Identity/Verified Email Protocol: Difference between revisions

Deprecate VEP; link to BrowserID
(Deprecate VEP; link to BrowserID)
 
(9 intermediate revisions by 2 users not shown)
Line 1: Line 1:
{| class="fullwidth-table"
|-
| '''Note: The Verified Email Protocol has been deprecated. Please check the [[Identity/BrowserID|BrowserID]] protocol.'''
|}
{| class="fullwidth-table"
{| class="fullwidth-table"
|-
|-
Line 8: Line 12:
<section begin="status" />
<section begin="status" />
| [[Identity/Verified Email Protocol|Verified Email Protocol]]
| [[Identity/Verified Email Protocol|Verified Email Protocol]]
| {{StatusHealthy|status=Draft 1}}
| {{StatusHealthy|status=First draft done. Refining/polishing.}}
| TBD
| TBD
| Dan Mills
| Dan Mills
Line 28: Line 32:


== Next Steps ==
== Next Steps ==
* Spec changes
* Deal with TODOs in Verified Email doc
** Use certification flow (exclusively)
** cert refresh - decide on long-lived (reusable) keys or not
** Rewrite to be more spec-like (MUSTs and so on)
* Polish/expand session API specification doc
** Add nonces to assertions so they may be single-use
** Add session API
* Figure out delta from previous spec
* Security review
* Security review
* Privacy review
* Privacy review
Line 40: Line 41:


;Current
;Current
* [[/Latest|Latest]]
* [[/Latest|Latest (Verified Email)]]
* [[/Latest-Session|Latest (Session)]]


;Archived
;Archived
Line 48: Line 50:


== Open Issues ==
== Open Issues ==
How is this different from SSL Client Authentication?
#Trusted 3rd party signs a certificate that you store in your browser
#The browser has a "Selector" to let you choose the cert based on acceptable signed 3rd parties
#The cert can be expired or revoked
#You have the same issues with crl checking, if my "key" is comprimised and i have my provider revoke it before it expires the RP still needs to validate it against a revocation list at some point
A certificate can store all the information a JSON token can (shoot, it could store a JSON token if thats the way you wanted to go).  Certificate based authentication is already working and would provide a much greater range for not just consumer sites but enterprise apps as well.


== Use Cases ==
== Use Cases ==
Line 56: Line 67:


== Other Documentation ==
== Other Documentation ==
[[File:Verified_Email_Primary_Authority_Flow.jpg|200px|thumb|left|'''Protocol flow'''<br>Primary Authority + Relying Party verification using crypto]]
[[File:Verified_Email_Secondary_Authority_Flow.jpg|200px|thumb|left|'''Protocol flow'''<br>Secondary Authority + Relying Party verification using crypto]]
<br clear="all"/>


== Legend (remove if you like) ==
== Legend (remove if you like) ==
Confirmed users
170

edits