Thanks Kingsley. Yes, I think that is pretty close for the authentication. Get them the p12 file somehow (most do have email!). I hadn't thought of actually generating the certs in advance for them, but it makes sense, and is easier than putting something to do it on the site. There's a good chance that their machine will interpret it well when "open"ed. Of course, it doesn't do the Personal Profile Document bit of it - I still think I need a foaf-me style service for that (as long as I can persuade them to use it). Now I just need to work out how to make the site do WebID :-) I could use http://wordpress.org/plugins/wp-linked-data/, but my hosting system doesn't have PHP 5.3.0 :-( Sigh. Cheers
On 7 Aug 2013, at 23:29, Kingsley Idehen <kide...@openlinksw.com> wrote: > On 8/7/13 6:12 PM, Hugh Glaser wrote: >> Norman, thanks for being so attentive to my needs :-) >> >> I actually started looking at WebID just because of RWW.IO >> >> But in answer to your footnote: >> It turns out last week I brought up a private social network, using >> Wordpress, for a group of people, who aren't just n-t-f (I finally guessed >> this was non-technical friends, I think :-)), but actually pretty much t-i-f >> (technically illiterate friends) - some don't have their own email accounts >> and also some of them clearly have problems with the htaccess dialogue in >> their browsers, and certainly can't seem to find the "more" button at the >> bottom of a page! >> At the moment, I have a single username/password (u/p) that we all know for >> access to the site, using htaccess (they don't need to know it is htaccess, >> Kinglsey, they just see a request for a u/p). >> If they want to contribute, then they have to login, using a different u/p I >> have made for them (actually the same password!)(*) >> (I decided, probably in my ignorance, that adding htaccess was better than >> trying to understand how to keep the entire site blocked using Wordpress - I >> don't even want it to be known about.) >> The site also has personal profile pages, so that people know each others' >> addresses etc - hence the wish to block the complete site. >> There are wordpress plugins etc that sort of would help, but not quite. >> Anyway, I thought I would ponder on how WebID might help to do some or all >> the personal stuff associated with the site, and whether there would then be >> extra benefit for the users and/or me. >> I know that these people, as many are, would be very wary of giving any >> information to a web site they didn't trust, which is probably anything >> other than my site, gov.uk, bbc and a few others. >> It isn't all clear to me - hence the probable lack of focus of my comments. >> But it is a real use case that I am using, so I sort of find it interesting. > > Okay, imagine this flow: > > 1. you generate WebID bearing certificates and private keys for your friends > 2. package as pkcs#12 files > 3. dispatch via email > 4. exchange the password for opening the file by phone (since encrypted email > isn't an option, just yet for this friend profile) > 5. use a WebID+TLS based ACL to protect the WordPress endpoints (I am > assuming that you self host your WordPress instance) > 6. share new URLs for WordPress service with friends. > > > 1-6 only requires the following actions on the part of your friends: > > 1. read email > 2. open the attachment > 3. follow native OS instructions for processing pkcs#12 files (i.e., storing > to native OS key store) > 4. done. > > Next time they visit the URL for your WordPress service, they are challenged > to present their digital certificate (or identity card) which will be > presented automatically by their browser. They click OK, and they should okay > :-) > >> >> Yes, you read that right - I am talking about people who don't have email >> accounts (and don't want one), but might use WebID to access sites! > > Huh? > > Okay, so scrap the email exchange part. You can place the pkcs#12 file at a > public or private network location. Use the phone to exchange passwords for > opening up the file when prompted by their host OS. >> And no, they have never used a program that can do text editing, not even >> Word. > > I wasn't expecting them to edit Turtle, so in this case, they should be set. > It's all in the pkcs#12 file . > >> >> I hope that gives a bit more context. > > For me, yes ! > > > Kingsley >> And thanks again for all the interesting discussion - it's great to see the >> list working so well. >> >> Hugh >> >> PS >> (*) I realise that some people will find the security level appalling - but >> security is always a balance of convenience against security, and I have >> gone for quite weak security with more convenience. I may change this, and >> in fact that is part of my interest in WebID. >> >> On 7 Aug 2013, at 21:36, Norman Gray <nor...@astro.gla.ac.uk> >> wrote: >> >>> Greetings. >>> >>> Thanks, Kingsley, for the trace of the various steps. >>> >>> On 2013 Aug 7, at 19:14, Norman Gray <nor...@astro.gla.ac.uk> wrote: >>> >>>> Hey -- this stuff is easy! (and nearly works) >>> Walking home, it occurred to me that this is easy in a very _specific_ >>> sense: (given that someone had added some UI chrome around Nicholas >>> Humfrey's script) I would not think it unreasonable to walk a non-technical >>> friend through that process, giving them the script but not touching their >>> mouse or keyboard, and ending up with a usable WebID. >>> >>> Now, that particular process requires that we first sign said n-t-f up at >>> purl.org, on the entirely reasonable assumption that they don't have an >>> account there already. >>> >>> That violates Hugh's demand that he avoid 'one last login'. However it >>> nonetheless does distil out the point that this last step, of associating a >>> 303-redirect with a URI you control, is the _only_ irreducibly exotic web >>> step in the process. Also, purl.org shows that that can be done >>> straightforwardly (or reasonably so, since purl.org's interface could use >>> some prettification). Hmm: things like bit.ly are URI rewriting services, >>> albeit 302-only. People manage to use bit.ly aaaall the time. >>> >>> Therefore _if_ Hugh discovered that any of the accounts he already owns >>> allows him to add this one bit of plumbing, and presuming he has something >>> like Dropbox, to turn the action of putting bytes on the web into a >>> non-exotic step, then he's sorted. >>> >>> By the way: 'non-exotic' here, means an action that the n-t-f already has >>> some mental model of, and which they have already managed to do, for some >>> other entirely pragmatic reason. Interestingly, I suspect that the process >>> of generating the WebID certificate in the browser fails this test, _even >>> though_ the certificate has to end up in the browser (other than on OS X), >>> because there's no clear mental model of what's happening in this step, and >>> that matters. >>> >>> ---- >>> >>> The above does sidestep the question of why the n-t-f so wants a WebID. >>> None of the examples that have appeared in this thread so far are >>> compelling in the right way, I think, but it would only take one gmail or >>> dropbox or similar to decide to try WebID, for the whole thing to suddenly >>> work. >>> >>> All the best, >>> >>> Norman >>> >>> >>> -- >>> Norman Gray : http://nxg.me.uk >>> SUPA School of Physics and Astronomy, University of Glasgow, UK >>> >>> >> >> >> > > > -- > > Regards, > > Kingsley Idehen > Founder & CEO > OpenLink Software > Company Web: http://www.openlinksw.com > Personal Weblog: http://www.openlinksw.com/blog/~kidehen > Twitter/Identi.ca handle: @kidehen > Google+ Profile: https://plus.google.com/112399767740508618350/about > LinkedIn Profile: http://www.linkedin.com/in/kidehen > > > > >