openid webid and wif

For production reasons (yea, it's not all demos!), we have been WIF enabling
our web applications (IDP, IDP proxy and several SPs). (WIF is Microsoft
websso library, properly engineered to be token and protocol independent).
This is quite easy, as it simply required adding WIF libraries to endpoints
that were working with SAML offloading servers. (This means, the core flows
are already implemented, bar a switch of URI parameters or blob format)

 

Anyways, we were able to play with a fun interaction.

 

We have Google (openid) talking to Microsoft ACS bridge (ws-fedp + claims
transformer) which signs a SAML2 assertion with the key/cert issued by
Henry's myxwiki webid issuer, which is processed by our IDP proxy, which
calls my webid validator class to verify the cert supporting the
assertion's/container's signature, which authorized a session creation on
the IDP, which performs an act of session proxying to an SP site

 

Presumably, I now get lynched by each and every religion, claiming special
knowledge.

 

Now, tomorrow, Im going to turn on our impersonation feature (which is claim
based, already), in which local roles authorize one claimant (evaluated at
the IDP proxy) the rights to impersonate another user, at the SP site!

 

 

 

Received on Tuesday, 12 April 2011 05:38:53 UTC