<?xml version="1.0" encoding="utf-8"?>
<feed xml:lang="en-us" xmlns="http://www.w3.org/2005/Atom"><title>Simon Willison's Weblog: openid</title><link href="http://simonwillison.net/" rel="alternate"/><link href="http://simonwillison.net/tags/openid.atom" rel="self"/><id>http://simonwillison.net/</id><updated>2022-10-01T20:15:40+00:00</updated><author><name>Simon Willison</name></author><entry><title>Does Company ‘X’ have an Azure Active Directory Tenant?</title><link href="https://simonwillison.net/2022/Oct/1/does-company-x-have-an-azure-active-directory-tenant/#atom-tag" rel="alternate"/><published>2022-10-01T20:15:40+00:00</published><updated>2022-10-01T20:15:40+00:00</updated><id>https://simonwillison.net/2022/Oct/1/does-company-x-have-an-azure-active-directory-tenant/#atom-tag</id><summary type="html">
    
&lt;p&gt;&lt;strong&gt;&lt;a href="https://www.shawntabrizi.com/aad/does-company-x-have-an-azure-active-directory-tenant/"&gt;Does Company ‘X’ have an Azure Active Directory Tenant?&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
Neat write-up from Shawn Tabrizi about looking up if a company has Active Directory single-sign-on configured (which is based on OpenID) by checking for an OpenID configuration endpoint. I particularly enjoyed this new-to-me trick: Google’s “I’m Feeling Lucky” search button redirects to the first result, which means it can double as an unofficial API endpoint for returning the URL of the first matching search result.

    &lt;p&gt;&lt;small&gt;&lt;/small&gt;Via &lt;a href="https://news.ycombinator.com/item?id=33046188"&gt;Hacker News&lt;/a&gt;&lt;/small&gt;&lt;/p&gt;


    &lt;p&gt;Tags: &lt;a href="https://simonwillison.net/tags/openid"&gt;openid&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/google"&gt;google&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/microsoft"&gt;microsoft&lt;/a&gt;&lt;/p&gt;



</summary><category term="openid"/><category term="google"/><category term="microsoft"/></entry><entry><title>Implementing IndieAuth for Datasette</title><link href="https://simonwillison.net/2020/Nov/18/indieauth/#atom-tag" rel="alternate"/><published>2020-11-18T23:22:17+00:00</published><updated>2020-11-18T23:22:17+00:00</updated><id>https://simonwillison.net/2020/Nov/18/indieauth/#atom-tag</id><summary type="html">
    &lt;p&gt;&lt;a href="https://indieweb.org/IndieAuth"&gt;IndieAuth&lt;/a&gt; is a spiritual successor to &lt;a href="https://openid.net/"&gt;OpenID&lt;/a&gt;, developed and maintained by the IndieWeb community and based on OAuth 2. This weekend I attended &lt;a href="https://indieweb.org/2020/East"&gt;IndieWebCamp East Coast&lt;/a&gt; and was inspired to try my hand at an implementation. &lt;a href="https://github.com/simonw/datasette-indieauth"&gt;datasette-indieauth&lt;/a&gt; is the result, a new plugin which enables IndieAuth logins to a Datasette instance.&lt;/p&gt;
&lt;p&gt;Surprisingly this was my first IndieWebCamp - I've been adjacent to that community for over a decade, but I'd never made it to one of their in-person events before. Now that everything's virtual I didn't even have to travel anywhere, so I finally got to break my streak of non-attendance.&lt;/p&gt;
&lt;h4&gt;Understanding IndieAuth&lt;/h4&gt;
&lt;p&gt;The key idea behind IndieAuth is to provide federated login based on URLs. Users enter a URL that they own (e.g. &lt;code&gt;simonwillison.net&lt;/code&gt;), and the protocol then derives their identity provider, redirects the user there, waits for them to sign in and get redirected back and then uses tokens passed in the redirect to prove the user's ownership of the URL and sign them in.&lt;/p&gt;
&lt;p&gt;Here's what that authentication flow looks like, using &lt;a href="https://datasette-indieauth-demo.datasette.io/"&gt;this demo of the plugin&lt;/a&gt;:&lt;/p&gt;
&lt;p&gt;&lt;img src="https://static.simonwillison.net/static/2020/datasette-indieauth.gif" alt="Animated demo: starts at an IndieAuth login screen, enters simonwillison.net, gets redirected to another site where clicking the verify button completes the sign-in and redirects back to the original page." style="max-width:100%;" /&gt;&lt;/p&gt;
&lt;p&gt;IndieAuth works by scanning the linked page for a &lt;code&gt;&amp;lt;link rel="authorization_endpoint" href="https://indieauth.com/auth"&amp;gt;&lt;/code&gt; HTML element which indicates a service that should be redirected to in order to authenticate the user.&lt;/p&gt;
&lt;p&gt;I'm using &lt;a href="https://indieauth.com"&gt;IndieAuth.com&lt;/a&gt; for my own site's authorization endpoint, an identity provider run by IndieAuth spec author &lt;a href="https://aaronparecki.com/"&gt;Aaron Parecki&lt;/a&gt;. IndieAuth.com implements &lt;a href="http://microformats.org/wiki/RelMeAuth"&gt;RelMeAuth&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;RelMeAuth is a neat hack where the authentication provider can scan the user's URL for a &lt;code&gt;&amp;lt;link href="https://github.com/simonw" rel="me"&amp;gt;&lt;/code&gt; element, confirm that the GitHub profile in question links back to the same page, and then delegate to GitHub authentication for the actual sign-in.&lt;/p&gt;
&lt;h4&gt;Why implement this for Datasette?&lt;/h4&gt;
&lt;p&gt;A key goal of Datasette is to reduce the friction involved in publishing data online as much as possible.&lt;/p&gt;
&lt;p&gt;The &lt;a href="https://docs.datasette.io/en/latest/publish.html#datasette-publish"&gt;datasette publish&lt;/a&gt; command addresses this by providing a single CLI command for publishing a SQLite database to the internet and assigning it a new URL.&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;datasette publish cloudrun ca-fires.db \
    --service ca-fires \
    --title "Latest fires in California"
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;This command will create a new Google Cloud Run service, package up the &lt;code&gt;ca-fires.db&lt;/code&gt; (created &lt;a href="https://simonwillison.net/2020/Nov/14/personal-data-warehouses/"&gt;in this talk&lt;/a&gt;) along with the Datasette web application, and deploy the resulting site using Google Cloud Run.&lt;/p&gt;
&lt;p&gt;It will output a URL that looks like this: &lt;code&gt;https://ca-fires-j7hipcg4aq-uc.a.run.app&lt;/code&gt;&lt;/p&gt;
&lt;p&gt;Datasette is unauthenticated by default - anyone can view the published data. If you want to add authentication you can do so using a plugin, for example &lt;a href="https://github.com/simonw/datasette-auth-passwords"&gt;datasette-auth-passwords&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Authentication without passwords is better. The &lt;a href="https://github.com/simonw/datasette-auth-github"&gt;datasette-auth-github&lt;/a&gt; plugin implements single-sign-on against the GitHub API, but comes with a slight disadvantage: you need to register and configure your application with GitHub in order to configure things like the redirect URL needed for authentication.&lt;/p&gt;
&lt;p&gt;For most applications this isn't a problem, but when you're deploying dozens or potentially hundreds of applications with Datasette - each with initially unpredictable URLs - this can add quite a bit of friction.&lt;/p&gt;
&lt;p&gt;The joy of IndieAuth (and OpenID before it) is that there's no centralized authority to register with. You can deploy an application to any URL, install the &lt;code&gt;datasette-indieauth&lt;/code&gt; plugin and users can start authenticating with your site.&lt;/p&gt;
&lt;p&gt;Even better... IndieAuth means you can grant people permission to access a site without them needing to create an account, provided they have their own domain with IndieAuth setup.&lt;/p&gt;
&lt;p&gt;I took advantage of that in the design of &lt;code&gt;datasette-indieauth&lt;/code&gt;. Say you want to publish a Datasette that only I can access - you can do that using the &lt;code&gt;restrict_access&lt;/code&gt; plugin configuration setting like so:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;datasette publish cloudrun simon-only.db \
  --service simon-only \
  --title "For Simon's eye only" \
  --install datasette-indieauth \
  --plugin-secret datasette-indieauth \
    restrict_access https://simonwillison.net/
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;The resulting Datasette instance will require the user to authenticate in order to view it - and will only allow access to the user who can use IndieAuth to prove that they are the owner of &lt;code&gt;simonwillison.net&lt;/code&gt;.&lt;/p&gt;
&lt;h4&gt;Next steps&lt;/h4&gt;
&lt;p&gt;There are two sides to the IndieAuth specification: client sites that allow sign-in with IndieAuth, and authorization providers that handle that authentication.&lt;/p&gt;
&lt;p&gt;&lt;code&gt;datasette-indieauth&lt;/code&gt; currently acts as a client, allowing sign-in with IndieAuth.&lt;/p&gt;
&lt;p&gt;I'm considering extending the plugin to act as an authorization provider as well. This is a bit more challenging as authentication providers need to maintain some small aspects of session state, but it would be good for the IndieAuth ecosystem for there to be more providers. The most widely used provider at the moment is the excellent &lt;a href="https://wordpress.org/plugins/indieauth/"&gt;IndieAuth WordPress plugin&lt;/a&gt;, which I used while testing my Datasette plugin and really was just a one-click install from the WordPress plugin directory.&lt;/p&gt;
&lt;p&gt;&lt;code&gt;datasette-indieauth&lt;/code&gt; has 100% test coverage, and I wrote the bulk of the logic in a standalone &lt;a href="https://github.com/simonw/datasette-indieauth/blob/1.0/datasette_indieauth/utils.py"&gt;utils.py module&lt;/a&gt; which could potentially be extracted out of the plugin and used to implement IndieAuth in Python against other frameworks. A Django IndieAuth provider is another potential project, which could integrate directly with my Django blog.&lt;/p&gt;
&lt;h4&gt;Addendum: what about OpenID?&lt;/h4&gt;
&lt;p&gt;Fom 2006 to 2010 I was a &lt;a href="https://simonwillison.net/tags/openid/"&gt;passionate advocate&lt;/a&gt; for &lt;a href="https://openid.net/"&gt;OpenID&lt;/a&gt;. It was clear to me that passwords were an increasingly unpleasant barrier to secure usage of the web, and that some form of federated sign-in was inevitable. I was terrified that Microsoft Passport would take over all authentication on the web!&lt;/p&gt;
&lt;p&gt;With hindsight that's not quite what happened: for a while it looked like Facebook would win instead, but today it seems to be a fairly even balance between Facebook, Google, community-specific authentication providers like GitHub and Apple's iPhone-monopoly-enforced Sign in with Apple.&lt;/p&gt;
&lt;p&gt;OpenID as an open standard didn't really make it. The specification grew in complicated new directions (Yadis, XRDS, i-names, OpenID Connect, OpenID 2.0) and it never quite overcame the usability hurdle of users having to understand URLs as identifiers.&lt;/p&gt;
&lt;p&gt;IndieAuth is a &lt;em&gt;much&lt;/em&gt; simpler specification, based on lessons learned from OAuth. I'm still worried about URLs as identifiers, but helping people reclaim their online presence and understand those concepts is core to what the &lt;a href="https://indieweb.org/"&gt;IndieWeb movement&lt;/a&gt; is all about.&lt;/p&gt;
&lt;p&gt;IndieAuth also has some clever additional tricks up its sleeve. My favourite is that IndieAuth can return an identifier for the user that's different from the one they typed in the box. This means that if a top-level domain with many users supports IndieAuth, each user can learn to just type &lt;code&gt;example.com&lt;/code&gt; in (or click a branded button) to start the authentication flow - they'll be signed in as &lt;code&gt;example.com/users/simonw&lt;/code&gt; based on who they authenticated as. This feels like an enormous usability improvement to me, and one that could really help avoid users having to remember their own profile URLs.&lt;/p&gt;
&lt;p&gt;OpenID was trying to solve authentication for every user of the internet. IndieAuth is less ambitious - if it only takes off with the subset of people who embrace the IndieWeb movement I think that's OK.&lt;/p&gt;
&lt;p&gt;The &lt;code&gt;datasette-indieauth&lt;/code&gt; project is yet another example of the benefit of having a plugin ecosystem around Datasette: I can add support for technologies like IndieAuth without baking them into Datasette's core, which almost eliminates the risk to the integrity of the larger project of trying out something new.&lt;/p&gt;
    
        &lt;p&gt;Tags: &lt;a href="https://simonwillison.net/tags/openid"&gt;openid&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/projects"&gt;projects&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/datasette"&gt;datasette&lt;/a&gt;&lt;/p&gt;
    

</summary><category term="openid"/><category term="projects"/><category term="datasette"/></entry><entry><title>37signals Product Blog: We'll be retiring our support of OpenID on May 1</title><link href="https://simonwillison.net/2011/Jan/25/signals/#atom-tag" rel="alternate"/><published>2011-01-25T16:17:00+00:00</published><updated>2011-01-25T16:17:00+00:00</updated><id>https://simonwillison.net/2011/Jan/25/signals/#atom-tag</id><summary type="html">
    
&lt;p&gt;&lt;strong&gt;&lt;a href="http://productblog.37signals.com/products/2011/01/well-be-retiring-our-support-of-openid-on-may-1.html"&gt;37signals Product Blog: We&amp;#x27;ll be retiring our support of OpenID on May 1&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
The support costs far outweighed the benefits to customers, especially now that 37signals have their own single sign in mechanism that works across all of their products.


    &lt;p&gt;Tags: &lt;a href="https://simonwillison.net/tags/37-signals"&gt;37-signals&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/openid"&gt;openid&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/recovered"&gt;recovered&lt;/a&gt;&lt;/p&gt;



</summary><category term="37-signals"/><category term="openid"/><category term="recovered"/></entry><entry><title>What are some scalable OAuth and OpenID server implementations?</title><link href="https://simonwillison.net/2010/Dec/5/what-are-some-scalable/#atom-tag" rel="alternate"/><published>2010-12-05T18:34:00+00:00</published><updated>2010-12-05T18:34:00+00:00</updated><id>https://simonwillison.net/2010/Dec/5/what-are-some-scalable/#atom-tag</id><summary type="html">
    &lt;p&gt;&lt;em&gt;My answer to &lt;a href="https://www.quora.com/What-are-some-scalable-OAuth-and-OpenID-server-implementations/answer/Simon-Willison"&gt;What are some scalable OAuth and OpenID server implementations?&lt;/a&gt; on Quora&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Any OAuth library should scale horizontally - I can't see how any one library would be a better choice than another.&lt;/p&gt;
    
        &lt;p&gt;Tags: &lt;a href="https://simonwillison.net/tags/apis"&gt;apis&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/oauth"&gt;oauth&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/openid"&gt;openid&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/servers"&gt;servers&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/web-development"&gt;web-development&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/quora"&gt;quora&lt;/a&gt;&lt;/p&gt;
    

</summary><category term="apis"/><category term="oauth"/><category term="openid"/><category term="servers"/><category term="web-development"/><category term="quora"/></entry><entry><title>Vox is closing on September 30, 2010</title><link href="https://simonwillison.net/2010/Sep/3/vox/#atom-tag" rel="alternate"/><published>2010-09-03T08:50:00+00:00</published><updated>2010-09-03T08:50:00+00:00</updated><id>https://simonwillison.net/2010/Sep/3/vox/#atom-tag</id><summary type="html">
    
&lt;p&gt;&lt;strong&gt;&lt;a href="http://closing.vox.com/"&gt;Vox is closing on September 30, 2010&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
One month seems like very short notice for closing a service of this size, especially since it functions as an OpenID provider so in addition to migrating their content away users may need to sign in to other services and set up an alternative form of authentication. UPDATE: From the comments, Vox accounts that migrate to TypePad will also have their OpenID migrated, and TypePad will continue to serve OpenID requests for old vox.com addresses. Smart solution.


    &lt;p&gt;Tags: &lt;a href="https://simonwillison.net/tags/closing"&gt;closing&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/openid"&gt;openid&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/sixapart"&gt;sixapart&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/vox"&gt;vox&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/recovered"&gt;recovered&lt;/a&gt;&lt;/p&gt;



</summary><category term="closing"/><category term="openid"/><category term="sixapart"/><category term="vox"/><category term="recovered"/></entry><entry><title>RasterWeb: Lanyrd</title><link href="https://simonwillison.net/2010/Aug/31/rasterweb/#atom-tag" rel="alternate"/><published>2010-08-31T20:49:00+00:00</published><updated>2010-08-31T20:49:00+00:00</updated><id>https://simonwillison.net/2010/Aug/31/rasterweb/#atom-tag</id><summary type="html">
    
&lt;p&gt;&lt;strong&gt;&lt;a href="http://rasterweb.net/raster/2010/08/31/lanyrd/"&gt;RasterWeb: Lanyrd&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
Pete Prodoehl calls me out on Lanyrd’s integration with the Twitter auth API at the expense of OpenID. I’ve posted a comment with my justification—essentially, tying to Twitter’s ecosystem means I can actually implement the features I’ve been talking about building on top of OpenID for years, with far less engineering effort.


    &lt;p&gt;Tags: &lt;a href="https://simonwillison.net/tags/identity"&gt;identity&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/oauth"&gt;oauth&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/openid"&gt;openid&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/pete-prodoehl"&gt;pete-prodoehl&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/twitter"&gt;twitter&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/recovered"&gt;recovered&lt;/a&gt;&lt;/p&gt;



</summary><category term="identity"/><category term="oauth"/><category term="openid"/><category term="pete-prodoehl"/><category term="twitter"/><category term="recovered"/></entry><entry><title>App Engine at Google I/O 2010</title><link href="https://simonwillison.net/2010/May/20/appengine/#atom-tag" rel="alternate"/><published>2010-05-20T15:30:00+00:00</published><updated>2010-05-20T15:30:00+00:00</updated><id>https://simonwillison.net/2010/May/20/appengine/#atom-tag</id><summary type="html">
    
&lt;p&gt;&lt;strong&gt;&lt;a href="http://googleappengine.blogspot.com/2010/05/app-engine-at-google-io-2010.html?utm_source=feedburner&amp;amp;utm_medium=feed&amp;amp;utm_campaign=Feed%3A GoogleAppEngineBlog %28Google App Engine Blog%29"&gt;App Engine at Google I/O 2010&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
OpenID and OAuth are now baked in to the AppEngine users API. They’re also demoing two very exciting new features—a mapper API for doing map/reduce style queries against the data store, and a Channel API for building comet applications.


    &lt;p&gt;Tags: &lt;a href="https://simonwillison.net/tags/comet"&gt;comet&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/google"&gt;google&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/mapreduce"&gt;mapreduce&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/oauth"&gt;oauth&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/openid"&gt;openid&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/recovered"&gt;recovered&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/google-io"&gt;google-io&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/google-app-engine"&gt;google-app-engine&lt;/a&gt;&lt;/p&gt;



</summary><category term="comet"/><category term="google"/><category term="mapreduce"/><category term="oauth"/><category term="openid"/><category term="recovered"/><category term="google-io"/><category term="google-app-engine"/></entry><entry><title>Stack Overflow Blog: OpenID, One Year Later</title><link href="https://simonwillison.net/2010/Apr/14/openid/#atom-tag" rel="alternate"/><published>2010-04-14T20:46:02+00:00</published><updated>2010-04-14T20:46:02+00:00</updated><id>https://simonwillison.net/2010/Apr/14/openid/#atom-tag</id><summary type="html">
    
&lt;p&gt;&lt;strong&gt;&lt;a href="http://blog.stackoverflow.com/2010/04/openid-one-year-later/"&gt;Stack Overflow Blog: OpenID, One Year Later&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
Google’s support is a huge deal—61% of Stack Overflow accounts use Google. Google’s implementation of directed identity has caused problems though, since Google provide a different OpenID for each domain making it hard for Stack Overflow, Server Fault and Super User to correlate accounts. Their solution is to require a (verified) e-mail address from Google OpenID users using sreg and use that as a key for the accounts.


    &lt;p&gt;Tags: &lt;a href="https://simonwillison.net/tags/openid"&gt;openid&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/stackoverflow"&gt;stackoverflow&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/google"&gt;google&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/directedidentity"&gt;directedidentity&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/email"&gt;email&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/sreg"&gt;sreg&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/login"&gt;login&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/registration"&gt;registration&lt;/a&gt;&lt;/p&gt;



</summary><category term="openid"/><category term="stackoverflow"/><category term="google"/><category term="directedidentity"/><category term="email"/><category term="sreg"/><category term="login"/><category term="registration"/></entry><entry><title>RFC5785: Defining Well-Known Uniform Resource Identifiers</title><link href="https://simonwillison.net/2010/Apr/11/rfc/#atom-tag" rel="alternate"/><published>2010-04-11T19:32:28+00:00</published><updated>2010-04-11T19:32:28+00:00</updated><id>https://simonwillison.net/2010/Apr/11/rfc/#atom-tag</id><summary type="html">
    
&lt;p&gt;&lt;strong&gt;&lt;a href="http://www.rfc-editor.org/rfc/rfc5785.txt"&gt;RFC5785: Defining Well-Known Uniform Resource Identifiers&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
Sounds like a very good idea to me: defining a common prefix of /.well-known/ for well-known URLs (common metadata like robots.txt) and establishing a registry for all such files. OAuth, OpenID and other decentralised identity systems can all benefit from this.

    &lt;p&gt;&lt;small&gt;&lt;/small&gt;Via &lt;a href="http://www.mnot.net/blog/2010/04/07/well-known"&gt;Mark Nottingham&lt;/a&gt;&lt;/small&gt;&lt;/p&gt;


    &lt;p&gt;Tags: &lt;a href="https://simonwillison.net/tags/rfc"&gt;rfc&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/urls"&gt;urls&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/wellknownurls"&gt;wellknownurls&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/openid"&gt;openid&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/oauth"&gt;oauth&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/robots-txt"&gt;robots-txt&lt;/a&gt;&lt;/p&gt;



</summary><category term="rfc"/><category term="urls"/><category term="wellknownurls"/><category term="openid"/><category term="oauth"/><category term="robots-txt"/></entry><entry><title>Yahoo! OpenID: Now with Attribute Exchange!</title><link href="https://simonwillison.net/2009/Dec/5/yahoo/#atom-tag" rel="alternate"/><published>2009-12-05T17:25:38+00:00</published><updated>2009-12-05T17:25:38+00:00</updated><id>https://simonwillison.net/2009/Dec/5/yahoo/#atom-tag</id><summary type="html">
    
&lt;p&gt;&lt;strong&gt;&lt;a href="http://developer.yahoo.net/blog/archives/2009/12/yahoo_openid_now_with_attribute_exchange.html?utm_source=feedburner&amp;amp;utm_medium=feed&amp;amp;utm_campaign=Feed%3A YDNBlog %28Yahoo%21 Developer Network Blog%29"&gt;Yahoo! OpenID: Now with Attribute Exchange!&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
The nice thing about this is that an e-mail address obtained from Yahoo! via attribute exchange has already been verified, so you don’t need to perform the e-mail roundtrip yourself. I expect a lot of OpenID consuming sites will end up with internal whitelists of OpenID providers who they trust to provide verified e-mail addresses, with users of sites not on the whitelist still getting e-mailed a verification link.


    &lt;p&gt;Tags: &lt;a href="https://simonwillison.net/tags/verification"&gt;verification&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/email"&gt;email&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/openid"&gt;openid&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/yahoo"&gt;yahoo&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/attributeexchange"&gt;attributeexchange&lt;/a&gt;&lt;/p&gt;



</summary><category term="verification"/><category term="email"/><category term="openid"/><category term="yahoo"/><category term="attributeexchange"/></entry><entry><title>OpenID: Now more powerful and easier to use!</title><link href="https://simonwillison.net/2009/Sep/25/hybrid/#atom-tag" rel="alternate"/><published>2009-09-25T21:08:21+00:00</published><updated>2009-09-25T21:08:21+00:00</updated><id>https://simonwillison.net/2009/Sep/25/hybrid/#atom-tag</id><summary type="html">
    
&lt;p&gt;&lt;strong&gt;&lt;a href="http://openid.net/2009/09/25/more-powerful-and-easier-to-use/"&gt;OpenID: Now more powerful and easier to use!&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
The OpenID+OAuth hybrid protocol (where a user can sign in with OpenID and grant an application access to their OAuth protected resources such as a contact list at the same time) is now supported by Google, Yahoo! and MySpace—this feels like OpenID finally coming of age.


    &lt;p&gt;Tags: &lt;a href="https://simonwillison.net/tags/openid"&gt;openid&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/oauth"&gt;oauth&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/hybrid"&gt;hybrid&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/google"&gt;google&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/myspace"&gt;myspace&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/yahoo"&gt;yahoo&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/identity"&gt;identity&lt;/a&gt;&lt;/p&gt;



</summary><category term="openid"/><category term="oauth"/><category term="hybrid"/><category term="google"/><category term="myspace"/><category term="yahoo"/><category term="identity"/></entry><entry><title>Evidence of OpenID at Amazon</title><link href="https://simonwillison.net/2009/Jul/6/amazonopenid/#atom-tag" rel="alternate"/><published>2009-07-06T01:25:17+00:00</published><updated>2009-07-06T01:25:17+00:00</updated><id>https://simonwillison.net/2009/Jul/6/amazonopenid/#atom-tag</id><summary type="html">
    
&lt;p&gt;&lt;strong&gt;&lt;a href="http://bit.ly/amazon-openid-demo"&gt;Evidence of OpenID at Amazon&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
It looks like Amazon are using OpenID for SSO between their different properties—I clicked a link to sign in to AWS and the URL had OpenID query string parameters.


    &lt;p&gt;Tags: &lt;a href="https://simonwillison.net/tags/openid"&gt;openid&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/amazon"&gt;amazon&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/sso"&gt;sso&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/aws"&gt;aws&lt;/a&gt;&lt;/p&gt;



</summary><category term="openid"/><category term="amazon"/><category term="sso"/><category term="aws"/></entry><entry><title>Facebook Usernames and OpenID</title><link href="https://simonwillison.net/2009/Jun/13/thefacebookdebacle/#atom-tag" rel="alternate"/><published>2009-06-13T17:01:00+00:00</published><updated>2009-06-13T17:01:00+00:00</updated><id>https://simonwillison.net/2009/Jun/13/thefacebookdebacle/#atom-tag</id><summary type="html">
    &lt;p&gt;Today's launch of &lt;a href="http://search.twitter.com/search?q=%23fufacebook"&gt;Facebook Usernames&lt;/a&gt; provides an obvious and exciting opportunity for Facebook to become an OpenID provider. Facebook have clearly demonstrated their interest in becoming the key online identity for their users, and the new usernames feature is their acknowledgement that URL-based identities are an important component of that, no doubt driven in part by Twitter making usernames trendy again.&lt;/p&gt;

&lt;p&gt;It's interesting to consider Facebook's history with regards to OpenID and single sign on in general. When I started publicly advocating for OpenID &lt;a href="http://simonwillison.net/2007/talks/"&gt;back in 2007&lt;/a&gt;, my primary worry was that someone would solve the SSO problem in a proprietary way, irreparably damaging the decentralised nature of the Web - just as Microsoft had attempted a few years earlier with Passport.&lt;/p&gt;

&lt;p&gt;When Facebook Connect was announced &lt;a href="http://blog.facebook.com/blog.php?post=24577977130"&gt;a year ago&lt;/a&gt; it seemed like my worst fears had become realised. Facebook Connect's user experience was a huge improvement over OpenID - with only one provider, the sign in UI could be reduced to a single button. Their use of a popup window for the sign in flow was inspired - various usability studies have since shown that users are much more likely to complete a SSO flow if they can see the site they are signing in to in a background window.&lt;/p&gt;

&lt;p&gt;Thankfully, Facebook seem to understand that the industry isn't willing to accept a single SSO provider, no matter how smooth their implementation. Mark Zuckerberg made reassuring noises about OpenID support at both &lt;a href="http://news.cnet.com/8301-13577_3-10063328-36.html"&gt;FOWA 2008&lt;/a&gt; and &lt;a href="http://www.readwriteweb.com/archives/mark_zuckerberg_on_data_portab.php"&gt;SxSW 2009&lt;/a&gt;, but things really stepped up earlier this year when &lt;a href="http://openid.net/2009/02/05/facebook-joins-openid-foundation-board/"&gt;Facebook joined the OpenID Foundation Board&lt;/a&gt; (accompanied by a substantial financial donation). Facebook's board representative, &lt;a href="http://www.sociallipstick.com/"&gt;Luke Shepherd&lt;/a&gt;, is an excellent addition and brings a refreshingly user-centric approach to OpenID. Luke was previously responsible for much of the work on Facebook Connect and has been advocating OpenID inside Facebook for a long time.&lt;/p&gt;

&lt;p&gt;Facebook may not have committed to becoming a provider yet (at least not in public), but their decision to become a consumer first is another interesting data point. They may be trying to avoid the common criticism thrown at companies who provide but don't consume - if they're not willing to eat their own dog food, why should anyone else?&lt;/p&gt;

&lt;p&gt;At any rate, their consumer implementation is fascinating. It's live right now, even though there's no OpenID login box anywhere to be seen on the site. Instead, Facebook take advantage of the little known &lt;a href="http://openid.net/specs/openid-authentication-2_0.html#anchor28"&gt;checkid_immediate mode&lt;/a&gt;. Once you've associated your OpenID with your Facebook account (using the "Linked Accounts" section of the settings pane) Facebook sets a cookie remembering your OpenID provider, which persists even after you log out of Facebook. When you later visit the Facebook homepage, a checkid_immediate request is silently sent to your provider, logging you in automatically if you are already authenticated there.&lt;/p&gt;

&lt;p&gt;While it's great to see innovation with OpenID at such a large scale, I'm not at all convinced that they've got this right. The feature is virtually invisible to users (it took me a bunch of research to figure out how to use it) and not at all intuitive - if I've logged out of Facebook, how come visiting the home page logs me straight back in again? I guess this is why Luke is keen on &lt;a href="http://www.sociallipstick.com/2009/05/logout-the-other-half-of-the-identity-equation/"&gt;exploring single sign out with OpenID&lt;/a&gt;. It sounds like the current OpenID consumer support is principally intended as a developer preview, and I'm looking forward to seeing how they change it based on ongoing user research.&lt;/p&gt;

&lt;p&gt;As OpenID provider implementation is an obvious next step that can't be that far off - I wouldn't be surprised to hear an announcement within a month or two.&lt;/p&gt;

&lt;h3&gt;HTTP redirect codes&lt;/h3&gt;

&lt;p&gt;As an aside, I decided to check that Facebook were using the correct 3xx HTTP status code to redirect from &lt;a href="http://www.facebook.com/profile.php?id=666590500"&gt;my old profile page&lt;/a&gt; to &lt;a href="http://www.facebook.com/swillison"&gt;my new one&lt;/a&gt;. I was horrified to discover that they are using a 200 code, followed by &lt;a href="http://gist.github.com/129240"&gt;a chunk of JavaScript&lt;/a&gt; to implement the redirect! The situation for logged out users is better but still fundamentally flawed: if you enable your public search listing (using an option tucked away on &lt;a href="http://www.facebook.com/privacy/?view=search"&gt;www.facebook.com/privacy/?view=search&lt;/a&gt;) and &lt;samp&gt;curl -i&lt;/samp&gt; your old profile URL you get a 302 Found, when the correct status code is clearly a 301 Moved Permanently.&lt;/p&gt;

&lt;p&gt;One final note: it almost goes without saying, but one of the best things about OpenID is that you can register a real domain name that you can own, instead of just having another URL on Facebook.&lt;/p&gt;
    
        &lt;p&gt;Tags: &lt;a href="https://simonwillison.net/tags/facebook"&gt;facebook&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/fufacebook"&gt;fufacebook&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/http"&gt;http&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/openid"&gt;openid&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/sso"&gt;sso&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/thefacebookdebacle"&gt;thefacebookdebacle&lt;/a&gt;&lt;/p&gt;
    

</summary><category term="facebook"/><category term="fufacebook"/><category term="http"/><category term="openid"/><category term="sso"/><category term="thefacebookdebacle"/></entry><entry><title>Exclusive: The Future of Facebook Usernames</title><link href="https://simonwillison.net/2009/Jun/11/exclusive/#atom-tag" rel="alternate"/><published>2009-06-11T09:46:15+00:00</published><updated>2009-06-11T09:46:15+00:00</updated><id>https://simonwillison.net/2009/Jun/11/exclusive/#atom-tag</id><summary type="html">
    
&lt;p&gt;&lt;strong&gt;&lt;a href="http://www.dashes.com/anil/2009/06/the-future-of-facebook-usernames.html"&gt;Exclusive: The Future of Facebook Usernames&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
I have to admit I was planning to just let Facebook get on with it, assuming that the OpenID provider part would show up of its own accord—but maybe I should write a thoughtful and persuasive essay about it after all.


    &lt;p&gt;Tags: &lt;a href="https://simonwillison.net/tags/facebook"&gt;facebook&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/anil-dash"&gt;anil-dash&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/openid"&gt;openid&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/funny"&gt;funny&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/urls"&gt;urls&lt;/a&gt;&lt;/p&gt;



</summary><category term="facebook"/><category term="anil-dash"/><category term="openid"/><category term="funny"/><category term="urls"/></entry><entry><title>Sign in with Twitter</title><link href="https://simonwillison.net/2009/Apr/20/twitter/#atom-tag" rel="alternate"/><published>2009-04-20T04:10:33+00:00</published><updated>2009-04-20T04:10:33+00:00</updated><id>https://simonwillison.net/2009/Apr/20/twitter/#atom-tag</id><summary type="html">
    
&lt;p&gt;&lt;strong&gt;&lt;a href="http://apiwiki.twitter.com/Sign-in-with-Twitter"&gt;Sign in with Twitter&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
Intriguing: Twitter are now an OpenID-style identity provider... using OAuth.


    &lt;p&gt;Tags: &lt;a href="https://simonwillison.net/tags/oauth"&gt;oauth&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/twitter"&gt;twitter&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/openid"&gt;openid&lt;/a&gt;&lt;/p&gt;



</summary><category term="oauth"/><category term="twitter"/><category term="openid"/></entry><entry><title>"Recover my account" link on the login page</title><link href="https://simonwillison.net/2009/Feb/16/recover/#atom-tag" rel="alternate"/><published>2009-02-16T22:22:27+00:00</published><updated>2009-02-16T22:22:27+00:00</updated><id>https://simonwillison.net/2009/Feb/16/recover/#atom-tag</id><summary type="html">
    
&lt;p&gt;&lt;strong&gt;&lt;a href="http://stackoverflow.uservoice.com/pages/general/suggestions/121262-recover-my-account-link-on-the-login-page"&gt;&amp;quot;Recover my account&amp;quot; link on the login page&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
For the record, collecting and verifying e-mail addresses is a VERY good idea, even (especially?) if you accept OpenID. A verified e-mail address is still absolutely the best way to deal with lost passwords or “my OpenID isn’t working”.


    &lt;p&gt;Tags: &lt;a href="https://simonwillison.net/tags/email"&gt;email&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/accounts"&gt;accounts&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/identity"&gt;identity&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/openid"&gt;openid&lt;/a&gt;&lt;/p&gt;



</summary><category term="email"/><category term="accounts"/><category term="identity"/><category term="openid"/></entry><entry><title>Plaxo sees 92% success rate with OpenID/OAuth hybrid method</title><link href="https://simonwillison.net/2009/Feb/11/plaxo/#atom-tag" rel="alternate"/><published>2009-02-11T17:20:55+00:00</published><updated>2009-02-11T17:20:55+00:00</updated><id>https://simonwillison.net/2009/Feb/11/plaxo/#atom-tag</id><summary type="html">
    
&lt;p&gt;&lt;strong&gt;&lt;a href="http://www.readwriteweb.com/archives/comcast_property_sees_92_success_rate_openid.php"&gt;Plaxo sees 92% success rate with OpenID/OAuth hybrid method&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
Really wish I could have been at the OpenID UX Summit hosted by Facebook yesterday—sounds like an awful lot of important problems are being solved.


    &lt;p&gt;Tags: &lt;a href="https://simonwillison.net/tags/facebook"&gt;facebook&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/openid"&gt;openid&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/plaxo"&gt;plaxo&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/comcast"&gt;comcast&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/google"&gt;google&lt;/a&gt;&lt;/p&gt;



</summary><category term="facebook"/><category term="openid"/><category term="plaxo"/><category term="comcast"/><category term="google"/></entry><entry><title>Quoting Chris Messina</title><link href="https://simonwillison.net/2009/Feb/6/welcoming/#atom-tag" rel="alternate"/><published>2009-02-06T00:19:51+00:00</published><updated>2009-02-06T00:19:51+00:00</updated><id>https://simonwillison.net/2009/Feb/6/welcoming/#atom-tag</id><summary type="html">
    &lt;blockquote cite="http://factoryjoe.com/blog/2009/02/04/welcoming-facebook-to-the-openid-foundation/"&gt;&lt;p&gt;... Facebook will be hosting the second User Experience Summit for OpenID on February 10th. The goal is to convene some of the best designers that leading internet companies can muster, and bring them together to develop a series of guidelines, best practices, iterations, and interfaces for making OpenID not just suck less, but become a great experience&lt;/p&gt;&lt;/blockquote&gt;
&lt;p class="cite"&gt;&amp;mdash; &lt;a href="http://factoryjoe.com/blog/2009/02/04/welcoming-facebook-to-the-openid-foundation/"&gt;Chris Messina&lt;/a&gt;&lt;/p&gt;

    &lt;p&gt;Tags: &lt;a href="https://simonwillison.net/tags/facebook"&gt;facebook&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/openid"&gt;openid&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/chris-messina"&gt;chris-messina&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/usability"&gt;usability&lt;/a&gt;&lt;/p&gt;



</summary><category term="facebook"/><category term="openid"/><category term="chris-messina"/><category term="usability"/></entry><entry><title>Want Proof OpenID Can Succeed? Just Scroll Down</title><link href="https://simonwillison.net/2009/Jan/16/aargh/#atom-tag" rel="alternate"/><published>2009-01-16T12:16:03+00:00</published><updated>2009-01-16T12:16:03+00:00</updated><id>https://simonwillison.net/2009/Jan/16/aargh/#atom-tag</id><summary type="html">
    
&lt;p&gt;&lt;strong&gt;&lt;a href="http://blog.wired.com/business/2009/01/want-proof-open.html"&gt;Want Proof OpenID Can Succeed? Just Scroll Down&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
“It’s easier for blogs, which don’t need a lot of demographic information about a user, to let people jump in and start participating socially without filling out a registration form.” Aargh. Repeat after me: supporting OpenID does not mean you can’t require additional registration details through a signup form.


    &lt;p&gt;Tags: &lt;a href="https://simonwillison.net/tags/openid"&gt;openid&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/registration"&gt;registration&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/wired"&gt;wired&lt;/a&gt;&lt;/p&gt;



</summary><category term="openid"/><category term="registration"/><category term="wired"/></entry><entry><title>Wetpaint no longer supports OpenID</title><link href="https://simonwillison.net/2009/Jan/8/wetpaint/#atom-tag" rel="alternate"/><published>2009-01-08T14:53:40+00:00</published><updated>2009-01-08T14:53:40+00:00</updated><id>https://simonwillison.net/2009/Jan/8/wetpaint/#atom-tag</id><summary type="html">
    
&lt;p&gt;&lt;strong&gt;&lt;a href="http://www.wetpaintcentral.com/page/OpenID?t=anon"&gt;Wetpaint no longer supports OpenID&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
I missed this, but they turned off their OpenID support in November due to low usage and high maintenance costs.


    &lt;p&gt;Tags: &lt;a href="https://simonwillison.net/tags/openid"&gt;openid&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/wetpaint"&gt;wetpaint&lt;/a&gt;&lt;/p&gt;



</summary><category term="openid"/><category term="wetpaint"/></entry><entry><title>Talking about OpenID</title><link href="https://simonwillison.net/2009/Jan/5/talking/#atom-tag" rel="alternate"/><published>2009-01-05T10:46:57+00:00</published><updated>2009-01-05T10:46:57+00:00</updated><id>https://simonwillison.net/2009/Jan/5/talking/#atom-tag</id><summary type="html">
    
&lt;p&gt;&lt;strong&gt;&lt;a href="http://mywhat.org/2009/01/04/talking-about-openid/"&gt;Talking about OpenID&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
“So a relying party walks in to a bar...”


    &lt;p&gt;Tags: &lt;a href="https://simonwillison.net/tags/openid"&gt;openid&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/jargon"&gt;jargon&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/relyingparty"&gt;relyingparty&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/comic"&gt;comic&lt;/a&gt;&lt;/p&gt;



</summary><category term="openid"/><category term="jargon"/><category term="relyingparty"/><category term="comic"/></entry><entry><title>Getting OpenID Into the Browser</title><link href="https://simonwillison.net/2008/Dec/3/openid/#atom-tag" rel="alternate"/><published>2008-12-03T10:00:24+00:00</published><updated>2008-12-03T10:00:24+00:00</updated><id>https://simonwillison.net/2008/Dec/3/openid/#atom-tag</id><summary type="html">
    
&lt;p&gt;&lt;strong&gt;&lt;a href="http://radar.oreilly.com/2008/12/getting-openid-into-the-browse.html"&gt;Getting OpenID Into the Browser&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
David Recordon makes the case for online identity management as a key browser feature (I like the “your browser is currently locked” concept), and argues that Gears is in a great position to deliver it.


    &lt;p&gt;Tags: &lt;a href="https://simonwillison.net/tags/gears"&gt;gears&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/david-recordon"&gt;david-recordon&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/identity"&gt;identity&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/browsers"&gt;browsers&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/openid"&gt;openid&lt;/a&gt;&lt;/p&gt;



</summary><category term="gears"/><category term="david-recordon"/><category term="identity"/><category term="browsers"/><category term="openid"/></entry><entry><title>Clearing up inaccuracies about the Google OpenID IDP launch</title><link href="https://simonwillison.net/2008/Nov/8/clearing/#atom-tag" rel="alternate"/><published>2008-11-08T23:11:31+00:00</published><updated>2008-11-08T23:11:31+00:00</updated><id>https://simonwillison.net/2008/Nov/8/clearing/#atom-tag</id><summary type="html">
    
&lt;p&gt;&lt;strong&gt;&lt;a href="http://blog.unto.net/miscellaneous/clearing-up-inaccuracies-about-the-google-openid-idp-launch/"&gt;Clearing up inaccuracies about the Google OpenID IDP launch&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
Google took some undeserved flack when they launched their OpenID provider. For the record, whitelisting providers fits my definition of the “Open” in OpenID perfectly (providers and consumers are free to impose whatever policies they like).


    &lt;p&gt;Tags: &lt;a href="https://simonwillison.net/tags/whitelisting"&gt;whitelisting&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/openid"&gt;openid&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/google"&gt;google&lt;/a&gt;&lt;/p&gt;



</summary><category term="whitelisting"/><category term="openid"/><category term="google"/></entry><entry><title>New OpenID Implementations Abound</title><link href="https://simonwillison.net/2008/Oct/30/apparentlymeuk/#atom-tag" rel="alternate"/><published>2008-10-30T17:11:19+00:00</published><updated>2008-10-30T17:11:19+00:00</updated><id>https://simonwillison.net/2008/Oct/30/apparentlymeuk/#atom-tag</id><summary type="html">
    
&lt;p&gt;&lt;strong&gt;&lt;a href="http://community.livejournal.com/apparentlymart/18734.html"&gt;New OpenID Implementations Abound&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
I’ve missed linking to a bunch of OpenID news recently—in particular, Google Accounts are becoming OpenID identifiers and LiveJournal has quietly ugraded its consumer support to OpenID 2.0.


    &lt;p&gt;Tags: &lt;a href="https://simonwillison.net/tags/openid"&gt;openid&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/google"&gt;google&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/livejournal"&gt;livejournal&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/openid2"&gt;openid2&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/martin-atkins"&gt;martin-atkins&lt;/a&gt;&lt;/p&gt;



</summary><category term="openid"/><category term="google"/><category term="livejournal"/><category term="openid2"/><category term="martin-atkins"/></entry><entry><title>Quoting Jorgen Thelin</title><link href="https://simonwillison.net/2008/Oct/30/jorgen/#atom-tag" rel="alternate"/><published>2008-10-30T17:09:58+00:00</published><updated>2008-10-30T17:09:58+00:00</updated><id>https://simonwillison.net/2008/Oct/30/jorgen/#atom-tag</id><summary type="html">
    &lt;blockquote cite="http://simonwillison.net/2008/Oct/27/windows/#c42074"&gt;&lt;p&gt;In the final Production release we will be adding the ability to sign in to the Live ID OpenID Provider using any of the credential types that can be used with regular Live ID sign-in's -- including CardSpace, SmartCard, eID, etc.&lt;/p&gt;&lt;/blockquote&gt;
&lt;p class="cite"&gt;&amp;mdash; &lt;a href="http://simonwillison.net/2008/Oct/27/windows/#c42074"&gt;Jorgen Thelin&lt;/a&gt;&lt;/p&gt;

    &lt;p&gt;Tags: &lt;a href="https://simonwillison.net/tags/cardspace"&gt;cardspace&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/smartcard"&gt;smartcard&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/eid"&gt;eid&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/windowslive"&gt;windowslive&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/openid"&gt;openid&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/jorgen-thelin"&gt;jorgen-thelin&lt;/a&gt;&lt;/p&gt;



</summary><category term="cardspace"/><category term="smartcard"/><category term="eid"/><category term="windowslive"/><category term="openid"/><category term="jorgen-thelin"/></entry><entry><title>Windows Live Adds Support For OpenID</title><link href="https://simonwillison.net/2008/Oct/27/windows/#atom-tag" rel="alternate"/><published>2008-10-27T21:34:22+00:00</published><updated>2008-10-27T21:34:22+00:00</updated><id>https://simonwillison.net/2008/Oct/27/windows/#atom-tag</id><summary type="html">
    
&lt;p&gt;&lt;strong&gt;&lt;a href="http://www.techcrunch.com/2008/10/27/windows-live-adds-support-for-openid-calls-it-de-facto-login-standard/"&gt;Windows Live Adds Support For OpenID&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
I hope they include the option to log in to the provider using CardSpace, to address phishing.


    &lt;p&gt;Tags: &lt;a href="https://simonwillison.net/tags/phishing"&gt;phishing&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/cardspace"&gt;cardspace&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/openid"&gt;openid&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/microsoft"&gt;microsoft&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/techcrunch"&gt;techcrunch&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/live"&gt;live&lt;/a&gt;&lt;/p&gt;



</summary><category term="phishing"/><category term="cardspace"/><category term="openid"/><category term="microsoft"/><category term="techcrunch"/><category term="live"/></entry><entry><title>Yahoo! Releases OpenID Research</title><link href="https://simonwillison.net/2008/Oct/14/yahoo/#atom-tag" rel="alternate"/><published>2008-10-14T16:59:12+00:00</published><updated>2008-10-14T16:59:12+00:00</updated><id>https://simonwillison.net/2008/Oct/14/yahoo/#atom-tag</id><summary type="html">
    
&lt;p&gt;&lt;strong&gt;&lt;a href="http://developer.yahoo.net/blog/archives/2008/10/open_id_research.html"&gt;Yahoo! Releases OpenID Research&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
Extremely valuable research, conducted with a group of typical Yahoo! users. OpenIDs usability remains bad, and if we don’t get it right soon something centralised like Facebook Connect will take over and the Web will stop being open.


    &lt;p&gt;Tags: &lt;a href="https://simonwillison.net/tags/facebook"&gt;facebook&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/facebookconnect"&gt;facebookconnect&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/openid"&gt;openid&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/usability"&gt;usability&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/yahoo"&gt;yahoo&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/research"&gt;research&lt;/a&gt;&lt;/p&gt;



</summary><category term="facebook"/><category term="facebookconnect"/><category term="openid"/><category term="usability"/><category term="yahoo"/><category term="research"/></entry><entry><title>Google's Usability Research on Federated Login</title><link href="https://simonwillison.net/2008/Sep/22/usability/#atom-tag" rel="alternate"/><published>2008-09-22T20:56:33+00:00</published><updated>2008-09-22T20:56:33+00:00</updated><id>https://simonwillison.net/2008/Sep/22/usability/#atom-tag</id><summary type="html">
    
&lt;p&gt;&lt;strong&gt;&lt;a href="https://sites.google.com/site/oauthgoog/UXFedLogin"&gt;Google&amp;#x27;s Usability Research on Federated Login&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
Fascinating—suggests an approach to federated auth based on the Amazon.com “Yes, I have a password” login flow. Feels convoluted to me but apparently it tests really well against a mainstream audience. The more research shared around this stuff the better.


    &lt;p&gt;Tags: &lt;a href="https://simonwillison.net/tags/google"&gt;google&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/usability"&gt;usability&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/openid"&gt;openid&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/login"&gt;login&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/amazon"&gt;amazon&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/authentication"&gt;authentication&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/federated"&gt;federated&lt;/a&gt;&lt;/p&gt;



</summary><category term="google"/><category term="usability"/><category term="openid"/><category term="login"/><category term="amazon"/><category term="authentication"/><category term="federated"/></entry><entry><title>Quoting Tim Anderson</title><link href="https://simonwillison.net/2008/Aug/29/captcha/#atom-tag" rel="alternate"/><published>2008-08-29T10:01:32+00:00</published><updated>2008-08-29T10:01:32+00:00</updated><id>https://simonwillison.net/2008/Aug/29/captcha/#atom-tag</id><summary type="html">
    &lt;blockquote cite="http://www.guardian.co.uk/technology/2008/aug/28/internet.captcha"&gt;&lt;p&gt;New authentication schemes such as OpenID, or Microsoft's CardSpace, may help as adoption increases. These systems make it possible to register for one site using credentials verified by another. Instead of having many sites with poor verification procedures, the internet could have a few sites with strong verification procedures, that are then used by others. The advantage for the user is that they no longer have to jump through multiple hoops for each new site they encounter.&lt;/p&gt;&lt;/blockquote&gt;
&lt;p class="cite"&gt;&amp;mdash; &lt;a href="http://www.guardian.co.uk/technology/2008/aug/28/internet.captcha"&gt;Tim Anderson&lt;/a&gt;, in the Guardian&lt;/p&gt;

    &lt;p&gt;Tags: &lt;a href="https://simonwillison.net/tags/tim-anderson"&gt;tim-anderson&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/guardian"&gt;guardian&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/openid"&gt;openid&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/cardspace"&gt;cardspace&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/security"&gt;security&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/captchas"&gt;captchas&lt;/a&gt;&lt;/p&gt;



</summary><category term="tim-anderson"/><category term="guardian"/><category term="openid"/><category term="cardspace"/><category term="security"/><category term="captchas"/></entry><entry><title>OSCON in 37 minutes</title><link href="https://simonwillison.net/2008/Jul/29/oscon/#atom-tag" rel="alternate"/><published>2008-07-29T23:59:14+00:00</published><updated>2008-07-29T23:59:14+00:00</updated><id>https://simonwillison.net/2008/Jul/29/oscon/#atom-tag</id><summary type="html">
    
&lt;p&gt;&lt;strong&gt;&lt;a href="http://www.railsenvy.com/2008/7/29/oscon-videos"&gt;OSCON in 37 minutes&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
45 OSCON talks summarised by their presenters in just 37 minutes, compiled by Gregg Pollack. I get to rant about OpenID for a minute at 27:22.


    &lt;p&gt;Tags: &lt;a href="https://simonwillison.net/tags/openid"&gt;openid&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/video"&gt;video&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/oscon"&gt;oscon&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/gregg-pollack"&gt;gregg-pollack&lt;/a&gt;&lt;/p&gt;



</summary><category term="openid"/><category term="video"/><category term="oscon"/><category term="gregg-pollack"/></entry></feed>