbnVsbF0= it yields: [http://www.kuppingercole.com,https://www.kuppingercole.com,null] which was generated by var text = "["+login.hostname+","+login.formSubmitURL+","+login.httpRealm+"]"
The card is a managed card with a special issuer: urn:openinfocard:storage:component -Axel <RoamingInformationCard xmlns="http://schemas.xmlsoap.org/ws/2005/05/identity"> <InformationCardMetaData xml:lang="en"> <InformationCardReference> <CardId>urn:openinfocard:W2h0dHA6Ly93d3cua3VwcGluZ2VyY29sZS5jb20saHR0cHM 6Ly93d3cua3VwcGluZ2VyY29sZS5jb20sbnVsbF0=</CardId> <CardVersion>1</CardVersion> </InformationCardReference> <CardName>https://www.kuppingercole.com</CardName> <Issuer>urn:openinfocard:storage:component</Issuer> <TimeIssued>2009-04-30T18:48:46.949Z</TimeIssued> <SupportedTokenTypeList> <TokenType xmlns="http://schemas.xmlsoap.org/ws/2005/02/trust">urn:openinfocard:tok entype:usernamepassword</TokenType> </SupportedTokenTypeList> <SupportedClaimTypeList> <SupportedClaimType Uri="http://schemas.openinfocard.org/ws/2009/03/identity/claims/username /urn:openinfocard:W2h0dHA6Ly93d3cua3VwcGluZ2VyY29sZS5jb20saHR0cHM6Ly93d3 cua3VwcGluZ2VyY29sZS5jb20sbnVsbF0="> <DisplayTag>username</DisplayTag> <Description>username</Description> </SupportedClaimType> <SupportedClaimType Uri="http://schemas.openinfocard.org/ws/2009/03/identity/claims/password /urn:openinfocard:W2h0dHA6Ly93d3cua3VwcGluZ2VyY29sZS5jb20saHR0cHM6Ly93d3 cua3VwcGluZ2VyY29sZS5jb20sbnVsbF0="> <DisplayTag>password</DisplayTag> <Description>password</Description> </SupportedClaimType> <SupportedClaimType Uri="http://schemas.openinfocard.org/ws/2009/03/identity/claims/username field/urn:openinfocard:W2h0dHA6Ly93d3cua3VwcGluZ2VyY29sZS5jb20saHR0cHM6L y93d3cua3VwcGluZ2VyY29sZS5jb20sbnVsbF0="> <DisplayTag>usernameField</DisplayTag> <Description>usernameField</Description> </SupportedClaimType> <SupportedClaimType Uri="http://schemas.openinfocard.org/ws/2009/03/identity/claims/password field/urn:openinfocard:W2h0dHA6Ly93d3cua3VwcGluZ2VyY29sZS5jb20saHR0cHM6L y93d3cua3VwcGluZ2VyY29sZS5jb20sbnVsbF0="> <DisplayTag>passwordField</DisplayTag> <Description>passwordField</Description> </SupportedClaimType> </SupportedClaimTypeList> <IsSelfIssued>false</IsSelfIssued> <HashSalt>fL59RqJZ5ZgVBPEjGx2N2mjaUqs=</HashSalt> <TimeLastUpdated>2009-04-30T18:48:46.949Z</TimeLastUpdated> <IssuerId/> <IssuerName>MeMyselfAndI</IssuerName> <BackgroundColor>16777215</BackgroundColor> </InformationCardMetaData> <InformationCardPrivateData> <MasterKey>X9hOswYlTQK5jdM4GJpEg8a43aQF3XVv5XTVCHA/jvCrJzMQawXbqswrBdEQP bZDnBlGyOjh7xgVHdv8Gqw5CQ==</MasterKey> <ClaimValueList> <ClaimValue Uri="http://schemas.openinfocard.org/ws/2009/03/identity/claims/password /urn:openinfocard:W2h0dHA6Ly93d3cua3VwcGluZ2VyY29sZS5jb20saHR0cHM6Ly93d3 cua3VwcGluZ2VyY29sZS5jb20sbnVsbF0="> <Value>YXNkZg==</Value> </ClaimValue> <ClaimValue Uri="http://schemas.openinfocard.org/ws/2009/03/identity/claims/username /urn:openinfocard:W2h0dHA6Ly93d3cua3VwcGluZ2VyY29sZS5jb20saHR0cHM6Ly93d3 cua3VwcGluZ2VyY29sZS5jb20sbnVsbF0="> <Value>c2RmYXM=</Value> </ClaimValue> <ClaimValue Uri="http://schemas.openinfocard.org/ws/2009/03/identity/claims/password field/urn:openinfocard:W2h0dHA6Ly93d3cua3VwcGluZ2VyY29sZS5jb20saHR0cHM6L y93d3cua3VwcGluZ2VyY29sZS5jb20sbnVsbF0="> <Value>cGFzc3dvcmQ=</Value> </ClaimValue> <ClaimValue Uri="http://schemas.openinfocard.org/ws/2009/03/identity/claims/username field/urn:openinfocard:W2h0dHA6Ly93d3cua3VwcGluZ2VyY29sZS5jb20saHR0cHM6L y93d3cua3VwcGluZ2VyY29sZS5jb20sbnVsbF0="> <Value>dXNlcm5hbWU=</Value> </ClaimValue> </ClaimValueList> </InformationCardPrivateData> </RoamingInformationCard> ________________________________ Von: [email protected] [mailto:[email protected]] Im Auftrag von Paul Trevithick Gesendet: Dienstag, 28. April 2009 17:44 An: Valery Kokhan Cc: higgins-dev Betreff: [higgins-dev] Re: Re[2]: Password Cards Hi Valery. See ##inline. On 4/28/09 11:17 AM, "Valery Kokhan" <[email protected]> wrote: Hi Paul, As far as I remember the main goals of making password cards fully compatible with generic p-cards were standardization and interoperability so we could use standard .crds format to store them and to pass across different selectors. ## as much as possible, yes. I've reviewed once again our design options. I agree that "Per role" option is the best but if we use proposed set of required claim types I do not see real way for this option to do both store all those claims in .crds format and make user name and password claims be indexed by three other claim types. In order to be able index UN & PW we need to store some kind of hash table in .crds but how could we do this? ## I'd suggest that in the persistent file format the value of the username claim, for example, would be an XML-structured value that encodes the multiple, rp-site-dependent values of username. This is hinted at here [1] with mentioned of "arrays" etc. ## If host_name + realm_name together can be used to identify the rp site (or app) then we'd need to store as the value of the username claim a set of N {username, host_name, realm_name} triples in the XML. And we'd do the same thing for the password claim value ---a set of N {password, host_name, realm_name) triples. ## If you design an XML syntax, please add it here [1] and we can all review it. ## [1] http://wiki.eclipse.org/Password_Cards#Architecture If we a going to move forward with "Per role" design option I'd suggest to use only two claim types for user name and password claim values while host name, form submit URL and http realm should be included/encoded in a query part of URL for both user name and password claim types. Thus, for any card for some particular role will contain two claim types for each particular site log-on: http://schemas.informationcard.net/@ics/username/2009-3?host_name=host_n ame&url=url&realm=realm http://schemas.informationcard.net/@ics/password/2009-3?host_name=host_n ame&url=url&realm=realm ## What you propose above as a way to pass the parameters is not unreasonable, and in fact had been my original thinking based on Axel Nennker's original suggestion to use "?" parameters from last year. Folks in the IMI TC do NOT think that this "?" is a good way forward as opposed to a much more comprehensive, general purpose solution that (as I understand it) involves passing full WS-SecurityPolicy expressions in the getDigitalIdentity() API call, as opposed to the limited subset that the <object> tag currently supports. However, this is all many moons away from being resolved. Since you need to do SOMETHING immediately, I'd go ahead and use the "?" approach and let's keep an eye on this as things evolve at the ICF and within the OASIS IMI TC. Of course if we move forward with this we will need to be able to manage claim types dynamically but from my point it is the only way. -- Thanks, Valery
_______________________________________________ higgins-dev mailing list [email protected] https://dev.eclipse.org/mailman/listinfo/higgins-dev
