-
Notifications
You must be signed in to change notification settings - Fork 18
Deriving WebID URI from ID Token #10
Comments
I don't understand why "wishful thinking". The RP at some point needs to have some awareness of WebID, so why would one method be realistic and the others not? If method 1 and 2 are wishful thinking, I don't understand "Why not construct..." |
Because in the general case you cannot rely on ID-token containing |
WebID-OIDC is an extension of core. It isn't advertised as something else. So, the webid key is a clear signal from the server. Besides, string concat'ing key values to derive the WebID URI generally feels more like a hack to me, but that's the environment we are working with. |
What is the benefit of that extension though? Does it justify excluding all software that supports OpenID Connect Core but not WebID-OIDC? Which is like, the absolute majority. Where is the WebID URI from WebID-OIDC being used? Isn't only for ACL? Can't the WebID be formulated as Core-compliant convention instead? I think I've shown that it can. |
To summarize
Regarding method 1, it seems impractical to have the Regarding method 2, I do not see why the OIDC server would not be able to add claims. It is the entity forging the JWT in the first place. Besides, how to know that the Regarding method 3, it is similar in requirements to method 1. i.e. identity claims can either be retrieved within the ID token or from a user-info request. However, why use the It seems to me that the WebID-OIDC specification should be clarified by specifying a
Like I was saying in solid/solid-spec#106, it is possible to forge an identifier with the pair |
@Sparika the point of my proposal was that WebID-OIDC does not need new scopes or anything outside the OIDC spec that would drastically hamper adoption, just the Re. the
How do you understand "locally unique and never reassigned identifier"? To me it sounds like a primary identifier. |
It was not obvious to me before one of the architect at Orange explained it to me. Consider the following example: See also Nat Sakimura's implementation of OIDC, and especially the function |
Of the 3 methods listed in Deriving WebID URI from ID Token, only the
UserInfo
-based one is realistic, the other ones are wishful thinking.But if this WebID URI will not be used for the TLS-based authentication protocol, and most likely only relevant for ACL, why even bother?
Why not construct a URI from
iss
andsub
fields of the ID-token? For examplehttps://server.example.com#24400320
.Since
iss
is "a locally unique and never reassigned identifier within the Issuer for the End-User", I don't think this can lead to any collisions.The text was updated successfully, but these errors were encountered: