<?xml version="1.0" encoding="utf-8"?>
<feed xml:lang="en-us" xmlns="http://www.w3.org/2005/Atom"><title>Simon Willison's Weblog: dumbnetworks</title><link href="http://simonwillison.net/" rel="alternate"/><link href="http://simonwillison.net/tags/dumbnetworks.atom" rel="self"/><id>http://simonwillison.net/</id><updated>2008-06-24T08:12:23+00:00</updated><author><name>Simon Willison</name></author><entry><title>The point of "Open" in OpenID</title><link href="https://simonwillison.net/2008/Jun/24/openid/#atom-tag" rel="alternate"/><published>2008-06-24T08:12:23+00:00</published><updated>2008-06-24T08:12:23+00:00</updated><id>https://simonwillison.net/2008/Jun/24/openid/#atom-tag</id><summary type="html">
    &lt;p&gt;TechCrunch report that &lt;a href="http://www.techcrunch.com/2008/06/23/microsofts-first-step-in-accepting-openid-signons-healthvault/"&gt;Microsoft are accepting OpenID&lt;/a&gt; for their new &lt;a href="http://www.healthvault.com/"&gt;HealthVault site&lt;/a&gt;, but with a catch: you can only use OpenIDs from two providers: &lt;a href="http://www.trustbearer.com/"&gt;Trustbearer&lt;/a&gt; (who offer two-factor authentication using a hardware token) and Verisign. "Whatever happened to the &lt;em&gt;Open&lt;/em&gt; in OpenID?", asks TechCrunch's Jason Kincaid.&lt;/p&gt;

&lt;p&gt;Microsoft's decision is a beautiful example of the Open in action, and I fully support it.&lt;/p&gt;

&lt;p&gt;You have to remember that behind the excitement and marketing OpenID is a protocol, just like SMTP or HTTP. All OpenID actually provides is a mechanism for asserting ownership over a URL and then "proving" that assertion. We can build a pyramid of interesting things on top of this, but that assertion is really all OpenID gives us (well, that and a globally unique identifier). In internet theory terms, it's a &lt;a href="http://en.wikipedia.org/wiki/Dumb_network"&gt;dumb network&lt;/a&gt;: the protocol just concentrates on passing assertions around; it's up to the endpoints to set policies and invent interesting applications.&lt;/p&gt;

&lt;p&gt;Open means that providers and consumers are free to use the protocol in whatever way they wish. If they want to only accept OpenID from a trusted subset of providers, they can go ahead. If they only want to pass OpenID details around behind the corporate firewall (great for gluing together an SSO network from open-source components) they can knock themselves out. Just like SMTP or HTTP, the protocol does not imply any rules about where or how it should be used.&lt;/p&gt;

&lt;p&gt;HealthVault have clearly made this decision due to security concerns - not over the OpenID protocol itself, but the providers that their users might choose to trust. By accepting OpenID on your site you are &lt;em&gt;outsourcing the security of your users&lt;/em&gt; to an unknown third party, and you can't guarantee that your users picked a good home for their OpenID. If you're a bank or a healthcare provider that's not a risk you want to take; whitelisting providers that you have audited for security means you don't have to rule out OpenID entirely.&lt;/p&gt;

&lt;p&gt;I have a very simple rule of thumb for whether or not a site should consider whitelisting OpenID providers: does the site offer a "forgotten password" feature that e-mails the user a login token? If it does, then the owners have already made the decision to outsource the security of their users to whoever they picked as an e-mail provider. If they don't (banks are a good example here) they should continue that policy decision and consider using an OpenID provider whitelist.&lt;/p&gt;

&lt;p&gt;I've been using the example of banks potentially accepting OpenID only from security audited providers in my &lt;a href="http://simonwillison.net/talks/openid/"&gt;talks on OpenID&lt;/a&gt; for at least the past year. Now I can finally provide a real-world example.&lt;/p&gt;
    
        &lt;p&gt;Tags: &lt;a href="https://simonwillison.net/tags/dumbnetworks"&gt;dumbnetworks&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/healthvault"&gt;healthvault&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/microsoft"&gt;microsoft&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/open"&gt;open&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/openid"&gt;openid&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/security"&gt;security&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/techcrunch"&gt;techcrunch&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/trustbearer"&gt;trustbearer&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/verisign"&gt;verisign&lt;/a&gt;&lt;/p&gt;
    

</summary><category term="dumbnetworks"/><category term="healthvault"/><category term="microsoft"/><category term="open"/><category term="openid"/><category term="security"/><category term="techcrunch"/><category term="trustbearer"/><category term="verisign"/></entry></feed>