Skip to content
This repository has been archived by the owner on Apr 13, 2022. It is now read-only.

Removed references to TLS that imply it is the primary form of authenication #26

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

jaxoncreed
Copy link
Contributor

TLS as a primary form of authentication should be deprecated in favor of a oidc. TLS may still be used as a form of credentials under oidc. All concerns about needing completely decentralized identity systems will be solved with an eventual implementation of DiD.

README.md Show resolved Hide resolved
motivation.md Show resolved Hide resolved
@dmitrizagidulin
Copy link
Member

👍 looks good.

@michielbdejong
Copy link

@jaxoncreed ping

@jaxoncreed
Copy link
Contributor Author

@dmitrizagidulin @michielbdejong could you give this a review so I can merge it?

Copy link

@michielbdejong michielbdejong left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM

@michielbdejong
Copy link

@kjetilk I think you have write access to this repo, can you add your review?

@michielbdejong
Copy link

also @RubenVerborgh please re-review

@michielbdejong
Copy link

@kjetilk @Mitzi-Laszlo @timbl @justinwb: we need one more of you to approve this before it can be merged.

@kjetilk
Copy link
Member

kjetilk commented Jun 14, 2019

Actually, I have no strong opinions, but this has such a long history that I think @timbl 's review would be good to have for legitimacy.

@kidehen
Copy link

kidehen commented Jun 15, 2019

TLS as a primary form of authentication should be deprecated in favor of a oidc. TLS may still be used as a form of credentials under oidc. All concerns about needing completely decentralized identity systems will be solved with an eventual implementation of DiD.

What does that mean, in regards to your DiD reference?

Solid has historically supported WebID-TLS or WebID-OpenID Connect as authentication protocols. Why do we need to go down the problematic maze associated with designating WebID-OpenID Connect as the Primary Authentication Protocol? That's simply wrong, and by now the experiences to date should be ample evidence.

Experiences to date meaning:

  1. Create a Pod
  2. Use the Pod repeatedly without authentication hassles and confusion.
  3. Allow others interact with a pod for read-write operations on a predictable basis without authentication hassles and confusion.

@RubenVerborgh
Copy link

Note: I approved for technical correctness, but this should not be merged without approval from @timbl indeed.

WebID-TLS has some very nice technical properties; the only blocker is the extremely bad browser UI (which is so bad that it is currently virtually impossible to use it with many sources, as we will have with Solid).

At the same time, we have the One Solid notion.

So not an easy decision at all.

Copy link
Member

@kjetilk kjetilk left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

OK, I'll set myself to "request changes" so that it is not merged by accident pending @timbl 's review.

@kidehen
Copy link

kidehen commented Jun 17, 2019

Situation Analysis

Solid seeks to simplify (via frameworks, libraries etc) the development and deployment of read-write applications that leverage Linked Data principles.

As part of the endeavor outlined above, loose-coupling of Identity (via resolvable identifiers i.e., WebID), Identification (profile data i.e., WebID-Profile Document), authentication (via authentication protocols e.g., OpenID Connect and TLS), and authorization (via WebACLs) are essential regarding architecture dexterity and vision consistency.

Challenge

What MUST application developers expect in order to provide solutions to end-users en route to providing the most flexible and usable experience possible?

Suggested Solution

Here's a table reflecting both what exists across protocols and developer profiles using a MAY, SHOULD, or MUST approach to authentication protocol support i.e., what needs to be reflected in literature that informs rather than confuses the broader Solid Community.

TLS OpenID Connect OpenID Connect + TLS Bridge
Solid Client App Developer MAY SHOULD MUST
Node Solid Server MAY SHOULD MUST

@jaxoncreed
Copy link
Contributor Author

@kidehen That sounds like an acceptable solution, though I think I'd upgrade OpenID Connect to a MUST (since it's already implemented for the OpenID Connect + TLS Bridge).

Would you mind making those modifications to the spec then linking that pull request here?

@michielbdejong
Copy link

  TLS OpenID Connect OpenID Connect + TLS Bridge
Solid Client App Developer MAY MUST
IDP MAY MUST SHOULD
Storage Server MAY MUST

@michielbdejong
Copy link

This PR only corrects the context about webid-oidc-spec, the mention of "secondary" webid-tls as per that table will go into solid/solid-spec#171

Copy link

@michielbdejong michielbdejong left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM, with the side note that we should take into account @kidehen's point when formulating solid/solid-spec#171

@michielbdejong
Copy link

@timbl can we merge this now? This only removes references from this spec, the bigger change is in solid/solid-spec#171

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

6 participants