OpenID Artifact Binding

From IIW
Revision as of 12:39, 7 February 2011 by WikiSysop (talk | contribs) (Undo revision 3073 by Igiwydijok (Talk))

(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to: navigation, search

Convener: =nat

Notes-taker: Breno de Medeiros

Tags: OpenID Artifact Extension


Discussion notes:

Idea: Send smaller payload through the browser (indirect communication).

Goal: Support less powerful mobile browsers that may have stricter URL lengths and no support for Javascript.

Question: How to bind the token to the requester? Standard XSRF protection can be used to bind the request to the browser session at the RP. RP must sign requests to prevent artifact being stolen.

Statelessness: Can be achieved for identity select, some state required for claimed id. Allow artifact to be different in the request and the response to support statelessness.

Maximum length for artifacts should be specified.

Doing it through extensions—not possible, it requires changes to add signatures. Suggestion: Use two different keys to avoid reflection attacks.