OpenID @ Winterschool 2008

2,319 views
2,242 views

Published on

Presentation at Winterschool 2008 on OpenID

Published in: Technology
0 Comments
2 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
2,319
On SlideShare
0
From Embeds
0
Number of Embeds
32
Actions
Shares
0
Downloads
11
Comments
0
Likes
2
Embeds 0
No embeds

No notes for slide

OpenID @ Winterschool 2008

  1. 1. OpenID Scott Wilson institute for educational cybernetics university of bolton
  2. 2. Identity in technology <ul><li>Simply an identifier correlated with credentials </li></ul><ul><ul><li>majority of identity identifiers are local identifiers </li></ul></ul><ul><ul><li>majority of identity credentials are passwords </li></ul></ul><ul><li>Identity can be correlated with attributes either self-asserted or externally verified </li></ul><ul><li>Attributes can be used to process access policies </li></ul><ul><li>Identity identifiers can be used for personalization </li></ul>
  3. 3. OpenID <ul><li>OpenID offers globally unique identifiers (URLs) for identity rather than local identifiers </li></ul><ul><li>OpenID SREG enables self-asserted attributes for the purposes of registering on new sites </li></ul><ul><li>OpenID providers offer the credential checking (which is optional) </li></ul><ul><li>OpenID doesn’t guarantee the validity of any user attributes </li></ul>
  4. 4. OpenID <ul><li>Board includes Google, Microsoft, IBM, VeriSign, Yahoo!, Sxip, SixApart… </li></ul><ul><li>Around 10,000 sites support it </li></ul><ul><li>Integrated into lots of products: Drupal, MediaWiki, Wordpress… </li></ul><ul><li>Approx. 250,000,000 OpenIDs created </li></ul>
  5. 5. <ul><li>“ The bottom line: OpenID is a disuptive technology that allows web sites to share identity information and streamline authentication processes. Enterprises with a significant online presence can increase contact with their customers by adopting OpenID.” </li></ul><ul><li>- Andrew Jacquith, Yankee Group </li></ul>
  6. 6. Already got one? <ul><li>http://wiki.openid.net/ OpenIDServers </li></ul><ul><li>You can also now use: </li></ul><ul><li>http://www.flickr.com/photos/username </li></ul><ul><li>http://blogname.blogspot.com/ </li></ul>Get one now
  7. 7. Try it out <ul><li>Make a comment on a Blogger blog </li></ul><ul><li>http://openiddirectory.com/ </li></ul><ul><li>https://www.myopenid.com/directory </li></ul><ul><li>Go to Jyte.com and claim something… </li></ul>
  8. 8. Why is OpenID interesting?
  9. 9. it isn’t really an authentication system That’s a good thing
  10. 10. it doesn’t really verify identity or identify the user That’s a good thing too
  11. 11. it doesn’t require or assume policy alignment or trust Nice and flexible…
  12. 12. it isn’t a provisioning system (Apart from SREG and AE, but they aren’t mandatory)
  13. 13. All it does is offer a means of asserting a relationship between an agent and a URL how cool is that?
  14. 14. This makes it a potential boundary mechanism for the coordination of individual, self-organised, and managed activity
  15. 15. OpenID is a pivot <ul><li>It can provide an axis of coordination between the formal system and informal systems </li></ul><ul><li>OpenID actually doesn’t really authenticate or identify anyone, but it can connect things that use identity </li></ul>
  16. 16. A (bad?) example: Jyte RSS feed <ul><li><item> </li></ul><ul><li><pubDate>Sat, 03 Nov 2007 11:36:53 -0700</pubDate> </li></ul><ul><li><title>I have at least one unfinished novel that I work on intermittently.</title> </li></ul><ul><li><author>http://elihu.myopenid.com/</author> </li></ul><ul><li><description>&lt;a href=&quot;http://jyte.com/profile/elihu.myopenid.com&quot; title=&quot;http://elihu.myopenid.com/&quot;&gt;Elihu&lt;/a&gt; made this claim.</description> </li></ul><ul><li><link>http://jyte.com/cl/i-have-at-least-one-unfinished-novel-that-i-work-on-intermittently</link> </li></ul><ul><li><guid>http://jyte.com/cl/i-have-at-least-one-unfinished-novel-that-i-work-on-intermittently</guid> </li></ul><ul><li><category>novel</category> </li></ul><ul><li><category>writing</category> </li></ul><ul><li><category>hobby</category> </li></ul><ul><li><category>unfinished projects</category> </li></ul><ul><li></item> </li></ul><ul><li><item> </li></ul><ul><li><pubDate>Sat, 03 Nov 2007 10:48:31 -0700</pubDate> </li></ul><ul><li><title>I always thought nic was a hip-py, but now I think he's a hip-hop.</title> </li></ul><ul><li><author>http://packers1.myopenid.com/</author> </li></ul><ul><li><description>&lt;a href=&quot;http://jyte.com/profile/packers1.myopenid.com&quot; title=&quot;http://packers1.myopenid.com/&quot;&gt;Packers&lt;/a&gt; made this claim.</description> </li></ul><ul><li><link>http://jyte.com/cl/i-always-thought-www.tapsellferrier.co.uknicferrier-was-a-hip-py-but-now-i-think-hes-a-hip-hop</link> </li></ul><ul><li><guid>http://jyte.com/cl/i-always-thought-www.tapsellferrier.co.uknicferrier-was-a-hip-py-but-now-i-think-hes-a-hip-hop</guid> </li></ul><ul><li></item> </li></ul>oAuth? Privacy!
  17. 17. Some potential uses <ul><li>Indirect evidencing & correlation, for assessment or for personal portfolio development </li></ul><ul><li>Early-commitment coordination, for early engagement without institutional commitment </li></ul><ul><li>Coordination of home/work/university boundary activities </li></ul><ul><li>Tracking activity for coordination at group/course level </li></ul><ul><li>Tracking activity for analytics and planning at course/programme/institution level </li></ul>
  18. 18. Thanks for listening - over to you http://www. cetis .ac.uk/members/scott (that’s also my OpenID, btw ;-)

×