[
Date Prev][
Date Next][
Thread Prev][
Thread Next][
Date Index][
Thread Index]
[
List Home]
AW: RoamingStore for Password Cards: [WAS: Re: AW: [higgins-dev] CardSync: Agenda for Higgins developer call March26 atnoon ET]
|
You are right. This is still evolving. The current card looks like this (see below).
I think that adresses your issues. I removed the "?" because it conflicts with the variable claims. Please note that the issuer is "special" and the cards are managed. This way I assume that cards are somewhat more legal in respect to ISIP. The issuer could even be some working https endpoint if it is working together with a card sync store.
Regarding "Per account" etc: in Firefox I have the following info:
login.hostname
login.formSubmitURL
login.httpRealm
login.usernameField
login.passwordField
Some of them are null in some cases. In the current version I just concatenate all these fields and base64 encode them to give the cardid.
-Axel
<RoamingStore xmlns="http://schemas.xmlsoap.org/ws/2005/05/identity">
<RoamingInformationCard>
<InformationCardMetaData xml:lang="en">
<InformationCardReference>
<CardId>urn:openinfocard:W2h0dHA6Ly93d3cua3VwcGluZ2VyY29sZS5jb20saHR0cHM6Ly93d3cua3VwcGluZ2VyY29sZS5jb20sbnVsbCx1c2VybmFtZSxwYXNzd29yZF0=</CardId>
<CardVersion>1</CardVersion>
</InformationCardReference>
<CardName>https://www.kuppingercole.com</CardName>
<Issuer>urn:openinfocard:storage:component</Issuer>
<TimeIssued>2009-04-02T14:57:14.375Z</TimeIssued>
<SupportedTokenTypeList>
<TokenType xmlns="http://schemas.xmlsoap.org/ws/2005/02/trust">urn:openinfocard:tokentype:usernamepassword</TokenType>
</SupportedTokenTypeList>
<SupportedClaimTypeList>
<SupportedClaimType Uri="http://schemas.openinfocard.org/ws/2009/03/identity/claims/username/urn:uuid:W2h0dHA6Ly93d3cua3VwcGluZ2VyY29sZS5jb20saHR0cHM6Ly93d3cua3VwcGluZ2VyY29sZS5jb20sbnVsbCx1c2VybmFtZSxwYXNzd29yZF0=">
<DisplayTag>username</DisplayTag>
<Description>username</Description>
</SupportedClaimType>
<SupportedClaimType Uri="http://schemas.openinfocard.org/ws/2009/03/identity/claims/password/urn:uuid:W2h0dHA6Ly93d3cua3VwcGluZ2VyY29sZS5jb20saHR0cHM6Ly93d3cua3VwcGluZ2VyY29sZS5jb20sbnVsbCx1c2VybmFtZSxwYXNzd29yZF0=">
<DisplayTag>password</DisplayTag>
<Description>password</Description>
</SupportedClaimType>
</SupportedClaimTypeList>
<IsSelfIssued>fasle</IsSelfIssued>
<HashSalt>ThwN0VMmd1eACq6YwJqdWLdSvuc=</HashSalt>
<TimeLastUpdated/>
<IssuerId/>
<IssuerName>MeMyselfAndI</IssuerName>
<BackgroundColor>16777215</BackgroundColor>
</InformationCardMetaData>
<InformationCardPrivateData>
<MasterKey>JhqtikXltNiOSAm3UWoS9owKXJA1VYLmamom1GPD4Fb0nkmyDESAytXcFSI9COXH9A09HXzbf6Cbe8PHKboJxA==</MasterKey>
<ClaimValueList>
<ClaimValue Uri="http://schemas.openinfocard.org/ws/2009/03/identity/claims/password/urn:uuid:W2h0dHA6Ly93d3cua3VwcGluZ2VyY29sZS5jb20saHR0cHM6Ly93d3cua3VwcGluZ2VyY29sZS5jb20sbnVsbCx1c2VybmFtZSxwYXNzd29yZF0=">
<Value>sadf</Value>
</ClaimValue>
<ClaimValue Uri="http://schemas.openinfocard.org/ws/2009/03/identity/claims/username/urn:uuid:W2h0dHA6Ly93d3cua3VwcGluZ2VyY29sZS5jb20saHR0cHM6Ly93d3cua3VwcGluZ2VyY29sZS5jb20sbnVsbCx1c2VybmFtZSxwYXNzd29yZF0=">
<Value>sdf</Value>
</ClaimValue>
</ClaimValueList>
</InformationCardPrivateData>
</RoamingInformationCard>
</RoamingStore>
________________________________
Von: higgins-dev-bounces@xxxxxxxxxxx [mailto:higgins-dev-bounces@xxxxxxxxxxx] Im Auftrag von Paul Trevithick
Gesendet: Mittwoch, 1. April 2009 16:54
An: higgins-dev
Cc: jbradley@xxxxxxx
Betreff: RoamingStore for Password Cards: [WAS: Re: AW: [higgins-dev] CardSync: Agenda for Higgins developer call March26 atnoon ET]
Axel,
I think you forgot to append the "username" and "password" strings to the
http://schemas.openinfocard.org/ws/2009/03/identity/claims/ "base" URI, but yes, this could work.
* What you have here follows the "per account" design option here [1].
* I assume that you are passing the site as the "?" parameter in both "username" and "password" claim requests. This is a twist on what is proposed here [2] --we also pass the site in a "?" parameter, but do so on a separate "webpage" claim. Your approach eliminates the need for this third webpage claim. I think I prefer your approach.
* I agree that we could use a special tokentype
* This approach could work self issued or not.
--Paul
[1] http://wiki.eclipse.org/Password_Card_Metaphor_Design_Options
[2] http://wiki.eclipse.org/Password_Cards#Required_Claims
On 3/30/09 5:37 PM, "Axel.Nennker@xxxxxxxxxx" <Axel.Nennker@xxxxxxxxxx> wrote:
What do you think of this RoamingStore for UsernamePasswordCards?
It was generated by a Firefox extension that I wrote this evening.
It has a special tokentype,
the supportedClaim contains the URL in the ?h= portion,
it is not self-issued
The danger that it will be used at a wrong site should be minimal because the site is encoded in the claim's URI.
An RP "bad" would have to request exactly this claim to steal this card's values for the kuppingercole site.
But then hopefully the "this is your first visit" dialog should stop the user...
Although I did not try to import it into CardSpace because I have not javascript code to encrypt the store.
-axel
<RoamingStore xmlns="http://schemas.xmlsoap.org/ws/2005/05/identity">
<RoamingInformationCard>
<InformationCardMetaData xml:lang="en">
<InformationCardReference>
<CardId>urn:uuid:f0596820-4a90-41eb-b64b-c368e9549462</CardId>
<CardVersion>1</CardVersion>
</InformationCardReference>
<CardName>https://www.kuppingercole.com</CardName>
<Issuer>urn:openinfocard:storage:component</Issuer>
<TimeIssued>2007-03-08T17:04:52.09375Z</TimeIssued>
<SupportedTokenTypeList>
<TokenType xmlns="http://schemas.xmlsoap.org/ws/2005/02/trust">urn:openinfocard:tokentype:usernamepassword</TokenType>
</SupportedTokenTypeList>
<SupportedClaimTypeList>
<SupportedClaimType Uri="http://schemas.openinfocard.org/ws/2009/03/identity/claims/?h=https://www.kuppingercole.com">
<DisplayTag>username</DisplayTag>
<Description>username</Description>
</SupportedClaimType>
<SupportedClaimType Uri="http://schemas.openinfocard.org/ws/2009/03/identity/claims/?h=https://www.kuppingercole.com">
<DisplayTag>password</DisplayTag>
<Description>password</Description>
</SupportedClaimType>
</SupportedClaimTypeList>
<IsSelfIssued>fasle</IsSelfIssued>
<HashSalt>AFFKiQEqRyZGbX47JVVDzA==</HashSalt>
<TimeLastUpdated/>
<IssuerId/>
<IssuerName>MeMyselfAndI</IssuerName>
<BackgroundColor>16777215</BackgroundColor>
</InformationCardMetaData>
<InformationCardPrivateData>
<MasterKey>uinRcAPgRlSZGd7B4bAHsf7U1vgkhbklcBhpoxA1ZD4=</MasterKey>
<ClaimValueList>
<ClaimValue Uri="http://schemas.openinfocard.org/ws/2009/03/identity/claims/?h=https://www.kuppingercole.com">
<Value>sadfasadf</Value>
</ClaimValue>
<ClaimValue Uri="http://schemas.openinfocard.org/ws/2009/03/identity/claims/?h=https://www.kuppingercole.com">
<Value>asdfasf</Value>
</ClaimValue>
</ClaimValueList>
</InformationCardPrivateData>
</RoamingInformationCard>
</RoamingStore>
________________________________
Von: higgins-dev-bounces@xxxxxxxxxxx [mailto:higgins-dev-bounces@xxxxxxxxxxx] Im Auftrag von Paul Trevithick
Gesendet: Donnerstag, 26. März 2009 14:17
An: higgins-dev
Cc: John Bradley
Betreff: Re: [higgins-dev] CardSync : Agenda for Higgins developer call March26 atnoon ET
Axel,
WRT auth, we agree with you. John Bradley has been suggesting the same thing to me for a couple of weeks. Why reinvent auth to the CardSync server, why not use a token. The CardSync that we threw up was just something to get the ball rolling. We want to evolve it. Your input is vital and most helpful. Don't assume what we've done is anything more than a prototype. This CardSync protocol really needs to be well designed (as I'm sure you'd agree) as it could well be very important for lots of uses in the future. Your inputs are always valued, so please consider yourself part of the CardSync design team. This is one reason I like open source so much. You get many more perspectives weighing in. And if we're willing to listen we get a better result.
--Paul
On 3/26/09 8:42 AM, "Axel.Nennker@xxxxxxxxxx" <Axel.Nennker@xxxxxxxxxx> wrote:
Regarding 2. and [2] from the latest Agenda email and last weeks email regarding CardSync:
"GET Cards" is only one example of the many bad decisions from
http://wiki.eclipse.org/CardSync_Protocol
Most methods/calls described in CardSync_Protocol reinvent the wheel!
Another example:
AuthCredential - "/AuthCredential" Signon
You are posting a usernamePasswordAuthCredentialTO but this is sö 90ties...
The selector accessing the cardstore in the cloud is just a rich-client that needs an access token to access the cardstore.
So the way this MUST be achieved to adhere to the overall Higgins goals is:
- send a security token request to the cardstore idp and retrieve a security token. Authenticate to the IdP using what ever method it accepts but use the standard RST for this.
- use that security token in to access the cardstore (RP) to e.g. retrieve the cards
The difference between the data exchanged in the Signon example and the standard RST is minimal. And Higgins already has all the code needed to do it the standard way.
-Axel
-----Ursprüngliche Nachricht-----
Von: higgins-dev-bounces@xxxxxxxxxxx [mailto:higgins-dev-bounces@xxxxxxxxxxx] Im Auftrag von Alexander Yuhimenko
Gesendet: Donnerstag, 19. März 2009 15:28
An: higgins-dev@xxxxxxxxxxx
Betreff: RE: CardSync was: [higgins-dev] Agenda for Higgins developer callMarch 19
Hello,
GET /cardsync/rs/Cards was implemented just for FC2 demo, it's temporary method due to i didn't finish method which return all changes (ICards, Card history, Card categories, ...) from server between client and server root revisions.
if you think "GET Cards" is useful, i may re-implement it by using RoamingStore and card extension for transferring CardSync specific data (Revsion information etc) or without it.
I'm sure, CardSync should be compatible with "Identity Selector Interoperability
Profile" as much as possible, but it will not be clear/easy always usage extensions for transferring CardSync specific data, so CardSync have to define own schema.
it may make sense to support few methods for importing cards from Crd/Crds files and getting them, for example some Card selectors would use CardSync like on-line backup service with minimal changes.
--
thanks,
Alexander Yuhimenko
From: "Axel.Nennker@xxxxxxxxxx" <Axel.Nennker@xxxxxxxxxx>
Date: March 19, 2009 4:31:56 AM EDT
To: "higgins-dev@xxxxxxxxxxx" <higgins-dev@xxxxxxxxxxx>
Subject: CardSync was: [higgins-dev] Agenda for Higgins developer call March 19
Reply-To: "Higgins (Trust Framework) Project developer discussions" <higgins-dev@xxxxxxxxxxx>
Sorry for chiming in late but why do you define your own cardstore xml in
http://wiki.eclipse.org/CardSync_Protocol ?
Why isn't the response to
GET /cardsync/rs/Cards HTTP/1.1
a RoamingStore as defined in identity.xsd ?
http://schemas.xmlsoap.org/ws/2005/05/identity/identity.xsd
There are enough extension points in the schema if you need extra data and if you do not want to use some required value then like BackgroundColor then set them to 0.
-Axel
------------------------------------------------
Von: higgins-dev-bounces@xxxxxxxxxxx [mailto:higgins-dev-bounces@xxxxxxxxxxx] Im Auftrag von Paul Trevithick
Gesendet: Donnerstag, 19. März 2009 05:19
An: higgins-dev
Betreff: [higgins-dev] Agenda for Higgins developer call March 19
Logistics
Time: noon Eastern
Dial-in: 1-866-362-7064 / 89-2048#
Agenda
1. [Brian] 1.1M6 - was targeted for March 18
See [1]
2. [Brian, Alexander, Andy] Selector Architecture Harmonization
See [2]
Andy didn't quite get the Synchronizing CardStore done; may need to hand this off to another developer
3. [Mary, Jeesmon, Jochen] Current status of RCP Selector use for EclipseCON demo
4. [Markus] IdAS Authentication
Markus is working on a proposal [4]
5. [Paul] Higgins website improvements [3]
There are 6 items to discuss
2.1 Flatten Solutions into the 3 solutions areas (nav structure change)
2.2 Reorganizing Solutions
2.3 Eliminate "Higgins Data Model" (nav structure change)
2.4 New solution names
2.5 New component set names
2.6 New Downloads Page
Updated home page implementing (2.1, 2.2 and 2.3) is available in the staging area [5]
6. [Paul] FC2 Higgins Workshop Mar 11-13 in Paris
We demoed the Selector Linux-GTK reading/writing cards using CardSync
FC2 member (Orange) has developed a selector for Nokia J2me phone
FC2 has also developed a web selector
7. [Paul] Propose merge web ICM and the Web Selector together into a single solution
8. [Paul] CardSync
JohnB's authentication idea (use personal card)
Should we use it as the one and only CardStore API for the Higgins selector? This was discussed briefly last week in Paris. Perhaps a simple core protocol and then extensions.
9. [Paul, Markus] All Selectors diagram [6]
Discuss if diagram is correct WRT process boundaries (as noted in [6])
[1] http://wiki.eclipse.org/Higgins_1.1M6
[2] http://wiki.eclipse.org/Selector_Architecture_Harmonization
[3] http://wiki.eclipse.org/Higgins_1.1_Plan#Website
[4] http://wiki.eclipse.org/Authentication_Materials
[5] http://www.eclipse.org/higgins/ver2/index.php
[6] http://wiki.eclipse.org/Selector_Overview#H1.1_All_Selectors
_______________________________________________
higgins-dev mailing list
higgins-dev@xxxxxxxxxxx
https://dev.eclipse.org/mailman/listinfo/higgins-dev
_______________________________________________
higgins-dev mailing list
higgins-dev@xxxxxxxxxxx
https://dev.eclipse.org/mailman/listinfo/higgins-dev