Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
Security Hardware

Hardware Based OpenID Service Available 119

An anonymous reader writes "TrustBearer Labs has announced a new service that lets you use various hardware based security tokens like smartcards and biometric devices with OpenID. A hardware based connection to OpenID allows higher levels of security and makes it easier for the end-user to control their credentials. OpenID is a decentralized cross-site authentication system that has been gaining momentum for quite a while now with major supporters like AOL, Google and Microsoft already announced."
This discussion has been archived. No new comments can be posted.

Hardware Based OpenID Service Available

Comments Filter:
  • Privacy Problem (Score:2, Interesting)

    by jswinth ( 528529 ) on Wednesday February 13, 2008 @05:26PM (#22411598) Homepage
    Doesn't this create a new privacy problem much like search data? How likely are companies providing the authentication services to create logs of which sites you login to? It is one thing to know what I search on but it is even more invasive to know which sites I actively login to.
  • by cybereal ( 621599 ) on Wednesday February 13, 2008 @05:26PM (#22411604) Homepage
    I have this verisign pip setup and have a key. It is essentially human delivered asymmetrical authentication. It's great security; plus, it works with the $5 keyfob from PayPal!
  • REMOTE_USER (Score:4, Interesting)

    by thanasakis ( 225405 ) on Wednesday February 13, 2008 @05:46PM (#22411842)
    As long as the openid provider (the party that provides the identity by utilizing an authentication mechanism) can access the the REMOTE_USER env variable or something equivalent, it can perform its duty normally. I think it is really not important whether there is username/password based authentication or PKI authentication using soft tokens or hardware crypto tokens or biometric authentication or one time passwords or whatever else. It is up to the implementor of the service to decide what kind of authentication will be used according to his/her requirements. Using an external authentication mechanism can slightly perplex the situation on how logout is performed (as it is dependent on the auth mechanism) or on how attribute based authorization is being carried out.

    But overall it gives great flexibility to the implementor because he/she can layout a scheme were existing authentication/authorization infrastructures (like an institution's LDAP for example) can be used in a cross platform way to offer web based identity.

  • by IGnatius T Foobar ( 4328 ) on Wednesday February 13, 2008 @06:30PM (#22412398) Homepage Journal
    I would like to use OpenID as a "single sign on" solution for a wide range of services. The problem I see right now is that it's only viable for web based services. Does the OpenID technology have a way (or is planning one) to authenticate when the client is something other than a web browser? I'm thinking things like IMAP/SMTP mail, console mode login (ssh/telnet), etc. etc.
  • Re:Security risks? (Score:3, Interesting)

    by CSMatt ( 1175471 ) on Wednesday February 13, 2008 @07:02PM (#22412798)
    True, but that relies on the original account holder to know that they have been compromised to begin with. Given the amount of identity fraud victims that don't even know that they are victims until it's too late (although I would imagine that number has gone down in recent years with recent awareness of identity fraud), it's not too hard to imagine that there are several account holders online who don't even know that someone has guessed their password, especially if the account holder has abandoned the site (one-time purchases and such).
  • Re:itsatrap (Score:3, Interesting)

    by Tony Hoyle ( 11698 ) <tmh@nodomain.org> on Thursday February 14, 2008 @07:23AM (#22418308) Homepage
    The difference is that the person I'm replying to knows I own that OpenID account, rather than me just being a random anonymous person.

    No, it knows nothing. OpenID has no trust, so they could have just visited http://www.jkg.in/openid/ [www.jkg.in] and generated one for that purpose.

    OpenID says zero about who you really are. You are an anonymous user - which is why it would be crazy for a site which previously required registration to allow OpenID users to post simply based on the existence of that token. You're going to have to registry/verify your email/etc. *as well* so you've gained nothing.

He has not acquired a fortune; the fortune has acquired him. -- Bion

Working...