skip to main content
10.1145/1179529.1179532acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
Article

OpenID 2.0: a platform for user-centric identity management

Published:03 November 2006Publication History

ABSTRACT

With the advancement in user-centric and URI-based identity systems over the past two years, it has become clear that a single specification will not be the solution to all problems. Rather, like the other layers of the Internet, developing small, interoperable specifications that are independently implementable and useful will ultimately lead to market adoption of these technologies. This is the intent of the OpenID framework. OpenID Authentication 1.0 began as a lightweight HTTP-based URL authentication protocol. OpenID Authentication 2.0 it is now turning into an open community-driven platform that allows and encourages innovation. It supports both URLs and XRIs as user identifiers, uses Yadis XRDS documents for identity service discovery, adds stronger security, and supports both public and private identifiers. With continuing convergence under this broad umbrella, the OpenID framework is emerging as a viable solution for Internet-scale user-centric identity infrastructure.

References

  1. K. Cameron, The Laws of Identity, http://www.identityblog.com/?page_id=354, May 2005.]]Google ScholarGoogle Scholar
  2. D. Recordon and B. Fitzpatrick, OpenID Authentication 1.1, http://www.openid.net/specs/openid-authentication-1_1.txt, May 2006]]Google ScholarGoogle Scholar
  3. T. Berners-Lee, L. Masinter, M. McCahill, Uniform Resource Locators, http://www.ietf.org/rfc/rfc1738.txt, December 1994.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. S. Cantor et al, Assertions and Protocols for the OASIS Security Assertion Markup Language (SAML) V2.0, OASIS Standard, http://docs.oasis-open.org/security/saml/v2.0/saml-core-2.0-os.pdf, March 2005.]]Google ScholarGoogle Scholar
  5. D. Reed, D. McAlpin, Extensible Resource Identifier Syntax 2.0, OASIS Committee Specification, OASIS XRI Technical Committee, http://www.oasis-open.org/committees/download.php/15377, November 2005]]Google ScholarGoogle Scholar
  6. G. Wachob et al, Extensible Resource Identifier Resolution 2.0, Working Draft 10, (Work In Progress), OASIS XRI Technical Committee, http://www.oasis-open.org/committees/xri , March 2005]]Google ScholarGoogle Scholar
  7. J. Miller, Yadis 1.0, http://yadis.org/papers/yadis-v1.0.pdf, March 2006]]Google ScholarGoogle Scholar
  8. D. Hardt et al, OpenID Attribute Exchange 1.0 -- Draft 1, http://openid.net/specs/openid-attribute-exchange-1_0-01.txt, August 2006]]Google ScholarGoogle Scholar
  9. J. Merrells et al, DIX: Digital Identity Exchange Protocol, http://dixs.org/index.php/DIX_Protocol_Internet_Drafts, May 2006]]Google ScholarGoogle Scholar
  10. J. Hoyt et al, OpenID Simple Registration Extension 1.0, http://openid.net/specs/openid-simple-registration-extension-1_0.txt, June 2006]]Google ScholarGoogle Scholar

Index Terms

  1. OpenID 2.0: a platform for user-centric identity management

              Recommendations

              Comments

              Login options

              Check if you have access through your login credentials or your institution to get full access on this article.

              Sign in
              • Published in

                cover image ACM Conferences
                DIM '06: Proceedings of the second ACM workshop on Digital identity management
                November 2006
                88 pages
                ISBN:1595935479
                DOI:10.1145/1179529

                Copyright © 2006 ACM

                Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                Publisher

                Association for Computing Machinery

                New York, NY, United States

                Publication History

                • Published: 3 November 2006

                Permissions

                Request permissions about this article.

                Request Permissions

                Check for updates

                Qualifiers

                • Article

                Acceptance Rates

                Overall Acceptance Rate16of34submissions,47%

                Upcoming Conference

                CCS '24
                ACM SIGSAC Conference on Computer and Communications Security
                October 14 - 18, 2024
                Salt Lake City , UT , USA

              PDF Format

              View or Download as a PDF file.

              PDF

              eReader

              View online with eReader.

              eReader