Brad Fitzpatrick Six Apart, Ltd. / LiveJournal / Danga August 2005.

Slides:



Advertisements
Similar presentations
The How of OAuth OAuth Hackathon – Six Apart
Advertisements

SECURE SITES. A SECURE CONNECTION TERMS Secure Sockets Layer (SSL) An older Internet protocol that allows for data transmission between server and client.
The I-Card Cloud Selector CloudCard.  An introduction to Avoco’s fully Cloud based I-Card Selector, CloudCard  A demonstration of the logon process.
Addressing spam and enforcing a Do Not Registry using a Certified Electronic Mail System Information Technology Advisory Group, Inc.
Post-Module WordPress 3-5 BTM 395: Internet Programming.
By: Ansuya Chauhan.
And YADIS David Recordon Six Apart, Ltd. / LiveJournal.com / Danga Interactive, Inc. Parts of presentation stolen from Brad Fitzpatrick.
Experimental OpenID Service for DOEGrids Summer Student Program 2008 Jan Durand ESnet 08/06/08.
Mark Phillip markphillip.com “Badges? We don't need no stinkin' badges!” A Look at Identity on the Web.
Unit 12 Using the Internet & Browsing the Web.  Understand the difference between the Internet and the World Wide Web  Identify items on a web page.
 Key exchange o Kerberos o Digital certificates  Certificate authority structure o PGP, hierarchical model  Recovery from exposed keys o Revocation.
Introduction to OpenID Huanxing Shen WHIM 2009Spring.
Web Services Security Multimedia Information Engineering Lab. Yoon-Sik Yoo.
Acquiring A Web Presence Caroline Leibinger Jimmy Neyhart Joey Tuma.
OpenID And the Future of Digital Identity Alicia Bozyk April 1, 2008.
Single Sign-on Writ Large. What is OpenID?  Open, Decentralized single sign on standard  Allows users to use a single digital identity across multiple.
Remote Access SSL VPN Stewart Duncan Technical Manager.
Security Jonathan Calazan December 12, 2005.
Short History YouTube, LLC* is a video sharing website where users can upload, view and share video clips. YouTube was created in February 2005 by three.
MEDLINEplus Tutorial Chicago Urban Health Outreach Project MEDLINEplus Tutorial Use the buttons below to navigate. Start by clicking the right arrow to.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
An Introduction to Information Card Barry Dorrans Charteris plc
Digital Certificates Public Key Deception Digital Certificates Certificate Authorities Public Key Infrastructures (PKIs)
Wolfgang Schneider NSI: A Client-Server-Model for PKI Services.
IDENTITY MANAGEMENT Hoang Huu Hanh (PhD), OST – Hue University hanh-at-hueuni.edu.vn.
1 Chapter 8 Securing Information Systems. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized.
Internet Trust Defined. Delivered. Electronic Business the Way It Was Meant to Be.
NASA NEX & OpenID -- Observations -- Andreas Matheus Secure Dimensions.
Human-Computer Interface Course 5. ISPs and Internet connection.
New Class Name Here EFRT 308 EFRT 460 EFRT 461 WordPress.
Masud Hasan Secue VS Hushmail Project 2.
Identity Management in Education. Welcome Scott Johnson, NetProf, Inc. Creator of OmnID Identity Management for Education
Demos!. Demo 1: Dropbox-like Behavior Syndicate producerconsumer.
Identity Management Report By Jean Carreon and Marlon Gonzales.
Implementing ISA Server Publishing. Introduction What Are Web Publishing Rules? ISA Server uses Web publishing rules to make Web sites on protected networks.
SEAN WALLBRIDGE ITGROOVE AND SECTOR LEARNING SOLUTIONS SharePoint Users Group – March 12, 2009.
Chapter 1: The Internet and the WWW CIS 275—Web Application Development for Business I.
The Internet Identity Layer OpenID Connect Update for HIT Standards Committee’s Privacy and Security Workgroup Wednesday, March 12th from 10:00-2:45 PM.
SSL with New Client Authentication Takuya Yahagi, S University of Aizu Performance Evaluation Lab.
All Input is Evil (Part 1) Introduction Will not cover everything Healthy level of paranoia Use my DVD Swap Shop application (week 2)
Building Security into Your System Bill Major Gregory Ponto.
Introducing HingX now with Capacity Development Network.
Windows 2000 Certificate Authority By Saunders Roesser.
XP Practical PC, 3e Chapter 8 1 Browsing and Searching the Web.
© 2008 by Matt Flaherty & Mary Ruddy; made available under the EPL v1.0 Security & Identity : From present to future Matt Flaherty, IBM Mary Ruddy, Meristic.
David Recordon IOS Vancouver 2006.
McLean HIGHER COMPUTER NETWORKING Lesson 8 E-Commerce Explanation of ISP Description of E-commerce Description of E-sales.
Mobile Security. Security is Hard Just this year: Denial of service Credit card compromise I Love you Cost to manage security quickly becomes prohibitive.
RUBRIC IP1 Ruben Botero Web Design III. The different approaches to accessing data in a database through client-side scripting languages. – On the client.
1 Effectively Coordinating Print and Web Publications David Strom (516)
Saphe surfing! 1 SAPHE Secure Anti-Phishing Environment Presented by Uri Sternfeld.
1. U2F Case Study Examining the U2F paradox 3 What is Universal 2 nd Factor (U2F)?
Joseph Smarr A Practical Vision for Friends-List Portability Joseph Smarr IIW 2007b, 12/5/2007.
Web Services Security Patterns Alex Mackman CM Group Ltd
Basic Computer Terms Introduction to Computer Applications Mrs. Sorrell.
Social Internet Marketing Introduction October 2009 Deb Durkey Social Internet Expertise.
Experiences Deploying OpenID for a Broad User Base Security and Usability Considerations Breno de Medeiros Identity Management 2009, September
Matt Bostrom, APCO Worldwide THE SIX ONLINE REPUTATIONAL DRIVERS.
Csci5233 Computer Security1 Bishop: Chapter 14 Representing Identity.
Uploading Web Page  It would be meaningful to share your web page with the rest of the net user.  Thus, we have to upload the web page to the web server.
A person responsible for maintaining websites. o Webmaster ensure that web servers hardware and software are operating accurately. o Design websites.
Spoofing The False Digital Identity. What is Spoofing?  Spoofing is the action of making something look like something that it is not in order to gain.
MICROSOFT AJAX CDN (CONTENT DELIVERY NETWORK) Make Your ASP.NET site faster to retrieve.
Digital Certificates Presented by: Matt Weaver. What is a digital certificate? Trusted ID cards in electronic format that bind to a public key; ex. Drivers.
Client Certs -- the old-new thing CAcert The Community CA cacert.org.
Federation made simple
Client Certs -- the old-new thing
Why is it important? ❏ Most website owners do not think that if they paste address on page or post than they have too much risk of spam. ❏
Cloud system.
Presentation transcript:

Brad Fitzpatrick Six Apart, Ltd. / LiveJournal / Danga August 2005

What is OpenID? ● an identity system – all the rage lately ● a protocol – gratis, libre ● not a service or company – not Passport – not TypeKey – not Sxip ● survives if companies turn evil or go out of business

Why? ● no authentication way too common ● comment spam ● auth interop – LiveJournal – TypePad – Movable Type – DeadJournal, WordPress, TextPattern,..... lame

Design Goals ● low barrier to entry – works with static HTML pages – no registration (no central server) – understandable identity (a URL) ● no new namespace ● no public keys (key revocation, etc...) – no SSL required – no browser plugins ● most simple protocol possible – other needs layered atop

What OpenID isn't... ● a trust system – need identity before you can have trust ● a solution for all identity problems ● perfectly secure – DNS spoofing – man-in-the-middle ● between some parts

How's it work? ● proves “who” you are – one-time assertions w/ digital signature – see openid.net for specs ● not that you're a good person – spammers can/will/have setup OpenID servers – better than state of today – Trust/reputation providers on their way ● 5+ companies working on this ● TrustRank

Chicken / Egg ● LiveJournal / TypePad / Movable Type – all support OpenID server – OpenID consumer in LJ/MT ● TypePad soon enough ● TypeKey – still speaks TypeKey. also speaks OpenID – an OpenID provider for people without their own ● 10M+ OpenID users who don't know it – already: DeadJ/GreatestJ/LiveJ interop

Why URLs as identity? ● already the convention – Comment by Matt at 7:23pm – mouseover to see which Matt ● users don't understand public keys ● users don't understand namespaces ● users do understand URLs – 10+ years of billboards and TV commercials ● you can click them – tangible

Why should you use OpenID? ● interop with others using OpenID – your users can mark external users leaving comments as “trusted” or “friends” – your users can bring their identity to other sites, thus advertising your service ● not theoretical, already in use ● can support OpenID + _______ in future – no reason to only support OpenID ● free ● open libraries for most languages