Skip to main content

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [List Home]
AW: RoamingStore for Password Cards: [WAS: Re: AW: [higgins-dev] CardSync: Agenda for Higgins developer call March26 atnoon ET]

You are right. This is still evolving. The current card looks like this (see below).
I think that adresses your issues. I removed the "?" because it conflicts with the variable claims. Please note that the issuer is "special" and the cards are managed. This way I assume that cards are somewhat more legal in respect to ISIP. The issuer could even be some working https endpoint if it is working together with a card sync store.
Regarding "Per account" etc: in Firefox I have the following info:
 login.hostname
 login.formSubmitURL
 login.httpRealm
 login.usernameField
 login.passwordField
Some of them are null in some cases. In the current version I just concatenate all these fields and base64 encode them to give the cardid.

-Axel

<RoamingStore xmlns="http://schemas.xmlsoap.org/ws/2005/05/identity";>
  <RoamingInformationCard>
    <InformationCardMetaData xml:lang="en">
      <InformationCardReference>
        <CardId>urn:openinfocard:W2h0dHA6Ly93d3cua3VwcGluZ2VyY29sZS5jb20saHR0cHM6Ly93d3cua3VwcGluZ2VyY29sZS5jb20sbnVsbCx1c2VybmFtZSxwYXNzd29yZF0=</CardId>
        <CardVersion>1</CardVersion>
      </InformationCardReference>
      <CardName>https://www.kuppingercole.com</CardName>
      <Issuer>urn:openinfocard:storage:component</Issuer>
      <TimeIssued>2009-04-02T14:57:14.375Z</TimeIssued>
      <SupportedTokenTypeList>
        <TokenType xmlns="http://schemas.xmlsoap.org/ws/2005/02/trust";>urn:openinfocard:tokentype:usernamepassword</TokenType>
      </SupportedTokenTypeList>
      <SupportedClaimTypeList>
        <SupportedClaimType Uri="http://schemas.openinfocard.org/ws/2009/03/identity/claims/username/urn:uuid:W2h0dHA6Ly93d3cua3VwcGluZ2VyY29sZS5jb20saHR0cHM6Ly93d3cua3VwcGluZ2VyY29sZS5jb20sbnVsbCx1c2VybmFtZSxwYXNzd29yZF0=";>
          <DisplayTag>username</DisplayTag>
          <Description>username</Description>
        </SupportedClaimType>
        <SupportedClaimType Uri="http://schemas.openinfocard.org/ws/2009/03/identity/claims/password/urn:uuid:W2h0dHA6Ly93d3cua3VwcGluZ2VyY29sZS5jb20saHR0cHM6Ly93d3cua3VwcGluZ2VyY29sZS5jb20sbnVsbCx1c2VybmFtZSxwYXNzd29yZF0=";>
          <DisplayTag>password</DisplayTag>
          <Description>password</Description>
        </SupportedClaimType>
      </SupportedClaimTypeList>
      <IsSelfIssued>fasle</IsSelfIssued>
      <HashSalt>ThwN0VMmd1eACq6YwJqdWLdSvuc=</HashSalt>
      <TimeLastUpdated/>
      <IssuerId/>
      <IssuerName>MeMyselfAndI</IssuerName>
      <BackgroundColor>16777215</BackgroundColor>
    </InformationCardMetaData>
    <InformationCardPrivateData>
      <MasterKey>JhqtikXltNiOSAm3UWoS9owKXJA1VYLmamom1GPD4Fb0nkmyDESAytXcFSI9COXH9A09HXzbf6Cbe8PHKboJxA==</MasterKey>
      <ClaimValueList>
        <ClaimValue Uri="http://schemas.openinfocard.org/ws/2009/03/identity/claims/password/urn:uuid:W2h0dHA6Ly93d3cua3VwcGluZ2VyY29sZS5jb20saHR0cHM6Ly93d3cua3VwcGluZ2VyY29sZS5jb20sbnVsbCx1c2VybmFtZSxwYXNzd29yZF0=";>
          <Value>sadf</Value>
        </ClaimValue>
        <ClaimValue Uri="http://schemas.openinfocard.org/ws/2009/03/identity/claims/username/urn:uuid:W2h0dHA6Ly93d3cua3VwcGluZ2VyY29sZS5jb20saHR0cHM6Ly93d3cua3VwcGluZ2VyY29sZS5jb20sbnVsbCx1c2VybmFtZSxwYXNzd29yZF0=";>
          <Value>sdf</Value>
        </ClaimValue>
      </ClaimValueList>
    </InformationCardPrivateData>
  </RoamingInformationCard>
</RoamingStore>

________________________________

	Von: higgins-dev-bounces@xxxxxxxxxxx [mailto:higgins-dev-bounces@xxxxxxxxxxx] Im Auftrag von Paul Trevithick
	Gesendet: Mittwoch, 1. April 2009 16:54
	An: higgins-dev
	Cc: jbradley@xxxxxxx
	Betreff: RoamingStore for Password Cards: [WAS: Re: AW: [higgins-dev] CardSync: Agenda for Higgins developer call March26 atnoon ET]
	
	
	Axel,
	
	I think you forgot to append the "username" and "password" strings to the 
	http://schemas.openinfocard.org/ws/2009/03/identity/claims/ "base" URI, but yes, this could work. 
	

	*	What you have here follows the "per account" design option here [1]. 
	*	I assume that you are passing the site as the "?" parameter in both "username" and "password" claim requests. This is a twist on what is proposed here [2] --we also pass the site in a "?" parameter, but do so on a separate "webpage" claim. Your approach eliminates the need for this third webpage claim. I think I prefer your approach. 
	*	I agree that we could use a special tokentype 
	*	This approach could work self issued or not.
		

	
	--Paul
	
	[1] http://wiki.eclipse.org/Password_Card_Metaphor_Design_Options
	[2] http://wiki.eclipse.org/Password_Cards#Required_Claims
	
	
	On 3/30/09 5:37 PM, "Axel.Nennker@xxxxxxxxxx" <Axel.Nennker@xxxxxxxxxx> wrote:
	
	

		What do you think of this RoamingStore for UsernamePasswordCards?
		It was generated by a Firefox extension that I wrote this evening.
		
		It has a special tokentype, 
		the supportedClaim contains the URL in the ?h= portion,
		it is not self-issued
		
		The danger that it will be used at a wrong site should be minimal because the site is encoded in the claim's URI.
		An RP "bad" would have to request exactly this claim to steal this card's values for the kuppingercole site.
		But then hopefully the "this is your first visit" dialog should stop the user...
		
		Although I did not try to import it into CardSpace because I have not javascript code to encrypt the store.
		
		-axel
		
		<RoamingStore xmlns="http://schemas.xmlsoap.org/ws/2005/05/identity";>
		  <RoamingInformationCard>
		    <InformationCardMetaData xml:lang="en">
		      <InformationCardReference>
		        <CardId>urn:uuid:f0596820-4a90-41eb-b64b-c368e9549462</CardId>
		        <CardVersion>1</CardVersion>
		      </InformationCardReference>
		      <CardName>https://www.kuppingercole.com</CardName>
		      <Issuer>urn:openinfocard:storage:component</Issuer>
		      <TimeIssued>2007-03-08T17:04:52.09375Z</TimeIssued>
		      <SupportedTokenTypeList>
		        <TokenType xmlns="http://schemas.xmlsoap.org/ws/2005/02/trust";>urn:openinfocard:tokentype:usernamepassword</TokenType>
		      </SupportedTokenTypeList>
		      <SupportedClaimTypeList>
		        <SupportedClaimType Uri="http://schemas.openinfocard.org/ws/2009/03/identity/claims/?h=https://www.kuppingercole.com";>
		          <DisplayTag>username</DisplayTag>
		          <Description>username</Description>
		        </SupportedClaimType>
		        <SupportedClaimType Uri="http://schemas.openinfocard.org/ws/2009/03/identity/claims/?h=https://www.kuppingercole.com";>
		          <DisplayTag>password</DisplayTag>
		          <Description>password</Description>
		        </SupportedClaimType>
		      </SupportedClaimTypeList>
		      <IsSelfIssued>fasle</IsSelfIssued>
		      <HashSalt>AFFKiQEqRyZGbX47JVVDzA==</HashSalt>
		      <TimeLastUpdated/>
		      <IssuerId/>
		      <IssuerName>MeMyselfAndI</IssuerName>
		      <BackgroundColor>16777215</BackgroundColor>
		    </InformationCardMetaData>
		    <InformationCardPrivateData>
		      <MasterKey>uinRcAPgRlSZGd7B4bAHsf7U1vgkhbklcBhpoxA1ZD4=</MasterKey>
		      <ClaimValueList>
		        <ClaimValue Uri="http://schemas.openinfocard.org/ws/2009/03/identity/claims/?h=https://www.kuppingercole.com";>
		          <Value>sadfasadf</Value>
		        </ClaimValue>
		        <ClaimValue Uri="http://schemas.openinfocard.org/ws/2009/03/identity/claims/?h=https://www.kuppingercole.com";>
		          <Value>asdfasf</Value>
		        </ClaimValue>
		      </ClaimValueList>
		    </InformationCardPrivateData>
		  </RoamingInformationCard>
		</RoamingStore>
		
		

			
			 
			
________________________________

			Von: higgins-dev-bounces@xxxxxxxxxxx  [mailto:higgins-dev-bounces@xxxxxxxxxxx] Im Auftrag von Paul  Trevithick
			Gesendet: Donnerstag, 26. März 2009 14:17
			An:  higgins-dev
			Cc: John Bradley
			Betreff: Re: [higgins-dev]  CardSync : Agenda for Higgins developer call March26 atnoon  ET
			
			 
			Axel,
			
			WRT auth, we agree with you. John Bradley  has been suggesting the same thing to me for a couple of weeks. Why reinvent  auth to the CardSync server, why not use a token. The CardSync that we threw  up was just something to get the ball rolling. We want to evolve it. Your  input is vital and most helpful. Don't assume what we've done is anything more  than a prototype. This CardSync protocol really needs to be well designed (as  I'm sure you'd agree) as it could well be very important for lots of uses in  the future. Your inputs are always valued, so please consider yourself part of  the CardSync design team. This is one reason I like open source so much. You  get many more perspectives weighing in. And if we're willing to listen we get  a better result.
			
			--Paul
			
			
			On 3/26/09 8:42 AM, "Axel.Nennker@xxxxxxxxxx" <Axel.Nennker@xxxxxxxxxx>  wrote:
			
			 
			

				Regarding 2. and [2] from the latest Agenda email  and last weeks email regarding CardSync:
				
				"GET Cards" is only one  example of the many bad decisions from
				http://wiki.eclipse.org/CardSync_Protocol
				
				Most  methods/calls described in CardSync_Protocol reinvent the  wheel!
				
				Another example:
				   AuthCredential -  "/AuthCredential" Signon
				You are posting a  usernamePasswordAuthCredentialTO but this is sö 90ties...
				
				The  selector accessing the cardstore in the cloud is just a rich-client that  needs an access token to access the cardstore.
				So the way this MUST be  achieved to adhere to the overall Higgins goals is:
				 - send a  security token request to the cardstore idp and retrieve a security token.  Authenticate to the IdP using what ever method it accepts but use the  standard RST for this.
				 - use that security token in to access the  cardstore (RP) to e.g. retrieve the cards
				
				The difference between the  data exchanged in the Signon example and the standard RST is minimal. And  Higgins already has all the code needed to do it the standard  way.
				
				-Axel
				
				-----Ursprüngliche Nachricht-----
				Von: higgins-dev-bounces@xxxxxxxxxxx  [mailto:higgins-dev-bounces@xxxxxxxxxxx]  Im Auftrag von Alexander Yuhimenko
				Gesendet: Donnerstag, 19. März 2009  15:28
				An: higgins-dev@xxxxxxxxxxx
				Betreff: RE:  CardSync was: [higgins-dev] Agenda for Higgins developer callMarch  19
				
				Hello,
				
				GET /cardsync/rs/Cards  was implemented just  for FC2 demo, it's temporary method due to i didn't finish method which  return all changes (ICards, Card history, Card categories, ...)  from  server between client and server root revisions.
				
				if you think "GET  Cards" is useful, i may  re-implement it  by using   RoamingStore and card extension for transferring  CardSync  specific data (Revsion information etc) or without it.
				
				I'm sure,   CardSync should be compatible with "Identity Selector  Interoperability
				Profile" as much as possible, but it will not  be  clear/easy always usage extensions for transferring CardSync specific data,  so CardSync have to define  own  schema.
				
				it may make sense  to support few methods for importing cards from Crd/Crds files and getting  them, for example some Card selectors would use CardSync like on-line backup  service with minimal changes.
				
				
				--
				thanks,
				Alexander  Yuhimenko
				
				From: "Axel.Nennker@xxxxxxxxxx" <Axel.Nennker@xxxxxxxxxx>
				Date:  March 19, 2009 4:31:56 AM EDT
				To: "higgins-dev@xxxxxxxxxxx" <higgins-dev@xxxxxxxxxxx>
				Subject:  CardSync was: [higgins-dev] Agenda for Higgins developer call March  19
				Reply-To: "Higgins (Trust Framework) Project developer discussions"  <higgins-dev@xxxxxxxxxxx>
				
				Sorry  for chiming in late but why do you define your own cardstore xml  in
				
				http://wiki.eclipse.org/CardSync_Protocol  ?
				
				Why isn't the response to
				
				GET /cardsync/rs/Cards  HTTP/1.1
				
				a RoamingStore as defined in identity.xsd ?
				
				http://schemas.xmlsoap.org/ws/2005/05/identity/identity.xsd
				
				There  are enough extension points in the schema if you need extra data and if you  do not want to use some required value then like BackgroundColor then set  them to  0.
				
				-Axel
				
				------------------------------------------------
				Von:  higgins-dev-bounces@xxxxxxxxxxx  [mailto:higgins-dev-bounces@xxxxxxxxxxx]  Im Auftrag von Paul Trevithick
				Gesendet: Donnerstag, 19. März 2009  05:19
				An: higgins-dev
				Betreff: [higgins-dev] Agenda for Higgins  developer call March 19
				
				Logistics
				Time: noon Eastern
				Dial-in:  1-866-362-7064 / 89-2048#
				
				Agenda
				1. [Brian] 1.1M6 - was targeted  for March 18 
				 
				See [1]
				
				2.   [Brian, Alexander,  Andy] Selector Architecture Harmonization  
				 
				See [2]  
				Andy didn't quite get the Synchronizing CardStore done; may need to hand  this off to another developer
				
				3.   [Mary, Jeesmon, Jochen]  Current status of RCP Selector use for EclipseCON  demo
				
				4.  [Markus]  IdAS Authentication
				 
				Markus is working on a  proposal [4]
				
				5.   [Paul] Higgins website improvements  [3]
				 
				There are 6 items to discuss
				2.1 Flatten Solutions into  the 3 solutions areas (nav structure change)
				2.2 Reorganizing  Solutions
				2.3 Eliminate "Higgins Data Model" (nav structure  change)
				2.4 New solution names
				2.5 New component set names
				2.6 New  Downloads Page
				Updated home page implementing (2.1, 2.2 and 2.3) is  available in the staging area [5]
				
				6.   [Paul] FC2 Higgins  Workshop Mar 11-13 in Paris
				
				We demoed the Selector Linux-GTK  reading/writing cards using CardSync
				FC2 member (Orange) has developed a  selector for Nokia J2me phone
				FC2 has also developed a web  selector
				
				7. [Paul] Propose merge web ICM and the Web Selector  together into a single solution
				
				8. [Paul] CardSync
				
				JohnB's  authentication idea (use personal card)
				Should we use it as the one and  only CardStore API for the Higgins selector? This was discussed briefly last  week in Paris. Perhaps a simple core protocol and then extensions.
				
				9.  [Paul, Markus] All Selectors diagram [6]
				
				Discuss if diagram is  correct WRT process boundaries (as noted in [6])
				
				[1] http://wiki.eclipse.org/Higgins_1.1M6
				[2]  http://wiki.eclipse.org/Selector_Architecture_Harmonization
				[3]  http://wiki.eclipse.org/Higgins_1.1_Plan#Website
				[4]  http://wiki.eclipse.org/Authentication_Materials
				[5]  http://www.eclipse.org/higgins/ver2/index.php
				[6]  http://wiki.eclipse.org/Selector_Overview#H1.1_All_Selectors
				
				_______________________________________________
				higgins-dev  mailing list
				higgins-dev@xxxxxxxxxxx
				https://dev.eclipse.org/mailman/listinfo/higgins-dev
				_______________________________________________
				higgins-dev  mailing list
				higgins-dev@xxxxxxxxxxx
				https://dev.eclipse.org/mailman/listinfo/higgins-dev
				
				

		
		



Back to the top