cacert-sysadm AT lists.cacert.org
Subject: CAcert System Admins discussion list
List archive
- From: Ian G <iang AT cacert.org>
- To: cacert-sysadm AT lists.cacert.org
- Subject: Re: SSO openid
- Date: Tue, 22 Sep 2009 04:07:18 +0200
- Authentication-results: lists.cacert.org; dkim=pass (1024-bit key) header.i= AT cacert.org; dkim-asp=none
On 22/09/2009 02:52, Peter Williams wrote:
One may wish to ensure that the CPs meets criteria beyond the original
scope: Mozilla root registry.
It seems to be only 1% more effort to meet current programs for
ssl-based sso systems.
If it is members running the servers, I don't think a change is necessary as yet. See other mail to policy+board, and+but ... i could be wrong both ways.
All that is missing policywise is ca/ttp policy
assertions and testing that certain statistical metrics about compromise
are true.
I miss those missing assertions :)
I also wonder about the "certain statistical metrics about compromise." We have a fairly broad assertion which covers exactly that: file a dispute.
Just IMHO!
iang
Attachment:
smime.p7s
Description: S/MIME Cryptographic Signature
- SSO openid, Daniel Black, 09/22/2009
- Re: SSO openid, Peter Williams, 09/22/2009
- Re: SSO openid, Daniel Black, 09/22/2009
- Re: SSO openid, Ian G, 09/22/2009
- Re: SSO openid, Peter Williams, 09/22/2009
Archive powered by MHonArc 2.6.16.