cacert-sysadm AT lists.cacert.org
Subject: CAcert System Admins discussion list
List archive
- From: Daniel Black <daniel AT cacert.org>
- To: "Peter Williams" <home_pw AT msn.com>, cacert-sysadm AT lists.cacert.org, Philippe Teuwen <phil AT teuwen.org>
- Subject: SSO openid
- Date: Tue, 22 Sep 2009 10:38:12 +1000
- Authentication-results: lists.cacert.org; dkim=pass (1024-bit key) header.i= AT cacert.org; dkim-asp=none
- Organization: CAcert
On Tuesday 22 September 2009 03:16:56 Peter Williams wrote:
> If I were on CACert board, Id be inviting a friend to have CAcert also run
> an openid gateway server
We've asked before:
https://lists.cacert.org/wws/arc/cacert/2009-07/msg00082.html
Hey Philipp - do you have time now? Anyone else?
> - an asserting party that basically converts the
> presentation of a client cert by a user (back to CAcert) into an
> alternative bit format that is then consumed by sites adopting the
> openid-variant of SSO "token passing".
staying standards compliant is a key to adoption.
> A coherent position for CAcert to take would ve to induce OTHER
> **asserting** parties to rely on CAcert's openid assertion (which are
> generated on the fly as gatewayed versions of CAcert's own act of relying
> on is own issued certs).
that was the general plan.
Thanks for bringing this up Peter,
PS - subject of code signing had nothing to do with your post and its not
really a policy issue. It just needs someone to do it.
--
Daniel Black
Infrastructure Administrator
CAcert
Attachment:
signature.asc
Description: This is a digitally signed message part.
- SSO openid, Daniel Black, 09/22/2009
- Re: SSO openid, Peter Williams, 09/22/2009
- Re: SSO openid, Daniel Black, 09/22/2009
- Re: SSO openid, Ian G, 09/22/2009
- Re: SSO openid, Peter Williams, 09/22/2009
Archive powered by MHonArc 2.6.16.