Hi Anthony -

In OAuth, the user authenticates with a web browser at the user's Service Provider, almost always by typing in their password into a form hosted by the SP.

After the user authenticates with the SP, the SP then redirects the user's browser to the Consumer (another website) with a response. Behind the scenes, the Consumer then makes a web service call back to the SP to get an OAuth Access Token, which is the credential that the Consumer can use in lieu of the password.

After all is said and done, the user's web browser is at the Consumer's website, and the Consumer has an OAuth credential that can access the user's data at the Service Provider.

Based on your description, it sounds like you want a way for a user to pass a credential from an Identity Provider (the OAuth SP) to another website (Aka the Relying Party or Consumer), and that's exactly what OAuth is meant to do.

Allen



Anthony Brassac wrote:
I see, what's unfortunate is that openId was perfect for the needs of our web application. Unfortunately it won't meet the requirements of our web service, so we may actually choose to write our own system now (seeing as how even oAuth needs manual logging in at some point too). Though I'm surprised that we seem to be the only ones with this problem, is that a technical challenge to make openId more web service friendly or is that just a matter of time?


On Mon, Oct 19, 2009 at 11:40 AM, John Bradley <[email protected] <mailto:[email protected]>> wrote:

    The user needs to approve the oAuth access somehow.  It only needs
    to be a web browser if you want to use openID for that.

    Sorry for the bad news, but openID requires a browser at this
point.
    If you are the authenticator for the account and not a third party
    then there are lots of ways to solve your problem,  but you will
    have to stretch to claim they have any connection to openID.

    John B.

    On 2009-10-19, at 12:28 PM, Anthony Brassac wrote:

    But no matter what, even with oAuth I will need to log in using a
    web browser at some point in order to get that key/secret
    combination, won't i? Unless there are providers that offer
    programmatic log in?

    I have a feeling we are going to end up having to write something
    ourselves :S


    On Thu, Oct 15, 2009 at 11:54 AM, John Bradley <[email protected]
    <mailto:[email protected]>> wrote:

        You can have the user authenticate to the oAuth provider via
        openID if it is a condition of the grant:)

        That may be the best way to do it anyway depending on how the
        app is configured.

        John B.

        On 2009-10-15, at 12:00 PM, Anthony Brassac wrote:

        Thanks all for your replies, oAuth looks like it could do it
        for us, however it seems management had agreed upon using
        OpenID (research grant related I think), so I'll have to see
        what gives. Anyway, I appreciate your support.

        On Wed, Oct 14, 2009 at 1:47 AM, SitG Admin
        <[email protected]
        <mailto:[email protected]>> wrote:

                Users giving there passwords to RPs is what openID
                is trying to prevent.
                That is why passwords are not supported in the redirect.


            Hmm . . . minor clarification here, though: users giving
            passwords *their passwords for the OP* (or otherwise
            transmitting "in the clear") is not compatible with OpenID.

            If the RP wants to ask for another password (one local
            to that system), e.g. for rarely invoked high levels of
            access, it *might* be compatible with OpenID (depends on
            the exact use, but isn't automatically NOT compatible).

            The description Anthony gave sounds vaguely like
            Kerberos (from the MIT dialogue), but my mind is stuffed
            full of other things right now and I get a bit of a
            headache just getting some meaning out of roughly half
            of it (the rest seems beyond me tonight).

            -Shade

            _______________________________________________
            security mailing list
            [email protected] <mailto:[email protected]>
            http://lists.openid.net/mailman/listinfo/openid-security






------------------------------------------------------------------------

_______________________________________________
security mailing list
[email protected]
http://lists.openid.net/mailman/listinfo/openid-security

_______________________________________________
security mailing list
[email protected]
http://lists.openid.net/mailman/listinfo/openid-security

Reply via email to