- From: Peter Williams <home_pw@msn.com>
- Date: Sun, 29 Jun 2014 22:35:30 +0000
- To: Kingsley Idehen <kidehen@openlinksw.com>, "public-rww@w3.org" <public-rww@w3.org>, "public-webid@w3.org" <public-webid@w3.org>
- Message-ID: <SNT404-EAS192A4797BB0982FDF5DF4E892050@phx.gbl>
can we add an “community of interest” IDP to the list? at https://login.windows.net/rapmlsqa.com there is another OAUTH IDP, openid connect enabled. See http://leastprivilege.com/2014/06/12/using-discovery-and-katana-middleware-to-write-an-openid-connect-web-client/ - a discovery method for the various oauth URIs, should one input andy@rapmlsqa.com in a identifier box intended for the million IDPs of office 365 world. Various signed JSON-P tokens back, suitable for user profiling, or getting API tokens in the name of the original user, etc. ill guess there is a parallel google initiative, all coordinated by the US NSTIC and its nefarious aims for “cooperative vendors”. Im supportive, providing the US stuff boots assurance in peer-peer identity, which then takes “systemic OECD-wide security policies” into account. From: Kingsley Idehen Sent: Sunday, June 29, 2014 2:38 PM To: public-rww@w3.org, public-webid@w3.org Cc: peter Msn All, Simple example of loosely coupled identification and authentication. Basically, I have a simple Access Control List (ACL) that requires you to verify your identity using a variety of identifier and authentication protocol combos en route to viewing the protected resource (a PNG image). Note: WebID-TLS and TLS are distinct options i.e., you can use one or the other. Links: [1] http://kingsley.idehen.net/DAV/home/kidehen/Public/RWW-Demos/billionaire-ping-pong.png -- Regards, Kingsley Idehen Founder & CEO OpenLink Software Company Web: http://www.openlinksw.com Personal Weblog 1: http://kidehen.blogspot.com Personal Weblog 2: http://www.openlinksw.com/blog/~kidehen Twitter Profile: https://twitter.com/kidehen Google+ Profile: https://plus.google.com/+KingsleyIdehen/about LinkedIn Profile: http://www.linkedin.com/in/kidehen Personal WebID: http://kingsley.idehen.net/dataspace/person/kidehen#this
Received on Sunday, 29 June 2014 22:51:35 UTC