Cardspace Web Integration

Cardspace Web Integration

A Guide to Supporting Information Cards within Web Applications and Browsers as of the Information Card Profile V1.0 December 2006 Author Michael B. Jones Microsoft Corporation Copyright Notice © 2006 Microsoft Corporation. All rights reserved. Abstract The Identity Metasystem allows users to manage their digital identities from various identity providers and employ them in different contexts where they are accepted to access online services. In the Identity Metasystem, identities are represented to users as “Information Cards” (a.k.a. “InfoCards”). One important class of applications where Information Card- based authentication can be used is applications hosted on web sites and accessed through web browsers. This paper documents the web interfaces utilized by browsers and web applications that support the Identity Metasystem. The information in this document is not specific to any one browser or platform. This document supplements the information provided in two other Information Card Profile references: the Guide to the Information Card Profile V1.0 [InfoCard-Guide], which provides a non-normative description of the overall Information Card model, and the Technical Reference for the Information Card Profile V1.0 [InfoCard-Ref], which provides the normative schema definitions and behaviors referenced by the Guide to the Information Card Profile V1.0. Status The Information Card Profile V1.0 was used to implement Windows CardSpace V1.0, which is part of Microsoft .NET Framework 3.0 [.NET3.0], and Internet Explorer 7. Other implementations following these specifications should be able to interoperate with the Microsoft implementation. Version 1.0 Page 1 of 13 Table of Contents 1. Introduction 2. Design Goals 3. Browser Behavior with Information Cards 3.1. Basic Protocol Flow when using an Information Card at a Web Site 3.2. Protocol Flow with Relying Party STS 3.3. User Perspective and Examples 3.4. Browser Perspective 3.5. Web Site Perspective 4. Invoking an Identity Selector from a Web Page 4.1. Syntax Alternatives: OBJECT and XHTML tags 4.1.1. OBJECT Syntax Examples 4.1.2. XHTML Syntax Example 4.2. Identity Selector Invocation Parameters 4.2.1. issuer (optional) 4.2.2. issuerPolicy (optional) 4.2.3. tokenType (optional) 4.2.4. requiredClaims (optional) 4.2.5. optionalClaims (optional) 4.2.6. privacyUrl (optional) 4.2.7. privacyVersion (optional) 4.3. Data Types for use with Scripting 4.4. Detecting and Utilizing an Information Card-enabled Browser 5. References Appendix A – HTTPS POST Sample Contents Appendix B – Detecting Information Card Browser Support by Internet Explorer 1. Introduction The Identity Metasystem allows users to manage their digital identities, whether they are self-issued or issued by third-party identity providers, and employ them in contexts where they are accepted to access online services. In the Identity Metasystem, identities are represented to users as “Information Cards” (a.k.a. “InfoCards”). One important class of applications where Information Card-based authentication can be used is applications hosted on web sites and accessed through web browsers. This paper documents the web interfaces utilized by browsers and web applications supporting the Identity Metasystem. The information in this document applies to all platforms, browsers, and Identity Selectors. These mechanisms are documented here to enable web sites and browsers on all platforms to implement and use these mechanisms so they can utilize Information Cards for authentication. Two other documents should be considered prerequisites for understanding this document: the Guide to the Information Card Profile V1.0 [InfoCard-Guide], which provides a non- normative description of the overall Information Card model, and the Technical Reference for the Information Card Profile V1.0 [InfoCard-Ref], which provides the normative schema definitions and behaviors referenced by the Guide to the Information Card Profile V1.0. Version 1.0 Page 2 of 13 The Information Card Profile V1.0 was used to implement the Windows CardSpace V1.0 software, which is part of Microsoft .NET Framework 3.0 [.NET3.0]. Windows CardSpace implements an Identity Selector that allows users to select Information Cards to use for sites and applications that accept them. Internet Explorer 7 uses Windows CardSpace, if installed. The information in this document corresponds to the features supported in the Information Card Profile V1.0. 2. Design Goals Numerous alternatives were considered for ways of bringing Information Card-based authentication to web sites. The design goals that led to the eventual decisions described in this document are: • Browser independent: A goal was to ensure that the protocols developed for Information Card-based authentication to web sites could be implemented by a broad range of web browsers on the platforms of their choice. • Web server independent: A closely-related goal was to ensure that the protocols developed for Information Card-based authentication to web sites could be used by web-based applications running on a broad range of web servers on the platforms of their choice. • Minimal impact on web sites: A goal was to facilitate the adoption of Information Card-based authentication for existing web sites by requiring as few changes to them as possible. • Seamless browser integration: A goal was that Information Card-based authentication should be viewed as a seamless security feature that is a natural extension of the browser(s) being used. • Seamless user experience: A goal was that the Information Card web integration design should permit graceful fall-back when a browser or platform does not have Information Card support available. • Work with browser high security settings: A goal was that the mechanisms chosen should remain enabled even when browser security settings are set to “high”. The choices described in this document are an attempt to balance among all these sometimes-competing goals and to achieve all of them as well as possible, given the realities of how the web is used today. 3. Browser Behavior with Information Cards This section explains the steps that a web browser takes when using an Information Card to authenticate to a web site. Two cases are described. The basic case is where the web site provides all the relying party functionality via HTML extensions transported over HTTPS. The second case is where the relying party employs a relying party Security Token Server (STS), which it references via HTML extensions transported over HTTPS. 3.1. Basic Protocol Flow when using an Information Card at a Web Site This section explains the protocol flow when using an Information Card to authenticate at a web site where no relying party STS is employed. Version 1.0 Page 3 of 13 Figure 1. Basic protocol flow when using an Information Card to authenticate at a Web site Figure 1 gives an example of the basic protocol flow when an Information Card is used to authenticate at a web site that employs no relying party STS. Steps 1, 2, and 5 are essentially the same as a typical forms-based login today: (1) The user navigates to a protected page that requires authentication. (2) The site redirects the browser to a login page, which presents a web form. (5) The browser posts the web form that includes the login credentials supplied by the user back to the login page. The site then validates the contents of the form including the user credentials, typically writes a client-side browser cookie to the client for the protected page domain, and redirects the browser back to the protected page. The key difference between this scenario and today’s site login scenarios is that the login page returned to the browser in step (2) contains an HTML tag that allows the user to choose to use an Information Card to authenticate to the site. When the user selects this tag, the browser invokes an Identity Selector, which implements the Information Card user experience and protocols, and triggers steps (3) through (5). In Step (3), the browser Information Card support code invokes the Identity Selector, passing it parameter values supplied by the Information Card HTML tag supplied by the site in Step (2). The user then uses the Identity Selector to choose an Information Card, which represents a digital identity that can be used to authenticate at that site. Step (4) uses the standard Identity Metasystem protocols [InfoCard-Guide] to retrieve a security token that represents the digital identity selected by the user from the STS at the identity provider for that identity. In Step (5), the browser posts the token obtained back to the web site using a HTTPS/POST. The web site validates the token, completing the user’s Information Card- Version 1.0 Page 4 of 13 based authentication to the web site. Following authentication, the web site typically then writes a client-side browser cookie and redirects the browser back to the protected page. It is worth noting that this cookie is likely to be exactly the same cookie as the site would have written back had the user authenticated via other means, such as a forms-based login using username/password. This is one of the ways that the goal of “minimal impact on web sites” is achieved. Other than its authentication subsystem, the bulk of a web site’s code can remain completely unaware that Information Card-based authentication is even utilized. It just uses the same kinds of cookies as always. 3.2. Protocol Flow with Relying Party STS In the previous scenario, the web site communicated with the client Identity Selector using only the HTML extensions enabling Information Card use, transported over the normal browser HTTPS channel. In this scenario, the web site also employs a relying party STS to do part of the work of authenticating the user, passing the result of that authentication on to the login page via HTTPS POST.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    13 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us