Seems to me you want to add the URI needed to initiate the WebID
authentication protocol to HTTP requests. Why don't you just create a
WebID-specific header (e.g. "webid") or a WebID-specific authorization
scheme? Or is it imagined to initiate a OpenID process as well?
regards,
Torsten.
Am 19.07.2013 17:45, schrieb Kingsley Idehen:
On 7/19/13 11:10 AM, Torsten Lodderstedt wrote:
Hi Kingsley,
so your are essentially saying, the user agent (or a similar
application) sets a URL, which the server uses in turn to obtain some
values.
To be precise, an end-user would (via UI/UX) have the *option* to
provide a URI that's added to the HTTP payload via an HTTP client
(e.g., a Browser or other User Agents).
These values are used to meet access control decisions. Did I get
this right?
The header values would then be incorporated into a mechanism for
protected resource access control and anything else that benefits from
verifiable identity.
How does the server ensure the caller is the user represented by this
URL?
Through the logic of "shared secrets" and "mirrored claims" . This is
just about the ability to make an verify claims based on logic.
So for example, how would you prevent an attacker from sending your
user id URL to the server (and in turn impersonating you on this server)?
The server would verify identity based on logic. For instance, it can
verify that the user agent is being driven by an entity that has
access to:
1. private key which was used to make a signature -- stored locally
and accessed via native OS UI/UX controls (e.g., Keychain on Mac OS X)
2. certificate bearing claims that are mirrored in the document to
which the URI resolves
3. any other relationship that the data access policy deems worthy .
Note, this already works. We are just seeking to simplify exploitation
entry points.
Links:
1. http://bit.ly/UuWZSI -- various posts about this matter
2. http://bit.ly/UDlwc6 -- multi-identifier and multi-protocol based
identity verification.
Kingsley
Am 19.07.2013 um 15:42 schrieb Kingsley Idehen
<[email protected] <mailto:[email protected]>>:
On 7/19/13 4:14 AM, Torsten Lodderstedt wrote:
Hi,
could you please shed some light on the use case for the User
field? What entity sets the value, what entitity uses it for what
purpose?
It holds a URI that resolves to a document bearing content that
describes the URIs referent. For example, this document could be
comprised of a machine-readable entity->attribute->value or
subject->predicate->object based relations.
An end-user application (including browser extensions or plugins)
will set the value. A server will make use of these values e.g.,
looking up the URIs to locate the description of the entity denoted
(named) by the URI. It can then use this description as the basis
for ACLs and sophisticated data access policies which are all driven
by logic.
Kingsley
Regards,
Torsten.
Kingsley Idehen <[email protected]> schrieb:
On 7/18/13 1:38 PM, Torsten Lodderstedt wrote:
I fully agree with George und would like to add: why don't you
just use the authorization header to send identity
data/credentials/tokens to the server in order to allow for
access control?
This is already possible. The requirement here stems from the
fact that "From:" is bound specifically to mailto: scheme URIs
(Uniform Resource Identifiers). We are looking to "User:" to be
the superClass of "From:" which is basically URI scheme
agnostic. That's it.
[SNIP]
--
Regards,
Kingsley Idehen
Founder & CEO
OpenLink Software
Company Web:http://www.openlinksw.com
Personal Weblog:http://www.openlinksw.com/blog/~kidehen
Twitter/Identi.ca <http://Identi.ca> handle: @kidehen
Google+ Profile:https://plus.google.com/112399767740508618350/about
LinkedIn Profile:http://www.linkedin.com/in/kidehen
--
Regards,
Kingsley Idehen
Founder & CEO
OpenLink Software
Company Web:http://www.openlinksw.com
Personal Weblog:http://www.openlinksw.com/blog/~kidehen
Twitter/Identi.ca <http://Identi.ca> handle: @kidehen
Google+ Profile:https://plus.google.com/112399767740508618350/about
LinkedIn Profile:http://www.linkedin.com/in/kidehen
--
Regards,
Kingsley Idehen
Founder & CEO
OpenLink Software
Company Web:http://www.openlinksw.com
Personal Weblog:http://www.openlinksw.com/blog/~kidehen
Twitter/Identi.ca handle: @kidehen
Google+ Profile:https://plus.google.com/112399767740508618350/about
LinkedIn Profile:http://www.linkedin.com/in/kidehen
_______________________________________________
specs mailing list
[email protected]
http://lists.openid.net/mailman/listinfo/openid-specs