- From: Kingsley Idehen <kidehen@openlinksw.com>
- Date: Wed, 04 Jun 2014 14:02:14 -0400
- To: public-webpayments@w3.org
- Message-ID: <538F5F26.10107@openlinksw.com>
On 5/31/14 2:30 PM, Dave Longley wrote: > On 05/31/2014 03:41 AM, Anders Rundgren wrote: >> >On 2014-05-30 16:25, Dave Longley wrote: >>> >>On 05/30/2014 02:29 AM, Anders Rundgren wrote: >>>> >>>All distributed uses of U2F will force you into OpenID-kind >>>> >>>of schemes and NASCAR screens. There's IMO*no point whatsoever* >>>> >>>"reinventing" OpenID or try competing with OpenID. >>> >> >>> >>Suppose: >>> >> >>> >>1. You register with an Identity Provider of your choice using your >>> >>browser. Your Identity Provider may/may not use U2F or some other >>> >>mechanism to register your device. Your browser, if it supports this >>> >>feature, will remember your Identity Provider. >>> >> >>> >>2. You visit some other website you'd like to log into to get access to >>> >>their services. >>> >> >>> >>3. When asked to login, your browser contacts your Identity Provider to >>> >>authenticate you. If your browser does not yet support this mechanism, a >>> >>login shim is provided by the website you're trying to log into. The >>> >>shim accesses a trusted third-party site to provide you with an >>> >>appropriate interface to your Identity Provider. >>> >> >>> >>4. Your Identity Provider may/may not require 2-factor authentication. >>> >>If it does, and your device (or browser, etc.) is registered, login will >>> >>happen immediately, without the need for any username/password. It is >>> >>likely that people will choose Identity Providers with N-factor >>> >>authentication options because it provides them with extra security. >>> >> >>> >>5. Your Identity Provider transmits some credential, with your approval, >>> >>to the relying party (the original site you're trying to log into) which >>> >>is used to authenticate you and provide you access to the service. >>> >> >>> >>Note: >>> >> >>> >>1. There is no NASCAR screen. Your browser knows who your Identity >>> >>Provider is. If your browser doesn't yet support this protocol, then the >>> >>third party shim executes a discovery query to determine who your >>> >>Identity Provider is for you, based on your email address and a >>> >>passphrase that is only used for this discovery purpose. >>> >> >>> >>2. This is fully compatible with a distributed use of U2F. You only need >>> >>to use it at your Identity Provider and any Identity Provider may >>> >>implement it. A digitally-signed credential is provided by your Identity >>> >>Provider to some other relying party to provide the appropriate level of >>> >>authentication there (no U2F registration is required at the relying >>> >>party). >>> >> >>> >>3. If your browser can't yet obscure information about the relying party >>> >>from your Identity Provider, a trusted "login mixnet" can be provided to >>> >>intermediate communication between your Identity Provider and the >>> >>relying party in order to protect your privacy. >>> >> >>> >>Much of the above comes from the "Identity Credentials" proposal that >>> >>has been discussed on this mailing list. We have also discussed using >>> >>"Telehash" as part of a solution to provide an Identity Provider >>> >>discovery mechanism that solves the NASCAR problem. >>> >> >>> >>I don't believe any of this to be incompatible with U2F, and if Identity >>> >>Providers want to use U2F, they are more than welcome to; it is likely >>> >>value-add for their customers. >>> >> >> > >> >Thanx David for the elaborate write-up! > You're welcome, I hope it cleared up some of the strategy/design goals. > >> > >> >I understand what you are writing but still do feel a bit confused about >> >WebPayments fixation with identity and identity providers. In my world >> >payment providers are rather in the center. They typically want customers >> >to authorize transaction requests. 3D Secure is my starting point which >> >may explain why we seem to end up with different tools and concepts. > The idea is that ensuring a person's identity need only be loosely > coupled with their payment provider is an important feature of a > payments system that is intended to fit in with the rest of the Web. > That means talking about "Identity Providers", not just "Payment > Providers". We need to address the "Identity Problem" because it is > important for payments, however, Identity touches many different areas > of the Web, not*just* payments. > > This is about creating (or preserving) appropriate abstractions and > expanding choice so that a person may*either* choose to have a separate > Identity Provider (from their Payment Provider), or they may use a > service that acts as both. We're trying to ensure that various component > pieces can work both on their own and together. This approach, in > general, yields a better overall design (eg: reusable components) and it > has the potential to protect against various failure scenarios or spec > holdups during the standardization process. +1 There is no other architectural path to a solution in regards to: 1. broad adoption 2. scalability following adoption. -- Regards, Kingsley Idehen Founder & CEO OpenLink Software Company Web: http://www.openlinksw.com Personal Weblog: http://www.openlinksw.com/blog/~kidehen Twitter Profile: https://twitter.com/kidehen Google+ Profile: https://plus.google.com/+KingsleyIdehen/about LinkedIn Profile: http://www.linkedin.com/in/kidehen
Attachments
- application/pkcs7-signature attachment: S/MIME Cryptographic Signature
Received on Wednesday, 4 June 2014 18:02:39 UTC