OpenID
ã¢ã¤ãã³ãã£ãã£ãã¡ã³ã®çæ§*1ãå¾ ããè´ãã¾ããã http://groups.google.co.jp/group/idcon-ja/web/6-identity-conference?hl=ja ã«ã¦éå¬åç¥ãåºãã¾ããã æ¥æ 10/9(Fri) 19:00-21:00 å ´æ æ ªå¼ä¼ç¤¾ DeNA 12F ã»ããã¼ã«ã¼ã 1213 ã§ä»ã®ã¨ããåæâ¦
http://blog.spicebox.jp/labs/2009/07/openid_1_1.html ãã®ãµã³ãã«ã®å ´åãã¦ã¼ã¶ã« OpenID ãå ¥ãã¦ããããªãã¨ãããªãã¨ããåé¡ãããã¾ããä¾ãã° mixi ã®å ´å㯠https://id.mixi.jp/xxxxx ã¨ãã£ããã®ã OpenID ã«ãªãã®ã§ããããããã¦ã¼ã¶ã«èª¿â¦
ãã¤ãã OPé§å ã¨è¨ãè¨ãåãã使ã£ã¦ãã¾ã£ãããå±æçã«åºã¾ã£ã¦ãã¾ãã¾ããããtkudos ããã«ããã° OP initiated ã£ã¦è¨ãããã±ã«ã¹ã¨è¨ãäºãªã®ã§ããããã㯠OP initiated ã£ã¦è¨ãäºã«ãã¾ãã SEE ALSO OP initiated ã®èªè¨¼ã«é¢ããã¡ã¢ - Yeâ¦
ä»åã¯äºæ¬ç«ã¦ã§ããã Introduction OpenID Authentication 2.0 Revival Introduction OpenID Authentication 2.0 Revival åã®è³æãããã¡ãã£ã¨ä¸å¯§ã«æ¸ãç´ãããã¼ã¸ã§ã³ã§ããå³è§£ãè±å¯ã«ãã¦ã¿ãããã©ããã¦ãã®æ¦å¿µãããã®ããªãã¦ã®ãèªç¶ã¨åâ¦
ç©åãä¹ ãã¶ãã« OpenID ãã¿ã PAPE ã¨èªè¨¼ããªã·ã¼ PAPE (Provider Authentication Policy Extension) ã®èªè¨¼ããªã·ã¼ã«é¢ãã¦ãªãã§ããã©ãMulti-Factor Authentication ã¨è¨ãè¤æ°ã®èªè¨¼æ¹å¼ãçµã¿åãããèªè¨¼ããªã·ã¼ã OpenID Provider ã«å¯¾ãã¦è¦â¦
è¦ãæ¸ãã§ãã libgmp ã®ã¤ã³ã¹ãã¼ã« $ cd /usr/local/src $ wget ftp://ftp.gnu.org/gnu/gmp/gmp-4.2.4.tar.gz $ tar xfz gmp-4.2.4.tar.gz $ cd gmp-4.2.4 $ ./configure --disable-dependency-tracking --enable-shared ABI=32 $ make && make check $ â¦
è³æã®æ¹ã¯ãä¼ç¤¾ã®æ¹ã§è¨±å¯ãä¸ã次第ãã®ã¨ã³ããªã«ã¦å ¬éãããã¨æãã¾ãããã°ããå¾ ã¡ä¸ããã å ¬éãã¾ããã Introduction OpenID Authentication 2.0 ãã¡ããå½æ¥ã®è³æã«ãªãã¾ãã tkudo ããã®ææ°åå@2009ã«ã¤ã㦠ãããããã¸ã¿ã«ã¢ã¤ãã³â¦
ãã¦ãæ©ããã®ã§ OpenID Foundation Japan ã®æè¡ã¤ãã³ãã第4åç®ã¨ãªãã¾ããã http://www.openid.or.jp/modules/news/details.php?bid=14 OpenID Tech Night Vol.4 : ATND (åå ç³ãè¾¼ã¿) ä»å㯠tkudo ããã«ãã 2009 å¹´ã® ID é¢é£æè¡ååã¨ãåè¶â¦
ãã£ã¨ specs ã®ã¡ã¼ãªã³ã°ãªã¹ãã§ãã¢ãã¤ã«ç¨ã® OpenID ã«é¢ãã¦è°è«ãéå§ã«ãªã£ãã®ã§ãã¡ã¢ãã¦ããã¾ããhttp://www.nabble.com/OpenID-Mobile-Profile--td21739618.htmlãããã¹ã¬ä¸è¦§ã http://www.nabble.com/Re%3A-OpenID-Mobile-Profile--p21742â¦
ã¡ãã£ã¨ãã¿ãã¿ãã¦ã¦å®£ä¼å¿ãã¦ã¾ããï¼ï¼Software Design (ã½ããã¦ã¨ã¢ ãã¶ã¤ã³) 2009å¹´ 02æå· [éèª]å®ä¾¡ : ï¿¥ 970çºå£²æ¥ : 2009/01/17åºç社/ã¡ã¼ã«ã¼ : æè¡è©è«ç¤¾ã® OpenID ç¹éã«ã¦ OpenID ã»ãã¥ãªãã£ã®é ç®ã§å¯ç¨¿ãã¾ãããèªåã®è¨äºã¯ã¨ãâ¦
å½æ¥ã®ã¹ã©ã¤ãå ¬éãã¾ãããæ¬æ¥ãSocial Web Japan ã®ç¬¬ä¸ååå¼·ä¼ãéå¬ããã¾ãããéå¶å´ãã¾ã ããªãã¦ãªãä¸ã®ç¬¬ä¸åã ã£ãã®ã§ããããããè¦è¦ããã£ãããããã¾ããããååã«ãã¦ã¯ä¸ã è¯ãã£ããªã¨æã£ã¦ãã¾ãã以ä¸ææ³ã Social Web Japan â¦
ä»ã¡ãã£ã¨ãã¤ç¿»è¨³ãã¦ã¾ãã ä»æ§ Final: OpenID Provider Authentication Policy Extension 1.0 ä»ã®ã¨ãã使ããã㪠OP myopenid.com sxipper.com pip.verisignlabs.com ä½ããããã Phishing-Resistant Authentication (http://schemas.openid.net/paâ¦
ã¡ããã©ä»æ¥ãæå¿ã§ã¢ãã¤ã«ç¨ OpenID ã«ã¤ãã¦è°è«ãã¦ããã®ã§æ°å転æã«ã ã¢ãã¤ã«ç¨ã® OpenID è - Yet Another Hackadelic OpenID for mobile ã¨è¨ãé¡ç®ã§ idcon #4 ã§è©±ãã¦ãã¾ãã - Yet Another Hackadelic ã®ç¶ãã§ãã ãã¼ãºã®è©± OP å´ã®è¦â¦
å人çãªã¡ã¢ã§ãã åã« id:kthrtty ãã¡ãã£ã¨è¨ã£ã¦ããã¨ããµã¨æ°ã«ãªã£ãã®ã§ã ä»æ§ä¸é¢é£ããã¨ãã In indirect communication, messages are passed through the User-Agent. This can be initiated by either the Relying Party or the OP. éæ¥éâ¦
æ¨æ¥ã§ãããidcon #4 ã«ã¦æ¥æ¬ã®ã¢ãã¤ã«ã§ OpenID ãåºæ¥ããã©ããã¨è¨ã話ããã¦ãã¾ããã ã¹ã©ã¤ãã®æ¹ã¯ãã¡ãã«ã¦ã OpenID for Mobile (jp) è£è¶³ ãã®å¾ã®è°è«ã§ id_res ãªã©ã® Indirect Communication ã®ã¬ã¹ãã³ã¹ã POST ã§è¡ãããã§ãããã fâ¦
æ¨æ¥ã® idcon #4 㧠agektmr ããã¨è©±ãã¦ã¦ãé¡ç®ã®éã DataPortability çãªä½ãã横æçã«è©±ããã³ãã¥ããã£ç¡ãããä½ã£ã¦ã¿ããã¼ã¨è¨ã話ãèããã®ã§ãä»æ¥ããå ·ä½çã«åãå§ãã¦ã¿ã¾ãããã¨è¨ã訳㧠Google Group 㨠IRC ãã¨ããããéè¨ã Socâ¦
詳ããã¯ã 第4å Identity Conference - Google Groups ã«ã¦ãOpenID ã SAML ãªã©èªè¨¼å ¨è¬èå³ãããã£ã¦æ¹ãªãã©ãªãã§ãæè¿ãã¾ãã ã¾ãã以åãä¼ããããããããä¼¼ã®å½¼å¥³ããå¾ ã¡ãã¦ãã¾ã^^å人çã«ã¯ã Web Life!!! - Yahoo!ããã° ã®ä¸ã®äººã«â¦
id:tokuhirom ã® http://d.hatena.ne.jp/tokuhirom/20081129/1227923235 ã®ä»¶ãå ã® Lite ãã趣æ¨ã¨ããèæ ®ã«å ¥ããä¸ã§ã®è©±ã ãã©åãè¯ãã¨æãã¾ããã è¿½è¨ (2008-12-01T12:51:35+09:00) Net::OpenID::Consumer::Lite ã®ä»¶ã§ããã©ãéå®çãªæ段ããâ¦
ãã¤ãæ¸ããã¨æã£ã¦æ¸ãã¦ãªãã£ãã®ã§ãã¡ãªã¿ã«ã¢ãã¤ã«ãµã¤ãéçºã¯ä¸å¾æã¨è¨ããä½ãçµé¨ãç¡ãã®ã§ãçªã£è¾¼ã¿æè¿ã§ããã¾ãã¢ãã¤ã«ã®ä¸çã« OpenID ãªãã¦ï¼ï½ï½ ã£ã¦ã®ã¯ä»ã¯èããªãã ç¹å¾´ æºå¸¯é»è©±ã®å ´åã¯åä½èå¥çªå·ã£ã¦å¥´ããã£ã¦ããããâ¦
å ææ«ãã Community Technology Preview ã¨è¨ã形㧠Windows Live ID ã OpenID Provider ãµã¼ãã¹ãæä¾ãã¦ããã®ã§è©¦ãã«ä½¿ã£ã¦ã¿ã¾ãããã¡ãªã¿ã« 2.0 ã®ã¿å¯¾å¿ã¨è¨ãå½¢å¼ã¿ããã§ãã ã¾ãã¯åå¾ æåã«ãã¹ãã¢ã«ã¦ã³ããä½ããã°ãªããªãã¿ããã§ãâ¦
livedoor ã©ããEDGEã éçºæ¥èª : éçºè åéä¸ï¼ãEDGE co.Labãå§åã®ãç¥ãã - livedoor Blogï¼ããã°ï¼ ã§åç¥ããã¦ã EDGE co.Lab ãåããç¹å®ã®æ¡ä»¶ãã¨è¨ã£ã¦ã OpenID ã«å¯¾å¿ãããã¨ã "powered by EDGE" å ¥ããã¨ãããããæ¡ä»¶ãã¯ãªã¢ãã¦ãâ¦
ãã£ã¨èª¿ã¹ã¦ã¿ã¾ããããã£ã¨ãªã®ã§ééãã¦ãããããã¡ããã 追è¨ãããã®ã§ãã¡ããã覧ä¸ããã¾ãã Source http://google-code-updates.blogspot.com/2008/10/google-moves-towards-single-sign-on.html Migrating from OpenID 2.0 to OpenID Connectâ¦
=kthrtty/(+blog) ã¨è¨ã訳㧠id:kthrtty ããã®ããã°ã®ä»å¾ã®é å¼µãã«æå¾ ageï¼idcon ã§ãæ¯é話ãã¦ä¸ããã^^
4.2 XRD Elements and Attributes 辺ãã®æ訳 XRDS Document ã®ã¡ã¢ (1) - 4.2.1 Management Elements - Yet Another Hackadelic XRDS Document ã®ã¡ã¢ (2) - 4.2.2 Trust Elements - Yet Another Hackadelic XRDS Document ã®ã¡ã¢ (3) - 4.2.3 Synonym Elemâ¦
The final set of service endpoint descriptor elements is used in XRI resolution for service endpoint selection. These all include two global attributes used for this purpose: match and select. service endpoint descriptor è¦ç´ ã®æå¾ã®ã»ããâ¦
Similar to the XRD trust elements defined above, these elements enable trust to be established in the provider of the service endpoint. These elements are OPTIONAL for generic authority resolution (section 9), but REQUIRED for SAML trustedâ¦
In XRDS architecture, an identifier is a synonym of the query identifier (the identifier resolved to obtain the XRDS document) if it is not character-for-character equivalent but identifies the same target resource (the resource to which tâ¦
The second set of elements are for applications where trust must be established in the identifier authority providing the XRD. These elements are OPTIONAL for generic authority resolution (section 9), but may be REQUIRED for specific typesâ¦
XRI Resolution 2.0 ã§å®ç¾©ããã¦ãã XRDS ã®å®ç¾©ãã¡ããã¨ã¾ã¨ãããããªã¨è¨ã趣æ¨ã®ã¡ã¢ã§ããSpec ã§ããæã® 4.2 ä»è¿ã®è©±ã§ããç¸å¤ããã訳ã¯ä¿éãã¾ããã ãã¨å±æ§ã®è§£èª¬ã¯çç¥ãã¾ããã*1 åæ¸ã The first set of elements are used to managâ¦
ãã ããããããªãé·ããªã The next set of elements is used to describe service endpointsâthe set of network endpoints advertised in an XRD for performing delegated resolution, obtaining further metadata, or interacting directly with the tâ¦